Active Directory Security and Active Directory Delegation play a mission-critical role in global security and present an open challenge. A good Active Directory Audit Tool / Active Directory Reporting Tool / Active Directory Auditing Tool / Permissions Analyzer for Active Directory can help Audit Active Directory, generate Active Directory Reports and mitigate Active Directory Risks such as Active Directory Privilege Escalation, and find out who can reset your windows password. Today, even the US Department of Homeland Security runs on Active Directory.Today, tools like the Active Directory Effective Permissions Tab and Active Directory Permissions Analyzer can be used to perform Active Directory Permissions Analysis, prevent Token Bloat, Dump Active Directory ACLs, perform an Active Directory Audit and an Active Directory Access Audit.
Monday, May 24, 2010
What is delegation of administration?
An IT infrastructure of a typical medium and large organization is comprised of thousands of IT assets such as user accounts, computers, files and databases, applications and vital services (name resolution, service location, email and instant messaging, remote access, etc.), each of which needs to be adequately administered. In such IT infrastructures, it is not possible for a handful of administrators to adequately administer all aspects of the IT infrastructure.
Thus, in most IT infrastructures, administrative responsibilities for managing the various IT assets that together comprise the IT infrastructure are distributed (or delegated) amongst an adequate (and typically larger) number of (usually less-privileged) administrators, who are then individually or collectively responsible for managing smaller specific portions of the IT infrastructure.
The act of provisioning sufficient access so as to grant a delegated administrator the ability to carry out designated responsibilities is commonly referred to as administrative delegation.
Wednesday, May 12, 2010
What is Active Directory?
Clients can use the Active Directory to locate IT resources such as computers, network shares, and services. Active Directory provides access to its clients by virtue of the industry standard Lightweight Directory Access Protocol (LDAP) protocol.
It is also used to store and protect domain user accounts, security groups, computer accounts, service connection points, group policies and Microsoft Exchange mailboxes and distribution groups. It thus plays a central role in IT management, delegation of administrative responsibilities and the specification and deployment of host security and management policies.
Active Directory can be used to fulfill numerous IT requirements, ranging from the deployment of a NOS directory-service to the deployment of light-weight directory enabled applications.