What's New in 9.5
Identify, assess and reduce risks to your IT infrastructure and data
Visibility platform for user behavior analysis and risk mitigation in hybrid environments
New: Risk Assessment—Close security holes by identifying and prioritizing risks
Jump-start your risk mitigation program with a bird’s-eye view of your security posture that pinpoints high-risk areas in your IT environment that need your immediate attention. Use this actionable information to adjust your security controls and thereby improve your security posture.
For example, assess your environment for the following risks:
- Excessive provisioning of administrative rights
- Overly broad assignment of data access rights
- Stale user and computer accounts
- Accounts with passwords that are empty or never expire
New: Behavior Anomaly Discovery—Improve detection of malicious insiders and compromised accounts
Spot data security threats that might otherwise stay concealed for a long time. An interactive behavior anomalies dashboard identifies the users with the most suspicious behavior over time by aggregating alerts on threat patterns and their associated risk scores. You can easily investigate the context of any anomalous action to enable an informed response.
For example, Netwrix Auditor’s use cases for behavior anomaly discovery include:
- Account compromise and hijacking
- Privileged account abuse
- Data theft by a departing employee
- Cyber sabotage by a malicious insider
New: Permission Analysis—Scrutinize who has access to what
Gain peace of mind and ensure regulatory compliance by enforcing good access hygiene. Make certain that access rights are in strict accordance with the least-privilege principle to limit the reach of both human and automated attacks.
Netwrix Auditor for Active Directory
Analyze effective permissions for important resources to spot unnecessary access rights. Remove them to mitigate the risk of privilege abuse and limit the damage that malware can inflict.
Netwrix Auditor for Windows Server
Stay informed about who has access to your critical servers by checking on local users and groups regularly. If you detect any deviations from your security policy or a known good baseline, quickly restrict access to minimize your attack surface.
New: API-Enabled Integrations—Speed incident response and maximize visibility into your Linux environment
Streamline incident detection and response workflows and expand visibility across your IT environment using free, ready-to-use add-ons.
Add-on for ServiceNow Incident Management
Speed incident response by immediately kicking off the resolution process whenever a suspicious event is detected. This smart integration uses information from Netwrix Auditor’s alerts to automatically create detailed tickets in your ServiceNow ITSM and provide initial incident support, enabling faster and more accurate incident investigation.
Add-on for Privileged User Monitoring on Linux and Unix Systems
Promptly identify and respond to improper behavior across your *nix systems by gaining full control over temporary privilege elevations via the SUDO command and OpenSSH remote sessions.
Add-on for Generic Linux Syslog
Spot, investigate and block threats to your Linux environment with a single-pane view of what’s happening there. Stay alert to risky behavior patterns, such as multiple authentication failures or failed attempts to run the SU command.
New: Custom Report Subscriptions—Stay informed about your specific security and compliance concerns
Easily ensure that your organization’s specific security and compliance requirements are continuously met by creating custom reports using Interactive Search and having them sent to you or other stakeholders on a regular basis. Prove your compliance in minutes by simply having these custom reports saved in a particular folder and granting auditors access to that folder when they come.
+ More than 20 additional enhancements that improve usability, performance and scalability