Change Happens. Users come and go, their properties change, policy needs are revised, and groups have their memberships updated. Changes are made all over your organization, and they eventually find their way to your Domain Controllers where objects are modified and the changes replicate throughout your organization. Keeping tabs on all of these changes is a tricky proposition, but it’s our job to make it simple here at STEALTHbits.
We all know that changes actually happen on DCs, and when the change happens the actual source DC is stamped on the object, so that’s easy to figure out. The much trickier part is understanding where the change request is coming from. It’s only on rare occasions that the application making the request is actually on the DC itself, so the vast majority of the time the changes come from elsewhere – and this is where a good product will give you that leg up on the standard change events that Microsoft provides. Armed with the workstation that the change originated from, the protocol used, and the port bound to for the change, you can answer questions like:
Clearly, this is valuable information and it’s annoying that you can’t get it from Microsoft’s native event logging for AD Changes. Luckily there’s an alternative, and that alternative is StealthINTERCEPT. Direct, in-line integration within the Active Directory event stream itself allows StealthINTERCEPT to elevate hidden change event details to the surface, such as the machine or application a change originated from, providing that missing piece of information that can be critical to making not just good, but informed decisions in the management of your Active Directory implementation.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.Read more
Start a Free Stealthbits Trial!
No risk. No obligation.