Hyena Tool

0 views
Skip to first unread message

Latrina Mosely

unread,
Aug 4, 2024, 2:20:16 PM8/4/24
to tronowadli
Usingthe built-in Windows administration tools to manage a medium to large Windows network or Active Directory environment can be a challenge. Add multiple domains, hundreds or thousands of servers, workstations, and users, and before you know it, things can get out of hand. Hyena is designed to both simplify and centralize nearly all of the day-to-day management tasks, while providing new capabilities for system administration. This functionality is provided in a single, centralized, easy to use product. Used today by tens of thousands of system administrators worldwide, Hyena is the one tool that every administrator cannot afford to be without.

Hyena uses an Explorer-style interface for all operations, including right mouse click pop-up context menus for all objects. Management of users, groups (both local and global), shares, domains, computers, services, devices, events, files, printers and print jobs, sessions, open files, disk space, user rights, messaging, exporting, job scheduling, processes, and printing are all supported. For an example of a typical enterprise-wide view in Hyena, click here.




The key new feature in Hyena is the 'Active Task'. Hyena's new 'Active Task' will provide the functionality for mass importing and updating of most Active Directory attributes from a delimited text input file.


All task settings are saved in a 'task file', allowing for easy repetitive task executions, including command line and scheduling support. For Active Directory user tasks, home directory creation can be automated using Hyena's existing user home directory templates.


Hyena's cost effective licensing policy is based on the number of administrators actually using the product, regardless of the number of end-users or servers. The 30-day evaluation copy is fully functional and free support is available both during and after the evaluation period.


To find out more about Hyena's different management areas, select one of the categories below:


In 2020 at my previous company I used Hyena, an network scanning tool, to identify all endpoint on our AD. I had great success using the tool to identify endpoints that did not have our required security agents. Particularly desktops being the main culprit.


Now at my new company, I am thinking about recommending performing the same project but I need to create a use case proposal. Can anyone tell me the risks of using Hyena or if there is any alternatives that you have experience with? We are also looking in to creating a better asset management process.


Generally speaking, ManageEngine tools are cheap and will do what you need them to, but they're not polished, the UX is not always intuitive, they'll have occasional operational issues (usually resolved by restarting services), and their support and documentation is India-based and not great.


It is designed to both simplify and centralize nearly all of the day-to-day management tasks, while providing new capabilities for system administration. This functionality is provided in a single, centralized, easy to use product. Whether your organization is using Windows 2003, Windows 2019 or anything and everything in between, you can manage everything with one tool.


Hyena uses an Explorer-style interface for all operations, including right mouse click pop-up context menus for all objects. Management of users, groups (both local and global), shares, domains, computers, services, devices, events, files, printers and print jobs, sessions, open files, disk space, user rights, messaging, exporting, job scheduling, processes, and printing are all supported.


LOGON is a pan-asian company operating in China, Hong Kong (HK), India, Singapore, Malaysia, Indonesia, Vietnam, Philippines and Thailand. LOGON has local dedicated trained product specialists in Hong Kong, Guangzhou, Kuala Lumpur, Mumbai and Bangalore. LOGON acts both as value added reseller and sole distributor for award winning software solutions. Customers can buy new licenses, purchase upgrades and renewals from any of our local offices. Contact us for first line support during evaluations, PoCs. We offer best practices consulting services and classroom & online training. Check our site for latest offers, special discounts, bundle deals, etc..


Hyena is the tool of choice for our everyday work in Active Directory. It really gives you fast access to alot of functions you need and normally would need two or three mmcs for. Especially the flexible reports and grid views make my day alot easier.


This software will allow administration of about any device in AD, without having to hunt down different management modules in Windows. I use this tool frequently to control our remote kiosk and sign computers.


Hyena goes back to the NT days, and is still a one-stop admin tool for everything including Exchange mailbox creation. As a mature and fully realized app, it lets you see the nooks and crannies of your AD and filter your way to whatever piece of info you want. I use it every day.


I really enjoy this product. I have been using it for almost 5 years and for the dynamic of our agency this product fits the bill. Only thing I would like to see is the improvement of the search tool. Otherwise, it fits the bill!


Reporting could use some improvement. There is the MS Access Report but that requires configuring a DB+Tables. There is export to Excel as well but these are WYSIWYG reports. I would have liked to see a report that shows me all servers and all disk space use in report.


Hyena is an administrative tool for Windows NT, XP, 2000, and 2003 systems. Its principal functions are Active Directory integration; server management; user management; service monitoring and control; event management; job and task scheduling; printer management; disk and file administration and reporting and exporting.


Hyena depends upon the operating system for security and authentication. In the main window the information is split in two fields; on the left side the program displays the information about the local workstation and the domain that it is currently logged in to - these are arranged in a hierarchical tree-styled format with small "plus" icons allowing you to expand the objects. The information about a selected object is displayed in a list on the right side.


The main objects of the left side are: Drives, Local connections, users, local groups, printers, shares, sessions, open files, services, devices, events, disk space, user rights, performance, schedule jobs, registry, and WMI. Right-clicking on an object from the left or right side will display a specific context menu.


Terminal server integration features are only available in the Enterprise Edition. For Windows 2000/2003 domains, Microsoft Administration Tools (AdminPak) are required. The price stated is for a single user; check the "buy URL" for more details.


We have been using DameWare for years and I agree with you since SolarWinds purchased them I get tons of marketing. But the product is still great. We have about 600 PCs and two techs so we rely on the remote desktop for 99% of our support.


I did find myself wondering why I had tools that were starting to duplicate features that other tools had, though. Between LogMeIn Central, Spiceworks, Meraki Device Manager, VMWare vCenter Protect, and Hyena, I usually have at least two ways to do the same thing, now I need one tool to tie all these together and I WILL REIGN SUPREME!!


Never had any significant issues with UltraVNC and I used it from when it started. I stopped using it when I started using LMI Free and Ignition and rightfully figured it was more efficient to have LMI on all the systems.


I have Altiris which now uses pcanywhere and have had a lot of trouble with it. So we are using MSRA for when the user is at the machine and RDP when they are not as we have all their passwords. Not my choice but what I inherited.


Analysis of a threat group's targeting, origin, and competencies can determine which organizations could be at risk. This information can help organizations make strategic defensive decisions regarding this threat.


Data collected by Secureworks incident response (IR) analysts and analyzed by CTU researchers indicates that GOLD LOWELL extorts money from victims using the custom SamSam ransomware. The use of scan-and-exploit techniques to gain network access suggests that the group's campaigns target systems and protocols (e.g., JBoss and RDP) that are more likely to be used by organizations than by individuals. The preference for leveraging access to vulnerable systems on a network perimeter suggests that the group targets organizations that are vulnerable to its methods, increasing the likelihood of successful extortion. In some cases where the victim paid the initial ransom, GOLD LOWELL revised the demand, significantly increasing the cost to decrypt the organization's files in an apparent attempt to capitalize on a victim's willingness to pay a ransom.


Most GOLD LOWELL victims known to CTU researchers are small to medium-size organizations. Some sources claimed that GOLD LOWELL operations specifically targeted the healthcare vertical following public SamSam incidents in 2016 and 2018. However, Secureworks IR analysts' visibility of activity across various organizations indicates that GOLD LOWELL does not limit itself to specific industry verticals or organization types but just takes advantage of identified opportunities.

3a8082e126
Reply all
Reply to author
Forward
0 new messages