Bring the order to your Active Directory
As we have moved to the post-pandemic era, we can’t count only on the endpoint protection. Employees are spread between corporate, mobile and home networks, thus making protecting endpoints – the main entry point to corporate networks – not enough. According to a recent survey by Deloitte, today there are on average up to 25 devices connected to the home network, more than doubled from 2019. Therefore, it requires other ways to detect a security breach and spot out an attack.
Let’s look at a common cyberattack kill chain to see that privilege escalation is the key passage. After gaining access to the infrastructure, attackers need to get administrator privileges for identifying and gaining control over the crucial resources. Massive attacks like NotPetya and Maze used the Active Directory to move around the victim’s infrastructure.
What is AD?
For over 20 years, Active Directory has been used to structure a corporate network and manage the resource allocation in line with the group policies. In other words, it is a key system that defines what a user can or can’t do or see within the organization infrastructure.
As a company matures and changes, its Active Directory ages too. Mergers, acquisitions, personnel turnover often result in blind areas, misconfiguration and confusion that could be exploited by malicious actors. On the contrary, a well-structured Active Directory increases the essential capability of a network to resist and slow down the development of an attack, making it harder for malicious actors to remain hidden in the network, escalate privileges, take over hosts and backups, and exploit them for the attack.
Sababa AD Hardening
Sababa AD Hardening is a service aimed at securing and strengthening Active Directory. Our expert security analysts evaluate the current configuration of the system and provide a roadmap with the actions necessary to improve its security, with priorities.
Sababa AD Hardening ensures that even in case of a security breach, it will be harder for cybercriminals to perform lateral movements in the infrastructure. With zero investment into additional security technologies and minimum time spent, companies can significantly improve their resilience:
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_gat_gtag_UA_150416163_1 | 1 minute | Set by Google to distinguish users. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
pardot | past | The pardot cookie is set while the visitor is logged in as a Pardot user. The cookie indicates an active session and is not used for tracking. |
visitor_id909942-hash | 10 years | No description |
Cookie | Duration | Description |
---|---|---|
lpv909942 | 30 minutes | No description |
visitor_id909942 | 10 years | No description |