Active Directory Monitoring

StealthINTERCEPT®: Monitors and prevents threats
in real-time for active directory security compliance

Watch Video


Request A Free Trial

Powered by ChronoForms -

John Deere Logo
Quest Diagnostics Logo

Detection, prevention, and alerting in real time for active directory security compliance

See threats, both malicious and accidental, as they happen. Get active directory monitoring alerts in real time or use blocking to ensure threats don’t become disasters.

Detect ransomware, insider threats and unauthorized changes.

Detect Threats

Detect threats with advanced authentication and file attack analytics to catch malware, ransomware, and bad guys on your network.

Feed threat data without the need for native logs into security information and event management.

Skip the Logs with SIEM

Integrate out of the box with the industry’s leading SIEM vendors. Increase the signal to noise ratio and get actionable insight in real-time.

Detect insider threats and cyber threats in real-time.

Alert in Real-Time

Know when threats emerge, changes happen, people misbehave, or processes go rogue as it happens.

Change auditor for active directory, file systems, and exchange that detects changes and access without native logs.

Detect Every Change in Active Directory

Detect every change to group memberships, GPOs, Mailbox and File permissions, as well as access activities like critical file access and Non-Owner Mailbox Access Events without the need for a single log.

Change auditor alternative for active directory auditing, exchange auditing, file system auditing.


Prevent changes and access to sensitive objects and resources like privileged accounts and security groups, VIP Mailboxes, and File Shares containing sensitive data and more.

active directory domain controller migration, consolidation, and upgrade authentication analytics.


Migrating, upgrading, consolidating, or simply decommissioning a domain controller? Use surgical authentication analysis to know beforehand what you’re going to break.

StealthINTERCEPT Overview

StealthINTERCEPT Overview

STEALTHbits addresses a challenge with native log data that I’ve struggled with for 8 years. STEALTHbits does the analytical work for me, specifically detecting modern attack vectors like horizontal account movement, the kind of technique that enables attackers to acquire privileged credentials and do the most damage.”

- Security Engineer at a Large Investment Firm

What's New:StealthINTERCEPT 5.2 is Here!

Enterprise PAssword Enforcer

In 2016 the Verizon Data Breach Investigations Report (DBIR) stated that 63% of confirmed data breaches leverage a weak, default, or stolen password. The 2017 Verizon DBIR reported that 81% of hacking-related breaches leveraged either stolen and/or weak passwords. And in the 2018 DBIR, use of stolen credentials remains a number one action in breaches. Attackers have demonstrated a consist ability to compromise accounts by leveraging passwords from prior breaches. For that reason, NIST Special Publication 800-63B (Authentication and Lifecycle Management, section*) recommends the use of “Memorized Secret Verifiers” such as the StealthINTERCEPT Enterprise Password Enforcer to reduce an attacker’s chances of compromising credentials.

StealthINTERCEPT 5.2 expands on the capabilities of STEALTHbits Enterprise Password Enforcer to include:

Custom complexity - the ability to reject specific passwords that do not contain the characters from a set list. This is configurable on both the numeric and character level. Curated dictionary - the ability to reject passwords based on the fact that they are vulnerable to attack from a dictionary or hybrid cracking algorithm.

  • Previous breach corpus - the ability to reject known compromised passwords from previous breach corpuses that are more susceptible to credential stuffing attacks.
  • Length enforcement - the ability to reject passwords based on how many or few characters.
  • User display/logon name rejection - the ability to reject passwords that are similar to the user’s display/logon name.
  • Special character enforcement - the ability to reject passwords that do or do not contain specific characters.
  • String rejection - the ability to reject passwords that contain user-defined strings (e.g. Reject passwords with “stealth” anywhere in the password).
  • Incremental digit avoidance - the ability to reject passwords that end in a number.
  • Keyboard pattern rejection - the ability to reject passwords that contain keyboard patterns (e.g. Qwerty)
  • Sequential character rejection - the ability to reject passwords that contain sequential characters.
  • Repeating character rejection - the ability to reject passwords that contain character repetition.
  • Unique character enforcement - the ability to reject passwords that do not contain a minimum number of unique characters.

What Our Customers Are Saying

Microsoft Ignite - Demetrius Moore


Learn More

Microsoft Ignite - Tony Frasco


Learn More

Microsoft Ignite - StealthINTERCEPT Demo


Learn More


Download instant free trial. Deploy where you need it.

StealthINTERCEPT Reports

  • Threat detection dashboard with authentication-based attack analytics to prevent data breaches and security breaches.
  • Feed events in real-time into SIEM.
  • Real-time alerting and auditing of changes in Active Directory, File Systems, and Exchange.
  • Detect changes to Active Directory group memberships, Group Policy Objects, Mailbox and File/Folder permissions and access activities.
  • Prevent active directory changes that go against security compliance.
  • Threat Detection

    Use authentication and file attack analytics to detect and block threats as they happen.

    Enlarge Screenshot

  • SIEM Integration

    Feed relevant security events into SIEM in real-time for actionable insight.

    Enlarge Screenshot

  • Real-time Alerting

    Alert audiences to critical events instantly at global or policy levels.

    Enlarge Screenshot

  • Change & Access Detection

    Detect suspicious LDAP queries, access activities and changes to objects and permissions.

    Enlarge Screenshot

  • Change & Access Prevention

    Prevent changes and access to critical objects like admin groups, GPOs, VIP mailboxes, and file shares with sensitive data.

    Enlarge Screenshot


StealthINTERCEPT® - Monitor and Prevent Threats in Real-Time

Data Sheet

Learn More

StealthINTERCEPT® - Enterprise Password Enforcer

Data Sheet

Learn More

Crypto Ransomware Detection

Executive Brief

Learn More

Insider Threat Detection

Executive Brief

Learn More

Free Risk Assessment
Free Trial Request
STEALTHbits Demo Request
Browse Resource Library