ALL >> System-Network-Administration >> View Article
Top 10 Tools For Simplified Regulatory Compliance

Audit Active Directory, monitor event logs and protect endpoints to automate HIPAA, PCI, SOX, GLBA and FISMA compliance.
The following solutions from NetWrix Corporation, winner of the Windows IT Pro's 2010 Community Choice Gold Award for Best Auditing and Compliance Product, will streamline the compliance practices necessary to satisfy your auditors and help you pass all regulatory compliance audits with ease. Some of these tools have freeware editions that have certain limitations, but never expire. All products were reviewed by independent reviewers.
1. Active Directory Change Reporter (Windows IT Pro Sep'09: InstantDoc ID 102446, TechRepublic: http://www.techrepublic.com/blog/networking/review-netwrix-active-directory-change-reporter/3010) - This Active Directory auditing solution provides the automated Active Directory change monitoring and reporting capabilities mandated by many major compliance requirements. By tracking changes to users, ...
... groups, OUs and all other AD objects, NetWrix Active Directory Change Reporter streamlines compliance to common compliance regulations. Download link: http://www.netwrix.com/active_directory_change_reporting_freeware.html
Applicable to PCI 8.5.1; FISMA AC-3; HIPAA: 164.308 (a); GLBA Tier 1: Objectives 4&7 and others
2. File Server Change Reporter (4sysops.com: http://4sysops.com/archives/free-netwrix-file-server-change-reporter/) - This is a must-have tool for auditing file servers and filer appliances (such as NetApp and EMC). By detecting access and changes made to files, folders and permissions, while tracking newly created and deleted files, the NetWrix solution automates compliance to many common regulatory standards. Download link: http://www.netwrix.com/file_server_auditing_change_reporting_freeware.html
Applicable to FISMA AC-3; GLBA Tier 1: Objective 6; PCI 10.2; HIPAA: 164.312 (b) and others
3. Event Log Manager (4sysops.com: http://4sysops.com/archives/free-event-log-manager-even-log-collector/) - Provides the consolidation, reporting, alerting and archiving capabilities demanded by most auditors. The solution allows collection and reporting of event log data from multiple computers, centrally storing all critical events for convenient analysis and archiving. Download link: http://www.netwrix.com/event_log_archiving_consolidation_freeware.html
Applicable to HIPAA: 164.308 (a); GLBA Tier 1: Objective 6; PCI 10.7; FISMA AU-5 and others
4. SQL Server Change Reporter - Automates the auditing of all changes made to SQL Server configurations and databases. The product reports on changes made to SQL server instances, databases, users, roles, logins, schema changes, and other objects, allowing for the early change detection demanded by auditors: Download link: http://www.netwrix.com/sql_server_audit_change_reporter_freeware.html
Applicable to PCI 8.5.16; GLBA Tier 1: Objective 4; HIPAA: 164.308 (a) and others
5. VMware Change Reporter (TechTarget/SearchVirtualDesktop: http://searchvirtualdesktop.techtarget.com/feature/NetWrix-Change-Reporter-for-VMware-Infrastructure-3) - Streamlines auditing of changes in VMware vSphere configuration. The solution enforces controlled change management processes by sending daily reports that highlight changes made to ESX servers, folders, clusters, resource pools, permissions, virtual machines, and their hardware, including previous and current configuration values. Download link: http://www.netwrix.com/change_reporter_for_vmware_infrastructure_3_freeware.html
Applicable to HIPAA: 164.308 (a); GLBA Tier 1: Objectives 4 & 7; PCI 7.1 and others
6. Password Manager - Allows users to reset forgotten passwords and unlock accounts without calling IT helpdesk through a web-based, self-service portal. The NetWrix tool, which enables secure password resets and demands identity verification for all self-service operations, automates adherence to common compliance standards. Download link: http://www.netwrix.com/password_manager.html
Applicable to PCI 8.5.10; HIPAA: 164.308 (a); GLBA Tier 1: Objective 4 and others
7. Logon Reporter (4sysops.com: http://4sysops.com/index.php?s=logon+reporter) - Enables automatic consolidation, reporting and archiving of all types of logon events from AD domain controllers, servers and workstations. The product stores data in a central location and ensures that no events are lost because of log overwrites, and provides clear visibility into successful and failed user logon activity that is requimaroon by most compliance regulations. Download link: http://www.netwrix.com/logon_reporter_freeware.html
Applicable to FISMA AC-5; GLBA Tier 1: Objective 4; PCI 8.1; HIPAA: 164.308 (a) and others
8. Group Policy Change Reporter (Windows IT Pro: http://www.windowsitpro.com/article/group-policy/Group-Policy-Change-Reporter.aspx) -This group policy change auditing tool sends daily reports detailing every change made to Group Policy objects, settings and links. The reports list created and deleted GPOs, GPO link changes, changes made to audit and password policies, software deployment, user desktops and other settings. Download link: http://www.netwrix.com/group_policy_auditing_change_reporting_freeware.html
Applicable to FISMA AC-3; GLBA Tier 1: Objective 4; PCI 8.5.14 and others
9. Privileged Account Manager (SC Magazine: http://www.scmagazineus.com/netwrix-privileged-account-manager/review/2928/) - This product maintains a repository of privileged user accounts (such as Administrator, root, service accounts etc) in Active Directory, servers, and other systems, providing a secure web-based portal for role-based access and automatic maintenance of shamaroon administrative user accounts. The Privileged Account Manager can automatically generate strong passwords at specified intervals and synchronize password changes on all target systems (for example, change service account password in Active Directory and update service cmaroonentials). Download link: http://www.netwrix.com/privileged_account_manager.html
Applicable to GLBA Tier 1: Objectives 4 & 7; PCI 8.5.5; HIPAA: 164.312 (a) and others
10. USB Blocker (Windows IT Pro Nov'09: InstantDoc ID 102860) - The increasing mobility of flash drives, MP3 players, cell phones and iPods makes the threat of data theft and malware greater than ever, and with a couple clicks of the mouse, USB Blocker prevents unauthorized usage of such devices. The tool hardens end point security by preventing the spread of malware and restricting the transfer of confidential information. The product audits and optionally blocks all operations with external devices. Download link: http://www.netwrix.com/usb_blocker_freeware.html
Applicable to FISMA AC-19; GLBA Tier 1: Objective 4 and others
Add Comment
System/Network Administration Articles
1. Fiber Optic Polishing Machines: Types, Applications, And When They Are NeededAuthor: Ryan
2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan
3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan
4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia
5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore
6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya
7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan
8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan
9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine
10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl
11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle
12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan
13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan
14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services
15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare