As one of the most critical components of your IT infrastructure, safeguarding your Microsoft Active Directory (AD) deployment is essential. With almost all your applications and tools integrated with Active Directory for authentication, directory browsing, and single sign-on, one cyber incident could disrupt your entire organization.
Kroll’s Active Directory assessments are performed by a team of experts who have spent years perfecting their skills and testing new attack tools and techniques in order to provide unrivaled analysis and support.
Our Active Directory Security Assessments consist of an in-depth review and analysis of your current infrastructure deployment, based on Microsoft and industry best practices.
We leverage a combination of automated and manual testing methods, with the help of a variety of licensed and open-source tools to identify vulnerabilities that could be exploited by both unauthenticated and authenticated threat actors on your networks.
Our practitioners examine several key areas, including but not limited to:
Once they identified the key issues, our specialists deliver tailored remediation guidance to fully address them.
As a trusted security partner to leading businesses around the world, we work to a proven and transparent assessment process, minimizing disruption to your organization while delivering the results you need. Our expert team will undertake an in-depth review of the current security status of your organization’s Active Directory deployment. Our assessment methodology is made up of the following three phases:
Agree the scope of the assessment with the project coordinator. Access to the environment is agreed (remote or on-site), established and tested before starting the process.
The point of contact and the mode of communication/escalation are agreed.
We review your organization’s existing documentation, discuss key aspects with your employees and run manual and automated reviews of the Active Directory configuration and settings.
Achieving this effectively relies on asking key scoping questions, including:
Our expert team delivers a security assessment report outlining the scope of the project, all discovered issues, and key findings and conclusions. We make recommendations including actionable items which enable your organization to mitigate the risks of the identified vulnerabilities, with a plan that allows you to perform tactical remediation to resolve the issues that pose the greatest threat.
Our Active Directory assessment process covers all of the areas shown in the diagram below.
Kroll’s team of certified cloud pen testers uncover vulnerabilities in your cloud environment and apps before they can be compromised by threat actors.
Kroll’s multi-layered approach to cloud security consulting services merges our industry-leading team of AWS and Azure-certified architects, cloud security experts and unrivalled incident expertise.
Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.
Fortify your defenses and maximize your technology investment with a Microsoft 365 security assessment from Kroll.
Digital forensic experts investigate hundreds of Office 365 incidents per year and help strengthen your security.
Immediately elevate your Office 365 security with 24x7 monitoring, analysis, and automated response using Kroll Responder for Office 365. Detect and respond to threats targeting email, Sharepoint, and third-party plugins leveraging frontline threat intelligence.
by Alex Cowperthwaite
by Ben Mahar
by Rob Deane