SlideShare a Scribd company logo
INTRODUCTION
The Security Kung Fu Series is a four-part series intended to guide you in the mastery of the art of
Security Kung Fu.
As we embarked on creating this series, we always knew that in the back of everyone’s minds were a
couple of curious thoughts: Why “Kung Fu?” And, “what does martial arts have to do with how I protect
my network?”
Well, “Kung Fu” is a Chinese term referring to any study, learning, or practice that requires patience,
energy, hard work, discipline and time to complete. So, really, it’s not just martial arts.
Perhaps, by this definition, you’re starting to see the parallels we see with IT security, and the vital roles
many of you play within your respective organizations.
For on demand access to each recording of the series visit the Security Kung Fu Series Page.
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 2
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Agenda
3
• Respect your Security Kung Fu Masters
• The threats within
• A need for monitoring Active Directory®
• Monitoring for Active Directory events/changes
• Maintaining compliance
• SIEM Solutions
• Using SolarWinds® Log & Event Manager (LEM)
to monitor for AD changes
• Q&A
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Security Kung Fu Masters
4
Ian Trump
Cyber Security Strategist
Jamie Hynds
Sr. Product Manager - Security
SolarWinds
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
The Threats Within
Verizon 2016 Data Breach Investigations Report – 3/21/16
http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
In 93% of cases, it took
attackers minutes or less
to compromise systems.
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
The Threats Within
• Not following procedures
• Negligent behavior
• Malicious intent
• Integrity of the AD Domain
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
A Need for Monitoring Active Directory
United States District Court for the Northern District of California – 3/21/16
https://www.justice.gov/opa/press-release/file/948201/download
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
A Need for Monitoring Active Directory
• Targeted attacks are more sophisticated
• It is difficult to completely prevent attacks by
just defending the border
• Attackers remain within the systems of an
organization and cleverly steal information
over a long period of time
• If detection is delayed, damages increase. It is
critical to detect as soon as possible to stop
the attack.
• Monitoring Active Directory is a critical layer of
your defense - especially when it comes to
detection of breach
Organizations in EMEA took three
times longer to detect a compromise
“…the mean dwell time (time between
compromise and detection) in the region
was 469 days versus a global average of
146 days.”
Mandiant Consulting M-Trends 2016 EMEA Edition - 3/21/17
https://www2.fireeye.com/WEB-RPT-M-Trends-2016-EMEA.html
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Monitoring for Active Directory Events
• User events
o New user creation
o User lock-out event
o User-enabled event
o User deleted
• Authentication events
o User logons
o Failed logons
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Monitoring for Active Directory Changes
• Group changes
o Added to groups they shouldn’t be a part of
o Removing someone purposefully or by accident
o Creating new groups
• Policy changes
o Group policy
o Audit policy
• Password resets
o Admin – verify that admin password changes are legitimate
o Users – verify users are changing passwords to comply with internal
policies/procedures
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Maintaining Compliance
• PCI DSS
• HIPAA
• SOX
• ISO
• NIST 800-53
• COBIT
• And more
Active Directory Change Monitoring for Compliance
Elevated to Privileged User 660, 4728, 4732, 4756
Domain's Administrator password reset 4724
Logon as Domain's Administrator 4624
Active Directory Permission Change
(((4661) and Object Server: is not “Security
Account Manager”) or 4662)
and Accesses: includes WRITE_DAC
Domain or Domain Controller Security
Setting Change
1102, 4616, 4697, 4704, 4705, 4706, 4707, 4716,
4719, 4713, 4717, 4718, 4739, 4906
Group Policy Related Change
See selection criteria and "cases" in the "Group
Policy Changes" report definition
Account Enabled 4722
Member deletions 4729, 4733, 4757, 4747, 4752, 4762
Deleted and disabled 4725, 4726
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SIEM Solutions
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SOLARWINDS LOG & EVENT MANAGER
Affordable SIEM solution that helps you detect and respond to security threats.
• Real-time event correlation for instantaneous detection of malicious and suspicious
activity
• Automated remediation and advanced search for forensic analysis and
troubleshooting
• Out-of-the-box compliance rules and reports for HIPAA, PCI, SOX, FISMA, and may
more.
Download Free Trial | Learn More
© 2017 SOLARWINDS WORLDWIDE, 13
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks
are the exclusive property of SolarWinds Worldwide, LLC or its affiliates,
are registered with the U.S. Patent and Trademark Office, and may be
registered or pending registration in other countries. All other SolarWinds
trademarks, service marks, and logos may be common law marks or are
registered or pending registration. All other trademarks mentioned herein
are used for identification purposes only and are trademarks of (and may
be registered trademarks) of their respective companies.

More Related Content

What's hot

Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any SizeAccelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
Cisco Canada
 
Design highly available and secure system
Design highly available and secure systemDesign highly available and secure system
Design highly available and secure system
Andi Pangeran
 
SSFIPSCisco Learning Services v2 1
SSFIPSCisco Learning Services v2 1SSFIPSCisco Learning Services v2 1
SSFIPSCisco Learning Services v2 1
Safwat Ramadan
 
Cisco SourceFire
Cisco SourceFireCisco SourceFire
Cisco SourceFire
Ahmed Serag
 
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
NetworkCollaborators
 
e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and Defense
Erik Iker
 
Sprint Secure Portfolio
Sprint Secure PortfolioSprint Secure Portfolio
Sprint Secure Portfolio
Richard Baredziak, MBA
 
Rethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraRethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native era
Priyanka Aash
 
G Data Retail 2011 English
G  Data  Retail 2011 EnglishG  Data  Retail 2011 English
G Data Retail 2011 English
Daniel Chee
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security Solutions
B.A.
 
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
BHack Conference
 
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal SitesDefense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Pantheon
 
Targeted  &  Persistent  Attacks  in  EU
Targeted  &  Persistent  Attacks  in  EU Targeted  &  Persistent  Attacks  in  EU
Targeted  &  Persistent  Attacks  in  EU
DFLABS SRL
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
Domen Savič
 
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
AugmentedWorldExpo
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
NetworkCollaborators
 
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Cloud Security Alliance, UK chapter
 
ASCP17 Principles to protect ISM from cyber threats draft Feb 2019
ASCP17 Principles to protect ISM from cyber threats draft Feb 2019ASCP17 Principles to protect ISM from cyber threats draft Feb 2019
ASCP17 Principles to protect ISM from cyber threats draft Feb 2019
DavidPiercePM
 
Information Security for startups
Information Security for startupsInformation Security for startups
Information Security for startups
Stijn Vande Casteele
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
CrowdStrike
 

What's hot (20)

Accelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any SizeAccelerating Incident Response in Organizations of Any Size
Accelerating Incident Response in Organizations of Any Size
 
Design highly available and secure system
Design highly available and secure systemDesign highly available and secure system
Design highly available and secure system
 
SSFIPSCisco Learning Services v2 1
SSFIPSCisco Learning Services v2 1SSFIPSCisco Learning Services v2 1
SSFIPSCisco Learning Services v2 1
 
Cisco SourceFire
Cisco SourceFireCisco SourceFire
Cisco SourceFire
 
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
 
e-Extortion Trends and Defense
e-Extortion Trends and Defensee-Extortion Trends and Defense
e-Extortion Trends and Defense
 
Sprint Secure Portfolio
Sprint Secure PortfolioSprint Secure Portfolio
Sprint Secure Portfolio
 
Rethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native eraRethinking Application Security for cloud-native era
Rethinking Application Security for cloud-native era
 
G Data Retail 2011 English
G  Data  Retail 2011 EnglishG  Data  Retail 2011 English
G Data Retail 2011 English
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security Solutions
 
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
 
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal SitesDefense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
 
Targeted  &  Persistent  Attacks  in  EU
Targeted  &  Persistent  Attacks  in  EU Targeted  &  Persistent  Attacks  in  EU
Targeted  &  Persistent  Attacks  in  EU
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
 
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
 
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
Csa UK agm 2019 - Craig Savage - safe as clouds the journey from legacy to cl...
 
ASCP17 Principles to protect ISM from cyber threats draft Feb 2019
ASCP17 Principles to protect ISM from cyber threats draft Feb 2019ASCP17 Principles to protect ISM from cyber threats draft Feb 2019
ASCP17 Principles to protect ISM from cyber threats draft Feb 2019
 
Information Security for startups
Information Security for startupsInformation Security for startups
Information Security for startups
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
 

Similar to Security Kung Fu: Active Directory Changes

Security Kung Fu: Security vs Compliance
Security Kung Fu: Security vs ComplianceSecurity Kung Fu: Security vs Compliance
Security Kung Fu: Security vs Compliance
SolarWinds
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
 
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the businessCisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Canada
 
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall LogsSecurity Kung Fu: Firewall Logs
Security Kung Fu: Firewall Logs
SolarWinds
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
Ernest Staats
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
Ernest Staats
 
Introduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptxIntroduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptx
kaushalmunish77
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
Ernest Staats
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team Approach
Joanne Klein
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
Mail.ru Group
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
Bloxx
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
Anant Shrivastava
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent Campaign
Denim Group
 
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the EnterpriseThe Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
Denim Group
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
SagarNegi10
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 

Similar to Security Kung Fu: Active Directory Changes (20)

Security Kung Fu: Security vs Compliance
Security Kung Fu: Security vs ComplianceSecurity Kung Fu: Security vs Compliance
Security Kung Fu: Security vs Compliance
 
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM SolutionsSecurity Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
 
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the businessCisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
Cisco Connect Vancouver 2017 - Embedding IR into the DNA of the business
 
Security Kung Fu: Firewall Logs
Security Kung Fu: Firewall LogsSecurity Kung Fu: Firewall Logs
Security Kung Fu: Firewall Logs
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Introduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptxIntroduction to Cybersecurity v2.1 - Course Overview.pptx
Introduction to Cybersecurity v2.1 - Course Overview.pptx
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Azure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team ApproachAzure Information Protection - Taking a Team Approach
Azure Information Protection - Taking a Team Approach
 
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
«Product Security Incident Response Team (PSIRT) - Изнутри Cisco PSIRT», Алек...
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
The Permanent Campaign
The Permanent CampaignThe Permanent Campaign
The Permanent Campaign
 
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the EnterpriseThe Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 

Recently uploaded

GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 

Recently uploaded (20)

GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 

Security Kung Fu: Active Directory Changes

  • 1.
  • 2. INTRODUCTION The Security Kung Fu Series is a four-part series intended to guide you in the mastery of the art of Security Kung Fu. As we embarked on creating this series, we always knew that in the back of everyone’s minds were a couple of curious thoughts: Why “Kung Fu?” And, “what does martial arts have to do with how I protect my network?” Well, “Kung Fu” is a Chinese term referring to any study, learning, or practice that requires patience, energy, hard work, discipline and time to complete. So, really, it’s not just martial arts. Perhaps, by this definition, you’re starting to see the parallels we see with IT security, and the vital roles many of you play within your respective organizations. For on demand access to each recording of the series visit the Security Kung Fu Series Page. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 2
  • 3. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Agenda 3 • Respect your Security Kung Fu Masters • The threats within • A need for monitoring Active Directory® • Monitoring for Active Directory events/changes • Maintaining compliance • SIEM Solutions • Using SolarWinds® Log & Event Manager (LEM) to monitor for AD changes • Q&A
  • 4. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Security Kung Fu Masters 4 Ian Trump Cyber Security Strategist Jamie Hynds Sr. Product Manager - Security SolarWinds
  • 5. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. The Threats Within Verizon 2016 Data Breach Investigations Report – 3/21/16 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ In 93% of cases, it took attackers minutes or less to compromise systems.
  • 6. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. The Threats Within • Not following procedures • Negligent behavior • Malicious intent • Integrity of the AD Domain
  • 7. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. A Need for Monitoring Active Directory United States District Court for the Northern District of California – 3/21/16 https://www.justice.gov/opa/press-release/file/948201/download
  • 8. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. A Need for Monitoring Active Directory • Targeted attacks are more sophisticated • It is difficult to completely prevent attacks by just defending the border • Attackers remain within the systems of an organization and cleverly steal information over a long period of time • If detection is delayed, damages increase. It is critical to detect as soon as possible to stop the attack. • Monitoring Active Directory is a critical layer of your defense - especially when it comes to detection of breach Organizations in EMEA took three times longer to detect a compromise “…the mean dwell time (time between compromise and detection) in the region was 469 days versus a global average of 146 days.” Mandiant Consulting M-Trends 2016 EMEA Edition - 3/21/17 https://www2.fireeye.com/WEB-RPT-M-Trends-2016-EMEA.html
  • 9. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Monitoring for Active Directory Events • User events o New user creation o User lock-out event o User-enabled event o User deleted • Authentication events o User logons o Failed logons
  • 10. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Monitoring for Active Directory Changes • Group changes o Added to groups they shouldn’t be a part of o Removing someone purposefully or by accident o Creating new groups • Policy changes o Group policy o Audit policy • Password resets o Admin – verify that admin password changes are legitimate o Users – verify users are changing passwords to comply with internal policies/procedures
  • 11. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Maintaining Compliance • PCI DSS • HIPAA • SOX • ISO • NIST 800-53 • COBIT • And more Active Directory Change Monitoring for Compliance Elevated to Privileged User 660, 4728, 4732, 4756 Domain's Administrator password reset 4724 Logon as Domain's Administrator 4624 Active Directory Permission Change (((4661) and Object Server: is not “Security Account Manager”) or 4662) and Accesses: includes WRITE_DAC Domain or Domain Controller Security Setting Change 1102, 4616, 4697, 4704, 4705, 4706, 4707, 4716, 4719, 4713, 4717, 4718, 4739, 4906 Group Policy Related Change See selection criteria and "cases" in the "Group Policy Changes" report definition Account Enabled 4722 Member deletions 4729, 4733, 4757, 4747, 4752, 4762 Deleted and disabled 4725, 4726
  • 12. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. SIEM Solutions
  • 13. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. SOLARWINDS LOG & EVENT MANAGER Affordable SIEM solution that helps you detect and respond to security threats. • Real-time event correlation for instantaneous detection of malicious and suspicious activity • Automated remediation and advanced search for forensic analysis and troubleshooting • Out-of-the-box compliance rules and reports for HIPAA, PCI, SOX, FISMA, and may more. Download Free Trial | Learn More © 2017 SOLARWINDS WORLDWIDE, 13
  • 14.
  • 15. © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.