Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Conduct a thorough search within your Active Directory domain to identify user and computer accounts that are inactive by examining criteria such as last logon time and DNS record timestamps, among other factors. Once you have filtered the accounts, you can take several actions, including relocating them to a different organizational unit, disabling them, generating a random password, removing them from all associated groups, and more. It is crucial to efficiently identify and eliminate accounts that are no longer in use in your Active Directory environment, providing a clear report on both types of accounts. You have the option to search throughout the entire domain or limit your search to a specific organizational unit, accommodating multi-domain scenarios by specifying any domain and using alternate credentials if needed. Additionally, you can retrieve last logon details from all domain controllers or target specific ones, utilizing either the lastLogon or lastLogonTimeStamp attributes. For precision, you can filter the results to show only those accounts that have not logged in for a defined number of days, and you can verify the activity status of computer accounts by performing a Ping test along with a check on the DNS record timestamp to ensure they are still operational. This comprehensive approach ensures that your Active Directory remains organized and secure by removing unnecessary clutter.

Description

Multi-Domain Security Management enhances security and oversight by dividing security management into various virtual domains. Organizations, regardless of their size, can effortlessly establish virtual domains tailored to geographic locations, business units, or specific security functions, thereby bolstering security and streamlining management processes. This approach facilitates detailed and distinct role-based administration within a multi-tenant security management framework. A unified security management setup governs VPNs, firewalls, intrusion prevention systems, and other protective measures. Administrators can create, monitor, and regulate all network security management domains through a single interface. Additionally, it allows for the centralized management of numerous administrators within the multi-domain security management framework. Administrators can be granted permissions to oversee particular domains or various facets of the multi-domain system, enabling multiple administrators to collaborate across different security management domains simultaneously. This collaborative environment ensures that security measures are effectively maintained and adapted to the evolving needs of the organization.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Alibaba Cloud
Amazon Web Services (AWS)
Avaya Aura
CrowdStrike Falcon
CyberArk Machine Identity Security
Google Digital Risk Protection
IBM Cloud
Infoblox Cloud Network Automation
Medigate
Microsoft Excel
Minerva
Netskope
Nutanix AHV
Okta
Rackspace OpenStack
SentryBay Armored Client
SolarWinds Access Rights Manager
Tripwire

Integrations

Alibaba Cloud
Amazon Web Services (AWS)
Avaya Aura
CrowdStrike Falcon
CyberArk Machine Identity Security
Google Digital Risk Protection
IBM Cloud
Infoblox Cloud Network Automation
Medigate
Microsoft Excel
Minerva
Netskope
Nutanix AHV
Okta
Rackspace OpenStack
SentryBay Armored Client
SolarWinds Access Rights Manager
Tripwire

Pricing Details

$99 one-time payment
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

CJWDEV

Founded

2014

Country

United Kingdom

Website

www.cjwdev.com/Software/ADTidy/Info.html

Vendor Details

Company Name

Check Point

Founded

1993

Country

United States

Website

www.checkpoint.com/quantum/multi-domain-security-management/

Product Features

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Alternatives

Alternatives

CPTRAX for Windows Reviews

CPTRAX for Windows

Visual Click Software