Enzoic for Active Directory v3.2
The Reporting page of the Enzoic Console allows you to see statistics about how many password change operations Enzoic has checked for your organization, how many were matched, as well as how many password/credentials have been checked by your continuous monitoring features. This is also where you’ll find the Monitored Users report, which contains a detailed breakdown of which users in your organization are currently being monitored by Enzoic for Active Directory and what the current status of their password security is.
The dropdown menu in the upper right of this page allows you to select which report you’d like to view.
Sample Password Change Report
This report shows you a statistical view over time of how many user password change operations have been checked by Enzoic and how many of those ended up being matches with a compromised or weak password (i.e. the new password was rejected). There is a bar for each month showing these numbers. Hovering over the bar provides an additional breakdown of the matches by type of match (i.e. exact match, fuzzy match, etc.).
Sample Continuous Monitoring Report
This report shows you a statistical view over time of how many user passwords and credentials were scanned by the continuous monitoring functions (User Password Monitoring and User Credentials Monitoring). It also indicates how many of those checks ended up being matches with a compromised or weak password or credentials (i.e. the user’s password or credentials were flagged as compromised). There is a bar for each month showing these numbers. Hovering over the bar provides an additional breakdown of the matches by type of match (i.e. exact match, fuzzy match, etc.).
Sample Monitored Users Report
This report shows you a list of all the users currently being monitored by Enzoic for Active Directory, along with a Compromised status for each user. For each user, you can also see what the current status is for Password Monitoring and Credentials Monitoring. The filter dropdown at the top right allows you to further filter the report, so you can, for instance, just see users with currently compromised passwords.The Update button in the header allows you to refresh the report. Since this report can be time-consuming to generate for larger domains, it is only refreshed on demand. If the data is stale (more than 15 minutes out of date), you will see a red warning message next to this Update button reminding you that you need to regenerate the report to see current data.
The potential values for the Compromised column are as follows: