SlideShare une entreprise Scribd logo
1  sur  34
Scrubbing your
Active Directory
Squeaky Clean!
Chris Radband
Senior Solutions Consultant
Lets talk about…
• Cleaning up your Active Directory
• What’s happening in your environment today

• Controlling changes in your environment
 eg. user lifecycle management

• Empowering the user with self-service

32

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Active Directory clean-up
Active Directory Environmental Clean-up
Challenges of an unmanaged Active Directory Estate
•

Inactive Users

•

Disabled Users

•

Locked out users

•

Expired Users

•

Passwords never set to expire

•

Security Groups with no members

•

Nested Security Groups

•

Stale Computer Accounts

•

Mixed-Naming conventions

•

Reducing the number of Power
Users

These illustrate just a few common Security

risks,
Performance impacts and contributors to Audit failures
seen in many environments of all sorts of sizes

44

|

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
How do you deal with Clean-up today?

Scripted and manual
clean-up tasks are

labour
intensive,
limited in
functionality,
inaccurate and
often

at worst can have all
sorts of

unexpected
results!
*Source: http://www.codeproject.com/Articles/18621/VBScript-to-Disable-Old-Accounts-in-Active-Directo
55

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Automated Clean-up of Inactive Accounts

66

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Automated Clean-up of Inactive Accounts
Discovery:
Process runs to determine
which accounts are
inactive

67

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Automated Clean-up of Inactive Accounts
Discovery:
Process runs to determine
which accounts are
inactive

Action:
Request administrator or
manager approval to
disable account

68

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Automated Clean-up of Inactive Accounts
Discovery:
Process runs to determine
which accounts are
inactive

Action:
Request administrator or
manager approval to
disable account
Remediation:
Account is disabled
and therefore
secured
69

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
What are today’s challenges,
right now?
Regulatory & Oversight Pressures

Internal Audit

Board of Directors – Oversight Groups
11

© 2011 NetIQ Corporation. All rights reserved.
Worst case scenario…

http://www.flickr.com/photos/teegardin/6093810333/in/photostream/
12

© 2011 NetIQ Corporation. All rights reserved.
Increasing audit and compliance requirements
…not to mention good-practice!
•

•

Identify Change when it happens

•

Catalogue managed and unmanaged changes

•

Detect high-profile changes

•

Provides detailed AD/GPO change history

•

Centrally record and audit AD/GPO changes

•

Easily integrates into your existing AD change process

•

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.

Satisfying audit requirements/achieving compliance
with regulations such as ISO 27001/2, Sarbanes-Oxley
and PCI DSS

•

7
13

Minimises the risk associated with Operational
changes

Feeding events backup to your Monitoring
Infrastructure
14

© 2011 NetIQ Corporation. All rights reserved.
Monitor for unmanaged GPO Changes

8
15

|

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Be proactive: GPO change: Email report sent to administrators

9
16

|

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Regaining Control…
Managing Privileged/Non-privileged Users
•

Why is it important?

•

The granular the better but no
added complexity

•

Something which defines:
-

-

-

WHO– who are we delegating control to (for
Active Directory).
WHAT – what functionality/permissions are
we delegating to the individual(s)
WHERE – which objects are we allowing
these individuals to execute their permissions
on (most likely contain multiple objects).

•

Capable of managing an enterprise
environment

•

Report on delegation

•

Controlled way to make
changes to environment

11
18

|

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Just in Time Automated Access

12
19

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Just in Time Automated Access

12
20

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Just in Time Automated Access

12
21

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Just in Time Automated Access

12
22

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
User Provisioning, User De-provisioning, User Re-provisioning
•

Reducing the human element

•

Increasing Security & compliance

•

Does it increase consistency?

•

Is it truly efficient and does it

save time?
•

Does the process work for your

business today?
•

Can it accommodate the changes of

tomorrow?

13
23

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Empowering the User…
Password Management
•

It may seem straightforward to us but the statistics are
scary!
–
–

65%

–

82%

–

25

64%

76%

© 2011 NetIQ Corporation. All rights reserved.
Password Management
•

It may seem straightforward to us but the statistics are
scary!
–
–

65%

–

82%

–

26

64% - end users that write passwords down

76%

© 2011 NetIQ Corporation. All rights reserved.
Password Management
•

It may seem straightforward to us but the statistics are
scary!
–
–

65% - use the same password for multiple accounts

–

82%

–

27

64% - end users that write passwords down

76%

© 2011 NetIQ Corporation. All rights reserved.
Password Management
•

It may seem straightforward to us but the statistics are
scary!
–
–

65% - use the same password for multiple accounts

–

82% - have forgotten a password

–

28

64% - end users that write passwords down

76%

© 2011 NetIQ Corporation. All rights reserved.
Password Management
•

It may seem straightforward to us but the statistics are
scary!
–
–

65% - use the same password for multiple accounts

–

82% - have forgotten a password

–

29

64% - end users that write passwords down

76% - intrusions exploit weak or stolen credentials

© 2011 NetIQ Corporation. All rights reserved.
Password Management
•

It may seem straightforward to us but the statistics are scary!
–
–

65% - use the same password for multiple accounts

–

82% - have forgotten a password

–

•

64% - end users that write passwords down

76% - intrusions exploit weak or stolen credentials

Instead, provide the user ability to reset password
anytime and anyplace (at work, home, or on the road)
–

Increased productivity – lower TCO
–
–

–

Helpdesk freed to perform higher value tasks
Users don’t have to wait for their password to be reset

Increased security
–
–

Challenge questions provide higher security than phone based user
validation

–
30

Users less likely to write password down on paper

Password rules enable consistent enforcement of password policy

© 2011 NetIQ Corporation. All rights reserved.
Self Service Administration
Empowering the Business User
More than just Self Service Password Reset...

•

Further Frees up IT Resources

•

Giving the business users an

On-Demand Service
•

Controlled way to deal with User Request

•

Being able to provide a timely response

•

Requesting access to resources

•

Mailbox Size Quota Increase Request

•

Group membership change request

14
31

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
NetIQ Solutions
•

Directory and Resource Administrator

•

Aegis

•

Group Policy Administrator

•

Change Guardian for Active Directory

•

Self-Service Password Reset
See NetIQ.com/Products

16
32

© 2011 NetIQ Corporation. All rights reserved.
2013 NetIQ Corporation. All rights reserved.
Demo
www.netiq.com

Contenu connexe

Tendances

Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...centralohioissa
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechDell EMC World
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
RSA ASIA 2014 - Internet of Things
RSA ASIA 2014 - Internet of Things RSA ASIA 2014 - Internet of Things
RSA ASIA 2014 - Internet of Things Wolfgang Kandek
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is HereLancope, Inc.
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
 
Regulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRegulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRajesh Chitharanjan
 

Tendances (20)

Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
RSA ASIA 2014 - Internet of Things
RSA ASIA 2014 - Internet of Things RSA ASIA 2014 - Internet of Things
RSA ASIA 2014 - Internet of Things
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Regulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRegulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent Need
 

En vedette

NetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebookNetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebookpamolson
 
Risk assessment system inside NetIQ. NCU development
Risk assessment system inside NetIQ.  NCU developmentRisk assessment system inside NetIQ.  NCU development
Risk assessment system inside NetIQ. NCU developmentNCU Ltd
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lithvdhendrikse
 
Plate spin migration and transformation prsesentation upload
Plate spin migration and transformation prsesentation uploadPlate spin migration and transformation prsesentation upload
Plate spin migration and transformation prsesentation uploadApurva Shah
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-SocialNetIQ
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own IdentityNetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and HealthcareNetIQ
 
Remote Access
Remote AccessRemote Access
Remote Accesszaisahil
 
What is active directory
What is active directoryWhat is active directory
What is active directoryAdeel Khurram
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
Update Your Disaster Recovery Plans with Virtualization
Update Your Disaster Recovery Plans with VirtualizationUpdate Your Disaster Recovery Plans with Virtualization
Update Your Disaster Recovery Plans with VirtualizationJason Dea
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 

En vedette (18)

NetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebookNetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebook
 
Risk assessment system inside NetIQ. NCU development
Risk assessment system inside NetIQ.  NCU developmentRisk assessment system inside NetIQ.  NCU development
Risk assessment system inside NetIQ. NCU development
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
 
Plate spin migration and transformation prsesentation upload
Plate spin migration and transformation prsesentation uploadPlate spin migration and transformation prsesentation upload
Plate spin migration and transformation prsesentation upload
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own Identity
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Remote desktop connection
Remote desktop connectionRemote desktop connection
Remote desktop connection
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 
Remote Access
Remote AccessRemote Access
Remote Access
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
Update Your Disaster Recovery Plans with Virtualization
Update Your Disaster Recovery Plans with VirtualizationUpdate Your Disaster Recovery Plans with Virtualization
Update Your Disaster Recovery Plans with Virtualization
 
3 g and 4g final ppt
3 g and 4g final ppt3 g and 4g final ppt
3 g and 4g final ppt
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Active Directory
Active Directory Active Directory
Active Directory
 

Similaire à Scrubbing Your Active Directory Squeaky Clean

Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQServiceRocket
 
Get ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_extGet ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_extOracle Developers
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is nextThomas Teske
 
OCSL - VMware, vSphere Webinar May 2013
OCSL - VMware, vSphere Webinar May 2013OCSL - VMware, vSphere Webinar May 2013
OCSL - VMware, vSphere Webinar May 2013OCSL
 
How to Eliminate the #1 Cause of Network Down-time
How to Eliminate the #1 Cause of Network Down-timeHow to Eliminate the #1 Cause of Network Down-time
How to Eliminate the #1 Cause of Network Down-timeSolarWinds
 
Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...
Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...
Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...Cartegraph
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Andrejs Prokopjevs
 
The Changing Role of a DBA in an Autonomous World
The Changing Role of a DBA in an Autonomous WorldThe Changing Role of a DBA in an Autonomous World
The Changing Role of a DBA in an Autonomous WorldMaria Colgan
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapOracleIDM
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
OCW mutual materials (2).pptx
OCW mutual materials (2).pptxOCW mutual materials (2).pptx
OCW mutual materials (2).pptxAuraPlayer
 
OCW mutual materials.pptx
OCW mutual materials.pptxOCW mutual materials.pptx
OCW mutual materials.pptxAuraPlayer
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Systems, Inc.
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsOlivier DASINI
 
How Mutual Materials Achieved a New Look and Feel
How Mutual Materials Achieved a New Look and FeelHow Mutual Materials Achieved a New Look and Feel
How Mutual Materials Achieved a New Look and FeelAuraPlayer
 
Modern Data Security with MySQL
Modern Data Security with MySQLModern Data Security with MySQL
Modern Data Security with MySQLVittorio Cioe
 
How to See and Resolve Office 365 Performance Challenges
How to See and Resolve Office 365 Performance Challenges How to See and Resolve Office 365 Performance Challenges
How to See and Resolve Office 365 Performance Challenges ThousandEyes
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 

Similaire à Scrubbing Your Active Directory Squeaky Clean (20)

Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Atlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQAtlassian Executive Business Forum - LinkedIn HQ
Atlassian Executive Business Forum - LinkedIn HQ
 
Get ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_extGet ready for_an_autonomous_data_driven_future_ext
Get ready for_an_autonomous_data_driven_future_ext
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
 
OCSL - VMware, vSphere Webinar May 2013
OCSL - VMware, vSphere Webinar May 2013OCSL - VMware, vSphere Webinar May 2013
OCSL - VMware, vSphere Webinar May 2013
 
How to Eliminate the #1 Cause of Network Down-time
How to Eliminate the #1 Cause of Network Down-timeHow to Eliminate the #1 Cause of Network Down-time
How to Eliminate the #1 Cause of Network Down-time
 
Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...
Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...
Loras College 2014 Business Analytics Symposium | Aaron Lanzen: Creating Busi...
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...
 
The Changing Role of a DBA in an Autonomous World
The Changing Role of a DBA in an Autonomous WorldThe Changing Role of a DBA in an Autonomous World
The Changing Role of a DBA in an Autonomous World
 
Bridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On GapBridging the Cloud Sign-On Gap
Bridging the Cloud Sign-On Gap
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
OCW mutual materials (2).pptx
OCW mutual materials (2).pptxOCW mutual materials (2).pptx
OCW mutual materials (2).pptx
 
OCW mutual materials.pptx
OCW mutual materials.pptxOCW mutual materials.pptx
OCW mutual materials.pptx
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
 
How Mutual Materials Achieved a New Look and Feel
How Mutual Materials Achieved a New Look and FeelHow Mutual Materials Achieved a New Look and Feel
How Mutual Materials Achieved a New Look and Feel
 
Modern Data Security with MySQL
Modern Data Security with MySQLModern Data Security with MySQL
Modern Data Security with MySQL
 
How to See and Resolve Office 365 Performance Challenges
How to See and Resolve Office 365 Performance Challenges How to See and Resolve Office 365 Performance Challenges
How to See and Resolve Office 365 Performance Challenges
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 

Plus de NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your BusinessNetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed ServiceNetIQ
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...NetIQ
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense ReportNetIQ
 

Plus de NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Scrubbing Your Active Directory Squeaky Clean

  • 1. Scrubbing your Active Directory Squeaky Clean! Chris Radband Senior Solutions Consultant
  • 2. Lets talk about… • Cleaning up your Active Directory • What’s happening in your environment today • Controlling changes in your environment  eg. user lifecycle management • Empowering the user with self-service 32 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 4. Active Directory Environmental Clean-up Challenges of an unmanaged Active Directory Estate • Inactive Users • Disabled Users • Locked out users • Expired Users • Passwords never set to expire • Security Groups with no members • Nested Security Groups • Stale Computer Accounts • Mixed-Naming conventions • Reducing the number of Power Users These illustrate just a few common Security risks, Performance impacts and contributors to Audit failures seen in many environments of all sorts of sizes 44 | © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 5. How do you deal with Clean-up today? Scripted and manual clean-up tasks are labour intensive, limited in functionality, inaccurate and often at worst can have all sorts of unexpected results! *Source: http://www.codeproject.com/Articles/18621/VBScript-to-Disable-Old-Accounts-in-Active-Directo 55 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 6. Automated Clean-up of Inactive Accounts 66 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 7. Automated Clean-up of Inactive Accounts Discovery: Process runs to determine which accounts are inactive 67 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 8. Automated Clean-up of Inactive Accounts Discovery: Process runs to determine which accounts are inactive Action: Request administrator or manager approval to disable account 68 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 9. Automated Clean-up of Inactive Accounts Discovery: Process runs to determine which accounts are inactive Action: Request administrator or manager approval to disable account Remediation: Account is disabled and therefore secured 69 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 10. What are today’s challenges, right now?
  • 11. Regulatory & Oversight Pressures Internal Audit Board of Directors – Oversight Groups 11 © 2011 NetIQ Corporation. All rights reserved.
  • 13. Increasing audit and compliance requirements …not to mention good-practice! • • Identify Change when it happens • Catalogue managed and unmanaged changes • Detect high-profile changes • Provides detailed AD/GPO change history • Centrally record and audit AD/GPO changes • Easily integrates into your existing AD change process • © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved. Satisfying audit requirements/achieving compliance with regulations such as ISO 27001/2, Sarbanes-Oxley and PCI DSS • 7 13 Minimises the risk associated with Operational changes Feeding events backup to your Monitoring Infrastructure
  • 14. 14 © 2011 NetIQ Corporation. All rights reserved.
  • 15. Monitor for unmanaged GPO Changes 8 15 | © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 16. Be proactive: GPO change: Email report sent to administrators 9 16 | © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 18. Managing Privileged/Non-privileged Users • Why is it important? • The granular the better but no added complexity • Something which defines: - - - WHO– who are we delegating control to (for Active Directory). WHAT – what functionality/permissions are we delegating to the individual(s) WHERE – which objects are we allowing these individuals to execute their permissions on (most likely contain multiple objects). • Capable of managing an enterprise environment • Report on delegation • Controlled way to make changes to environment 11 18 | © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 19. Just in Time Automated Access 12 19 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 20. Just in Time Automated Access 12 20 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 21. Just in Time Automated Access 12 21 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 22. Just in Time Automated Access 12 22 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 23. User Provisioning, User De-provisioning, User Re-provisioning • Reducing the human element • Increasing Security & compliance • Does it increase consistency? • Is it truly efficient and does it save time? • Does the process work for your business today? • Can it accommodate the changes of tomorrow? 13 23 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 25. Password Management • It may seem straightforward to us but the statistics are scary! – – 65% – 82% – 25 64% 76% © 2011 NetIQ Corporation. All rights reserved.
  • 26. Password Management • It may seem straightforward to us but the statistics are scary! – – 65% – 82% – 26 64% - end users that write passwords down 76% © 2011 NetIQ Corporation. All rights reserved.
  • 27. Password Management • It may seem straightforward to us but the statistics are scary! – – 65% - use the same password for multiple accounts – 82% – 27 64% - end users that write passwords down 76% © 2011 NetIQ Corporation. All rights reserved.
  • 28. Password Management • It may seem straightforward to us but the statistics are scary! – – 65% - use the same password for multiple accounts – 82% - have forgotten a password – 28 64% - end users that write passwords down 76% © 2011 NetIQ Corporation. All rights reserved.
  • 29. Password Management • It may seem straightforward to us but the statistics are scary! – – 65% - use the same password for multiple accounts – 82% - have forgotten a password – 29 64% - end users that write passwords down 76% - intrusions exploit weak or stolen credentials © 2011 NetIQ Corporation. All rights reserved.
  • 30. Password Management • It may seem straightforward to us but the statistics are scary! – – 65% - use the same password for multiple accounts – 82% - have forgotten a password – • 64% - end users that write passwords down 76% - intrusions exploit weak or stolen credentials Instead, provide the user ability to reset password anytime and anyplace (at work, home, or on the road) – Increased productivity – lower TCO – – – Helpdesk freed to perform higher value tasks Users don’t have to wait for their password to be reset Increased security – – Challenge questions provide higher security than phone based user validation – 30 Users less likely to write password down on paper Password rules enable consistent enforcement of password policy © 2011 NetIQ Corporation. All rights reserved.
  • 31. Self Service Administration Empowering the Business User More than just Self Service Password Reset... • Further Frees up IT Resources • Giving the business users an On-Demand Service • Controlled way to deal with User Request • Being able to provide a timely response • Requesting access to resources • Mailbox Size Quota Increase Request • Group membership change request 14 31 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 32. NetIQ Solutions • Directory and Resource Administrator • Aegis • Group Policy Administrator • Change Guardian for Active Directory • Self-Service Password Reset See NetIQ.com/Products 16 32 © 2011 NetIQ Corporation. All rights reserved. 2013 NetIQ Corporation. All rights reserved.
  • 33. Demo