Continuous Visibility to Active Directory Exposures

Why Organizations Need ADAssessor for Active Directory Security

Active Directory is one of the main targets of attack because it contains the required information that attackers need to expand their access, establish persistence, elevate privileges, move laterally, and identify targets to attack. By identifying critical AD exposures and alerting on attacks that target them, organizations improve their security before attackers can compromise their AD data.

In addition to real-time attack detection, the solution also provides visibility into critical domain, computer, and user-level exposures. These insights easily show identities and service account risk related to credentials, privileged accounts, stale accounts, shared credentials, and AD attack paths. The solution gathers this information efficiently from the domain, so it does not impact day to day Active Directory operations or employee access to resources.

Awards for Active Directory Protection

SC 2020 Awards
Info Security Products Guide 2020 Bronze
Astors award platinum 2019

ADASSESSOR CRITICAL CAPABILITIES

Finds Exposures
Finds Exposures

Detect and fix AD weaknesses and exposures

Reduce Attack Surface

Eliminate excess and unneeded privileges

Deception and Concealment Detect
Detects Attacks

Detect advanced attacks targeting AD in real-time

Periodically and automatically reanalyze AD
Flexible Use

Periodically and automatically reanalyze AD

“Fascinating technology. Real competitive advantage and far more sophisticated than other tools I’ve encountered.”

John Tolbert, Kuppingercole

PRIVILEGE & SERVICE ACCOUNT EXPOSURE VISIBILITY

Gain immediate value by identifying and remediating Active Directory security hygiene issues.

Early

Real-time unauthorized AD query detection

visibility icon
Visibility

Detect AD security hygiene issues

CONDITIONAL ACCESS

Granularly restricts AD information access.No impact to business operations

alert icon
Actionable

Substantiated alerts for key exposures at the Domain, computer, and user level

COMPREHENSIVE

Covers on-premises and multi-cloud environments

Continuous

Constant visibility into identities and service account risk

Active Directory Assessments Related to
Credentials
Privileged accounts
Stale accounts
Shared credentials
AD attack paths

Protect Your Active Directory. See Attivo In Action.

How ADAssessor for Active Directory Protection Works

Organizations can quickly set up the ADAssessor solution through a single domain-joined system. There are no extra privileges required. The management console provides analysis and data for remediation assistance.

 

Once deployed, the solution:

  • Immediately detects vulnerabilities in the AD environment, including misconfigurations, excessive privileges, or data exposures.
  • Discovers weaknesses before attackers can exploit them and to reduce the attack surface.
  • Automatically monitors AD, analyzing changes and new exposures that indicate possible malicious activity.
  • Runs continuously or on-demand to protect Active Directory.

ADAssessor Deployment

ACTIVE DIRECTORY DETECTIONS

  • Real Time Detections

    • — Mass account changes
    • — Suspicious password changes
    • — AD-specific attacks


  • Domain Level Exposures

    • — Weak policies
    • — Credential harvesting
    • — Kerberos vulnerabilities
    • — Domain assessments


  • User Level Exposures

    • — Account and privilege issues
    • — Service account exposures
    • — Privileged account exposures


  • Device Level Exposures

    • — Rogue domain controllers
    • — Operating System issues
    • — AD-related vulnerabilities