The health and operational integrity of AD has a direct impact on the overall security of your organization. The capability to rollback and recover from unwanted changes is a critical requirement for you to maintain the security and performance of your network.
In fact – it’s never been more important.
90% of organizations use AD as their central hub of authentication and authorization. It literally holds the keys to the kingdom and therefore is an extremely common attack path. Microsoft informs that 95 million AD accounts are under attack every day[1]. Those attacks come from all angles. The 2019 Version DBIR tells us 69% come from outside and 34% come from inside an organization[2]. Preventative measures to reduce the chance of an attack are useful, but quickly recovering from an accidental or malicious change can be just as important, if not more so.
Whether the changes made to AD are accidental or malicious, it really doesn’t matter. Any disruption into this critical backend component can cost an organization time, money and reputation. If AD isn’t working properly…
It sounds like a disaster, right?
If you haven’t yet experienced something that halts the proper operation of AD, that’s great news! However, as Ben Franklin once said, “By failing to prepare, you are preparing to fail.”
Every organization has the responsibility to prepare for the unknown, and a means in which to recover from the multitude of changes and actions that can wreak havoc on your environment:
What if an attacker modified numerous group policies to ensure continual access? How do you return to pre-attack policies in order to correctly govern AD behavior?
If you ask AD administrators where they spend the majority of their work time, they would say “PowerShell” or “ADUC (Active Directory Users and Computer)”. Even if they have multiple ‘management consoles’ to an army of management, operations, and security products aimed at “improving the life of an administrator”. While I’d love to think every admin loves jumping into STEALTHbits products to solve problems, sometimes it’s not the most convenient option. Hence why we enable rollback and recovery operations to be performed through popular efficiency and automation tools like PowerShell and ADUC.
“If you have ‘a lot of hands in your AD’ then this software will give you the peace of mind that any errors can be rolled back.” (Link)
We provide a library of PowerShell cmdlets and can plug-in to the ADUC interface so commands can be taken immediately without separately opening the StealthRECOVER solution.
“StealthRECOVER – Rolling back Active Directory changes is a breeze” (Link)
We’ve made some enhancements to the UI so it’s more responsive. Our restore operations have been modified to improve speed. We’ve adopted design enhancements to our backend database to reduce database size and improve query efficiency. We also made general security and user experience enhancements to ensure you always operate safely and easily.
Visit the StealthRECOVER webpage – https://www.stealthbits.com/stealthrecover-active-directory-rollback-recovery-tool
Request a Demo or Trial – https://www.stealthbits.com/free-trial/
Contact Sales – +1.201.447.9300 or https://www.stealthbits.com/contact
[1] https://www.zdnet.com/article/active-directory-czar-rallies-industry-for-better-security-identity/
[2] https://enterprise.verizon.com/resources/executivebriefs/2019-dbir-executive-brief.pdf
Damon is the Director of Product Marketing at Stealthbits responsible for Active Directory and Privileged Access Management solutions. He has over 20 years of experience addressing marketing challenges of all kinds for many notable, B2B software companies, including Red Hat, Quest Software, Sterling Commerce, and most recently SecureAuth. Damon has a passion for cybersecurity software and improving the defenses of organizations against cyber-attacks. Damon resides in Columbus, Ohio.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply