logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
18th October 2019 by CyberVision 0 Comments 1166 Views
18th October 2019 by CyberVision in Business Security

Active Directory Security

The Active Directory (AD) is the ID management system used by most major enterprises around the globe. It controls all users on the network and manages access to restricted information. To initiate an attack on a given network, attackers need to steal credentials or compromise a high privilege admin account with malware. If this is done successfully, they can then have access to a company’s IP, financial information and sensitive data. This makes AD a prime target for malicious attacks on the network. If you don’t have proper security controls for your company’s AD, attackers could hide and steal any data they wanted, without you even knowing.

 

Microsoft released the ambitious Red Forest system architecture as a solution to the more complex AD attacks. Red Forest eliminates most AD attack strategies and if there is a breach, Red Forest architecture stops the attacker moving within the network and limits the spread of the attack. Implementing a Red Forest-style environment is a huge challenge, but if done correctly it provides great wins and a major uplift in network security.

 

Tackle the Red Forest challenge on your own network with these five manageable steps:

  1. Keep passwords complex, unique and regularly refreshed.
  2. Separate administrative access to eliminate the risk of shared-use workstations.
  3. Isolate all administrative systems in a fully separated forest with one-way trust.
  4. Limit users’ ability to request permissions by account group, and only grant access for a limited time.
  5. Sort the rest of your systems and accounts into tiers based on risk levels and permissions.

 

Effective use of a group policy can limit the possibility of outsiders getting access to confidential information in case an account is compromised. Group policy is a hierarchical infrastructure that allows a network administrator in charge of a company’s AD to implement specific configurations for users and computers. Monitoring AD activity is important and tracking this data daily will inform you if someone creates a new account incorrectly, an attacker has changed the encryption type as well as various other indicators of a cyberattack.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • active directory security
  • camsoft cyber security
  • cybersecurity
  • cybervision
  • f-secure
  • online security
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo