Documentation forAccess Rights Manager

Security Monitoring

Employees can make changes in Active Directory and the file server. Security risks can arise without comprehensive monitoring. Using the ARM Logga modules, you can record security-relevant activities in your corporate network. This process allows you to trace user actions performed in your network by name and date.

At process levels, you gain complete visibility into Access Rights activities. Changes made outside of ARM are recorded. Based on the information obtained, your Access Rights Management process can be optimized. Alerts (FS and AD Logga) proactively inform you about critical events.

See the following topics for more information.