How Lepide Can Help to Protect Active Directory

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s.

Philip Robinson
| Read Time 4 min read| Updated On - July 16, 2020

Last Updated on July 16, 2020 by Satyendra

Should an attacker gain access to your Active Directory (AD), you could find yourself in a lot of trouble as AD serves as the gatekeeper to your critical assets. It is imperative that you have as much visibility as possible so that you can quickly recognize and respond to any suspicious behavior that takes place on your network.

Sure, AD will generate event logs which you can scrutinize in order to gain the visibility you need; however, using the native logs to identify suspicious events would be akin to searching for a needle in a haystack. The native logs generate a lot of noise, they provide inadequate storage options, and provide no options for generating reports.

Lepide Data Security Platform is able to aggregate logs from multiple sources and display a summary of important events via an intuitive console. Combined with real-time and alerts and customizable reports, Lepide Data Security Platform gives you the visibility you need to protect your Active Directory.

Protection Against Social Engineering Attacks

Whenever possible, hackers will seek to steal a users’ login credentials, as this is often easier than trying to initiate a brute-force attack on LDAP or Kerberos – an authentication protocol used by Active Directory. They often try to do this via some sort of phishing attack – where a user is tricked into handing over details which can help the attack gain access to their account.

While it is theoretically very difficult to protect against social engineering attacks, since they are ultimately caused by human error, we can at least predict certain behaviors that may indicate that something suspicious is taking place. Should an attacker gain access to a set of credentials, they will likely try to use those credentials on as many devices as possible, to see what data they can access.

Using Lepide Active Directory Auditor, you can setup alerts based on a threshold condition – as to detect an unusually large number devices accessed by a given user. Likewise, threshold alerting can be used to identify suspicious login attempts. For example, if a large number of failed login attempts occur over a short period of time, this might indicate a brute for attack. In such a situation, a custom script can be executed which can disable a user account, or anything else that may prevent the attacker from gaining access to the network.

Identifying “Privilege Creep”

If an attacker is successful in gaining access to your network, they will likely seek to obtain more credentials in order to access more data. The attacker will try to add themselves to privileged groups, and/or delete privileged user accounts in order to make it hard for administrators to initiate a response.

Using Lepide Data Security Platform, we can check to see if any new members have been added or deleted from privileged groups, and either trigger an alert or execute a custom script to lock down the account and/or server.

Preventing Attacks from Spreading

Attackers will naturally seek to use their stolen credentials to move laterally across your network. Each time they login to a different server, a new event will be created. Again, threshold alerting can be used to identify patterns of behavior that exceed the typical usage pattern of a particular user.

In this case, an alert or custom script can be executed if a certain number of servers are accessed within a defined period of time, which, when combined, exceed the typical usage pattern represented by that user.

These are just some of the ways in which Lepide Data Security Platform can help to keep your Active Directory secure. For a more detailed look at how our Active Directory auditing solution can help you better secure your AD environment, click here.

Philip Robinson
Philip Robinson

Phil joined Lepide in 2016 after spending most of his career in B2B marketing roles for global organizations. Over the years, Phil has strived to create a brand that is consistent, fun and in keeping with what it’s like to do business with Lepide. Phil leads a large team of marketing professionals that share a common goal; to make Lepide a dominant force in the industry.

Get Your Free Copy of the Ultimate Guide to Active Directory Auditing
Related Articles
The Complete Guide to Effective Data Access Governance

This whitepaper provides a comprehensive guide to implementing effective data access governance.

Download Whitepaper
Data Access Governance Solution.

Better govern access to sensitive unstructured data, enforce zero-trust, and demonstrate compliance with the Lepide Data Security Platform.

Learn more