Configuration Audit

Today's IT implementations are increasingly more complex. A single server can contain thousands of configuration elements, including system files, kernel parameters, registry keys, application settings, and firmware switches. Each of these elements must be to meet specific IT business requirements. Since a typical organization may have hundreds or even thousands of servers, the number of configurations to be tracked and managed can reach into the hundreds of thousands.

Adding to the complexity of the IT environment are the need for services to be available for internal, remote and outsourced workers, the range of technology in heterogeneous environments stretching from PDAs to mainframes, and the growing migration to virtualized environments.

Traditional methods of managing and monitoring configuration settings are impeded by IT staffs that simply don't have time or resources to look at each element of a complex infrastructure individually. This can initially result in systems being deployed into the infrastructure that aren't fully configured to a defined standard. Even when deployed properly, over time, the lack of visibility into the environment will result in "configuration drift" - configuration settings that, without staff knowledge, have changed over time until they're far from what they're supposed to be. Configuration drift negatively impacts an enterprise's operational performance and availability, security, and, eventually state of compliance to internal and external standards.

Configuration audit and analytics can help align the configuration of servers and other assets, contribute to proper capacity planning, validate the configuration of environments designed for business continuity, facilitate migrations from physical to virtual environments, and improve application lifecycles across an environment. By maintaining appropriate configuration controls, you will also reduce the risks associated with unauthorized change - including downtime because of system failure, the introduction of security vulnerabilities, and insider security threats.

Ecora Auditor Professional is the only solution to automate the generation of detailed configuration and change reporting for identifying and auditing configuration settings and their changes in virtually all operating systems, database management systems, applications, directories, network devices and firewalls. With its agentless architecture, you can begin collecting data and reporting on your infrastructure in a matter of hours. Pre-installed report templates quickly validate newly deployed systems are configured to an established baseline configuration standard, identify systems that have drifted from your standard, and identify potential root cause for an outage by identifying deviations from a system's last known good state.

Integration with popular service desk solutions like BMC Remedy and HP OpenView Service Desk provide the ability to act quickly to remediate configuration drift that has been detected through Auditor Pro's rich reporting and policy analysis.

Next Steps

See Auditor Pro in action. Click here to schedule an on-site or web demonstration.

See how it works in your own environment. Click here to request a trial.