As the authentication and authorization hub of your network, the importance of understanding Active Directory (AD) permissions is not to be understated. Unfortunately, native tools and views into AD object permissions lack the ability to scale effectively even in smaller organizations, requiring advanced knowledge of scripting languages like PowerShell to make any real headway in understanding AD permissions vulnerabilities.
StealthAUDIT Active Directory Permissions Analyzer enables organizations to easily and automatically determine effective permissions applied to any and all Active Directory objects, at any scope, allowing for the most authoritative view available of who has access to what in AD.
Shadow Access Rights
Shadow Access analysis allows users to proactively and explicitly identify attack paths bad actors can take using obscured object-level permissions to move laterally, escalate privileges, compromise entire domains, and gain access to sensitive data.
User Object Permissions
Group Membership Change Permissions
Group Object Permissions
Open Access Permissions
Broken Inheritance in AD Permissions
Domain Replication Permissions
DCShadow Permissions Report