Whitepaper: Re-constituting Active Directory after a critical compromise or detection of an Advanced Persistent Threat
Microsoft’s Active Directory (AD) provides a secure and stable directory service on which many organizations depend to provide user authentication and authorization. Because AD represents the preverbal keys to the kingdom it typically receives the appropriate level of care and feeding required maintaining it. Despite proper upkeep, there is still a chance that an Advanced Persistent Threats (APT) may be successful and compromise your Active Directory. Because of the nature of APTs a wide range of attacks vectors may be tried that may or may not attempt to subjugate AD directly. The result is that a successful compromise may go undetected for some time until the attacker decides to exploit the compromise by stealing data or making critical systems unavailable.
Most administrators are now resigned to the fact that their network will be hacked. It’s just a matter of time. It’s no secret that there is a lot of activity around cyber security, and the most serious and damaging breach that could happen to any organization is a compromise of their Active Directory (AD) environment. AD is at the heart of many mission critical services, including desktop logins, file & print sharing, email & other communications and collaboration. And once the compromise happens, it can have far reaching effects. Plus, attackers are much more sophisticated, using various tactics to penetrate and then stay hidden within your environment.
Reducing the immediate threat – Domain Admins role
A quick way to reduce the threat to Active Directory is to…
To continue ready this article please download my whitepaper…