StealthAUDIT® for Active Directory

Everything you need to know about Active Directory

As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) is not to be understated.

StealthAUDIT for Active Directory provides comprehensive data collection, analysis, remediation, and reporting facilities to combat the complexity, security, and management challenges today’s organizations face.

 

Active Directory Auditing Software

StealthAUDIT for Active Directory is your Active Directory inventory. With complete insight into every layer of AD, StealthAUDIT for Active Directory acts as a single solution to understand the conditions that expose your organization to unnecessary security, compliance, and operational risk.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Auditing

Collect information on anything residing in AD, from objects and their attributes to Group Policy Objects (GPOs), configurations, group memberships, domains, sites, trusts, and more.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Reporting

Leverage dozens of preconfigured reports or create completely custom reports in seconds using StealthAUDIT’s powerful analysis and reporting engines.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Governance

Calculate and assign group ownership, perform automated membership reviews, and enable self-service group management and membership requests.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Permissions Analysis

Collect, inventory, and analyze every permission to every object to understand exactly who has privileged access in Active Directory.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Security Configuration

Preconfigured and customizable security best practices checks proactively identify critical security configurations that leave Active Directory vulnerable to attack.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Clean-up

Pinpoint stale, duplicate, and toxic objects and programmatically clean them up using integrated actions to increase security and reduce complexity.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Compliance

Preconfigured and customizable report tags aligning to various compliance standards such as HIPAA, PCI-DSS, GDPR, and SOX automate the production of compliance artifacts.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Agentless Architecture

With no agents to install, StealthAUDIT installs in minutes, collects at lightning-fast speed, and always maintains a lightweight footprint.

Learn why organizations all over the world rely on StealthAUDIT for Active Directory to maintain a clean, optimized and secure AD environment.

Active Directory Report Screenshot Tour

Browse some of our best reports to see how StealthAUDIT for Active Directory provides the most complete and comprehensive views into how AD is configured, secured, and managed. With this insight, users are empowered to make informed decisions that improve their security posture, as well as the health of Active Directory.

Summary Report of all audited domains and objects in Active Directory.

Active Directory Summary

This report provides a summary of all audited domains and objects.

This report provides all Group Policy Objects (GPOs) found in Active Directory with their respective settings.

Group Policy Object Overview

This report lists all Group Policies and their settings.

This report identifies key probable owners within a department based on effective member attributes.

Probable Owners

This report identifies the most probable manager or department, based on effective member attributes.

This report provides key visibility into where plaintext passwords are stored on a network using Group Policy Preferences.

Potential Plaintext Passwords

This report shows where plaintext passwords are stored in Group Policy Preferences.

This report provides information around stale user accounts that have not logged on to a domain and whether that account is disabled or expired in Active Directory.

Stale User Accounts

This report identifies user accounts which have not logged into the domain for an extended period of time or are currently disabled. A user account is considered stale if the last logon is over 60 days ago, is currently disabled, or expired.

This reports provides instances where 'Reset Password' permissions are applied to Active Directory user object.

Reset Password

This report highlights instances where "Reset Password" permissions are applied to Active Directory user objects. The information is summarized at the domain and enterprise levels.

This report provides effective membership for sensitive security groups in Active Directory.

Sensitive Security Group Membership

This report displays effective membership for sensitive security groups.

Resources