Visualizing Active Directory Objects


See AD-objects and understand relationships allows you to browse comfortably through your AD objects, in order to understand the complex correlation, affiliations and relationships between the user accounts and the permission groups. In this way, targeted and clear information can be gathered concerning questions about the permissions of individual users or groups.

The information about actual group affiliations is significant. Shortcomings of the Microsoft AD console are eliminated from the views. One can see at a glance where an object is actually a member or which actual members have a group. Diverse information can also be counted or typed immediately through the performance of the database. Furthermore, useful additional information is given. If you have a look at members of a group, the information about the department or OU is shown. This is vital to understand whether the correct accounts are members of the corresponding group.


Colleague Check – Analyzing group dynamics

The Colleague Check connects user to their group affiliations. The ‘fuzzy’ approach of this analytical procedure produces a view on the complex group structures and similar structural problems which can be hardly determined with the help of individual figures.

Unlike the reporting of hard facts, the change in perspective of the colleague check requires a certain interpretation by the administrator. The fact that Mr. Smith from the Research Department is member of the group ‘Key_Figures’, is only avaluable information if one sees that he is the only one from his department and except him, only the management has such permissions. And the fact that the apprentice Paul has same permissions as the accounts department is relevant only if he, in addition, has great similarities with the sales, IT and auditing departments, too.


  • Clean up NTFS permissions

    End your authorisation chaos identifies inconsitent NTFS-permissions and transfers them, in accordance with the administrator's specifications, into a new, clean permission structure. Permission groups, including tedious list permissions, are automatically built in migRaven´s Sandbox without causing any downtime to the production system.

  • Introduction of 8MAN

    From Installation to Integration

    Installation of 8MAN Access Rights Management is easily done. But if one wants to work with it efficiently, the existing, often historically evolved, directory and authorization structure must first be reorganized. Because can make 8MAN compatable conversions of even the largest of structures (and in the shortest of times) it has become the official integration tool for 8MAN.

  • Introducing an IDM-system

    Clear permissions from the first day

    IDM & rights management systems often provide sophisticated workflows that can greatly simplify authorization assignment and involve them data owners. In order to establish these processes, however, the system must be based on the existing access rights. Fits to this previously with of which can greatly simplify integration.

  • Remove direct access rights

    Find and replace them fully automatically

    Direct permissions on NTFS-file servers undermine the approach, to depict access rights with groups. The overview is lost, the administration and revocation of the access rights are hardly to be managed. can identify and transfer all direct permissions in consistent group affiliations.

  • Revise your directory structures

    Data, data and even more data

    If the file services are not structured clearly, employees quickly create their own, parallel directories. At this point, the amount of data can multiply itself in the shortest time, making it hard for the user to work efficiently. can reduce the complexity of your directory tree while ensuring properly set NTFS permissions. development GmbH / / Tel: +49 (30) 8095010-40 / about us / terms / imprint