Ownership is key to beginning certification routines within your IAM platform of choice. StealthAUDIT can help you begin that process while onboarding a new IAM solution, or with existing solutions you may already have today. Right out of the box we can start identifying Probable Ownership within StealthAUDIT’s Report Index for both AD and unstructured […]
It is the responsibility of administrators to control the threat surface of their corporate environments. Authentication based attacks, such as pass the hash, are making this harder every day. Learn how to mitigate this risk by reducing the privileged account access of internet-facing machines. StealthINTERCEPT for AD can help you accomplish this in just a […]
If you’re like me, you want to get these new features up and running as soon as possible. Good thing the StealthAUDIT Instant Job Wizard makes adding new solutions a breeze! First, import your new license with the Office 365 options you purchased. Then, with the “Jobs” group selected, click the Instant Job Wizard (it’s […]
StealthINTERCEPT’s Advanced Attack Analytics are integral to understanding potential internal threats through authentication activity. While having this information at your fingertips is great, no one has time to watch a screen all day. Just like our Change Alerting, Analytics can be enabled for all our various alert capabilities as well. Simply select the Configuration option […]
Customers using StealthINTERCEPT often ask the question how to quickly find all the changes made to a user object including all group membership adds and deletes. The Investigation feature can be used to perform this search. Here’s how: first, make sure all policies are selected. Then, under the Other category, click both Class and Attribute. […]
© 2022 Stealthbits Technologies, Inc.