{"id":1020,"date":"2017-09-06T10:45:52","date_gmt":"2017-09-06T08:45:52","guid":{"rendered":"https:\/\/adm-adria.nevtron.si\/prod-18\/?p=1020"},"modified":"2018-10-10T13:46:42","modified_gmt":"2018-10-10T11:46:42","slug":"varnostno-orodje-za-hitro-prepoznavo-udorov","status":"publish","type":"post","link":"https:\/\/adm-adria.si\/en\/2017\/09\/varnostno-orodje-za-hitro-prepoznavo-udorov\/","title":{"rendered":"Varnostno orodje za hitro prepoznavo vdorov"},"content":{"rendered":"<p>Pregled nad spremembami in dostopi za <strong>Aktivni<\/strong> <strong>imenik<\/strong> (<strong>Active<\/strong> <strong>Directory<\/strong>) ter korporativne aplikacije je pogosto zelo zapleten, \u010dasovno potraten, in v dolo\u010denih primerih celo nemogo\u010d z uporabo privzetih orodij za IT revizijo. Zaradi tega mnoga podjetja enostavno spregledajo vdore v njihove informacijske sisteme in krajo podatkov, kar tudi dr\u017ei za notranje gro\u017enje Aktivnemu imeniku in drugim Microsoftovim platformam. Zaradi tega je klju\u010dnega pomena, da imamo na voljo orodja, ki nam pomagajo pri razkrivanju tako napadov s svetovnega spleta kot znotraj na\u0161ega lastnega podjetje.<\/p>\n<p>&nbsp;<\/p>\n<p>Tega se ve\u010d kot dobro zavedajo pri podjetju Quest, saj so pripravili posebno varnostno orodje Change Auditor, ki kon\u010dnemu uporabniku dejansko omogo\u010da popoln nadzor nad celotno informacijsko tehnologijo v realnem \u010dasu, mo\u017enost forenzi\u010dnega preiskovanja ter celovitega varnostnega nadzora na klju\u010dnimi nastavitvami, uporabniki in upravljavskimi spremembami znotraj Microsoftovega Aktivnega imenika, obla\u010dnega Aktivnega imenika znotraj platforme Azure, obla\u010dnega pisarni\u0161kega paketa Office 365, po\u0161tnega odjemalca Exchange Online in \u0161e mnogo ve\u010d. Poleg tega varnostno orodje Change Auditor omogo\u010da \u0161e sledenje aktivnosti uporabnikov pri prijavi v sistem, avtentikacijam in drugim klju\u010dnim storitvam preko celotnega podjetja in sicer z namenom, da pove\u010damo na\u0161o zmo\u017enost zaznavanja tveganja oziroma ranljivosti in izbolj\u0161amo varnostne nadzorne sisteme. Centralni nadzorni sistem pa pripomore k poenostavitvi nadzora nad sicer zapletenimi in \u0161tevilnimi orodij za IT revizijo v realnem \u010dasu.<\/p>\n<p>V nadaljevanju si poglejmo vse klju\u010dne prednosti uporabe varnostnega orodja Quest Change Auditor.<\/p>\n<p><strong>Nadzor nad hibridnim okoljem z zdru\u017eenim pogledom<\/strong><\/p>\n<p>Z varnostnim orodjem Quest Change Auditor lahko nadziramo Microsoftov Aktivni imenik, obla\u010dni Aktivni imenik znotraj platforme Azure, obla\u010dni pisarni\u0161ki paket Office 365, po\u0161tni odjemalec Exchange Online in \u0161e mnogo ve\u010d. Ta namre\u010d na enem mestu ponuja celovit vpogled nad dogajanjem v realnem \u010dasu, vklju\u010dno s spremembami.<\/p>\n<p><strong>Vpogled z IT varnostnim iskanjem<\/strong><\/p>\n<p>Za ve\u010djo varnost je klju\u010dnega pomena, da imamo celovit vpogled na podatki \u0161tevilnih sistemov in naprav. To nam dejansko omogo\u010da hiter odziv na varnostne incidente in forenzi\u010dno analizo. To ne presene\u010da, saj varnostno orodje Quest Change Auditor zdru\u017euje uporabnikove dejavnosti, trende dogodkov in zaznavo sumljivih varnostnih vzorcev.<\/p>\n<p><strong>Poenostavljena preiskovanja<\/strong><\/p>\n<p>Varnostno orodje Quest Change Auditor poskrbi za zajem izvornega naslova IP, imena ra\u010dunalnika za blokirane uporabni\u0161ke ra\u010dune in povezovanje uporabni\u0161kih ra\u010dunov s poskusi dostopa do virov. To dejansko pripomore k precej poenostavljenemu zaznavanju in preiskavi tako notranjih kot tudi zunanjih gro\u017eenj.<\/p>\n<p><strong>Alarmi v realnem \u010dasu<\/strong><\/p>\n<p>Za vsako kriti\u010dno spremembo nam bo varnostno orodje Quest Change Auditor poslalo bodisi elektronsko sporo\u010dilo bodisi kratko sporo\u010dilo SMS na na\u0161 pametni mobilni telefon. Na ta na\u010din lahko hitro reagiramo na morebitne gro\u017enje.<\/p>\n<p><strong>Prepre\u010ditev sprememb<\/strong><\/p>\n<p>Prepre\u010devanje nedovoljenih sprememb je klju\u010dno za varovanje na\u0161ih podatkov. Varnostno orodje Quest Change Auditor\u00a0 prepre\u010duje zlonamerne spremembe na Aktivnem imeniku, po\u0161tnem sistemu Exchange, podatkovnem stre\u017eniku Windows in \u0161e mnogo ve\u010d.<\/p>\n<p><strong>\u017delite izvedeti ve\u010d?<\/strong><\/p>\n<p>Za ve\u010d informacij o vsestransko uporabnem orodju Toad Edge podjetja Quest se obrnite na info@adm-adria.eu ali telefon 059 251 955.<\/p>","protected":false},"excerpt":{"rendered":"<p>Pregled nad spremembami in dostopi za Aktivni imenik (Active Directory) ter korporativne aplikacije je pogosto zelo zapleten, \u010dasovno potraten, in v dolo\u010denih primerih celo nemogo\u010d z uporabo privzetih orodij za IT revizijo. Zaradi tega mnoga podjetja enostavno spregledajo vdore v njihove informacijske sisteme in krajo podatkov, kar tudi dr\u017ei za notranje gro\u017enje Aktivnemu imeniku in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1021,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-novice"],"_links":{"self":[{"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/posts\/1020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/comments?post=1020"}],"version-history":[{"count":3,"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/posts\/1020\/revisions"}],"predecessor-version":[{"id":1642,"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/posts\/1020\/revisions\/1642"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/media\/1021"}],"wp:attachment":[{"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/media?parent=1020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/categories?post=1020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adm-adria.si\/en\/wp-json\/wp\/v2\/tags?post=1020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}