Gain the Most Authoritative View of AD Permissions
Domain, OU, & Object Permissions
Analyze and report on OU, user, group, and computer permissions to identify security risks.
Identify group memberships and the access they can grant to sensitive areas in AD.
Effective Access to Change Objects
Determine who has effective access to make changes to admin groups in AD.
Inheritance on Objects
Uncover broken inheritance on objects to reduce complexity and remediate toxic conditions.
Organizations without the tools to automate the monitoring and reporting of privileged access within their AD-centric environments always end up having embarrassing numbers of people with unsanctioned authority. Stealthbits’ AD solutions automate the laborious tasks associated with constantly ensuring AD security."
- Randy Franklin Smith
Active Directory Auditing Reports
Highlight instances where "Reset Password" permissions are applied to Active Directory user objects, with the information summarized at the domain and enterprise levels.
Active Directory User Permissions
Pinpoint instances where permissions are applied to Active Directory user objects, as well as the level of permissions granted.
Active Directory Group Membership
Understand which trustees can change the membership of Active Directory group objects, either by writing the member attribute or via the "Add/Remove self as member" permission.
Active Directory Group Permissions
Shed light on instances where permissions are applied to Active Directory group objects to understand who can perform specific operations against AD groups.
Quickly analyze and report on where permissions are applied to Active Directory organizational units, with findings summarized at the domain and enterprise levels.
Uncover instances where permissions are applied to Active Directory computer objects to avoid growing breach scenarios.