Reciprocal Auditor includes applications for Active Directory, Azure AD, Exchange, Office 365, Windows file servers, EMC storage devices, NetApp filer appliances, SharePoint, Oracle Database, SQL Server, VMware and Windows Server. Empowered with a RESTful API and user activity video recording, the platform delivers visibility and control across all your on-premises or cloud-based IT systems in a unified way.

Reciprocal auditing applications for Active Directory

What Auditor does?

Detect Data Security Threats – On Premises and in the Cloud


Auditor bridges the visibility gap by delivering security analytics about critical changes, configurations and data access in hybrid cloud IT environments and enabling investigation of suspicious user behaviour. The platform also provides alerts about patterns that violate corporate security policies and indicate a possible insider threat.


Pass Compliance Audits with Less Effort and Expense


Our Auditor provides the evidence required to prove that your organisation’s IT security program adheres to PCI DSS, HIPAA, HITECH, SOX, GLBA, FISMA/NIST800-53, COBIT, FERPA, NERC CIP, ISO/IEC 27001 and other standards. It also ensures easy access to compliance reports for more than 10 years.

What Auditor does?: Detect Data Security Threats On Premises and in the Cloud

Increase the Productivity of Security and Operations Teams

With our Auditor, there’s no need to crawl through weeks of log data to answer questions about who changed what, when and where a change was made, or who has access to what. The platform delivers actionable audit data to anyone in your organisation who needs it.


Secure identities and data in the cloud

Solidify AD security — even if your identities reside in the cloud.

In Action: Detect Data Security Threats

Gain a bird’s-eye view of activity across your IT environment

Get a high-level view of what’s going on in your hybrid cloud IT infrastructure with Enterprise Overview dashboards. Track trends in employee activity, such as how much activity is occurring, which users are most active and which systems are most affected.

Protect your structured data against exfiltration.

Gain control over database activity to detect, investigate and remediate threats to structured data.


User Behaviour and Blind Spot Analysis — Detect insider threats or external attacks in progress.


Spot anomalous activity and abusive user behaviour that would otherwise go unnoticed.


You can detect insider threats and cyber-attacks, identify bad actors and respond to incidents efficiently. The new User Behaviour and Blind Spot Analysis capability enables you to easily answer questions such as:


Has there been any abnormal access to sensitive data?

Is anyone accessing stale data?

Have there been any unusual spikes in failed activity?

Who is active outside of business hours and what are they doing?

Has anyone put harmful files on corporate data storage?

Are there any files likely to contain credentials, Social Security numbers, PHI or other sensitive data? … and more.

Add-on Store — Fully leverage your IT security ecosystem through seamless, bi-directional integration

Maximise the value of your existing security applications by feeding them granular audit data

What Auditor does?: Protect your structured data against exfiltration

Spot abnormal user behaviour that would otherwise go unnoticed


Quickly identify potential security incidents, such as unusual logons that might indicate user identity theft or a disgruntled privileged user trying to hide his or her activity behind temporary accounts. With the user behaviour and blind spot analysis capability, no malicious activity can slip under your radar.


We provide a market-leading visibility and governance platform for on-premises, hybrid and cloud IT environments. More than 160,000 IT departments worldwide rely on Netwrix to detect insider threats on premises and in the cloud, pass compliance audits with less expense and increase productivity of IT security and operations teams.


Reciprocal are pleased to be a Netwrix partner; being able to provide insight to our customers about their environments, the daily changes that are made and the associated security risks that unmanaged administration can present.

Apply Online