??? pgHead ???

How ManageEngine helps you meet GDPR compliance requirements

 
Requirement/
Article
Requirement Product Capability/ Feature Rules Summary reports Description
Article 5 - 1(b) "Personal data shall be: Collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall, in accordance with Article 89(1), not be considered to be incompatible with the initial purposes (‘purpose limitation’)..." Log360 Log360: Real time alert capability, Database auditing, File integrity monitoring   All file/folder changes:
Created File/Folder
Deleted File/Folder
Modified File/Folder
Permission Changes
Overwrite

File analysis reports:
Old files
Stale files
Unmodified files

Database change auditing reports (MS SQL or Oracle databases):
Database table deleted
Database table modified (DDL query execution)
Unauthorized login failures
Permission changes for files or folders
Database account creation
Database schema changes
With the help of Log360 real time alerting capability, organizations will be alerted when any anomalous activity take place. Log360 simplifies database auditing by automatically collecting and monitoring logs from different database servers. Apart from collecting logs – it analyzes and correlates this data to provide insightful reports on database activity across all these platforms. This allows you to investigate potential issues and ensure the security of your databases.
Article 5 - 1(d) "Personal data shall be accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’)..." Log360 Log360: Database auditing   Database table deleted
Database table modified (DDL query execution
Unauthorized login failures
Permission changes for files or folders
Database account creation
Database schema changes
Log360 provides database activity monitoring for Microsoft SQL, MySQL, Oracle and IBM DB2 applications. The solution helps you gain instant alerts and ready-made reports of database activity to prove compliance with stringent IT regulatory mandates.
Article 5 - 1(f) "Personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidentalloss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’)." Log360, DataSecurity Plus Log360: Predefined alert profiles and real-time alert notifications, audit reports on DML and DDL operations. File integrity monitoring to detect file changes. Multiple file permission changes
Excessive file removal
Suspicious file access
Possible ransomware activities
Excessive file removal
File access
File modified
File deletion
Database table deleted
Modified (DDL query execution)
Unauthorized login failures
Permission changes for file or folde
Database account creation
Database schema change
Log360 comes with pre-configured alerts for suspicious activities potentially indicating unauthorized access attempts, data breaches, or other security incidents. It also continuously monitors and audits DML and DDL activities in SQL and Oracle databases, alerting security personnel to any changes. It also tracks changes to database server accounts. DataSecurity Plus helps to maintain the data integrity by auditing file and folder actions including create, rename, delete, copy, and more, in real time.
Article 25 - 2 "The controller shall implement appropriate technical and organizational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed. That obligation applies to the amount of personal data collected, the extent of their processing, the period of their storage and their accessibility. 3In particular, such measures shall ensure that by default personal data are not made accessible without the individual’s intervention to an indefinite number of natural persons." ADManager Plus ADManager Plus: Workflows Notification rulesAssignment rules   ADManager Plus reports: Workflow in ADManager Plus
Notification rules
Assignment rules
ADManager Plus also helps to keep track of permission records.
Users in groupsGroups for users
Shares in the servers
Permissions for folders
Folders accessible by accounts
Servers accessible by accounts
Server permissions
ADManager Plus simplifies Active Directory management tasks by utilizing workflows. These workflows define a sequence of steps for handling user, group, computer, contact, and permission management requests. Additionally, ADManager Plus enables you to send detailed request information to technicians and other stakeholders via email and SMS.
Article 30 - 1 "Each controller and, where applicable, the controller’s representative, shall maintain a record of processing activities under its responsibility." ADManager Plus Get a complete audit trail of all the activities related to personal data.

ADManager Plus reports: Workflow historyHelp desk technician audit
  Shares in the Servers
Permissions for Folders
Folders accessible by Accounts
Server Permissions
Subnet Permissions
Servers accessible by Accounts
Subnets accessible by Accounts
AD Objects accessible by Accounts
Inactive Users
Users Never Logged On
Logon Hour Based Report
Account Never Expires Users
Users with Password Never Expires
Group MembersGroups for Users
Admin Audit ReportAudit Report
ADManager Plus provides comprehensive audit capabilities through detailed reports and functionalities, that enables administrators to track and document access to personal data stored in Active Directory. Users can view and manage group memberships, audit shared folder permissions, and monitor access rights across specified locations. The platform enables oversight of workflow requests and management actions, ensuring transparency in data processing activities.
Article 32 - 1 "Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk." ADSelfService Plus, RecoveryManager Plus ADSelfService Plus: Strong password policy and MFA settings. RecoveryManager Plus: Backup and recovery.     ADSelfService Plus offers strong password policy and MFA settings that can help your organization comply with the GDPR. ADSelfService Plus provides adaptive MFA with 20 different authentication factors to secure organizational resources, such as machines, applications, VPNs, OWA, and RDPs. RecoveryManager Plus is a backup solution providing you with the ability to easily backup and restore your data.
Article 32 - 1(b) "The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services;" Log360 Log360: Database auditing   Database table deleted
Database table modified (DDL query execution)
Unauthorized login failures
Permission changes for files or folders
Database account creation
Database schema changes
Regularly audit the systems (or servers) that store and applications (databases) that process personal data. Get notified in real-time with Log360, upon any unauthorized access attempts, permission changes, privilege escalations, or unexpected shutdowns of servers and applications that could result in potential threats affecting their confidentiality or integrity.
Article 32 - 1(d) "a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing." Log360 Log360: Log collection   Network Device Configuration Reports, Network Device Attack Reports, Network Device Security Reports, Network Device Logon Reports, Printer Auditing Reports, File Changes Log360 collects data from devices like firewalls, vulnerability scanners, file servers, databases, Linux/Unix machines, IBM AS400 systems, and more.
Article 32 - 2 "In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data transmitted, stored or otherwise processed." Log360, Exchange Reporter Plus Log360: Database auditing, File integrity monitoring

Exchange Reporter Plus: Data transmission audit via email
  Database table deleted
Database table modified (DDL query execution)
Unauthorized login failures
Permission changes for files or folders
Database account creation
Database schema changes

Exchange reporter plus compliance reports: Messages by Subject
Mails Sent by Shared Mailbox
Mails Received by Shared Mailbox
Mailbox Permission Changes
User Mailbox Security
Mailbox Created
Mailbox Deleted

Mailbox Content Reports:Folder Message Count And Size
Folder - wise Unread Mails with Subject
Messages by Subject Keyword
Messages by Body Keyword
Attachments by File Name Keyword
Attachments by File Extension Keyword
Attachments by File Size
Message Count and Size Summary
Folder-wise Read Mails with Subject
Exchange Reporter Plus help to comply with the GDPR by: Locating messages based on keywords in their content.Filtering messages based on attachments' name, type, and extension.Auditing changes to mailbox permissions.View emails deleted or moved across folders in your organization. Identify non-owner mailbox logons.Get real-time alerts about critical changes to your Exchange environment.
Article 32 - 4 "The controller and processor shall take steps to ensure that any natural person acting under the authority of the controller or the processor who has access to personal data does not process them except on instructions from the controller, unless he or she is required to do so by Union or Member State law." ADManager plus AD Manager Plus: Folders accessible by accountsHelp desk technician auditAdmin audit   Users in groups
Groups for users
Shares in the servers
Permissions for folders
Folders accessible by accounts
Servers accessible by accounts
Server permissions
Folders accessible by accounts
Help desk technician audit
Admin audit
ADManager Plus helps to keep track of permission records. It generates alerts if any person who does not have explicit permission attempts to access the data.
Article 33 - 1 "In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay." Log360, ADAudit Plus Log360: Correlation rules, UEBA ADAuditPlus: User's Last Logon reports Correlation rules: SQL injectionRansomware attacksCross-site scriptingDenial of Service Distributed Denial of Service. ADAuditPlus predefined alert profiles to detect backdoor account creation:
Modified admin groups
Members added to privileged groups
New user creation
Domain policy changes
GPO changes

Monitors critical security events to detect potential threats:Users logged into multiple computers
Administrator logon activity

ADAuditPlus GDPR compliance reports: User's Last Logon
Member Server Logon Activity
Files Modified
User Attribute New and Old Value
Folder Permission Changes
File Read Access
Failed attempt to Read File
Log360 correlation engine helps to detect data breaches. It is capable of detecting data leakages for many well known attack. Log360's UEBA detects anomalous activities of users and entities. This helps identify and mitigate insider threats, account compromise and data exfiltration attempts at an early stage. ADAudit Plus helps you detect brute-force attacks with its extensive user logon auditing capability. It helps to get insights into: Logon failures due to a bad password or username. Logon activity based on domain controller and IP address. Account lockouts, including when the user got locked out, from which device, and their logon history. ADAudit Plus can also promptly detect backdoor account detection with its real-time alerts module.
Article 33 - 5 "The controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken. That documentation shall enable the supervisory authority to verify compliance with this Article." Log360 Log360: Forensic analysis, Incident work bench     Log360's log search engine helps to perform forensic analysis. The forensic analysis provide information like: who was responsible for the breach, when the breach occurred, systems that were affected because of the breach, data that got transmitted, exposed, deleted or tampered. By enabling faster investigation and efficient evidence collection, the incident workbench helps you meet the timeframes and information requirements for notifying authorities and data subjects about personal data breaches.
 
  • How ManageEngine helps you meet GDPR compliance requirements

Take the lead in data protection best practices with our unified SIEM solution!