My Mom Said My Password Was Important…

0

Well, I know I have been saying it for years, talking about it like it was one of the most important aspects of your computer, and emphasizing it as one of the top five most important security configurations for corporations and users.

With so many companies being attacked, compromised, and making front page news, I hope that now you get the picture!? The passwords for your Active Directory, your bank, Amazon, LinkedIn, and other sensitive accounts are key to your career, personal protection, and economic stability.

Now, all I can say is, “I told you so!” Just like your mom said to you regarding washing behind your ears, wearing clean underwear, and not cursing in public.

It only makes sense, does it not

Find and Delete “Never Used” User Accounts

0

Every Active Directory installation has one common issue. Every installation has one or more users that were created for a project, new employee, returning employee, and the like; but the user account was never used. These users should be cleaned up as they pose a threat to the overall security of the environment.

I know, “pose an overall threat to the environment” seems a bit severe. However, I truly believe this, and these are the reasons why:

  1. Most organizations use the same password for new user accounts, knowing the user will be forced to change the password on next logon. However, if the user account was never used, it could be used as an attack account at any time.
  2. Most organizations place new user acco

Tracking Workstation Logon/Logoff using ADAudit Plus

0


Before getting into the specifics, I would like to give a small introduction on tracking Logon / Logoff in Active Directory environment, which is a cumbersome process.


Auditing the Windows Active Directory environment


Logon Auditing


With the current Windows architecture it’s difficult to get all logon data at a single point. In an AD environment, a Domain Controller (DC) is the one which does the real authentication. When there are multiple DCs in a setup, handling the authentication mechanism, the logon data (please note only the logon data) is available in different computers (read as DCs). So to compute a clear logon activity collecting all these data is essential. Also another pain point here is