Introducing StealthAUDIT 11.5! Complete your cloud security puzzle. LEARN MORE
Stealthbits

INSIDER THREAT SECURITY BLOG

And other things that keep you up at night

Blog >Active Directory

Browsed By
Category: Active Directory

Microsoft Advanced Threat Analytics (ATA) Compared to StealthDEFEND for Active Directory

Detecting advanced threats against Active Directory can be approached in a variety of ways. When looking at Microsoft Advanced Threat Analytics (ATA) compared to STEALTHbits StealthDEFEND for Active Directory they have the same goal and a similar approach, however, there are some key differences. Microsoft is in a privileged position to build a threat detection solution to protect against Active Directory attacks. Their end product is similar to what you would expect from a third-party ven…

LDAP Reconnaissance – Defend with StealthDEFEND

Editor’s note: This is the second blog post in a series of blogs for using StealthDEFEND to defend against attacks. Read the first blog “Using StealthDEFEND to Defend Against Password Spraying”. In this blog post, we’ll be talking about LDAP Reconnaissance and how we can use StealthDEFEND to defend ourselves against this type of attack. Introduction to LDAP Reconnaissance When an attacker initially compromises a system on a network, they may have little to no privileges within the do…

Active Directory Object Recovery (Recycle Bin)

Editors note: This is the 3rd in a series of blog around Active Directory (AD) backup and recovery using Stealthbits, StealthRECOVER. Read the 1st blog, An Introduction to Active Directory Backup and Recovery and the 2nd blog, Active Directory Object Recovery. The previous post in this series discussed the joys of Active Directory object recovery in an environment without the AD Recycle Bin. If you missed that post, I strongly encourage you to go back and read it as it is arguably the sin…

Using StealthDEFEND to Defend against Password Spraying

In this blog post, we’ll be talking about Password Spraying and how we can use StealthDEFEND to defend ourselves against this type of attack. Introduction to Password Spraying Password Spraying is a technique attackers leverage to guess the passwords of accounts by trying a small number of highly common passwords against a large number of accounts while also staying below an organization’s defined lockout threshold. This allows an attacker to compromise accounts without a…
Active Directory Security

Introduction to Active Directory Backup and Recovery

When I was a little kid, I knew what I wanted to be when I grew up. No, not an astronaut. Definitely not a doctor or a lawyer. When I grew up, I wanted to be the Product Manager of an Active Directory backup and recovery tool. Just kidding. I’m pretty sure I wanted to be a Transformer. Now that I’m grown up older and not a Transformer, I’ve been tasked with writing a series of blog posts which explain both the backup and recovery of Active Directory and why you should care about it.&nb…
Quest Alternative, STEALTHbits, Active directory, Active directory security

Best Quest Alternative

Looking for a Quest Alternative? If you’ve been following STEALTHbits and our achievements in the Active Directory Management and Security space, you know we’ve been on a Quest to become your go-to Active Directory security solution provider and Quest Alternative. At STEALTHbits, we believe customers deserve the most innovative solutions and creative capabilities on the market, as well as a partner who will help you make informed decisions about the solutions you’re investing in. Most imp…
Are Weak Passwords Putting You At Risk?

Are Weak Passwords Putting You At Risk?

Credentials and data: two common denominators that are present in almost every breach scenario. Unfortunately for all of us, attackers are well aware that you can’t have one without the other. Getting to the mother lode is simple, really. Step 1: Crack the password. Step 2: Obtain credentials. And that’s why an organization’s password requirements and policies should always be under intense scrutiny. But herein lies a problem. What if an organization has “complex” criteria in place, but th…

Subscribe

DON’T MISS A POST. SUBSCRIBE TO THE BLOG!


Loading

© 2022 Stealthbits Technologies, Inc.

Start a Free Stealthbits Trial!

No risk. No obligation.

FREE TRIAL