What Is Active Directory?
Active Directory is a directory service from Microsoft used in corporate settings to manage and store details about network resources, explains Lisa Plaggemier, executive director of the National Cybersecurity Alliance.
“These resources include users, computers, printers and services,” she says. “AD provides administrators a platform to organize these resources, regulate access and enforce security protocols.”
Jeff McJunkin, a principal instructor at the SANS Institute and founder of cybersecurity firm Rogue Valley Information Security, says that “the vast majority of organizations” use AD for
“managing their computers, user accounts, group memberships within their environment and a lot of management of those users and computers and servers.”
What Is Active Directory Monitoring?
Active Directory monitoring, Plaggemier says, “is the process of vigilantly observing the health and security of the Active Directory environment.” Organizations may do this by tracking alterations to user privileges, identifying failed login attempts, observing for uncommon activity and guaranteeing optimal system performance, she says.
“The primary objective of AD monitoring is to uphold system integrity, availability and security,” Plaggemier adds.
AD monitoring often is not something that is set up by default, according to McJunkin. “But it turns out if an attacker inside your environment wants to gain control of a server, and you use Active Directory, that is very commonly the system they will abuse,” he says.
Watch to Learn More About Building Cyber Resilience
“If an attacker gains access to something like the built-in domain admins group, you will have a new group member in many cases, and monitoring would, as one easy example, let you know that, ‘Hey, look, there’s a new domain admin with a username of HackerHacker. We probably should have some alerts based upon that.’”
Typically, however, that monitoring is not always active, McJunkin says, and organizations will only know that something is amiss if an attacker breaks production on AD or a staff member lodges a complaint. Then, IT security teams investigate.
AD monitoring tools let organizations know that changes are occurring to Active Directory, says Rob Clyde, board director for ISACA and executive chair of the board of directors for White Cloud Security. If AD monitoring is done well, it will include anomaly detection tools, Clyde says, to scan for strange details or changes that aren’t in the audit log and didn’t go through a normal process.
“But you could still tell from one point in time to the next that the change occurred,” he says. “How did that happen? It’s like making an accounting change without having it show up in a general ledger.”