SlideShare a Scribd company logo
1 of 22
The Future of Integrated
Identity and Access Management
JAY
Product Expert, ADSolutions
Active Directory Webinar - 2017
SESSION AGENDA
• Automated 'User Life Cycle Management' - Effectively provisioning and
deprovisioning Active Directory user accounts
• Privileged Access Management - Prepare, Protect(MFA), Operate(JIT) &
Monitor(Reports, Alerts) identities of critical stakeholders
• Comprehensive Data Access Governance & Compliance - Get clear insights
into which employees have what access-ownership and perform necessary
permission cleanup
• Integrated ITSM-IAM dashboard - Empower your help desk for Active
Directory management
• Native Active Directory tools fall short in
meeting modern day requirements such as
automating routine AD tasks and generating
reports quickly.
• Multiple consoles for-
Active Directory, Exchange, Lync, O365, Gsuite,
etc., - cumbersome and time consuming.
• Security and granularity in delegation?
• Lacks support for bulk creation/mod GUI
NATIVE TOOLS ?
Sample PS for User Creation
Import-Csv .usercreationfile.csv | foreach-object {
$userprinicpalname = $_.SamAccountName +
"@{domainname}.com" New-ADUser -SamAccountName
$_.SamAccountName -UserPrincipalName
$userprinicpalname -Name $_.name -DisplayName $_.name
-GivenName $_.cn -SurName $_.sn -Department
$_.Department -Path "CN=Users,DC=biogen,DC=com" -
AccountPassword (ConvertTo-SecureString "Microsoft~1;"
-AsPlainText -force) -Enabled $True -
PasswordNeverExpires $True -PassThru }
Options that native tool offer
• New users have to wait a long time
before they can start working
• Your AD has quite a lot of mistakes
• You've got a lot of "inactive users"
• Ex-employees still have backdoor
access to your resources
Signs you may need AD automation
Automated Onboarding
360° User Provisioning
Automation Policy: User Creation
Objects to remove
• Inactive user objects especially admin
accounts
• Inactive computer objects to avoid naming
conflicts
Benefits removing objects stale objects
• Improves security for your domain
• Ensures effective license utilization
Automated AD Cleanup
Automated Offboarding
Create Custom Logics
Supervise and execute
Isolate admin and non-admin
accounts
PRIVILEGED ACCESS MANAGEMENT
— Enforce restrictions for accessing
— File servers
— Domain controllers
— Grant privileges to users only for systems on
which they are authorized.
— Grant access only when it’s needed and
revoke access when the need expires.
— Create an unalterable audit trail for any
privileged operation.
Observing accounts
Every object needs attention
• Expired accounts, expired passwords, and
disabled users are all major causes of internal
hacks
Privileged accounts with unchanged passwords
• Pose a chance of being compromised
• Require an immediate, forced password
change
Compliance & Clean up permissions
• Find out who has access to
confidential data
• What level of access do they have?
• Investigate subfolder permissions
• Practice the approach of 'least
permissions'
ITSM-IAM Integration & more.
ADManager Plus + ServiceDesk Plus
Create | Unlock | Enable | Disable | Delete | Reset
passwords
ADManager Plus + ServiceNow
Create | Unlock | Enable | Disable | Delete | Reset
passwords
& Add or remove from Group
Other integrations
MS SQL and Oracle DB – user onboarding
ADManager Plus - ITSM
ADManager Plus DB integration
The Essential Toolkit for effective
Active Directory Management
DOWNLOAD ADManager Plus
www.manageengine.com
THANK YOU
JAY
jay@manageengine.com
WHITEPAPER – USER LIFECYCLE MANAGEMENT,
DEREK MELBER, MVP

More Related Content

What's hot

System Center Service Manager 2012 Overview
System Center Service Manager 2012 OverviewSystem Center Service Manager 2012 Overview
System Center Service Manager 2012 Overview
Amit Gatenyo
 
Blue Ocean Electronic Document Control System
Blue Ocean Electronic Document Control SystemBlue Ocean Electronic Document Control System
Blue Ocean Electronic Document Control System
Tang Eileen
 
AWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security Keynote
Amazon Web Services
 
Service Manager – The New Helpdesk & CMDB Solution
Service Manager – The New Helpdesk & CMDB SolutionService Manager – The New Helpdesk & CMDB Solution
Service Manager – The New Helpdesk & CMDB Solution
Amit Gatenyo
 

What's hot (20)

Document Management System
Document Management SystemDocument Management System
Document Management System
 
Wadoop vivek shrivastava
Wadoop vivek shrivastavaWadoop vivek shrivastava
Wadoop vivek shrivastava
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365Intelligent Security, Compliance and Privacy in Office 365
Intelligent Security, Compliance and Privacy in Office 365
 
Introduction to agility
Introduction to agilityIntroduction to agility
Introduction to agility
 
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANTUNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
UNIFIED MESSAGE ARCHIVING – WHY IT IS IMPORTANT
 
Overview Prozone DMS for maximo
Overview Prozone DMS for maximoOverview Prozone DMS for maximo
Overview Prozone DMS for maximo
 
Grey tower technical capablities
Grey tower  technical capablitiesGrey tower  technical capablities
Grey tower technical capablities
 
System Center Service Manager 2012 Overview
System Center Service Manager 2012 OverviewSystem Center Service Manager 2012 Overview
System Center Service Manager 2012 Overview
 
BusinessPort's AgilityBMS 1 Minute Demo
BusinessPort's AgilityBMS 1 Minute DemoBusinessPort's AgilityBMS 1 Minute Demo
BusinessPort's AgilityBMS 1 Minute Demo
 
The SUG - Documents & Records Management, Really
The SUG - Documents & Records Management, ReallyThe SUG - Documents & Records Management, Really
The SUG - Documents & Records Management, Really
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
 
Blue Ocean Electronic Document Control System
Blue Ocean Electronic Document Control SystemBlue Ocean Electronic Document Control System
Blue Ocean Electronic Document Control System
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
WSO2Con ASIA 2016: Event Driven Architecture: Managing Business Dynamics for ...
WSO2Con ASIA 2016: Event Driven Architecture: Managing Business Dynamics for ...WSO2Con ASIA 2016: Event Driven Architecture: Managing Business Dynamics for ...
WSO2Con ASIA 2016: Event Driven Architecture: Managing Business Dynamics for ...
 
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
 
AWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security Keynote
 
Service Manager – The New Helpdesk & CMDB Solution
Service Manager – The New Helpdesk & CMDB SolutionService Manager – The New Helpdesk & CMDB Solution
Service Manager – The New Helpdesk & CMDB Solution
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
 
SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
 

Similar to The Future of integrated Identity and Access Management

access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
jemtallon
 
Satheesh.G_IDM
Satheesh.G_IDMSatheesh.G_IDM
Satheesh.G_IDM
satheesh64
 

Similar to The Future of integrated Identity and Access Management (20)

ADManager Plus Active Directory Management & Reporting
ADManager Plus Active Directory Management & ReportingADManager Plus Active Directory Management & Reporting
ADManager Plus Active Directory Management & Reporting
 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptx
 
Secure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollarSecure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollar
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
IAM Introduction and Best Practices
IAM Introduction and Best PracticesIAM Introduction and Best Practices
IAM Introduction and Best Practices
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
Introduction to IAM + Best Practices
Introduction to IAM + Best PracticesIntroduction to IAM + Best Practices
Introduction to IAM + Best Practices
 
Aws iam best practices to live by
Aws iam best practices to live byAws iam best practices to live by
Aws iam best practices to live by
 
Dell active roles
Dell active roles Dell active roles
Dell active roles
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Try {stuff} Catch {hopefully not} - Evading Detection & Covering Tracks
Try {stuff} Catch {hopefully not} - Evading Detection & Covering TracksTry {stuff} Catch {hopefully not} - Evading Detection & Covering Tracks
Try {stuff} Catch {hopefully not} - Evading Detection & Covering Tracks
 
Creating a fortress in your active directory environment
Creating a fortress in your active directory environmentCreating a fortress in your active directory environment
Creating a fortress in your active directory environment
 
Navigator - Your Cloud Management Platform
Navigator - Your Cloud Management PlatformNavigator - Your Cloud Management Platform
Navigator - Your Cloud Management Platform
 
SysAid Presentation V.7
SysAid Presentation V.7SysAid Presentation V.7
SysAid Presentation V.7
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)
 
Controlling Access to your Resources
Controlling Access to your ResourcesControlling Access to your Resources
Controlling Access to your Resources
 
Satheesh.G_IDM
Satheesh.G_IDMSatheesh.G_IDM
Satheesh.G_IDM
 

More from Zoho Corporation

Case study-self-password-management-camh
Case study-self-password-management-camhCase study-self-password-management-camh
Case study-self-password-management-camh
Zoho Corporation
 
Case study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreisCase study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreis
Zoho Corporation
 

More from Zoho Corporation (20)

One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.One portal for all your login needs - ADSelfService Plus Single sign-on.
One portal for all your login needs - ADSelfService Plus Single sign-on.
 
Using indicators to deal with security attacks
Using indicators to deal with security attacksUsing indicators to deal with security attacks
Using indicators to deal with security attacks
 
Ensuring security and consistency of users' self-service actions in Active Di...
Ensuring security and consistency of users' self-service actions in Active Di...Ensuring security and consistency of users' self-service actions in Active Di...
Ensuring security and consistency of users' self-service actions in Active Di...
 
Empowering ServiceNow help desk for Active Directory management
Empowering ServiceNow help desk for Active Directory managementEmpowering ServiceNow help desk for Active Directory management
Empowering ServiceNow help desk for Active Directory management
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​Decrypting the security mystery with SIEM (Part 2) ​
Decrypting the security mystery with SIEM (Part 2) ​
 
Overcoming the challenges of Office 365 user management in hybrid environments​
Overcoming the challenges of Office 365 user management in hybrid environments​Overcoming the challenges of Office 365 user management in hybrid environments​
Overcoming the challenges of Office 365 user management in hybrid environments​
 
Self-service password management and single sign-on for on-premises AD and cl...
Self-service password management and single sign-on for on-premises AD and cl...Self-service password management and single sign-on for on-premises AD and cl...
Self-service password management and single sign-on for on-premises AD and cl...
 
Effective User Life Cycle Management in Active Directory
Effective User Life Cycle Management in Active DirectoryEffective User Life Cycle Management in Active Directory
Effective User Life Cycle Management in Active Directory
 
Controlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active DirectoryControlling Delegation of Windows Servers and Active Directory
Controlling Delegation of Windows Servers and Active Directory
 
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
 
ALIGN Technology timely alerts its employees of their password expiry using A...
ALIGN Technology timely alerts its employees of their password expiry using A...ALIGN Technology timely alerts its employees of their password expiry using A...
ALIGN Technology timely alerts its employees of their password expiry using A...
 
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Unisource Worldwide Inc - An ADSelfservice Plus Case studyUnisource Worldwide Inc - An ADSelfservice Plus Case study
Unisource Worldwide Inc - An ADSelfservice Plus Case study
 
Case study-self-password-management-camh
Case study-self-password-management-camhCase study-self-password-management-camh
Case study-self-password-management-camh
 
Case study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreisCase study-administrative-office-schwarzwald-baar-kreis
Case study-administrative-office-schwarzwald-baar-kreis
 
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
 
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
 
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
 
Indispensable tool to help with Password Reset Issues
Indispensable tool to help with Password Reset IssuesIndispensable tool to help with Password Reset Issues
Indispensable tool to help with Password Reset Issues
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

The Future of integrated Identity and Access Management

  • 1. The Future of Integrated Identity and Access Management JAY Product Expert, ADSolutions Active Directory Webinar - 2017
  • 2. SESSION AGENDA • Automated 'User Life Cycle Management' - Effectively provisioning and deprovisioning Active Directory user accounts • Privileged Access Management - Prepare, Protect(MFA), Operate(JIT) & Monitor(Reports, Alerts) identities of critical stakeholders • Comprehensive Data Access Governance & Compliance - Get clear insights into which employees have what access-ownership and perform necessary permission cleanup • Integrated ITSM-IAM dashboard - Empower your help desk for Active Directory management
  • 3. • Native Active Directory tools fall short in meeting modern day requirements such as automating routine AD tasks and generating reports quickly. • Multiple consoles for- Active Directory, Exchange, Lync, O365, Gsuite, etc., - cumbersome and time consuming. • Security and granularity in delegation? • Lacks support for bulk creation/mod GUI NATIVE TOOLS ?
  • 4. Sample PS for User Creation Import-Csv .usercreationfile.csv | foreach-object { $userprinicpalname = $_.SamAccountName + "@{domainname}.com" New-ADUser -SamAccountName $_.SamAccountName -UserPrincipalName $userprinicpalname -Name $_.name -DisplayName $_.name -GivenName $_.cn -SurName $_.sn -Department $_.Department -Path "CN=Users,DC=biogen,DC=com" - AccountPassword (ConvertTo-SecureString "Microsoft~1;" -AsPlainText -force) -Enabled $True - PasswordNeverExpires $True -PassThru }
  • 5. Options that native tool offer
  • 6.
  • 7. • New users have to wait a long time before they can start working • Your AD has quite a lot of mistakes • You've got a lot of "inactive users" • Ex-employees still have backdoor access to your resources Signs you may need AD automation
  • 11. Objects to remove • Inactive user objects especially admin accounts • Inactive computer objects to avoid naming conflicts Benefits removing objects stale objects • Improves security for your domain • Ensures effective license utilization Automated AD Cleanup
  • 15. Isolate admin and non-admin accounts PRIVILEGED ACCESS MANAGEMENT — Enforce restrictions for accessing — File servers — Domain controllers — Grant privileges to users only for systems on which they are authorized. — Grant access only when it’s needed and revoke access when the need expires. — Create an unalterable audit trail for any privileged operation.
  • 16. Observing accounts Every object needs attention • Expired accounts, expired passwords, and disabled users are all major causes of internal hacks Privileged accounts with unchanged passwords • Pose a chance of being compromised • Require an immediate, forced password change
  • 17. Compliance & Clean up permissions • Find out who has access to confidential data • What level of access do they have? • Investigate subfolder permissions • Practice the approach of 'least permissions'
  • 18. ITSM-IAM Integration & more. ADManager Plus + ServiceDesk Plus Create | Unlock | Enable | Disable | Delete | Reset passwords ADManager Plus + ServiceNow Create | Unlock | Enable | Disable | Delete | Reset passwords & Add or remove from Group Other integrations MS SQL and Oracle DB – user onboarding
  • 20. ADManager Plus DB integration
  • 21. The Essential Toolkit for effective Active Directory Management DOWNLOAD ADManager Plus
  • 22. www.manageengine.com THANK YOU JAY jay@manageengine.com WHITEPAPER – USER LIFECYCLE MANAGEMENT, DEREK MELBER, MVP