Technology Magazine March 2023 | Page 30

FIVE MINUTES WITH ...

Evaluating

Identity Threat Detection and Response ( ITDR ) Solutions | Gartner IAM Summit
There are many permissions in AD that intruders use to hide , persisting in the environment . Semperis scans all permission changes live . Any change taking place in AD is visualised and recorded in its ‘ Directory Services Protector ’ ( DSP ) solution , with which you can undo any changes manually or automatically .
Q . WHAT ARE THE WEAKNESSES OF ACTIVE DIRECTORY ?

» The secret of Microsoft Active Directory ’ s success was its openness . By default , any end-user in your company can read all user- and group-information from your AD , as well as all critical configuration settings . This made it very easy to integrate with all sorts of applications .

But today , that is its weak spot , and hardly any company has taken the security steps needed to make AD harder to attack by reducing those weak permissions .
For many organisations , it ’ s their Achilles ’ heel . It ’ s so easy to read , which means it ’ s also easy for attackers to detect vulnerabilities and use them against you . Microsoft has increased AD security over the years , but there ’ s a variety of settings now that many companies are still not

“ WE ARE ENTERING A PHASE OF INCREASED FOCUS ON IDENTITY PROTECTION – AFTER ALL , HACKERS DON ’ T BREAK IN , THEY LOG IN !”

30 March 2023