Active Directory Permissions Auditing with StealthAUDIT
As the authentication and authorization hub of your network, the importance of understanding Active Directory (AD) permissions is not to be understated. Unfortunately, native tools and views into AD object permissions lack the ability to scale effectively even in smaller organizations, requiring advanced knowledge of scripting languages like PowerShell to make any real headway in understanding AD permissions vulnerabilities.
StealthAUDIT Active Directory Permissions Analyzer enables organizations to easily and automatically determine effective permissions applied to any and all Active Directory objects, at any scope, allowing for the most authoritative view available of who has access to what in AD.

StealthAUDIT Active Directory Permissions Analyzer
Comprehensive Active Directory Permissions Reporting
Browse our Active Directory Permissions reports and see how deep visibility into object-level permissions can illuminate vulnerabilities attackers exploit to compromise credentials.
-
Audit Reset Password Permissions in Active Directory
Highlight instances where "Reset Password" permissions are applied to Active Directory user objects. This information is summarized at the domain and enterprise levels.
-
Audit User Object Permissions in Active Directory
Pinpoint instances where permissions are applied to Active Directory user objects. This information helps organizations understand the level of permissions granted like read, write, and delete.
-
Audit Group Membership Change Permissions in AD
Understand which trustees can change the membership of Active Directory group objects, either by writing the member attribute or via the "Add/Remove self as member" permission.
-
Audit Group Object Permissions in Active Directory
Shed light on instances where permissions are applied to Active Directory group objects. This information is critical to understanding who can perform particular operations against AD groups.
-
Audit OU Permissions in Active Directory
Quickly analyze and report on where permissions are applied to Active Directory organizational units. This information is summarized at the domain and enterprise levels.
-
Audit Computer Permissions in Active Directory
Uncover instances where permissions are applied to Active Directory computer objects. Information regarding computer permissions can help avoid growing breach scenarios.
-
Audit Open Access Permissions on AD Objects
Rapidly assess instances of open access on AD objects, and summarize open access by domain. Common instances of open access include the use of well-known security principals like Domain Users, Authenticated Users, and Everyone.
-
Find Broken Inheritance in AD Permissions
Gain immediate insight into instances of broken inheritance on Active Directory objects. This information can be segmented by domain and show where the inheritance has been broken, regardless of its location in the permissions tree.
-
Audit AdminSDHolder Permissions in AD
Quickly determine what permissions exist on the AdminSDHolder container within Active Directory. If compromised, the AdminSDHolder container can be used by an attacker to achieve persistence in an environment. This information is summarized at the domain and enterprise levels.
-
Audit Domain Replication Permissions
Identify and track which accounts are capable of replicating Active Directory information. The ability to replicate the domain, for example, can be used as an attack path via techniques like DCShadow and DCSync to more easily compromise an Active Directory environment. This information is summarized at the domain and enterprise levels.
See the market’s most comprehensive Active Directory Permissions auditing and reporting solution in action.
It only takes 30 minutes!
Request Demo