SlideShare a Scribd company logo
1 of 27
Download to read offline
Protect Hybrid Active Directory
from cyber threads,
track attacks and recover easily
in case of disaster
Ragnar Heil
Microsoft MVP
Channel Account Manager, Quest
Where Next Meets Now.
Ragnar Heil
ragnar.heil@quest.com
www.linkedin.com/in/ragnarheil
ragnarh
https://ragnarheil.de
Where Next Meets Now.
Active Directory attack paths
If an adversary owns Active Directory, they own the enterprise
AD is the adversary’s favorite target – 25 BILLION attempted attacks on Azure AD
accounts in 2021
Constant change combined with user behavior creates more attack paths daily
Finding an attack path is virtually guaranteed
Where Next Meets Now.
• Defenders think in lists
– Listing thousands of generic configuration issues
solves nothing
• Attackers think in graphs
– Which makes it much easier to find effective attack
paths
Active Directory attack paths
Where Next Meets Now.
An Attack Path
Member Of Member Of Local Admin Has Session Add Member
DAVID HELPDESK PAYMENT-01
TIER TWO SUPPORT SVC_PAYADMIN DOMAIN ADMINS
A user was
phished.
The user
was a
member of
a group..
…which was a
member of
another
group…
…which had
local admin
privileges over
a system.
A high privilege
service account was
logged on to that
system.
The attackers stole
that service
account’s password.
That service account
had the “Add
Members” privilege
on the Domain
Admins group.
Where Next Meets Now.
Where Next Meets Now.
SpecterOps
BloodHound Enterprise
Where Next Meets Now.
There are many paths
Where Next Meets Now.
…many, many paths
https://www.sans.org/blog/bloodhound-sniffing-out-path-through-windows-domains/
Where Next Meets Now.
• It is impossible to effectively view/audit privilege in AD and answer
the question:
“How many users have administrator rights on this computer?”
Why does this happen?
The Windows command line similarly lists just the principals that directly belong to
the local admins group on a computer
Where Next Meets Now.
Group nesting
In reality, a computer can have hundreds, thousands, even tens of thousands
of administrators thanks to nested security groups.
Above, we can see that, thanks to security group nesting, 7 users have admin
rights on the computer — not just 4.
Where Next Meets Now.
• Random users with ownership of Domain Controllers
• AUTHENTICATED USERS group with full control over the domain
head
• WORKSTATION ADMINS with local admin on Servers
• Kerberoastable Domain Admin accounts with 7-character
passwords set in 2008
• DOMAIN USERS group in the RDP Users group on Domain
Controllers
….and millions more
20 years of AD has accumulated misconfiguration debt
Where Next Meets Now.
Top-down adversary view from Critical Assets
Map every Attack Path using every
misconfiguration, every relationship
Where Next Meets Now.
Identify and quantify exposure Choke Points
37%
11%
92%
Where Next Meets Now.
Identify and quantify exposure Choke Points
37%
11%
Where Next Meets Now.
Continuously maps all attack
paths in Active Directory
Provides precise, practical
remediation guidance
Prioritizes and quantifies
attack path choke points
Monitors and measures
improved security posture
Where Next Meets Now.
Continuous attack path mapping
• Continuously charts every relationship and connection
• Reveals full understanding of real permissions
• Exposes new and existing
hidden attack paths
Where Next Meets Now.
Attack path choke point prioritization
• Identifies the optimal location to block the largest number of pathways
• Ranks these finite set of choke
points by collective risk reduction
• Minimizes remediation efforts and
eliminating misconfiguration debt
cleanup
Where Next Meets Now.
Real-world remediation guidance
• Delivers practical remediations without drastic changes to AD or
negative impact
• Provides precise and
comprehensive guidance to ensure
attack path elimination
• Furnishes instructions on how to
validate privileges being removed
are not required
Where Next Meets Now.
Charts security posture improvement
• Establishes a baseline of AD, identifying each attack path and the risk of
any given point on the attack path
• Measures continuously as changes
to Active Directory are made,
reassessing risk
• As choke points are eliminated,
significant security posture
improvements are observed
Where Next Meets Now.
Where Next Meets Now.
Quest & SpecterOps
Better Together
Where Next Meets Now.
Assets, policies, vulnerabilities & risk
Identify
Limit the impact of a cybersecurity event
Protect
Continually monitor for anomalies
Detect
Take appropriate action
Respond
Restore impaired services or capabilities
Recover
Hybrid AD cyber resilience lifecycle
Quest solutions based on NIST core principles
Where Next Meets Now.
+Recovery Manager DRE / On Demand Recovery
Recover
Change Auditor / GPOADmin
Protect
+IT Security Search
Respond
On Demand Audit Hybrid Suite
Detect
SpecterOps BloodHound Enterprise
Identify
Hybrid AD cyber resilience lifecycle
Improve response time and resilience during & after attacks
Where Next Meets Now.
BloodHound / Quest AD Security Suites
AD CYBER RESILIENCY SUITE
AD RISK PROTECTION
SUITE
AD RISK ASSESSMENT SUITE
HYBRID AD CYBER
RESILIENCY SUITE
BLOODHOUND ENTERPRISE
ON DEMAND AUDIT FOR AD
CHANGE AUDITOR FOR AD
CA FOR LOGON ACTIVITY
GPOADMIN
RECOVERY MANAGER DRE
ON DEMAND RECOVERY
BLOODHOUND ENTERPRISE
ON DEMAND AUDIT FOR AD
CHANGE AUDITOR FOR AD
CA FOR LOGON ACTIVITY
GPOADMIN
RECOVERY MANAGER DRE
BLOODHOUND ENTERPRISE
ON DEMAND AUDIT FOR AD
CHANGE AUDITOR FOR AD
CA FOR LOGON ACTIVITY
GPOADMIN
BLOODHOUND ENTERPRISE
ON DEMAND AUDIT FOR AD
CHANGE AUDITOR FOR AD
CA FOR LOGON ACTIVITY
per managed person / year per managed person / year per managed person / year per managed person / year
Where Next Meets Now.
Microsoft cloud
auditing
Dashboard that analyzes millions of events and summarizes in interactive
visualizations
Automated detection of anomalous spikes in suspicious tenant activity
Tracking of security related trends such as account lockouts and risk events
Combine on-prem AD and authentications with cloud activity into a single view of
your hybrid environment
Email alerts on critical audit activities
Built-in searches to detect common security related activities an administrator
should monitor
Normalized event format for every cloud change, that matches on-prem changes
as well (5 W’s + before/after values)
Quest vs. Microsoft cloud auditing
Where Next Meets Now.
Microsoft cloud
auditing
Granular role-based access (RBAC) to the audit data
Search by any event field including the target object, activity details, specific
attributes and before and after values
Combine multiple search criteria into a single search
Google-like search for any value across all workloads and audit fields
Responsive search builder with immediate feedback on your search criteria
Pivot to related search on any event (e.g. show me everything else this user/actor
has done)
Store audit data for a minimum of 3 years, and up to 10 years, based on
subscription type*
Quest vs. Microsoft cloud auditing
*Azure AD events are stored by Microsoft for a max of 90 days (with a Premium 2 license) and Office 365 events for a max of 1 year (with an E5 license)
Where Next Meets Now.
Securing your AD attack paths
• Assess and map all AD attack paths
• Prioritize choke points to eliminate
most critical attack paths
• Continuously scan and measure
improvements to security posture
BloodHound Enterprise
• Continually validate GPOs through
automated attestation
• Roll-back to an approved configuration in the
case of unapproved GPO changes
• Remove critical attack paths by securing
GPOs and GPO change workflows
GPOADmin
• Audit all security changes across your
AD and Azure AD environments
• Monitor AD in real-time for active
attacks and IOCs
• Block attackers from leveraging critical
attack vectors
Change Auditor
• Quickly recover domains or entire AD forests
from an attack
• Restore unwanted changes to any object
including users, GPOs and AD configuration
• Roll-back AD when remediation changes
have unintended consequences
Recovery Manager
Questions?

More Related Content

Similar to Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attacks and recover easily in case of disaster

Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...KajolPatel17
 
CloudBrew 2018 - Azure Governance
CloudBrew 2018 - Azure GovernanceCloudBrew 2018 - Azure Governance
CloudBrew 2018 - Azure GovernanceTom Janetscheck
 
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationMicrosoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationNicholas Vossburg
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsQuest
 
S299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On Demand
S299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On DemandS299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On Demand
S299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On DemandKate Haughton
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachQuest
 
Agile Development – Why requirements matter by Fariz Saracevic
Agile Development – Why requirements matter by Fariz SaracevicAgile Development – Why requirements matter by Fariz Saracevic
Agile Development – Why requirements matter by Fariz SaracevicBosnia Agile
 
20161020 - Paris - Retour GC
20161020  - Paris - Retour GC20161020  - Paris - Retour GC
20161020 - Paris - Retour GCBenoît Simard
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Amazon Web Services
 
Azure Governance for Enterprise
Azure Governance for EnterpriseAzure Governance for Enterprise
Azure Governance for EnterpriseMohit Chhabra
 
Forrester Research on Globally Distributed Development Using Subversion
Forrester Research on Globally Distributed Development Using SubversionForrester Research on Globally Distributed Development Using Subversion
Forrester Research on Globally Distributed Development Using SubversionWANdisco Plc
 
Forrester Research on Optimizing Globally Distributed Software Development Us...
Forrester Research on Optimizing Globally Distributed Software Development Us...Forrester Research on Optimizing Globally Distributed Software Development Us...
Forrester Research on Optimizing Globally Distributed Software Development Us...WANdisco Plc
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementBeyondTrust
 
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Ryan Hodgin
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsSolarWinds
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 

Similar to Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attacks and recover easily in case of disaster (20)

Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...
 
CloudBrew 2018 - Azure Governance
CloudBrew 2018 - Azure GovernanceCloudBrew 2018 - Azure Governance
CloudBrew 2018 - Azure Governance
 
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance ConversationMicrosoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
S299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On Demand
S299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On DemandS299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On Demand
S299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On Demand
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Azure governance
Azure governanceAzure governance
Azure governance
 
Agile Development – Why requirements matter by Fariz Saracevic
Agile Development – Why requirements matter by Fariz SaracevicAgile Development – Why requirements matter by Fariz Saracevic
Agile Development – Why requirements matter by Fariz Saracevic
 
VAS - VMware CMP
VAS - VMware CMPVAS - VMware CMP
VAS - VMware CMP
 
20161020 - Paris - Retour GC
20161020  - Paris - Retour GC20161020  - Paris - Retour GC
20161020 - Paris - Retour GC
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
 
Azure Governance for Enterprise
Azure Governance for EnterpriseAzure Governance for Enterprise
Azure Governance for Enterprise
 
Forrester Research on Globally Distributed Development Using Subversion
Forrester Research on Globally Distributed Development Using SubversionForrester Research on Globally Distributed Development Using Subversion
Forrester Research on Globally Distributed Development Using Subversion
 
Forrester Research on Optimizing Globally Distributed Software Development Us...
Forrester Research on Optimizing Globally Distributed Software Development Us...Forrester Research on Optimizing Globally Distributed Software Development Us...
Forrester Research on Optimizing Globally Distributed Software Development Us...
 
Mayank-Tamrakar
Mayank-TamrakarMayank-Tamrakar
Mayank-Tamrakar
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 

More from Ragnar Heil

BDS Frühjahrstagung Working Out Loud
BDS Frühjahrstagung Working Out Loud BDS Frühjahrstagung Working Out Loud
BDS Frühjahrstagung Working Out Loud Ragnar Heil
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Ragnar Heil
 
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...Ragnar Heil
 
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)Ragnar Heil
 
Wann nutze ich welches Office 365 Tool?
Wann nutze ich welches Office 365 Tool?Wann nutze ich welches Office 365 Tool?
Wann nutze ich welches Office 365 Tool?Ragnar Heil
 
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...Ragnar Heil
 
Responsive Organization - Agiles Unternehmen
Responsive Organization - Agiles UnternehmenResponsive Organization - Agiles Unternehmen
Responsive Organization - Agiles UnternehmenRagnar Heil
 
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...Ragnar Heil
 
SharePoint 2013 Social yammer queport integration
SharePoint 2013 Social   yammer queport integrationSharePoint 2013 Social   yammer queport integration
SharePoint 2013 Social yammer queport integrationRagnar Heil
 
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)Ragnar Heil
 

More from Ragnar Heil (10)

BDS Frühjahrstagung Working Out Loud
BDS Frühjahrstagung Working Out Loud BDS Frühjahrstagung Working Out Loud
BDS Frühjahrstagung Working Out Loud
 
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
 
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...Trust in Tech Meetup bei Microsoft München  zu GDPR / DSGVO: Email Archivieru...
Trust in Tech Meetup bei Microsoft München zu GDPR / DSGVO: Email Archivieru...
 
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
Learntec: Working Out Loud mit Office 365 (Netmedianer, Microsoft)
 
Wann nutze ich welches Office 365 Tool?
Wann nutze ich welches Office 365 Tool?Wann nutze ich welches Office 365 Tool?
Wann nutze ich welches Office 365 Tool?
 
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
5 1/2 ways to hack your productivity (using Sway, OfficeMix, Yammer & Delve) ...
 
Responsive Organization - Agiles Unternehmen
Responsive Organization - Agiles UnternehmenResponsive Organization - Agiles Unternehmen
Responsive Organization - Agiles Unternehmen
 
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
Synopsis Konferenz 2014-SharePoint Yammer Integration -Microsoft Enterprise S...
 
SharePoint 2013 Social yammer queport integration
SharePoint 2013 Social   yammer queport integrationSharePoint 2013 Social   yammer queport integration
SharePoint 2013 Social yammer queport integration
 
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
Social Media-wie erhöht man die Interaktion mit den Lesern (am Bsp Microsoft)
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 

Cloud Summit: Protect Hybrid Active Directory from cyber threads, track attacks and recover easily in case of disaster

  • 1. Protect Hybrid Active Directory from cyber threads, track attacks and recover easily in case of disaster Ragnar Heil Microsoft MVP Channel Account Manager, Quest
  • 2. Where Next Meets Now. Ragnar Heil ragnar.heil@quest.com www.linkedin.com/in/ragnarheil ragnarh https://ragnarheil.de
  • 3. Where Next Meets Now. Active Directory attack paths If an adversary owns Active Directory, they own the enterprise AD is the adversary’s favorite target – 25 BILLION attempted attacks on Azure AD accounts in 2021 Constant change combined with user behavior creates more attack paths daily Finding an attack path is virtually guaranteed
  • 4. Where Next Meets Now. • Defenders think in lists – Listing thousands of generic configuration issues solves nothing • Attackers think in graphs – Which makes it much easier to find effective attack paths Active Directory attack paths
  • 5. Where Next Meets Now. An Attack Path Member Of Member Of Local Admin Has Session Add Member DAVID HELPDESK PAYMENT-01 TIER TWO SUPPORT SVC_PAYADMIN DOMAIN ADMINS A user was phished. The user was a member of a group.. …which was a member of another group… …which had local admin privileges over a system. A high privilege service account was logged on to that system. The attackers stole that service account’s password. That service account had the “Add Members” privilege on the Domain Admins group.
  • 6. Where Next Meets Now. Where Next Meets Now. SpecterOps BloodHound Enterprise
  • 7. Where Next Meets Now. There are many paths
  • 8. Where Next Meets Now. …many, many paths https://www.sans.org/blog/bloodhound-sniffing-out-path-through-windows-domains/
  • 9. Where Next Meets Now. • It is impossible to effectively view/audit privilege in AD and answer the question: “How many users have administrator rights on this computer?” Why does this happen? The Windows command line similarly lists just the principals that directly belong to the local admins group on a computer
  • 10. Where Next Meets Now. Group nesting In reality, a computer can have hundreds, thousands, even tens of thousands of administrators thanks to nested security groups. Above, we can see that, thanks to security group nesting, 7 users have admin rights on the computer — not just 4.
  • 11. Where Next Meets Now. • Random users with ownership of Domain Controllers • AUTHENTICATED USERS group with full control over the domain head • WORKSTATION ADMINS with local admin on Servers • Kerberoastable Domain Admin accounts with 7-character passwords set in 2008 • DOMAIN USERS group in the RDP Users group on Domain Controllers ….and millions more 20 years of AD has accumulated misconfiguration debt
  • 12. Where Next Meets Now. Top-down adversary view from Critical Assets Map every Attack Path using every misconfiguration, every relationship
  • 13. Where Next Meets Now. Identify and quantify exposure Choke Points 37% 11% 92%
  • 14. Where Next Meets Now. Identify and quantify exposure Choke Points 37% 11%
  • 15. Where Next Meets Now. Continuously maps all attack paths in Active Directory Provides precise, practical remediation guidance Prioritizes and quantifies attack path choke points Monitors and measures improved security posture
  • 16. Where Next Meets Now. Continuous attack path mapping • Continuously charts every relationship and connection • Reveals full understanding of real permissions • Exposes new and existing hidden attack paths
  • 17. Where Next Meets Now. Attack path choke point prioritization • Identifies the optimal location to block the largest number of pathways • Ranks these finite set of choke points by collective risk reduction • Minimizes remediation efforts and eliminating misconfiguration debt cleanup
  • 18. Where Next Meets Now. Real-world remediation guidance • Delivers practical remediations without drastic changes to AD or negative impact • Provides precise and comprehensive guidance to ensure attack path elimination • Furnishes instructions on how to validate privileges being removed are not required
  • 19. Where Next Meets Now. Charts security posture improvement • Establishes a baseline of AD, identifying each attack path and the risk of any given point on the attack path • Measures continuously as changes to Active Directory are made, reassessing risk • As choke points are eliminated, significant security posture improvements are observed
  • 20. Where Next Meets Now. Where Next Meets Now. Quest & SpecterOps Better Together
  • 21. Where Next Meets Now. Assets, policies, vulnerabilities & risk Identify Limit the impact of a cybersecurity event Protect Continually monitor for anomalies Detect Take appropriate action Respond Restore impaired services or capabilities Recover Hybrid AD cyber resilience lifecycle Quest solutions based on NIST core principles
  • 22. Where Next Meets Now. +Recovery Manager DRE / On Demand Recovery Recover Change Auditor / GPOADmin Protect +IT Security Search Respond On Demand Audit Hybrid Suite Detect SpecterOps BloodHound Enterprise Identify Hybrid AD cyber resilience lifecycle Improve response time and resilience during & after attacks
  • 23. Where Next Meets Now. BloodHound / Quest AD Security Suites AD CYBER RESILIENCY SUITE AD RISK PROTECTION SUITE AD RISK ASSESSMENT SUITE HYBRID AD CYBER RESILIENCY SUITE BLOODHOUND ENTERPRISE ON DEMAND AUDIT FOR AD CHANGE AUDITOR FOR AD CA FOR LOGON ACTIVITY GPOADMIN RECOVERY MANAGER DRE ON DEMAND RECOVERY BLOODHOUND ENTERPRISE ON DEMAND AUDIT FOR AD CHANGE AUDITOR FOR AD CA FOR LOGON ACTIVITY GPOADMIN RECOVERY MANAGER DRE BLOODHOUND ENTERPRISE ON DEMAND AUDIT FOR AD CHANGE AUDITOR FOR AD CA FOR LOGON ACTIVITY GPOADMIN BLOODHOUND ENTERPRISE ON DEMAND AUDIT FOR AD CHANGE AUDITOR FOR AD CA FOR LOGON ACTIVITY per managed person / year per managed person / year per managed person / year per managed person / year
  • 24. Where Next Meets Now. Microsoft cloud auditing Dashboard that analyzes millions of events and summarizes in interactive visualizations Automated detection of anomalous spikes in suspicious tenant activity Tracking of security related trends such as account lockouts and risk events Combine on-prem AD and authentications with cloud activity into a single view of your hybrid environment Email alerts on critical audit activities Built-in searches to detect common security related activities an administrator should monitor Normalized event format for every cloud change, that matches on-prem changes as well (5 W’s + before/after values) Quest vs. Microsoft cloud auditing
  • 25. Where Next Meets Now. Microsoft cloud auditing Granular role-based access (RBAC) to the audit data Search by any event field including the target object, activity details, specific attributes and before and after values Combine multiple search criteria into a single search Google-like search for any value across all workloads and audit fields Responsive search builder with immediate feedback on your search criteria Pivot to related search on any event (e.g. show me everything else this user/actor has done) Store audit data for a minimum of 3 years, and up to 10 years, based on subscription type* Quest vs. Microsoft cloud auditing *Azure AD events are stored by Microsoft for a max of 90 days (with a Premium 2 license) and Office 365 events for a max of 1 year (with an E5 license)
  • 26. Where Next Meets Now. Securing your AD attack paths • Assess and map all AD attack paths • Prioritize choke points to eliminate most critical attack paths • Continuously scan and measure improvements to security posture BloodHound Enterprise • Continually validate GPOs through automated attestation • Roll-back to an approved configuration in the case of unapproved GPO changes • Remove critical attack paths by securing GPOs and GPO change workflows GPOADmin • Audit all security changes across your AD and Azure AD environments • Monitor AD in real-time for active attacks and IOCs • Block attackers from leveraging critical attack vectors Change Auditor • Quickly recover domains or entire AD forests from an attack • Restore unwanted changes to any object including users, GPOs and AD configuration • Roll-back AD when remediation changes have unintended consequences Recovery Manager