Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking
    • Servers

    How Attivo Networks Strengthens Active Directory Defense

    By
    Frank J. Ohlhorst
    -
    August 21, 2020
    Share
    Facebook
    Twitter
    Linkedin
      Attivio1

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      How can an enterprise today more effectively protect AD (Active Directory)? This is a relevant question for those managing network security. Research giant Forrester noted, “Having a strong control of privileges in an ever-evolving company is critical and one of the challenges that every CISO must tackle.”

      Even so, Forrester stated that “100% of corporations suffering from cybersecurity breaches had a security policy.” Simply put, it takes more than rigid controls, audits and security policies to defend AD properly. This is a realization not lost on Fremont, Calif.-based Attivo Networks.

      Attivo’s ADSecure has a unique take on protecting AD; it uses the age-old art of deception with an added twist of concealment. ADSecure is designed to deceive even the most aggressive intruders with decoys and other techniques rooted in the world of deception.

      [To see a larger version of the image at upper left, right-click on it and select “View Image.”]

      While the concept of “deception” often creates an unfavorable mental image for most people, the truth is that “deception” and its sibling “concealment” are powerful tools that can protect enterprises from even the most aggressive cyberattackers.

      ADSecure breaks out from the traditional approach to deception that is found in the company’s other products to protect IT assets, data and intellectual property from the ills of the cyberattacker community. Instead of laying decoy traps and obfuscating the bait among real credentials or artifacts, the company has instead chosen simply to deny the attacker the ability to see and touch AD altogether.

      Perhaps the most important thing to remember about AD is that any account compromise could lead to handing the proverbial keys of the enterprise castle to an intruder. Once AD is compromised, attackers may be able to leverage lateral attacks, steal other credentials, access numerous systems or even bring the whole network to a locked state, where no one but the attacker can access corporate assets.

      What better way is there to derail this form of an attack than to hide and deny their access? What if you could do this and return fake data that steers the path of the attackers into decoys that trick them into spilling their tactics and methods?

      A Closer Look at Attivo’s ADSecure

      ADSecure brings together numerous security capabilities to protect AD from compromises. At its most basic level, the platform detects unauthorized queries to AD. It reduces the risk that those queries present by misdirecting attackers to decoys, protecting legitimate AD objects from exposure and compromise. Ultimately that reduces the attack surface of AD.

      What’s more, by misdirecting attackers into a deception environment, the platform can safely gather TTPs (tactics, techniques and procedures), which can be used to develop threat intelligence, provide forensics and create an accelerated response.

      Of course, there is much more to ADSecure than just confusing attackers. The platform also tracks attackers (and attacks), provides visibility to administrators and supports proactive threat hunting. It is also worth noting that ADSecure accomplishes its objectives without altering production AD controllers. In other words, it can return deceptive objects without disrupting production AD environments.  

      Hands-On with ADSecure

      • ADSecure can be a stand-alone module of the ThreatDefend platform or part of an ecosystem of threat protection products available from Attivo, which function under the Attivo Networks ThreatDefend Detection and Response Platform. ADSecure deploys as a module to the ThreatDefend platform, which makes installation quite straightforward. Once installed, ADSecure can be managed through a stand-alone management console or become fully integrated into the ThreatDefend platform, where it adds new features to the management consoles and administrator dashboards.
      • ADSecure can operate independently, or for organizations that would like the benefit of engaging the attacker for counterintelligence, it works hand in hand with Attivo’s BOTsink deception server, which is part of the ThreatDefend platform. The BOTsink houses the network decoys and manages the deception environment. ADSecure actively works on the endpoint to detect imposter AD queries and then directs those queries to the deception environment, where decoys are used to defuse an active attack. What’s more, the deception environment records the activity and alerts administrators of the attempted compromise. The BOTsink is the glue that makes deception work and engages with the attacker when paired with ADSecure.
      • The primary administrator dashboard is built around the real-time activity presented by the BOTsink deception server. The dashboard offers an “at-a-glance” status of network activity, showing the severity of detected events, as well as the types of attacks detected. The dashboard also provides additional insight into the recent events, as well as the top targets on the network. Administrators can drill down to garner more information on the displayed elements.

      The dashboard also provides alerts of suspicious events. In this case, the dashboard is displaying that someone attempted to gain access via AD to a resource on the network, and that the platform diverted the attempt for privilege escalation by providing a deceptive credential to the intruder. All critical information surrounding the attempted compromise is recorded, providing information for forensic analysis.

      Conclusions

      Perhaps the best analogy for ADSecure is to think of the module as a silent guardian that obstructs attacks by confusing the attacker with legitimate-looking information that is actually a fantasy. Or more simply put, ADSecure employs a magician’s sleight of hand to send attackers on what is the digital equivalent of a wild goose chase.

      The importance of protecting Active Directory in today’s cloud-enabled world cannot be underestimated, as noted by cybersecurity experts. 

      “Cybersecurity professionals continue to witness cybercriminals target Active Directory for privilege escalation, lateral movement and reconnaissance activities. Accounts and information stored in Active Directory are often targeted during security breaches because credential leverage is a necessary and invaluable aspect of every compromise. Solutions that detect and defend against Active Directory-related attacks are an important part of any security program,” said Marshall Heilman, senior vice president of Managed Defense and FLARE at Mandiant.

      For those looking to better protect Active Directory (and the resources it provides to users), the paradigm of deception proves to be quite valuable. ADSecure handily brings concealment and deceptive techniques to the forefront of protection and makes adoption quite easy. As a stand-alone product, companies can reduce the risk of lateral movement and privilege escalation. When used within Attivo’s ThreatDefend platform, it brings forward a unified way to protect networks from a number of different threats, beyond just those applicable to Active Directory.

      Arguably, the most important capability of ADSecure is how it can detect and prevent lateral attacks. For example, if an attacker attempts to harvest Active Directory data, ADSecure responds by providing the attacker with what looks like meaningful information but is, in fact, false data. Meanwhile, the attacker believes that they have successfully gathered critical information, yet that information is useless, and all details of the attack have been recorded, without the attacker even knowing. But there is much more to ADSecure than defending against lateral attacks. The module also can identify if stolen credentials are being used, which is becoming a growing problem as more and more workers shift to home or remote workplaces.

      In the past, compromises impacting Active Directory and the harvesting of Active Directory data were a major concern for organizations using AD. Yet, there was really no effective way to automate the protection of AD, and it was very difficult to detect the theft of AD data, if not impossible. It was a weakness amplified by the introduction of cloud services and resources that were also dependent upon AD. ADSecure effectively brings automated protection to Active Directory, which was once thought impossible.

      Frank Ohlhorst is a veteran IT product reviewer and analyst who has been an eWEEK regular for many years.

      Frank J. Ohlhorst
      Frank J. Ohlhorst
      Frank Ohlhorst is an award-winning technology journalist and IT industry analyst, with extensive experience as a business consultant, editor, author, and blogger. Frank works with both technology startups and established technology ventures, helping them to build channel programs, launch products, validate product quality, create marketing materials, author case studies, eBooks and white papers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      10 Best Artificial Intelligence (AI) 3D Generators

      Aminu Abdullahi - November 17, 2023 0
      AI 3D Generators are powerful tools for creating 3D models and animations. Discover the 10 best AI 3D Generators for 2023 and explore their features.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×