File Security Administrator
NetIQ’s File Security Administrator delivers a complete file security management and reporting solution for your Windows 2000/Active Directory environments.
This product’s straightforward interface and extensive, flexible reporting features simplify tasks, such as determining who can access your file system, eliminating and preventing enterprise security holes and reporting on storage utilization. Its ActiveReporting feature pinpoints trouble spots so you can take corrective action.
Enables accurate and precise assessment of enterprise file security. Provides comprehensive reporting to help you identify high-level file security problems.
Reduces security risks automatically. Offers the ability to modify permissions and reduce possible security issues, allowing you to create the exact security profile you need for your enterprise.
Provide extensive, rich reporting. With more than 30 reports, File Security Administrator enables you to track and audit the state of your file system permissions.
Automate file permissions backup and restore. Enables you to save time and reduce errors associated with manually resetting file permissions.
Prevents costly down time. Allows you report on your current security, and backup and tighten your security quickly and easily.
Provides user-friendly interface. Logical, organized graphic display lets you see your current file security settings and includes wizards to help carry out common task such as searching, replacing, modifying or reporting on permissions.
Permits enterprise-wide actions. Allows you to group files, directories, and shares across machines and domains, so you can modify permissions, backup permissions, and take immediate corrective action on the collection.
Enables storage capacity planning. Allows you to identify and characterize storage utilization with various reports, including file type, last accessed and modified times, owner, Windows 2000 quota settings, and more.
Allows impact analysis and change management. Lets you take snapshots of your ideal security model and track deviations from that model.