Prior to downloading this Software, you must review the Software Transaction Agreement located here and confirm, by clicking the I agree check box below, that your organization accepts and is bound by the terms and conditions of the Software Transaction Agreement for this Software.
If you purchased the licenses for this Software by executing an order form with Quest or if you have an agreement with Quest that states that all purchases are governed by such agreement, then the terms and conditions of that agreement supersedes and takes precedence over the Software Transaction Agreement.
In this video, the speaker provides a step-by-step guide on how to install IT Security Search onto a machine with a single hard drive. They cover the necessary permissions and setup required, as well as the difference between installing the tool on the C drive versus a non-C drive. The speaker also demonstrates the installation process and provides post-installation steps to be done immediately af...
This video provides an overview of IT Security Search, a web-based interface and console for several management and security solutions offered by Quest software. IT Security Search allows users to perform consolidated and correlated forensic searches of changes, issues, and general information in their environment. The video demonstrates how IT Security Search can be used to quickly identify and i...
This video demonstrates the capabilities of IT Security Search, a web-based interface that allows users to perform forensic searches across various data sources. The video shows how IT Security Search can be used to investigate changes made to files in a specific folder, including finding out who made the changes, how they gained access, and what changes were made. The video also highlights featur...
This video discusses the new search and search capabilities with Quest I.T security search. It demonstrates how to use the combined search feature to investigate a data leak and identify employees who accessed a specific file. The video explains how to use expressions and the pipe character to apply subsequent expressions to the results of previous searches. It concludes by mentioning that more in...
In this video, the presenter demonstrates some new features in Quest I.T security search. The customizable grid columns allow users to create search result layouts with specific event fields of interest. The newly added "current user" parameter enables users to search for events where they are the initiator. This can be useful for delegating responsibility to end users to investigate cer...
This video provides a step-by-step demonstration of how to install IT Security Search, a software suite by Quest Software. The video covers downloading and extracting the package, running the autorun.exe as an administrator, upgrading Microsoft SQL Server, accepting the license agreement, installing various components, creating or joining an organization, installing the configuration database, sel...
This video discusses the benefits of using IT Security Search, a product feature that allows users to monitor and manage their Microsoft infrastructure from one centralized console. He explains how IT Security Search integrates with Quest's Change Auditor, Enterprise Reporter, and Active Roles products, allowing users to access and analyze information from multiple sources without having to sw...