Documentation forAccess Rights Manager

Security Monitoring

A great many employees make changes in Active Directory and to the file server. Security risks can arise without comprehensive monitoring. With our Logga modules you can record security-relevant activities in your company network. This allows you to trace what has been done in the network, by whom and when.

At process levels, you gain complete visibility into Access Rights activities. Changes made outside of ARM are recorded. Based on the information obtained, your Access Rights Management process can be optimized. Alerts (FS and AD Logga) proactively inform you about critical events.