This InTrust report shows information about virtual machine creation, deletion and cloning.
This InTrust report shows virtual machine configuration changes.
This InTrust report shows all captured activity that involves snapshots: creation, deletion and reversion.
This InTrust report shows all virtual machine starts, shutdowns, suspends, and details as to who initiated them and when they happened.
This InTrust report shows all events related to VMware vCenter and ESX/ESXi.
This InTrust report shows events related to vCenter and ESX/ESXi server configuration changes, such as account, host and data store management.
This InTrust report shows permission changes on virtual machines. The report refers to users and groups that get role-based permissions as grantees.
This InTrust report shows all user logon and logoff attempts, both successful and failed, and provides reason information for the failed attempts.
This section contains a list of reports included in the InTrust11.6.1 Report Pack for Windows.
This InTrust report shows group changes. Groups should be created, deleted, or changed by administrators. If the administrator fails to duly perform group management tasks, this may lead to user rights misrule and security violations.
This InTrust report shows group membership changes. User accounts should be added to or removed from groups by administrators. If the administrator fails to duly perform group membership management tasks, this may lead to user rights misrule and security violations.
This InTrust report shows when account passwords were reset and who reset them. An entry in the report means that the password was either reset or changed. By default, only user accounts are included, but you can use the User Accounts filter if you want to include computer accounts as well.
This InTrust report shows changes to user accounts. User accounts should be created, deleted, enabled, or disabled by administrators. If the administrator fails to duly perform account management tasks, this may lead to account misrule and even security violations.
This InTrust report shows changes to user rights. User rights should be assigned or removed by administrators. If the administrator fails to duly perform user rights management tasks, this may lead to user rights misrule and security violations.
This InTrust report shows computer accounts changes. Computer accounts should be created, deleted, renamed, or changed by administrative accounts only. If the administrator fails to duly perform computer account management tasks, this may lead to security violations.
This report summarizes DHCP log data and represents the information as time intervals during which computers have certain IP addresses. If an event specifies the host as localhost or host from localdomain, the actual DNS name is determined by the MAC address. The report helps quickly pinpoint a computer at which certain actions were performed. For correct results, create this report for a single DHCP server or for several DHCP servers that work simultaneously and do not serve overlapping IP address pools.
This InTrust report shows domain trust changes. Domain trusts should be added, removed, or modified by administrative accounts only. If the administrator does not duly perform domain trust management tasks, this may lead to security violations.
This InTrust report shows audit policy changes. Audit policy should be modified by administrative accounts only; otherwise these changes can indicate a security breach. Failure of the administrator to duly perform audit policy management tasks may lead to security violations.
This InTrust report shows Audit and Kerberos policies changes.
This InTrust report shows and expands statistics on security events. Security events capture the activity taking place in the network and show, for example, when and where users log on, what data they access, how they manage accounts, and so on.
This InTrust report shows situations when events are missing from logs for a time period that you specify. For example, if a file server with classified data does not appear to have logged events for an hour, this is suspicious, all the more so if the server is supposed to be up at all times. It is possible that the server was down during that time or the log was cleared. Such a situation does not necessary mean a problem but should be investigated.
This InTrust report helps you analyze the background of an event you are interested in by exploring related events.
This InTrust report shows event data from specified event logs of selected computers.
This InTrust report shows the number of accounts created, changed, and deleted within a specified time period for such important types of accounts as user accounts, security groups, and distribution groups. It also shows group membership modification for both security and distribution groups.
This InTrust report shows statistics on security events grouped by users and their domains. Security events capture the activity taking place in the network and show, for example, when and where users log on, what data they access, how they manage accounts, and so on. The report is primarily intended for presenting statistics in printed form but, when working interactively, you can click any number to view the details of all events that the number stands for.
In the Windows environment different logon types are registered by the system depending on what kind of resource a user accesses. This InTrust report shows all logon types such as interactive logons to domains, access to shared folders, dial-up connections to the network, and so on, and groups logon statistics.
© ALL RIGHTS RESERVED. 利用規約 プライバシー Cookie Preference Center