As the authentication and authorization hub of your network, the importance of understanding Active Directory (AD) permissions is not to be understated. Unfortunately, native tools and views into AD object permissions lack the ability to scale effectively even in smaller organizations, requiring advanced knowledge of scripting languages like PowerShell to make any real headway in understanding AD permissions vulnerabilities.
StealthAUDIT Active Directory Permissions Analyzer enables organizations to easily and automatically determine effective permissions applied to any and all Active Directory objects, at any scope, allowing for the most authoritative view available of who has access to what in AD.
Shadow Access Rights
Shadow Access analysis allows users to proactively and explicitly identify attack paths bad actors can take using obscured object-level permissions to move laterally, escalate privileges, compromise entire domains, and gain access to sensitive data.
User Object Permissions
Pinpoint instances where permissions are applied to Active Directory user objects. This information helps organizations understand the level of permissions granted like read, write, and delete.
Group Membership Change Permissions
Understand which trustees can change the membership of Active Directory group objects, either by the “Write Member Attribute” or via the “Add/Remove self as member” permission.
Group Object Permissions
Shed light on instances where permissions are applied to Active Directory group objects. This information is critical to understanding who can perform particular operations against AD groups.
Quickly analyze and report on where permissions are applied to Active Directory organizational units. This information is summarized at the domain and enterprise levels.
Uncover instances where permissions are applied to Active Directory computer objects. Information regarding computer permissions can identify rogue computer devices on your network.
Open Access Permissions
Rapidly assess instances of open access on AD objects, and summarize open access by domain. Common instances of open access include the use of well-known security principals like Domain Users, Authenticated Users, and Everyone.
Broken Inheritance in AD Permissions
Gain immediate insight into instances of broken inheritance on Active Directory objects. This information can be segmented by domain and show where the inheritance has been broken, regardless of its location in the permissions tree.
Quickly determine what permissions exist on the AdminSDHolder container within Active Directory. If compromised, the AdminSDHolder container can be used by an attacker to achieve persistence in an environment. This information is summarized at the domain and enterprise levels.
Domain Replication Permissions
Identify and track which accounts are capable of replicating Active Directory information. The ability to replicate the domain, for example, can be used as an attack path via techniques like DCShadow and DCSync to more easily compromise an Active Directory environment.
DCShadow Permissions Report
Identify users that have the capability of executing a DCShadow attack – where attackers create a fake domain controller in order to get access to AD resources.
Comprehensive Active Directory Permissions Reporting
Browse our Active Directory Permissions reports and see how deep visibility into object-level permissions can illuminate vulnerabilities attackers exploit to compromise credentials.
See the market’s most comprehensive Active Directory Permissions auditing and reporting solution in action.
It only takes 30 minutes!