Reporting

tenfold’s central and automated permission reporting ensures you always know who in your organization has access to what – and why.

All Systems. One Platform.

tenfold breaks down access rights in all connected services and applications, providing a central overview of users’ effective permissions. This way, you always know who has and had access to which resources at which point in time.

How it works

Interfaces to Microsoft and third-party services allow tenfold to track organizational units, groups and permissions.

tenfold automatically breaks down nested group structures and permission inheritance, showing you the effective permissions that result from these complex structures. This way, admins can easily see which resources a given user can access.

Advantage For Your Company
  • Central Overview of Effective Permissions

  • Control Access to Sensitive Data

  • Full Audit Trail for Compliance Audits

Advantages For Your Users
  • No Need for Manual Documentation

  • Secure & Efficient Access

  • Accurate Permissions in All Systems

Screenshot von der Benutzerfläche der IAM Software tenfold, auf dem das Reporting für die Fileserver-Berechtigungen zu sehen ist.
Screenshot von der Benutzerfläche der IAM Software tenfold, auf dem das Reporting für die Fileserver-Berechtigungen zu sehen ist.

Transparent Permission Reporting

By breaking down nested groups and complex structures, tenfold gives you a clear picture of users’ effective access to IT assets. Potential issues, such as inactive accounts or external file shares, are highlighted for easier review.

How it works

tenfold‘s reporting not only shows you which users hold which permissions for a given object, but also whether it was assigned automatically through one of their roles or manually through a self-service request. For your convenience, permissions that deviate from the standard set are marked.

Additionally, the tenfold Dashboard tracks a number of common issues, such as orphaned accounts, empty AD groups and directories with broken inheritance or directly privileged users.

Detailed Change Tracking

tenfold documents all changes made to access rights in a secure database. This detailed change log makes it easy to prepare for compliance audits, as well as providing important forensic insight in the aftermath of an attack.

How it works

From automated changes to self-service workflows, the results of access reviews and even changes imported from outside systems, tenfold tracks and logs all permission management processes in your network.

Even processes that do not result in a change (such as denied self-service requests) are documented by tenfold in order to provide a complete record.

Warum lohnt sich eine Investition in tenfold. Adobe Stock (c) Andrey Popov
Warum lohnt sich eine Investition in tenfold. Adobe Stock (c) Andrey Popov

tenfold at a Glance

Productivity

Automated user and permission management means faster access for your users and less work for your IT staff.

Security

Change tracking, detailed reporting and regular access reviews keep your data from falling into the wrong hands.

Compliance

Least privilege access and audit-proof logs help you achieve, maintain and prove compliance with laws and security standards.

Screenshot of tenfold's user interface for managing Microsoft Teams memberships and shared files.
Screenshot of tenfold’s user interface for managing Microsoft Teams memberships and shared files.

Automated Permission Reviews

To ensure that users can only access IT assets for as long as they actually need them, tenfold automatically conducts periodic access reviews.

During this access review, data owners have to confirm whether permissions they have assigned are still in use, thus preventing outdated permissions from exposing data to theft and security breaches.

Regular access reviews are a key step in maintaining data security. tenfold makes the process fast and easy by providing each data owner with a simple list of review items. Each permission can be renewed or revoked with a single click.

Frequently Asked Questions

What Reports Does tenfold Provide?

tenfold offers detailed, item- and user-level permission reporting for all connected systems. Admins can access both current and historical data for privileges across different services, as well as generate their own custom reports or export data as PDF or Excel files. By breaking down group memberships and nested structures into effective permissions, tenfold makes it easy to keep track of which systems a particular user can currently and could previously access, as well as which users had access to a particular system.

How Can I Review Changes to Access Rights?

To help you track all changes made to users’ permissions, the tenfold Auditor shows you a list of days and which adjustments were made on those days. Admins can expand these data points as needed to see which changes were made and who approved them.

How Does the Visualization of Groups Work?

tenfold‘s Pathfinder provides a visual representation of users and groups in the Active Directory, allowing you to easily review your AD structure. By clicking on different objects, you can navigate through different AD levels and jump between users and groups as needed.

Does the Reporting Track Changes Made Outside of tenfold?

Managing permissions through a central platform is beneficial in terms of security, transparency and efficiency. Consequently, we recommend the use of tenfold‘s interfaces and workflows for any adjustments to accounts and privileges in connected systems.

tenfold regularly syncs with all connected systems and will therefore notice and identify changes made directly in the target system. So changes made in external systems are documented by tenfold. However, the audit trail for these changes includes significantly less data than for adjustments made through tenfold‘s own workflows (such as the comments left by data owners).

Which Issues Does the tenfold Dashboard Track?

tenfold‘s Dashboard tracks and highlights many common errors and misconfigurations. These include: Directories with broken inheritance or directly privileged users, orphaned accounts and SIDs, empty AD groups, inactive and unused accounts, accounts without group memberships, locked accounts and guest users with active M365 licenses.

Video Overview

See tenfold in Action With Our Feature Video

Book a 1:1 Demo

Schedule a Live Demo With One of Our Experts

Free Trial

Put tenfold to the Test With Our Free Trial!