Active Directory Security

Function overview

Hiperlinx ’s Active Directory security services recognize that AD is inherently complex, often managed by different administrators over time, each with their own methods. This diversity in management approaches makes AD susceptible to misconfigurations and gaps, which traditional auditing methods may not adequately address. This is where we excel. Our AD security in-depth audit uncovers these weaknesses and offers precise security mitigation strategies to address them effectively.

The Advantage

Hiperlinx Active Directory Security Assessment typically discovers more high priority findings than commercial tools. We use manual enumeration along with in-depth analysis to discover, identify, and provide feasible, actionable recommendations to get issues fixed.

What you get in our AD Report

Active Directory Security Assessment Findings & Recommendations

  • Most significant findings
  • Potential Attack Paths
  • Top Recommended Remediation Items

Existing Active Directory Architecture Configuration

Forest & Domain Configuration | Trusts | Authentication | Accounts

Active Directory Administration, Privileged Groups, Permissions, & Rights

Active Directory Administration Active Directory Administrative Accounts | Default Domain Administrator Account | KRBTGT Domain Kerberos Service Account | Kerberos Delegation | Domain Permissions | AdminSDHolder Permissions

Security Controls, Monitoring, and Group Policy Configuration

Secure Administrative Host and Configuration | Azure Active Directory Integration | Group Policy Configuration

Domain Controller Security

Domain Controller Configuration | Read-Only Domain Controllers

Security Recommendations

Standard Recommendations | Reducing Service Account Rights in Active Directory | Delegating Rights with Role Groups | Securing and Preventing Lateral Movement with a Host-Based Firewall | Securing Administration Recommendations | Hardening Active Directory Administration | Domain Controller System Encryption | Active Directory Security Best Practices | Microsoft Active Directory Security Reference Documents | Active Directory Security Reference Articles

Appendix 1

Active Directory Design Overview

Appendix 2

Recommended Configuration References

Need support in evaluating your active directory environment?

Get your AD security report