Manageengine Ad360 Buyers Guide
Manageengine Ad360 Buyers Guide
www.manageengine.com/active-directory-360/
27 / 1
01 Introduction 2
What is IAM? 2
Why do organizations need an IAM solution? 2
Index
4
02 What is AD360? 3
6
03 Why should I consider AD360? 3
What AD360 offers 3
Gartner recommended critical IAM capabilities in AD360 4
0
04 What are AD360's components? 6
1
05 How will AD360 benefit me if I already use any of its components? 7
If you use ADManager Plus 7
If you use ADSelfService Plus 9
If you use ADAudit Plus 11
If you use Exchange Reporter Plus 12
If you use M365 Manager Plus 14
If you use RecoveryManager Plus 15
9
06 How will AD360 benefit me in my industry? 16
Healthcare sector 16
Finance and banking sector 17
Government sector 18
5
07 What do I get with each edition of AD360? 20
7
08 What do people say about AD360? 21
Peer reviews 21
Analyst reviews 22
1
09 What is the architecture of AD360? 23
AD360's modules 23
Communication process between modules 25
User roles and their authentication 25
Technology used 26
6
10 Where can I get more information? 27
www.manageengine.com/active-directory-360/
27 / 2
Introduction
What is IAM?
Identity and access management (IAM) is a framework
that encompasses the policies and processes required to
govern users' identities and their access to resources
within an organization. IAM consists of three key
components: identification, authentication, and
authorization. Thus, an IAM solution is one that facilitates
these components under one umbrella.
Why do organizations
need an IAM solution?
With the number of data breaches rising exponentially,
organizations need to adopt governance practices and
tools to prevent threats and increase operational
efficiency. Gaining access to the corporate perimeter is
easier than ever due to remote work. For many
organizations, an enormous amount of the workload is
stored and shared across a wide variety of on-premises
and cloud applications, leading them to use granular
access control solutions to keep up with authentication
demands.
What is AD360?
AD360 is an IAM solution suite. It's a modular solution with multiple components that take care of a myriad
of IAM needs, from automating mundane tasks like user life cycle management to implementing strong
authentication mechanisms. AD360 has a simple and straightforward console from where you can manage
and protect your Windows Active Directory (AD), Exchange Server, and Microsoft 365 environments. It also
takes care of your identity governance and administration (IGA) demands and ensures business continuity
with backup and restoration of critical data.
Zero Trust implementation Adopt Zero Trust to protect your growing network
perimeter. Verify every user, employee, contractor,
and respective endpoint before establishing trust
with behavior-based security analytics.
Make informed choices about data, people,
devices, workloads, and networks.
Don't just take our word for it. The following list highlights the 15 capabilities Gartner considers critical for
an IAM solution, and you can implement them all using AD360.
2 Entitlement management:
Eliminate redundancy and human errors and improve business processes by automating
entitlement management.
Approval-based workflows:
3
Build purpose-oriented business workflows. Create the required levels of approval by including the
rights of the stakeholders. Define the approval flows for business processes, such as user account
creation, modification, or permissions management.
6 Access certification:
Review user access rights with detailed reports and ensure they comply with the internal security
policy.
8 Adaptive authentication:
Enforce risk-based adaptive authentication using factors such as user location, IP address, time of
previous logon, or device footprint.
Access requests:
11
Enable self-service group management through which users can request membership to AD
groups to gain access to a set of specific IT resources. By enabling an approval workflow for
self-service group management, application and resource owners can control who gets to be a
member of a particular group.
13 Ease of deployment:
No prerequisites or complicated deployment. Start managing identities in your on-premises,
cloud, or hybrid IT environment within minutes.
High availability:
15
Ensure high availability in case of system and application failures. High availability is achieved
through automatic failover; when the AD360 service running on one machine fails, another
instance of the AD360 service running on a different machine will automatically take over.
1 ADManager Plus: AD, Exchange, and Microsoft 365 management and reporting.
2 ADSelfService Plus: Self-service password management, and SSO and MFA implementation.
3 ADAudit Plus: UBA-driven auditing and threat detection for AD, file servers, and Windows Servers.
Exchange Reporter Plus: Reporting, auditing, monitoring, and content searching for Exchange
4
Server, Exchange Online, and Skype for Business.
M365 Manager Plus: Management, reporting, auditing, monitoring, automation, and alerting for
5
Microsoft 365 services.
Recovery Manager Plus: Enterprise backup and restoration for AD, Microsoft 365 and Exchange,
6
Azure, and Google Workspace servers.
Note:
The functionalities mentioned below are not exhaustive. The solution can be tailored to suit your
organization's needs. If you'd like to know how AD360 can help you specifically, you can contact us at:
Here's how you can benefit from upgrading to AD360 if you use one of the following components:
Track successful and failed logons, account lockouts, logons from disabled
accounts, MFA-enabled logon failures, and more.
Perform Track privileged user activities; monitor the active and idle time spent by
employees at their workstations; monitor user logons; and be notified about
user activity
sudden, atypical user login behavior, such as an unusual login time, by tracking
monitoring
deviations from the baseline.
Perform
Monitor privilege abuse by tracking accesses in real time to see who changed
real-time file
which file or folder, when, and from where across Windows, NetApp, EMC,
access
Synology, Huawei, and Hitachi file systems.
auditing
Greatly enhance security by using factors like IP address, business hours, device
used, or geolocation to enforce access control decisions automatically.
Add MFA for cloud application, VPN, virtual desktop infrastructure, machine
Enhance (Windows, Mac, and Linux), Outlook Web Access (OWA), and Exchange Admin
security
Enforce fine-grained password policies with stronger password settings to
privileged users.
Prevent employees from using passwords that have previously been exposed.
Back up all AD objects, like users, groups, GPOs, OUs, Exchange attributes, DNS
records, computers, and contacts, at regular intervals and restore them either
partially or completely.
recovery attributes to a previous backup point and undo all changes made after that point.
Hold backup data for a defined retention period, and discard the oldest full
backup to save storage space.
Reset passwords in bulk across AD, Exchange Server, Microsoft 365, Google
Enhance Workspace, and Lync or OCS environments.
AD password
management Automate periodic password changes for users, set unique passwords for
multiple users at once, and perform password management from built-in reports.
Detect and
Get instant notifications when critical user accounts are locked out with details
resolve AD
such as locked-out time and which machine they used.
account
lockouts Analyze and troubleshoot account lockouts effectively by tracking down the
faster with source of authentication failure.
real-time
alerts
Create an While enabling self-service for employees, redirect help desk tickets to your IT
approval-based service provider and define who should review and approve the tickets.
workflow for
password reset Stay in control of AD automation by receiving notifications via email or SMS
about the execution of any automated task.
requests
Track when employees log on and log off in real time, and detect privilege abuse
by monitoring user activity.
Track
employee Keep a close eye on users in your enterprise by continuously auditing user
real time
Ensure accountability by maintaining a foolproof record of all file accesses and
modifications along with all AD object modifications and user login information.
Perform
Provision, modify, and deprovision accounts and mailboxes for multiple users at
identity life
once across AD, Exchange servers, Microsoft 365 services, and G Suite from a
cycle single console.
management
Perform Set up a secure environment where trusted users are temporarily granted
privilege permission to access certain files, folders, and groups, and ensure users have
Generate and export reports on access permissions for all NTFS folders and files
and their properties for Windows file servers and NetApp servers to quickly view
and analyze file-level security settings applied to critical files and folders in their
environments.
Effortlessly generate a list of inactive user accounts, disabled user accounts, and
expired user accounts in the form of reports and delete or disable these accounts
Perform in bulk instantly.
user life cycle
management Automate critical tasks, specify how often you want automations to run, and view
and automation a history of automations to keep track of the status of all automations. View when
the automation was run, the total number of tasks it includes, which of them are
pending, and which of them have been executed.
Enable SSO and MFA for all SAML-based applications, which allows users to use
just one set of credentials to access all their commonly used applications.
Enhance
password Leverage a multi-platform password synchronizer to automatically synchronize
security: Windows AD and Azure AD password resets, changes, and account unlocks for
user accounts across multiple other platforms, such as Google apps, M365,
Salesforce, Zoho, Zendesk, and ServiceNow.
Undo any changes made to AD that are detected by ADAudit Plus through
periodic backups of AD data. Roll back AD objects, like users, groups, GPOs, OUs,
Exchange attributes, DNS records, computers, and contacts, to an earlier state
and undo any changes performed.
Roll back
Compare backup snapshots across multiple versions to get an overview of all
AD changes previous values and the current value of an AD object before you perform any
restoration.
Add multiple email addresses for users while ensuring they all map to the same
mailbox; enable or disable Exchange services attributes, including Outlook
Mobile Access, OWA, POP3, and IMAP4; and set delivery restrictions on the size
of the emails users send and receive.
Manage
mailboxes Easily set or reset the "send on behalf" and forwarding addresses.
Migrate mailboxes in bulk to the required Exchange server and delegate the
migration task accordingly. Set mailbox rights in bulk using templates, and
manage Exchange Servers 2003, 2007, 2010, and 2013.
Create and manage password policies for multiple cloud applications, including
Exchange Online, from a centralized console—no more jumping between
multiple cloud applications every time your organization's IT security policy
changes.
Enforce better
Extend AD password policy controls to cloud applications, like Exchange Online;
cloud security
enforce tighter password policies on privileged accounts and implement more
with granular
lenient password policies on normal user accounts.
password
policies Extend the granular password policy controls that govern AD to cloud
applications, and ensure that the passwords for all accounts have the same
complexity rules, expiration dates, etc. This makes password management easier
for both end users and administrators, and it greatly reduces password-related
issues.
Back up mailboxes and mailbox items, such as emails, calendar entries, contacts,
journals, notes, posts, tasks, draft emails, deleted items, junk mail, outgoing
Back up emails, permanently deleted items, and all group mailboxes, and archive
mailbox mailboxes from both on-premises Exchange Server and Exchange Online
items, perform tenants.
granular
restorations, Restore entire mailboxes or specific mailbox items to the same mailbox they were
backed up from or to a different mailbox in the same Exchange Online tenant or
and stay
Exchange organization. Export an entire mailbox to PST format for archival.
compliant with
retention
Define a retention period for your backups, and automatically discard
policies
olderbackups and stay compliant with retention policies.
Manage Exchange Server and AD from a single console with runtime mailbox
provisioning, deprovisioning, and delegation; set mailbox rights in bulk using
templates; and apply multiple Exchange policies, like a sharing policy, a role
assignment policy, a retention policy, a Unified Messaging policy, and an
ActiveSync policy, all at once.
Perform user
Create dynamic distribution groups and configure all their attributes at once,
management
provision new resource mailboxes in Exchange and Microsoft 365, and modify
resource mailboxes in Exchange.
Back up all the files and folders in your OneDrive for Business environment and
restore them to any of their backed-up versions instantly. Users experience no
downtime in Microsoft 365 services while their OneDrive data is backed up.
Back up just the changes made to mailboxes and sites since the last backup
cycle.
Track files Monitor privilege abuse by tracking accesses in real time to see who changed
and folders which file or folder, when, and from where across Windows, NetApp, EMC,
Detect and Set up a threshold for baseline parameters of user behavior; if the threshold is
respond to breached, it may be an indicator of a rogue insider or a hacked account. In such
internal cases, apart from being alerted, you can also set up an incident workflow as a first
response to counter these attacks.
threats
Perform
Reset or change user account passwords in bulk, and automate other identity
identity
management processes, like provisioning, deprovisioning, and bulk user
life cycle management.
management
Enhance your network's security by setting up MFA for endpoint and application
Enhance
logins using methods such as fingerprint authentication or a time-based OTP.
password You can also set strong password policies to ensure that a weak password doesn't
security compromise the security of your entire network.
Review security incident reports, track changes in real time at the attribute level,
spot undesired changes and revert them to the correct value immediately, and
Secure track and audit user access to systems that contain protected health information
confidential (PHI).
PHI
Find and track sensitive ePHI, monitor file accesses and modifications, and report
on overexposed sensitive files.
Achieve HIPAA Always stay in the know with over 200 preconfigured reports to view changes
compliance: made in the system, track user actions, access data logs, and modify data.
Enforce fine-grained password policies for OUs and groups, and implement a
Administer
stringent password policy for privileged users who have access to PHI.
granular
password Prevent users from setting passwords that are dictionary words, easy-to-crack
policies patterns, or passwords that have been compromised due to data breaches.
Implement Enforce MFA for different users based on domain, OU, or group memberships, all
Monitor
Keep tabs on data access rights by monitoring folder owner and permission
access to
changes, and be alerted about changes to critical files and folders via email and
sensitive
SMS.
financial data
Prevent inappropriate access to financial data by leveraging ADAudit Plus'
machine learning capabilities to spot unusual volumes of file changes and
changes occurring at unusual times.
Gain complete visibility and prevent unauthorized access to NTFS partitions and
shares with preconfigured access permissions reports for folders, files, and
Analyze and server shares.
refine share
permissions See which users and groups have access to folders in a specified path with
with NTFS predefined reports on AD access control permissions for users and groups.
reports
Track failed attempts to access or modify files and folders, which are often the
first sign of a security threats, with around-the-clock auditing.
Spot Detect anomalies instantly in user logons, account lockouts, and permission
suspicious changes, and actively respond to threats by configuring automatic responses to
Government sector
Compliance Stay compliant using out-of-the-box, automated reports for regulations such as
management FISMA, NIST, GPG 13, CJIS, ISO20000, ISO 27001, GDPR, CPRA, and LGPD.
Assign only the required level of access to sensitive documents to officials based
on their authority.
Privilege
Identify and get alerts on telltale signs of privilege abuse, such as unusually large
assignment
volumes of file modifications or attempts to access critical files.
and monitoring
Spot privilege escalation attacks by monitoring and auditing changes made to
security groups.
Implement Enforce MFA for different users based on domain, OU, or group memberships, all
Enforce fine-grained password policies for OUs and groups, and implement a
Administer stringent password policy for privileged users who have access to sensitive
granular personal information.
password
Prevent users from setting passwords that are dictionary words, easy-to-crack
policies
patterns, or passwords that have been compromised due to data breaches.
Keep all your critical information and AD configurations backed up in case they
Back up need to be restored.
and recover
your data Perform recovery operations without having to restart DCs, ensuring continuous
availability for the DCs.
AD management
AD user management
AD computer management
Report scheduling
OU-based administration
GPO management
AD auditing
Password self-service
Password changes
Exchange reporting
Samsung SDS
Electronics; USA
analytics are [in] AD360. Based on that, the behavior of users can be monitored and
outliers can be identified easily. The technology is based on ML algorithms."
"Workflows finally help in managing access beyond the IT team. AD tasks can
result in tickets that are used in multi-stage workflows. This also allows for
Approval
creating user request portals for various types of users, approvals of entitlement
workflows requests by the responsible managers, or approvals for controlled access to file
shares."
AD360 provides a web-based client that any machine connected to the same network as the AD360 web
server can access using a web browser. The web client can be accessed by entering the IP address or the
hostname, followed by the port number of the AD360 web server as the URL.
For example, if the IP address is 192.168.98.17 and the port number is 8082, the URL would be as follows:
https://192.168.98.17:8082
<Login page>
Once the administrator's credentials are authenticated, the AD360 dashboard displays all the necessary
information on one screen with easy access to the solution's various features. The dashboard can be
customized to suit individual requirements.
The database
AD360 comes bundled with a PostgreSQL (pgSQL) database. You can also migrate the built-in pgSQL
database to MS SQL or an external pgSQL database if you wish to do so. This product database stores
admin credentials, domain configuration settings, reverse proxy settings, and more. The AD360 web server
fetches these details as and when necessary. Sensitive information such as the administrator credentials
are encrypted using the bcrypt algorithm to ensure secure storage.
Admin/
Web client
Technician
Database
(pgSQL/MS SQL)
Active Directory
Integrated components:
1. ADManager Plus server
2. ADAduit Plus server
3. ADSelfService Plus server Email server Email alerts
4. Exchange Reporter Plus server
5. M365 Manager Plus server
6. Recovery Manger Plus server
Whenever the user tries to view a report or update the administration settings (domain configuration,
admin credentials, reverse proxy, auto-update, and more), the client sends a request to the AD360 web
server. Communication between the client and the AD360 web server can be secured by enabling
HTTPS after applying an SSL certificate.
Based on the request received from the client, the AD360 web server swings into action. It makes a
REST API call to the respective components to fetch the reports or, if there's an update in the
administration settings, it stores the necessary details in the product database and then makes a REST
API call to the integrated components to sync the changes across all of them.
Note:
While technicians only have access to the dashboard and reports, administrators have complete access,
and they can can modify domain settings, schedule an auto-update, access reverse proxy and SIEM
integration settings, and perform other actions in AD360 and its integrated components.
Administrator login
An administrator account is verified using product authentication, and the credentials are stored in the
database and encrypted with the bcrypt algorithm.
When the user tries to log in, the AD360 web server uses the Java Authentication and Authorization
Service to fetch the credentials stored in the database.
If the credentials entered by the user and those fetched from the database match, the user will be
successfully logged in.
Technician login
Once the user enters their credentials, the AD360 web server uses LDAP to communicate with AD.
The user will be granted access to the product once AD verifies the user.
Additionally, the administrator can also enable SSO with AD or smart card authentication for technician
logins.
Note:
A technician created in any of the integrated components will be assigned AD360 technician privileges
automatically when they first log in to the solution.
Technology used
The client side of the application is developed using Ember.js.
AD360 uses Java Database Connectivity to connect to pgSQL and MS SQL databases. It also
allows servers to communicate using HTTP or HTTPS.
Privileges and permissions guide An elaboration of all the necessary roles and permissions
required for the various features of each component
integrated with AD360.