Unix and Linux Privileged Account Discovery
Automatically discover and parse all rights granted via sudoers and identify the owners of critical files such as passwd, shadow, sudoers, hosts.deny, and more.
Unix and Linux User and Group Auditing
Inventory and analyze User and Group details to identify issues including password security settings, “toxic” group conditions, and system inconsistencies.
Unix and Linux Sharing Configuration
Assess and analyze NFS and Samba share configurations to identify and categorize high, medium, and low risk scenarios through generated reports.
Customizable Data Collection & Reporting
StealthAUDIT’s Unix/Linux, NIS, and LDAP data collectors provide deep, surgical visibility into virtually any piece of information available within the OS and applicable directory structures.
Leverage the full power of StealthAUDIT to automate processes in their entirety, including remediation workflows to fix issues programmatically or automatically.