1 million+ businesses helped. Get advice
Get Free Advice
Home

/

IT Management Software

/

Netwrix Access Analyzer

Netwrix Access Analyzer 2026: Benefits, Features & Pricing

Software Advice offers objective insights based on verified user reviews and independent product and market research. When our advisors match you to a software provider, we may earn a referral fee.

How Software Advice ensures transparency

Software Advice lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Users can talk to our advisors for free to receive software recommendations matching their needs. Software providers pay us for sponsored profiles to reach users interested in their products.

How Software Advice verifies reviews

Software Advice carefully verified over 2 million reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

Independent research methodology

Researchers at Software Advice use a mix of verified reviews, independent research, and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or talk to an advisor, this has no influence on our research or methodology.

Wondering if Netwrix Access Analyzer is right for your organization?

Our IT Management Software selection experts can help you in 15 minutes or less.

On this page
  • Overview
  • Pricing and Plans
  • Features
  • User Reviews

Overview

Netwrix Access Analyzer
Netwrix Access Analyzer
4.5
(15)

Pricing

Pricing available upon request

About Netwrix Access Analyzer

Netwrix StealthAUDIT provides a single extensible platform that helps users manage and secure their critical data, core systems and IT assets.

With 40+ built-in data collection modules covering both on-premises and cloud-based platforms, users can secure their sensitive data wherever it resides. The wizard-driven interface makes it easy to gather the necessary data, and the agentless architecture ensures a fast and lightweight collection process.

Proactively identifies conditions that put sensitive and regulated data at risk, including excessive user permissions, disabled accounts, and externally shared files. Users can minimize permissions to the least-privilege level by monitoring who is accessing which data and to what extent, and then revoking unneeded rights.

In addition, users can automatically remove excessive permissions, delete unneeded accounts, and disable rogue user accounts to shut down threats. To avoid business disruptions, users can also simulate a change first and then execute it in a single click.

The solution empowers data owners to regularly review permissions to their data and fix issues on the spot. It enables business users to request access from data own...

ers, reducing the IT team’s workload. Respond accurately and promptly to DSARS to reduce costs and avoid penalties, thanks to complete visibility into the data they possess on any individual. Netwrix StealthAUDIT provides easy-to-digest reports that give auditors hard proof of the user's control over access to regulated data. They can also automate the deprovisioning of AD accounts upon employee termination, cleanup of stale file system data, Exchange mailbox delegation, service ticket creation in ServiceNow, and much more, reducing the IT team's workload and improving system hygiene. Finally, the platform helps maximize the value of technology investments and home-grown systems by sharing data between them and Netwrix StealthAUDIT through powerful REST APIs. With the flexible AnyData connector, users can scan any data source for sensitive data.

Netwrix Access Analyzer Screenshots

0
0
1
2
3
4

Netwrix Access Analyzer Pricing and Plans

Free Trial
Free Version

Basic

Pricing available upon request

No plan information available

    Advisor Get Price CTA Image

    Confused about pricing? We've got you covered.

    Get a personalized pricing breakdown tailored to your specific needs—no guesswork, no generic estimates.

    Netwrix Access Analyzer Features

    • Popular features found in IT Management
      Access Controls/Permissions
      Capacity Management
      Compliance Management
      Incident Management
      Issue Auditing
      License Management
      Maintenance Scheduling
      Remote Access/Control
      Server Monitoring
      Ticket Management
    • More features of Netwrix Access Analyzer
      Active Directory Integration
      Activity Tracking
      Ad hoc Reporting
      Alerts/Notifications
      API
      Asset Tracking
      Audit Management
      Audit Trail
      Compliance Tracking
      Configurable Workflow
      Configuration Management
      Customizable Reports
      Data Discovery
      Data Migration
      Data Security
      Data Storage Management
      Data Synchronization
      Deletion Management
      Document Storage
      Monitoring
      Multiple Data Sources
      Policy Management
      Reporting/Analytics
      Reporting & Statistics
      Risk Assessment
      Rules-Based Workflow
      Search/Filter
      Secure Data Storage
      Third-Party Integrations
      Workflow Management

    Netwrix Access Analyzer User Reviews

    Overall Rating

    4.5

    Ratings Breakdown

    5

    53%

    4

    47%

    3

    0%

    2

    0%

    1

    0%

    Secondary Ratings

    Ease of Use

    3.9

    Value for money

    4.5

    Customer support

    4.6

    Functionality

    4.4

    Chad's profile

    Chad D.

    Verified reviewer

    Real Estate

    501-1000 employees

    Used daily for more than 2 years

    Review source

    Reviewed March 2020

    StealhAUDIT is the best product there is for monitoring AD and file systems

    5

    Absolutely love it. It has helped me remediate authentication issues and file governance. Very easy to install and initially set up.

    Ratings Breakdown

    5
    Ease of use
    5
    Value for money
    5
    Customer support
    5
    Functionality
    icon
    Pros:
    Very granular data collection and monitoring. Really love how easy it is to use once the queries are st up.
    Cons:
    Queries are sometimes a bit complicated to set up. Software as a whole requires a huge amount of VM resources.

    Read More

    JW

    Jason W.

    Verified reviewer

    Insurance

    501-1000 employees

    Used monthly for more than 2 years

    Review source

    Reviewed March 2020

    StealthAUDIT is not perfect, but it's pretty darn good for the price

    5

    We have really enjoyed having StealthAUDIT at Answer Financial. The product is regularly being updated and expanded, the support has been perfect, and the company is really good about communication (both in telling us what they are working on and taking feedback from their users).

    Ratings Breakdown

    4
    Ease of use
    5
    Value for money
    5
    Customer support
    4
    Functionality
    icon
    Pros:
    The built in reports, scanning functionalities, ability to do custom scripting, and the modularity are all major features that make StealthAUDIT appealing.
    Cons:
    Though it can scan and report on a lot of different types of systems, it is very limited in what can be imported into the access audit side of the software for owner approvals.

    Reasons for choosing Netwrix Access Analyzer

    Varonis was significantly more expensive with only a slight feature advantage.

    Read More

    BP

    Brian P.

    Verified reviewer

    Government Administration

    501-1000 employees

    Used monthly for less than 2 years

    Review source

    Reviewed March 2020

    Adequate in a field full of inadequacy

    4

    The experience is more user friendly than Varonis and less user friendly than Netwrix. Regardless, I see no point in buying audit software that is not accurate.

    Ratings Breakdown

    3
    Ease of use
    4
    Value for money
    4
    Customer support
    4
    Functionality
    icon
    Pros:
    StealthAudit was the only product we tested that was 100% accurate on file activity and could retain the audit data. (Methodology: create 100 files. Access the 100 files. Edit the 100 files. Delete the 100 files. Verify that creation, reads, edits, and deletions were all logged. We did this test with both text files and MS Word files as the way Office edits files is weird.) Another well-known product only logged 40% of the file activity, even after spending *weeks* with support and sales engineers to fix the issue. At one point, an engineer blamed Windows for not logging the data, and refused to look at the event log with me where I could see that Windows was logging 100% of the file activity. Whatever you buy, please verify that it works reliably before you buy it.
    Cons:
    Perhaps this has changed since we installed it, but the activity tracking console requires Silverlight to run, forcing me in IE rather than a current browser. It's also slow. It has crashed twice without any notification, causing me to lose all metadata between the time it crashed and the time I caught the crashes. I now know to constantly monitor the system to minimize audit data loss. This is why I describe it "adequate" rather than exceptional even when it was the only tested software that fulfilled its mission.

    Reasons for choosing Netwrix Access Analyzer

    Accuracy of results.

    Read More

    XQ

    Xero Q.

    Verified reviewer

    Hospital & Health Care

    1001-5000 employees

    Used weekly for free trial

    Reviewed August 2025

    Clearly Designed and Fast at Identifying Risky

    5

    Netwrix Access Analyzer offers a fast and straightforward experience for organizations that need a quick snapshot of file and folder permissions across Windows file systems. It’s ideal for small IT teams or early-stage audits.

    Ratings Breakdown

    5
    Ease of use
    5
    Value for money
    4
    Customer support
    5
    Functionality
    icon
    Pros:
    It's a free tool, which makes it accessible for smaller IT teams and organizations without a large budget. It gives instant insight into effective permissions across file shares and folders, which helps with Identifying excessive or unnecessary access. It quickly highlights risky permissions that helps reduce the attack surface.
    Cons:
    It provides a snapshot, but not real-time monitoring, automation, or alerting for changes. There's no continuous access monitoring or scheduling of reports.

    Read More

    PC

    Paul C.

    Verified reviewer

    Banking

    10000+ employees

    Used daily for less than 2 years

    Review source

    Reviewed March 2020

    StealthAUDIT vs Competitors

    5

    Ratings Breakdown

    5
    Ease of use
    5
    Value for money
    5
    Customer support
    5
    Functionality
    icon
    Pros:
    StealthAUDIT works plain and simple. It is quick responding, the AIC has everything that we need, easy to deploy and update, no fat client for our users all web based. We did an extensive POC/POV with StealthAUDIT and we were surprised the amount of data StealthAUDIT found over Varonis DatAdvantage using the same credentials and the same permissions as what Varonis was using. We scanned 5 NetApp filers and we ended up finding over 60 million more folders on those filers over Varonis. When we scanned all of production we found over 1 billion more folders than what Varonis had found. That is a huge risk that we didn't even know we had.
    Cons:
    The reporting function is very non user friendly unless if you know how to leverage SQL queries. I know they have ability to leverage Tableau but not everyone has that option. This is the one item where we actually had to decide if making the switch from Varonis to StealthAUDIT was a good idea or not. In the end we made the switch and we have become more proficient in report writing but we still need a reporting tool that is more user friendly.

    Reasons for switching to Netwrix Access Analyzer

    We asked Varonis to enhance their Automation Engine so that it would better suit our needs. The told us that they would not do that unless we purchased the tool first (fully licensed it for 83,000 users) then they wold consider making changes to it for our needs. We decided that we would look for a different tool to do automation.

    Read More

    AC

    Amy C.

    Verified reviewer

    Hospital & Health Care

    5001-10000 employees

    Used daily for less than 12 months

    Review source

    Reviewed March 2020

    Great to understand Active Directory and Filesystem environments and know where sensitive data is

    5

    We implemented StealthAUDIT for data governance and management of unstructured data in shared folders. We have been able to identify open shares/folders and restrict access appropriately. We are able to monitor activity on file shares. The process is helping to identify data stewards and holding them responsible for the data they own. We know where sensitive data resides and then delete it if no longer needed or we can ensure access is restricted.

    Ratings Breakdown

    5
    Ease of use
    5
    Value for money
    5
    Customer support
    5
    Functionality
    icon
    Pros:
    StealthAUDIT provides a lot of information about our Active Directory and Filesystem via numerous reports that give you an overall picture, recent changes, and situations that may need to be investigated and remediated. Finding sensitive data works well, although it does take some tweaking of criteria to reduce false positives. The system was fairly easy to set up with a dedicated technical implementation team that was responsive to questions and issues. The support team is very responsive.
    Cons:
    It took some time to get a handle on the scheduling of processing for our needs. Some of the jobs can run quite long and you need to be aware of contention between jobs as things can get backed up or cause SQL database logs to grow quickly. While there is a lot of documentation available, sometimes it is a challenge to find the information you need. More comprehensive initial training could be helpful to get new admins going quickly.

    Reasons for choosing Netwrix Access Analyzer

    Features/functionality, price

    Read More

    VR

    Verified
    Reviewer

    Financial Services

    10000+ employees

    Used weekly for more than 2 years

    Review source

    Reviewed March 2020

    Aging but useful

    4

    We use StealthAUDIT to provide data insight into our Active Directory environments, in order to maintain our security posture at a high level.

    Ratings Breakdown

    3
    Ease of use
    3
    Value for money
    4
    Customer support
    5
    Functionality
    icon
    Pros:
    Best thing about StealthAUDIT is that it allows you to acquire data in almost whatever manner you are most comfortable with, and then allows you to do useful things with it.
    Cons:
    The UI is dated, the capabilities are poorly documented, and it's not easy to clear out no longer useful data.

    Read More

    BC

    Brandon C.

    Verified reviewer

    Real Estate

    201-500 employees

    Used daily for more than 2 years

    Review source

    Reviewed March 2020

    Great product and support

    5

    Wit really helps with LPA, and ensure our users have the appropriate access. It also has great security reporting tools.

    Ratings Breakdown

    4
    Ease of use
    5
    Value for money
    5
    Customer support
    5
    Functionality
    icon
    Pros:
    The ability to see data and statistics about any user through an easy GUI. The support is top notch, stealth consistently reaches out to my teams to ensure we’re supported and using the product appropriately.
    Cons:
    It can be cumbersome to configure and setup.

    Read More

    JM

    Jay M.

    Verified reviewer

    Financial Services

    51-200 employees

    Used daily for more than 2 years

    Review source

    Reviewed March 2020

    Excellent Data Governance Tool

    5

    Very trusted platform. It helps us meet external audit requests.

    Ratings Breakdown

    4
    Ease of use
    5
    Value for money
    4
    Customer support
    4
    Functionality
    icon
    Pros:
    The platform is feature rich. We use it to protect AD, MS Exchange, File server & SharePoint Online. It is used as data governance tool to secure sensitive data & enforce least-privileged access control
    Cons:
    I would have liked wizard driven configuration setup.

    Read More

    DB

    David B.

    Verified reviewer

    Events Services

    501-1000 employees

    Used daily for less than 2 years

    Review source

    Reviewed March 2020

    StealthIntercept/StealthAudit

    5

    Great team supporting this software, they continually improve on the features and functionality of the software.

    Ratings Breakdown

    4
    Ease of use
    5
    Value for money
    5
    Customer support
    5
    Functionality
    icon
    Pros:
    Software has the best support and customer service, anytime you need to know more of the product or get some functionality added the support team goes above and beyond to support their end users.
    Cons:
    There is a little bit of a learning curve initially with the software but the support team is great in getting end user education along with supporting the end user.

    Read More

    Showing 1 - 10 of 15 Reviews

    Other Top Recommended IT Management Software

    NinjaOne
    NinjaOne

    4.7 (276)

    Recently recommended 12 times

    SysAid
    SysAid

    4.5 (500)

    Recently recommended 8 times

    Atera
    Atera

    4.6 (446)

    Recently recommended 5 times

    ChangeGear
    ChangeGear

    4.1 (51)

    Recently recommended 5 times

    Advisor Get Price CTA Image

    Stuck Between Options?

    Our experts can help you compare Netwrix Access Analyzer with other top options, so you can find the best fit for your needs.

    See what companies are saying about Software Advice