SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
The Challenges of Active Directory User Management
How you can improve efficiency and security through automation


Relying solely on Active Directory’s native tools can make the business-critical tasks of user provisioning,
change user and de-provisioning time consuming and error prone, negatively affecting productivity and
security.

Even if an organisation has well defined processes for managing provisioning and de-provisioning, including
authorised approvals, enforcing adherence to processes can be challenging. And if you can’t demonstrate your
processes are being followed or easily report on users’ access privileges, compliance can be a struggle.

Organisations that want to improve the efficiency and security of active directory user management are
increasingly considering automating these tasks. This paper looks at the key challenges that automating user
provisioning can help you resolve, and outlines the user provisioning offering from leading user provisioning
specialist NetIQ.


Introduction                                               and de-provisioning. This can also cut down on
Giving people the access they need to systems              mistakes and the need to implement and manage
and information to do their jobs is one of the most        a more rigorous approvals process. They can also
business-critical activities of any IT department.         benefit from better audit trails and make achieving
And changing access in a timely way—when                   and demonstrating compliance easier.
someone leaves the organisation, or changes
role, or their temporary contract ends—is just as          Responding quickly to business requests
important. Maintaining a secure and productive             When people join or leave your organisation,
business depends on responding quickly to user             how swiftly can you respond to requests to set up
provisioning and de-provisioning requests, but             or remove user accounts? And if there’s a major
accurately assigning and removing user permissions         change—such as a reorganisation or merger—can
in a dynamic business environment is not a                 you handle the resulting volume of provisioning and
straightforward task.                                      de-provisioning requests efficiently enough to meet
                                                           the needs of the business?
If you’re relying on Active Directory’s native tools
to manage the task, you’ll know how tedious and            In addition to new joiners and leavers, you’ll also
time consuming it can be. Do you feel you lack             be dealing with employees whose roles change. If
the controls to standardise processes or securely          someone moves, say, from a project leader to group
administer Active Directory? Do you find the               manager role, how easily can you revoke their old
provisioning process is prone to human error? Maybe        privileges and grant new ones? Or do you tend
you struggle to grant granular permissions to users        simply to add new privileges to the old ones?
based on specific business needs? Are you confident
you have the auditing and reporting capabilities to        The IT staff in most organisationsare stretched to
manage security and demonstrate compliance?                their limit with other critical projects or dealing with
                                                           emergency situations. They simply don’t have time
To drive efficiencies in user provisioning and improve     to comb through the details of a user’s permissions
the security of the Microsoft Windows environment,         to determine if access is still relevant to their current
organisations are increasingly choosing to automate        job. Relying on people and manual process alone can
the provisioning process. By doing so, they can            result in delays, errors or neglect.
significantly reduce both the time and resources
required to manage user provisioning, change user
Maximising the value of user management
 To get the most out of automating user provisioning, you may want to consider the following questions as a
 first step:
   * What is the trigger that instigates a provisioning request? For example, is it a ticket, a form, an email?
   * How do you check that the request is coming from an authorised source? And who in your organisation
        is authorised to make these requests?
   * What is your current process for account creation? Is there an opportunity to eliminate unnecessary steps
        or add critical steps before you implement automation?
   * How do you currently modify an account or its attributes? Does this process need to change going
        forward due to new regulations or security policies?
   * What would cause you to disable an account rather than delete it? Do the delete and disable processes
        require different approvals?

Automated user padministration can save a lot of time and effort, enabling you to respond promptly and
accurately to both individual and bulk requests from the business to grant, change and revoke access
privileges. You can be more confident that users have the appropriate access they need to do their jobs,
reducing the security risk of deliberate or inadvertent unauthorised use of systems or information—and
avoiding the need to perform forensics down the line if a breach should occur.

Providing just-in-time access to systems and information
Many organisations make extensive use of temporary and contract workers who need short-term access to
specific corporate resources. Equally, permanent staff who are seconded onto a special project or take over
another role on a short-term basis may need access to different resources than their regular roles require.

When projects or contracts have a fixed duration, no-one can afford to wait for access. You also need to be
able to assign permissions based on specific business needs. Granting granular permissions and keeping track
of contract and project end dates when access needs to be revoked can be burdensome if you’re doing it
manually.

With an automated solution, you’ll be able to grant access in time to meet contract and project start dates; and
you’ll have more control over the different permissions that can be assigned to temporary roles. You can also
set up end dates for permissions to be revoked, cutting the risk of users retaining access rights they no longer
need.

Enforcing security processes and maintaining compliance
The security of your organisation will be a key consideration of your Active Directory user management. But
if you’re working with Active Directory’s native tools alone, it can be difficult to enforce processes, which can
lead to errors and non-compliance.

For example, how many users end up with more access rights than they need to perform their current job role,
or administrative access that they shouldn’t have? Do paper or email trails make it difficult to demonstrate that
your processes are being followed; or show who requested, approved or revoked a user’s access, and to which
resources?

By automating user change management, you’ll gain greater visibility and so minimise the number of users
who have elevated or unnecessary privileges, which should in turn reduce the security risk. You’ll cut down on
provisioning errors and find it much easier to ensure privileges are granted and revoked in line with standards
like ISO 27001 and other applicable regulations.

Demonstrating compliance becomes much more straightforward with onscreen workflows that show you have
a process and that it is being followed, with controls to help prevent mistakes. You’ll be able to capture and
securely store an audit trail of the privileges assigned to each user that records when changes have been made
and who authorised them. This makes it much simpler to produce reports for your auditors in response to
questions like, “Show me what this temporary contractor did not have access to over the last 60 days”.




Improving efficiency and security through automation | Page 2
Streamlining the provisioning process                                       programmes, at the same time as reducing the
through automation                                                          administrative workload.
Even if you have established robust, well
documented provisioning and de-provisioning                                 If you don’t have the skills in house or can’t spare the
processes, executing them and maintaining an                                time, you can engage NetIQ Professional Services
audit trail are likely pain points if you rely purely on                    to install and configure NetIQ user provisioning
Active Directory’s native tools—especially if you’re                        solutions for you. They’ll align it with your processes
administering 1,000 or more users.                                          and handle the integration of your HR application or
                                                                            helpdesk ticketing system with Active Directory.
An automated solution like NetIQ® Directory and                             your distributed environment, providing detailed
Resource Administrator™ can speed up response                               insight into files, directories, file shares, registry keys
times to requests, enable accurate granting and                             (on Windows), system processes, database activity
revoking of user permissions, improve your ability                          (on Oracle, Microsoft, Sybase and other databases)
to keep to processes and demonstrate that you do                            and more. It delivers enhanced audit information
and significantly reduce resources needed to handle                         to provide greater fidelity and clarity of information
the user maintenance workload, freeing up IT staff                          than native log events can provide, and recording
for other activities. At the same time you’re likely                        pre- and post-change information for improved
to minimise the potential for errors and make it                            incident analysis.
easier to avoid high numbers of users with elevated
privileges.                                                                 Conclusion
                                                                            Automating your user management will dramatically
NetIQ Directory and Resource Administrator provides                         reduce the time and resources you need to dedicate
an intuitive graphical interface that makes processes                       to the task and cut down the volume of errors. Even
easy to enforce and errors and omissions less likely.                       an organisation with just a few hundred users will
An integrated solution that goes beyond traditional                         find the investment worthwhile if, for example,
identity management solutions, NetIQ Directory                              compliance is a major burden or the organisation
and Resource Administrator covers processes like                            handles particularly sensitive data.
email account setup in addition to Active Directory
administration. Its policy-based administration                             NetIQ Directory and Resource Administrator will
capabilities can help improve the security and                              help you automate access requests and incorporate
efficiency of your Microsoft Windows environment.                           stakeholder approval in your provisioning, change
                                                                            management and de-provisioning processes,
With NetIQ, provisioning and de-provisioning                                streamlining the lifecycle of an employee’s access
requests can be automatically triggered by updates                          needs.
in your HR application or helpdesk ticketing system,
and you can build in an approval phase that can’t be                        You’ll be able to respond promptly to business
worked around. You’ll also have a comprehensive,                            requests to grant, change and revoke users’
easily accessible audit trail of permissions granted                        privileges, and manage short-term access
and revoked that will help you stay compliant.                              requirements for contractors and project staff more
NetIQ Directory and Resource Administrator can                              easily. NetIQ Directory and Resource Administrator
also carry out automated clean-up maintenance of                            will also give you the control and visibility you need
Active Directory, such as removing empty groups or                          to enforce security; and the comprehensive audit
users with expired passwords. This helps ensure that                        trail and reporting capabilities that will let you both
Active Directory runs smoothly and remains a secure                         maintain and demonstrate compliance.
foundation for your identity and access management



Austria:       +43 1 595 43 35 0                  Middle East:       +971 4 391 2992                 NetIQ Europe Limited
Benelux:       +31 (0) 172 50 5555                Nordics:           +46 8 752 25 00                 Building 2,
Europe:        +44 (0) 1784 454 500               South Africa:      +27 21 418 3805                 2nd Floor
France:        +33 1 55 62 50 00                  Spain:             +34 (0) 91 151 71 11            Parkmore East Business Park
Germany:       +49 (0) 211 5631 0                 Switzerland:       +41 (0) 43 399 2090             Galway,
Italy:         +39 02 360 46 335                  UK:                +44 (0) 1344 724 000            Ireland


Copyright © 2012 NetIQ Corporation. All Rights Reserved. NetIQ, NetIQ Directory and Resource Administrator, and the NetIQ symbol are either
registered trademarks or trademarks of NetIQ Corporation, in the USA. All other trademarks, trade names, or company names referenced herein are used
for identification only and are the property of their respective owners.




Improving efficiency and security through automation | Page 3

Weitere ähnliche Inhalte

Was ist angesagt?

Upgrade To Microsoft Office System 2007 2
Upgrade To Microsoft Office System 2007 2Upgrade To Microsoft Office System 2007 2
Upgrade To Microsoft Office System 2007 2dylanmcneill
 
Fine docs product presentation latest
Fine docs product presentation latestFine docs product presentation latest
Fine docs product presentation latestSatyajit Roy
 
ECNO 2016-Using ECM to gain administrative efficiency for school boards
ECNO 2016-Using ECM to gain administrative efficiency for school boardsECNO 2016-Using ECM to gain administrative efficiency for school boards
ECNO 2016-Using ECM to gain administrative efficiency for school boardsChristopher Wynder
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overviewDr Neelesh Jain
 
A Perfect Combination: Case Management and Low Code
A Perfect Combination: Case Management and Low CodeA Perfect Combination: Case Management and Low Code
A Perfect Combination: Case Management and Low CodeSandy Kemsley
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEECanon Business CEE
 
DMS FOR INDUSTRIES
DMS FOR INDUSTRIESDMS FOR INDUSTRIES
DMS FOR INDUSTRIESDocsvault
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEECanon Business CEE
 
Therefore™ improves access to our data and our workflow
Therefore™ improves access to our data and our workflowTherefore™ improves access to our data and our workflow
Therefore™ improves access to our data and our workflowCanon, Inc.
 
Control of legal processes using collaborative tools
Control of legal processes using collaborative toolsControl of legal processes using collaborative tools
Control of legal processes using collaborative toolsHiriam Eduardo Perez Vidal
 
IRJET - Faculty Leave Management System
IRJET - Faculty Leave Management SystemIRJET - Faculty Leave Management System
IRJET - Faculty Leave Management SystemIRJET Journal
 
Transitioning From a Paper-based to Paperless Office System
Transitioning From a Paper-based to Paperless Office SystemTransitioning From a Paper-based to Paperless Office System
Transitioning From a Paper-based to Paperless Office SystemLogicalDOC
 
Insurance Vertical Presentation
Insurance Vertical PresentationInsurance Vertical Presentation
Insurance Vertical PresentationMurty NSN
 
Stop Guessing about Your Software Usage
Stop Guessing about Your Software UsageStop Guessing about Your Software Usage
Stop Guessing about Your Software UsageOpen iT Inc.
 
The_Microsoft_Private_Cloud_v1.0--Chappell
The_Microsoft_Private_Cloud_v1.0--ChappellThe_Microsoft_Private_Cloud_v1.0--Chappell
The_Microsoft_Private_Cloud_v1.0--ChappellDebora Cintron
 

Was ist angesagt? (20)

Upgrade To Microsoft Office System 2007 2
Upgrade To Microsoft Office System 2007 2Upgrade To Microsoft Office System 2007 2
Upgrade To Microsoft Office System 2007 2
 
Fine docs product presentation latest
Fine docs product presentation latestFine docs product presentation latest
Fine docs product presentation latest
 
Teamwox.Presentation.En.2007
Teamwox.Presentation.En.2007Teamwox.Presentation.En.2007
Teamwox.Presentation.En.2007
 
ECNO 2016-Using ECM to gain administrative efficiency for school boards
ECNO 2016-Using ECM to gain administrative efficiency for school boardsECNO 2016-Using ECM to gain administrative efficiency for school boards
ECNO 2016-Using ECM to gain administrative efficiency for school boards
 
Cloud Computing Project
Cloud Computing ProjectCloud Computing Project
Cloud Computing Project
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
 
Bp dfm-procurement-blog
Bp dfm-procurement-blogBp dfm-procurement-blog
Bp dfm-procurement-blog
 
A Perfect Combination: Case Management and Low Code
A Perfect Combination: Case Management and Low CodeA Perfect Combination: Case Management and Low Code
A Perfect Combination: Case Management and Low Code
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEE
 
DMS FOR INDUSTRIES
DMS FOR INDUSTRIESDMS FOR INDUSTRIES
DMS FOR INDUSTRIES
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEE
 
Therefore™ improves access to our data and our workflow
Therefore™ improves access to our data and our workflowTherefore™ improves access to our data and our workflow
Therefore™ improves access to our data and our workflow
 
Control of legal processes using collaborative tools
Control of legal processes using collaborative toolsControl of legal processes using collaborative tools
Control of legal processes using collaborative tools
 
IRJET - Faculty Leave Management System
IRJET - Faculty Leave Management SystemIRJET - Faculty Leave Management System
IRJET - Faculty Leave Management System
 
Transitioning From a Paper-based to Paperless Office System
Transitioning From a Paper-based to Paperless Office SystemTransitioning From a Paper-based to Paperless Office System
Transitioning From a Paper-based to Paperless Office System
 
Insurance Vertical Presentation
Insurance Vertical PresentationInsurance Vertical Presentation
Insurance Vertical Presentation
 
Stop Guessing about Your Software Usage
Stop Guessing about Your Software UsageStop Guessing about Your Software Usage
Stop Guessing about Your Software Usage
 
Dit yvol3iss37
Dit yvol3iss37Dit yvol3iss37
Dit yvol3iss37
 
The_Microsoft_Private_Cloud_v1.0--Chappell
The_Microsoft_Private_Cloud_v1.0--ChappellThe_Microsoft_Private_Cloud_v1.0--Chappell
The_Microsoft_Private_Cloud_v1.0--Chappell
 

Ähnlich wie Challenges of Active Directory User Management

The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementRyan Gallavin
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseNetwrix Corporation
 
Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperAxis Technology, LLC
 
How a large corporation streamlines legal authorizations case study by Workfl...
How a large corporation streamlines legal authorizations case study by Workfl...How a large corporation streamlines legal authorizations case study by Workfl...
How a large corporation streamlines legal authorizations case study by Workfl...Alain Bezançon
 
How to choose a Loan Document Management Software.pdf
How to choose a Loan Document Management Software.pdfHow to choose a Loan Document Management Software.pdf
How to choose a Loan Document Management Software.pdfTechugo
 
Network administration and support
Network administration and supportNetwork administration and support
Network administration and supportManas Rai
 
BI Technologies and ECM-System For A Multi-Industry Corporation
BI Technologies and ECM-System For A Multi-Industry CorporationBI Technologies and ECM-System For A Multi-Industry Corporation
BI Technologies and ECM-System For A Multi-Industry Corporation*instinctools
 
User Manager
User ManagerUser Manager
User ManagerEmpowerID
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
DRMS cu uuvhg. HbbhyfufucufMiniproject.pptx
DRMS cu uuvhg. HbbhyfufucufMiniproject.pptxDRMS cu uuvhg. HbbhyfufucufMiniproject.pptx
DRMS cu uuvhg. HbbhyfufucufMiniproject.pptxshubhamrkokare
 
Compliance
ComplianceCompliance
ComplianceNetBR
 
Workflow-101-Whitepaper-iDatix
Workflow-101-Whitepaper-iDatixWorkflow-101-Whitepaper-iDatix
Workflow-101-Whitepaper-iDatixEmmanuel Mateo
 
CII IT SOLUTIONS, AN EFFICIENT TOOL TO HELP
CII IT SOLUTIONS, AN EFFICIENT TOOL TO HELPCII IT SOLUTIONS, AN EFFICIENT TOOL TO HELP
CII IT SOLUTIONS, AN EFFICIENT TOOL TO HELPvisioninfo9
 
_Workday tenant access.pdf
_Workday tenant access.pdf_Workday tenant access.pdf
_Workday tenant access.pdfKaizenJon
 
CC computing for mba students PPT.pptx
CC   computing for mba students PPT.pptxCC   computing for mba students PPT.pptx
CC computing for mba students PPT.pptxSAINATHYADAV11
 
5 Key Components of a Document Management Workflow
5 Key Components of a Document Management Workflow5 Key Components of a Document Management Workflow
5 Key Components of a Document Management WorkflowBizPortals365
 

Ähnlich wie Challenges of Active Directory User Management (20)

Dit yvol4iss44
Dit yvol4iss44Dit yvol4iss44
Dit yvol4iss44
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
 
Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
 
How a large corporation streamlines legal authorizations case study by Workfl...
How a large corporation streamlines legal authorizations case study by Workfl...How a large corporation streamlines legal authorizations case study by Workfl...
How a large corporation streamlines legal authorizations case study by Workfl...
 
Intranet Solution Using Liferay
Intranet Solution Using LiferayIntranet Solution Using Liferay
Intranet Solution Using Liferay
 
Manual user provisioning is dangerous
Manual user provisioning is dangerousManual user provisioning is dangerous
Manual user provisioning is dangerous
 
How to choose a Loan Document Management Software.pdf
How to choose a Loan Document Management Software.pdfHow to choose a Loan Document Management Software.pdf
How to choose a Loan Document Management Software.pdf
 
Network administration and support
Network administration and supportNetwork administration and support
Network administration and support
 
BI Technologies and ECM-System For A Multi-Industry Corporation
BI Technologies and ECM-System For A Multi-Industry CorporationBI Technologies and ECM-System For A Multi-Industry Corporation
BI Technologies and ECM-System For A Multi-Industry Corporation
 
User Manager
User ManagerUser Manager
User Manager
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
DRMS cu uuvhg. HbbhyfufucufMiniproject.pptx
DRMS cu uuvhg. HbbhyfufucufMiniproject.pptxDRMS cu uuvhg. HbbhyfufucufMiniproject.pptx
DRMS cu uuvhg. HbbhyfufucufMiniproject.pptx
 
Compliance
ComplianceCompliance
Compliance
 
Workflow-101-Whitepaper-iDatix
Workflow-101-Whitepaper-iDatixWorkflow-101-Whitepaper-iDatix
Workflow-101-Whitepaper-iDatix
 
CII IT SOLUTIONS, AN EFFICIENT TOOL TO HELP
CII IT SOLUTIONS, AN EFFICIENT TOOL TO HELPCII IT SOLUTIONS, AN EFFICIENT TOOL TO HELP
CII IT SOLUTIONS, AN EFFICIENT TOOL TO HELP
 
_Workday tenant access.pdf
_Workday tenant access.pdf_Workday tenant access.pdf
_Workday tenant access.pdf
 
CC computing for mba students PPT.pptx
CC   computing for mba students PPT.pptxCC   computing for mba students PPT.pptx
CC computing for mba students PPT.pptx
 
5 Key Components of a Document Management Workflow
5 Key Components of a Document Management Workflow5 Key Components of a Document Management Workflow
5 Key Components of a Document Management Workflow
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 

Mehr von NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your BusinessNetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 

Mehr von NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 

Kürzlich hochgeladen

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Challenges of Active Directory User Management

  • 1. The Challenges of Active Directory User Management How you can improve efficiency and security through automation Relying solely on Active Directory’s native tools can make the business-critical tasks of user provisioning, change user and de-provisioning time consuming and error prone, negatively affecting productivity and security. Even if an organisation has well defined processes for managing provisioning and de-provisioning, including authorised approvals, enforcing adherence to processes can be challenging. And if you can’t demonstrate your processes are being followed or easily report on users’ access privileges, compliance can be a struggle. Organisations that want to improve the efficiency and security of active directory user management are increasingly considering automating these tasks. This paper looks at the key challenges that automating user provisioning can help you resolve, and outlines the user provisioning offering from leading user provisioning specialist NetIQ. Introduction and de-provisioning. This can also cut down on Giving people the access they need to systems mistakes and the need to implement and manage and information to do their jobs is one of the most a more rigorous approvals process. They can also business-critical activities of any IT department. benefit from better audit trails and make achieving And changing access in a timely way—when and demonstrating compliance easier. someone leaves the organisation, or changes role, or their temporary contract ends—is just as Responding quickly to business requests important. Maintaining a secure and productive When people join or leave your organisation, business depends on responding quickly to user how swiftly can you respond to requests to set up provisioning and de-provisioning requests, but or remove user accounts? And if there’s a major accurately assigning and removing user permissions change—such as a reorganisation or merger—can in a dynamic business environment is not a you handle the resulting volume of provisioning and straightforward task. de-provisioning requests efficiently enough to meet the needs of the business? If you’re relying on Active Directory’s native tools to manage the task, you’ll know how tedious and In addition to new joiners and leavers, you’ll also time consuming it can be. Do you feel you lack be dealing with employees whose roles change. If the controls to standardise processes or securely someone moves, say, from a project leader to group administer Active Directory? Do you find the manager role, how easily can you revoke their old provisioning process is prone to human error? Maybe privileges and grant new ones? Or do you tend you struggle to grant granular permissions to users simply to add new privileges to the old ones? based on specific business needs? Are you confident you have the auditing and reporting capabilities to The IT staff in most organisationsare stretched to manage security and demonstrate compliance? their limit with other critical projects or dealing with emergency situations. They simply don’t have time To drive efficiencies in user provisioning and improve to comb through the details of a user’s permissions the security of the Microsoft Windows environment, to determine if access is still relevant to their current organisations are increasingly choosing to automate job. Relying on people and manual process alone can the provisioning process. By doing so, they can result in delays, errors or neglect. significantly reduce both the time and resources required to manage user provisioning, change user
  • 2. Maximising the value of user management To get the most out of automating user provisioning, you may want to consider the following questions as a first step: * What is the trigger that instigates a provisioning request? For example, is it a ticket, a form, an email? * How do you check that the request is coming from an authorised source? And who in your organisation is authorised to make these requests? * What is your current process for account creation? Is there an opportunity to eliminate unnecessary steps or add critical steps before you implement automation? * How do you currently modify an account or its attributes? Does this process need to change going forward due to new regulations or security policies? * What would cause you to disable an account rather than delete it? Do the delete and disable processes require different approvals? Automated user padministration can save a lot of time and effort, enabling you to respond promptly and accurately to both individual and bulk requests from the business to grant, change and revoke access privileges. You can be more confident that users have the appropriate access they need to do their jobs, reducing the security risk of deliberate or inadvertent unauthorised use of systems or information—and avoiding the need to perform forensics down the line if a breach should occur. Providing just-in-time access to systems and information Many organisations make extensive use of temporary and contract workers who need short-term access to specific corporate resources. Equally, permanent staff who are seconded onto a special project or take over another role on a short-term basis may need access to different resources than their regular roles require. When projects or contracts have a fixed duration, no-one can afford to wait for access. You also need to be able to assign permissions based on specific business needs. Granting granular permissions and keeping track of contract and project end dates when access needs to be revoked can be burdensome if you’re doing it manually. With an automated solution, you’ll be able to grant access in time to meet contract and project start dates; and you’ll have more control over the different permissions that can be assigned to temporary roles. You can also set up end dates for permissions to be revoked, cutting the risk of users retaining access rights they no longer need. Enforcing security processes and maintaining compliance The security of your organisation will be a key consideration of your Active Directory user management. But if you’re working with Active Directory’s native tools alone, it can be difficult to enforce processes, which can lead to errors and non-compliance. For example, how many users end up with more access rights than they need to perform their current job role, or administrative access that they shouldn’t have? Do paper or email trails make it difficult to demonstrate that your processes are being followed; or show who requested, approved or revoked a user’s access, and to which resources? By automating user change management, you’ll gain greater visibility and so minimise the number of users who have elevated or unnecessary privileges, which should in turn reduce the security risk. You’ll cut down on provisioning errors and find it much easier to ensure privileges are granted and revoked in line with standards like ISO 27001 and other applicable regulations. Demonstrating compliance becomes much more straightforward with onscreen workflows that show you have a process and that it is being followed, with controls to help prevent mistakes. You’ll be able to capture and securely store an audit trail of the privileges assigned to each user that records when changes have been made and who authorised them. This makes it much simpler to produce reports for your auditors in response to questions like, “Show me what this temporary contractor did not have access to over the last 60 days”. Improving efficiency and security through automation | Page 2
  • 3. Streamlining the provisioning process programmes, at the same time as reducing the through automation administrative workload. Even if you have established robust, well documented provisioning and de-provisioning If you don’t have the skills in house or can’t spare the processes, executing them and maintaining an time, you can engage NetIQ Professional Services audit trail are likely pain points if you rely purely on to install and configure NetIQ user provisioning Active Directory’s native tools—especially if you’re solutions for you. They’ll align it with your processes administering 1,000 or more users. and handle the integration of your HR application or helpdesk ticketing system with Active Directory. An automated solution like NetIQ® Directory and your distributed environment, providing detailed Resource Administrator™ can speed up response insight into files, directories, file shares, registry keys times to requests, enable accurate granting and (on Windows), system processes, database activity revoking of user permissions, improve your ability (on Oracle, Microsoft, Sybase and other databases) to keep to processes and demonstrate that you do and more. It delivers enhanced audit information and significantly reduce resources needed to handle to provide greater fidelity and clarity of information the user maintenance workload, freeing up IT staff than native log events can provide, and recording for other activities. At the same time you’re likely pre- and post-change information for improved to minimise the potential for errors and make it incident analysis. easier to avoid high numbers of users with elevated privileges. Conclusion Automating your user management will dramatically NetIQ Directory and Resource Administrator provides reduce the time and resources you need to dedicate an intuitive graphical interface that makes processes to the task and cut down the volume of errors. Even easy to enforce and errors and omissions less likely. an organisation with just a few hundred users will An integrated solution that goes beyond traditional find the investment worthwhile if, for example, identity management solutions, NetIQ Directory compliance is a major burden or the organisation and Resource Administrator covers processes like handles particularly sensitive data. email account setup in addition to Active Directory administration. Its policy-based administration NetIQ Directory and Resource Administrator will capabilities can help improve the security and help you automate access requests and incorporate efficiency of your Microsoft Windows environment. stakeholder approval in your provisioning, change management and de-provisioning processes, With NetIQ, provisioning and de-provisioning streamlining the lifecycle of an employee’s access requests can be automatically triggered by updates needs. in your HR application or helpdesk ticketing system, and you can build in an approval phase that can’t be You’ll be able to respond promptly to business worked around. You’ll also have a comprehensive, requests to grant, change and revoke users’ easily accessible audit trail of permissions granted privileges, and manage short-term access and revoked that will help you stay compliant. requirements for contractors and project staff more NetIQ Directory and Resource Administrator can easily. NetIQ Directory and Resource Administrator also carry out automated clean-up maintenance of will also give you the control and visibility you need Active Directory, such as removing empty groups or to enforce security; and the comprehensive audit users with expired passwords. This helps ensure that trail and reporting capabilities that will let you both Active Directory runs smoothly and remains a secure maintain and demonstrate compliance. foundation for your identity and access management Austria: +43 1 595 43 35 0 Middle East: +971 4 391 2992 NetIQ Europe Limited Benelux: +31 (0) 172 50 5555 Nordics: +46 8 752 25 00 Building 2, Europe: +44 (0) 1784 454 500 South Africa: +27 21 418 3805 2nd Floor France: +33 1 55 62 50 00 Spain: +34 (0) 91 151 71 11 Parkmore East Business Park Germany: +49 (0) 211 5631 0 Switzerland: +41 (0) 43 399 2090 Galway, Italy: +39 02 360 46 335 UK: +44 (0) 1344 724 000 Ireland Copyright © 2012 NetIQ Corporation. All Rights Reserved. NetIQ, NetIQ Directory and Resource Administrator, and the NetIQ symbol are either registered trademarks or trademarks of NetIQ Corporation, in the USA. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners. Improving efficiency and security through automation | Page 3