Direct Inward Dialing: +1 408 916 9892
Segment: Publicly Traded Companies
The Sarbanes-Oxley Act of 2002 establishes strict standards for all publicly traded companies in the United States. It does not apply to private companies. The act is administered by the Securities and Exchange Commission (SEC), which deals with compliance, rules, and requirements. ADAudit Plus ensures an automated SOX 302 / 404 compliance system to secure corporate network security, continuous network monitoring with alerts / reports on authorized / unauthorized system, and data access for data integrity.
Section 302 of the act mandates a set of internal procedures designed to ensure accurate financial disclosure.
Note: Click the below section numbers to view the various ADAudit Plus reports that will help satisfy a particular clause.
Section Number | Description | Reports |
302 (a) (6) | The signing officers have indicated in the report whether or not there were significant changes in internal controls or in other factors that could significantly affect internal controls subsequent to the date of their evaluation, including any corrective actions with regard to significant deficiencies and material weaknesses. | All AD Objects:
|
302 (a) (5) (b) | Any fraud, whether or not material, that involves management or other employees who have a significant role in the issuer's internal controls. |
|
302 (a) (5) (a) | All significant deficiencies in the design or operation of internal controls which could adversely affect the issuer's ability to record, process, summarize, and report financial data and have identified for the issuer's auditors any material weaknesses in internal controls. |
|
302 (a) (4) (b) | Have designed such internal controls to ensure that material information relating to the issuer and its consolidated subsidiaries is made known to such officers by others within those entities, particularly during the period in which the periodic reports are being prepared. | All AD Policy Changes:
|
302 (a) (4) (c) / 302 (a) (4) (d) |
Have evaluated the effectiveness of the issuer's internal controls as of a date within 90 days prior to the report. Have presented in the report their conclusions about the effectiveness of their internal controls based on their evaluation as of that date. |
Local Logon Reports based on Time only:
|
302 (a) (4) (a) | Responsible for establishing and maintaining internal controls. |
|
Section 404 of the act requires management and external auditors to report on internal controls. Access controls should be maintained, reviewed and reported periodically.
Note: Click the below section numbers to view the various ADAudit Plus audit reports that will help satisfy the particular clause.
Section Number | Description | Reports |
404 (a) (1) | State the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting. | 200+ ADAudit Plus Continous Security Audit Reports for third party auditing |
404 (a) (2) | Contain an assessment, as of the end of the most recent fiscal year of the issuer, of the effectiveness of the internal control structure and procedures of the issuer for financial reporting. | 200+ ADAudit Plus Continous Security Audit Reports for third party auditing |
404 (b) | Internal Control Evaluation and Reporting- With respect to the internal control assessment required by subsection (a), each registered public accounting registered public accounting firm that prepares or issues the audit report for the issuer shall attest to, and report on, the assessment made by the management of the issuer. An attestation made under this subsection shall be made in accordance with standards for attestation engagements issued or adopted by the Board. Any such attestation shall not be the subject of a separate engagement. | 200+ ADAudit Plus Continous Security Audit Reports for third party auditing |
A broader look at various audit reports in ADAudit Plus, which satisfy the requirements under a particular category. The reports ensure thorough monitoring and reporting / alerting, besides custom reporting and profile-based reporting.
Recently Created Users | Recently Deleted Users | Recently Enabled Users | Recently Disabled Users | Recently Locked Out Users | Recently Unlocked Users | Frequently Lockedout Users | Recently Password Changed Users | Frequently Unlocked Users | Recently Password Set Users | User Based Password Changes | User Based Password Reset | Recently Modified Users | Password Never Expires Set Users | Extended Attribute Changes | User Attribute New and Old Value | Last Modification on Users | Account Lockout Analyzer | User Object History
Recently Created Security Groups | Recently Created Distribution Groups | Recently Deleted Security Groups | Recently Deleted Distribution Groups | Recently Modified Groups | Recently Added Members to Security Groups | Recently Added Members to Distribution Groups | Recently Removed Members from Security Groups | Recently Removed Members from Distribution Groups | Extended Attribute Changes | Group Attribute New and Old Value | Group Object History
Recently Created Computers | Recently Deleted Computers | Recently Modified Computers | Recently Enabled Computers | Recently Disabled Computers | Extended Attribute Changes | Computer Attribute New and Old Value | Computer Object History
Recently Created OUs | Recently Deleted OUs | Recently Modified OUs | Extended Attribute Changes | OU History
Recently Created GPOs | Recently Deleted GPOs | Recently Modified GPOs | GPO Link changes | GPO History | Advanced GPO Reports: Group Policy Settings Changes | Computer Configuration Changes | User Configuration Changes | Password Policy Changes | Account Lockout Policy Changes | Security Settings Changes | Administrative Template Changes | User Rights Assignment Changes | Windows Settings Changes | Group Policy Permission Changes | Group Policy Preferences Changes | Group Policy Settings History | Extended Attribute Changes
Recently Created Users Report & Recently Created Computers Report
Recently Created Users | Recently Deleted Users | Recently Enabled Users | Recently Disabled Users | Recently Locked Out Users | Recently Unlocked Users | Frequently Lockedout Users | Recently Password Changed Users | Frequently Unlocked Users | Recently Password Set Users | User Based Password Changes | User Based Password Reset | Recently Modified Users | Password Never Expires Set Users | Extended Attribute Changes | User Attribute New and Old Value | Last Modification on Users | Account Lockout Analyzer | User Object History
Recently Created Security Groups | Recently Created Distribution Groups | Recently Deleted Security Groups | Recently Deleted Distribution Groups | Recently Modified Groups | Recently Added Members to Security Groups | Recently Added Members to Distribution Groups | Recently Removed Members from Security Groups | Recently Removed Members from Distribution Groups | Extended Attribute Changes | Group Attribute New and Old Value | Group Object History
All AD Changes By User Report
All File or Folder Changes | Files Created | Files Modified | Files Deleted | Successful File Read Access | Failed attempt to Read File | Failed attempt to Write File | Failed attempt to Delete File | Folder Permission Changes | Folder Audit Setting Changes (SACL) | Files Moved (or) Renamed | Changes based on Users | Changes based on Servers | Files Copy-N-Pasted
Recently Created GPOs | Recently Deleted GPOs | Recently Modified GPOs | GPO Link changes | GPO History | Advanced GPO Reports: Group Policy Settings Changes | Computer Configuration Changes | User Configuration Changes | Password Policy Changes | Account Lockout Policy Changes | Security Settings Changes | Administrative Template Changes | User Rights Assignment Changes | Windows Settings Changes | Group Policy Permission Changes | Group Policy Preferences Changes | Group Policy Settings History | Extended Attribute Changes
Summary Report | Process Tracking | Policy Changes | System Events | Object Management | Scheduled Task
Currently Logged On Users | Logon Duration | Local Logon Failures | Logon History | Terminal Services Activity | Users Logon Duration on Computers | Interactive Logon Failure | Terminated Users Session | RADIUS Logon Failures (NPS) | RADIUS Logon History (NPS)
Summary Report | Process Tracking | Policy Changes | System Events | Object Management | Scheduled Task
Logon Activity based on DC (Every user Authentication) | Domain Controller Logon Activity (Direct login by users into DC).
200+ Pre-Configured / Custom / Profile based ADAudit Plus security audit reports for third party auditing.
Technician Settings with 'Operator Role' privilege will be able to view reports / alerts from ADAudit Plus console.
All File or Folder Changes | OU Management | Computer Management | Group Management | User Management | Logon Duration | Terminal Services Activity | Logon Failures | Recent User Logon Activity
Recent User Logon Activity | Logon Failures | Terminal Services Activity | Logon History | Administrative User Actions | All File or Folder Changes | RADIUS Logon History (NPS) | Successful File Read Access | Folder Permission Changes | Folder Audit Setting Changes
Folder Audit Setting Changes | Folder Permission Changes | Successful File Read Access | All File or Folder Changes | GPO Management | User Management | Group Management | Domain Policy Changes | Logon Duration | Local Logon Failures | Terminal Services Activity
Terminal Services Activity | Local Logon Failures | Logon History | Group Management | User Management | Administrative User Actions | Computer Management | OU Management | All File or Folder Changes | Failed attempt to Write File | Failed attempt to Delete File