Stealthbits is very excited to share a sneak peek of some of the enhancements available with the launch of StealthDEFEND 2.2, scheduled for November 5, 2019.
The fact remains – organizations concerned about data breaches and the rising costs to remediate them, need advanced solutions to not only quickly identify, but automatically respond to an ever-increasing barrage of attacks and breaches.
Please continue reading to review technical tips and aligning video tutorials of how StealthDEFEND 2.2 can help:
Inside the new “investigation builder” is an almost unnoticed option to expand and add one additional condition to a filter. By clicking the expand button it provides the option to add an additional condition.
By default, the drop-down only shows user, group, or computer. However, you can type in that field so you can add any desired object class to the filter list.
When building a custom threat, you can have your threat “group by” the user who performed the actions. If you don’t group by the user who performed the action it is possible you will have a number of users that performed an action that triggered the threat and it could be a false positive.
We have all been there. Despite being asked to put recovery data in a safe location sometimes we do not heed the warning. As the administrator, you can reset the built-in MFA for any user inside the system.
If you have questions, feel free to contact us at info@stealthbits.com.
Want to learn more about StealthDEFEND and the launch of version 2.2 on November 5, 2019? Email sales@stealthbits.com.
Rod Simmons is VP of Product Strategy at STEALTHbits Technologies responsible for the vision and strategy of their Active Directory Management and Security solutions. Rod has been in the technology space for over 20 years.
Prior to joining STEALTHbits, he served as Director of Product Management at BeyondTrust responsible for the Privileged Access Management products. He has also held positions leading Solution Architects and Product Managers at Quest Software and Netpro Computing Inc.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply