Anatomy of an AD Insider Threat—Are You Prepared?

“You mean this was an inside job?”

Ever since the first story about crime and the people who try to solve it, there has been that moment when someone uncovers a piece of evidence that an insider was involved. The characters exchange shocked, wary glances as one of them says, “You mean this was an inside job?”

Are you prepared for your next insider threat?

Unfortunately, glances and questions like those are becoming a standard feature of investigations into almost every data breach. Upon discovering that someone has illegitimately accessed data on the network, IT managers initially believe (hope, really) that the threat came from outside. But as recent, headline-grabbing data breaches demonstrate, a lapse in internal security—whether accidental or malicious—often makes the attack possible in spite of robust external security.

Since Microsoft Active Directory (AD) lives at the center of most organization, it’s often a prime target for attackers. See how a typical insider threat unfolds and learn security best practices that minimize the risk of the insider threat to the availability, confidentiality and integrity of AD.

Find out about these best practices and more, including how third-party tools—like InTrust from Quest—can help make insider threats a thing of the past.

Register for Dell World Software User Forum and get all the latest info.

About the Author
Thom Brainard
I am a highly personable and creative product marketing manager in the enterprise software industry with deep experience in B2B product/content marketing, technology application, content development, copy...