SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
The Challenges of Administering
Active Directory

As Active Directory’s role in the enterprise has drastically increased, so has
the need to secure the data it stores and to which it enables access. The lack
of native control makes the secure administration of Active Directory a
challenging task at best for administrators. As a result, organizations need
assistance in creating repeatable, enforceable processes that will ultimately
reduce their administrative overhead, while simultaneously helping increase
availability and security of their systems.

This white paper outlines seven common challenges associated with securely
administering Active Directory and provides some helpful insight into what
NetIQ can do to assist you with these difficulties.
This document could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein. These changes may be incorporated in new editions of this document.
NetIQ Corporation may make improvements in or changes to the software described in this document at
any time.

Copyright © 2010 NetIQ Corporation. All rights reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design,
Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator,
File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts,
NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security
Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the USA. All other company and product names mentioned are used only for identification
purposes and may be trademarks or registered trademarks of their respective companies.




                                                       WHITE PAPER: The Challenges of Administering Active Directory
Table of Contents 
Introduction: Active Directory and Its Central Role in Enterprise Environments........................................... 1 
   Compliance Auditing and Reporting .......................................................................................................... 1 
   Group Policy Management ........................................................................................................................ 2 
   User Provisioning, Re-Provisioning and De-Provisioning ......................................................................... 2 
   Secure Delegation of User Privilege ......................................................................................................... 3 
   Change Auditing and Monitoring ............................................................................................................... 3 
   Maintaining Data Integrity .......................................................................................................................... 4 
   Self-Service Administration ....................................................................................................................... 5 
Conclusion .................................................................................................................................................... 5 
About NetIQ .................................................................................................................................................. 6 




                                                                  WHITE PAPER: The Challenges of Administering Active Directory
Introduction: Active Directory and Its Central Role in
Enterprise Environments
Since its availability with Microsoft Windows (Windows) 2000, Microsoft Active Directory (Active Directory)
has been used to help organizations administer and secure their Windows environments. As deployment
of, and reliance upon, Active Directory in the enterprise has grown, it has increasingly become the central
data store for sensitive user data and the gateway to critical business information. This provides
organizations with a consolidated, integrated, and distributed directory service, which enables the
business to better manage user and administrative access to business applications and services.

As Active Directory’s role in the enterprise has drastically increased, so has the need to secure the data it
stores and to which it enables access. Unfortunately native Active Directory administration tools provide
little control over user and administrative permissions and access. The lack of native control makes the
secure administration of Active Directory a challenging task at best for administrators. In addition to
limited control over what users and administrators can do in Active Directory, there is a limited ability to
report on activities performed in Active Directory which makes it very difficult to meet audit requirements
and secure Active Directory. As a result, organizations need assistance in creating repeatable,
enforceable processes that will ultimately reduce their administrative overhead, while simultaneously
helping increase availability and security of their systems.

As an essential part of the IT infrastructure, Active Directory must be thoughtfully and diligently
managed—that is, controlled, secured, and audited. Not surprisingly, an application of this importance
that has minimal native controls presents management challenges that must be confronted and resolved
in order to reduce risk, while deriving maximum value for the business. This paper examines seven of the
most challenging administrative tasks in Active Directory.


Compliance Auditing and Reporting
In the face of diverse regulatory mandates—such as HIPAA, Sarbanes-Oxley, and PCI-DSS—achieving,
demonstrating, and maintaining compliance is challenging. To satisfy audit requirements, organizations
must be able to demonstrate control over the security of sensitive and business-critical data. However,
without additional tools, the ability to demonstrate regulatory compliance with Active Directory natively is
time-consuming, tedious, and complex at best.

Auditors and stakeholders require detailed information about privileged-user activity. This level of granular
information enables interested parties to troubleshoot problems and also provides the information
necessary to improve the performance and availability of Active Directory.

Auditing and reporting on Active Directory has always been a challenge. Prior to the release of Windows
Server 2008, there were no granular reporting capabilities. However, with the release of Windows Server
2008, there is now limited reporting on some of the details auditors require. While this limited information
is a move in the right direction, it is not robust enough to meet stringent audit requirements or to support
business changes or decisions.

To more easily achieve, demonstrate, and maintain compliance, organizations should employ a solution
that provides robust, customizable reporting and auditing capabilities. Reporting should provide
information on who made a change, what change was made, when the change was made, and where the
change was made. Reporting capabilities should be flexible enough to provide graphical trend information
for business stakeholders, while also providing granular detail necessary for administrators to improve


                                          WHITE PAPER: The Challenges of Administering Active Directory | 1
their Active Directory deployment. Solutions should also securely store audit events for as long as
necessary to meet data retention requirements and enable the easy search of these audit events.


Group Policy Management
Microsoft recommends that Group Policy be utilized as a cornerstone of Active Directory security.
Leveraging the powerful capabilities of Group Policy, IT organizations can centrally manage and
configure user and asset settings, applications, and operating systems from a central console. It is an
indispensable resource for managing user access, permissions, and security settings in the Windows
environment.

Maintaining a large number of Group Policy Objects (GPOs), where policy settings are stored, can be a
challenging task. In large IT environments with many systems administrators, for example, special care
must be taken because changes made to GPOs can affect every computer or user in a domain in real
time; yet Group Policy lacks true change-management and version-control capabilities.

Due to the limited native controls available in Group Policy, accomplishing something as simple as
deploying a shortcut requires writing a script. Custom scripts are often complex to create and difficult to
debug and test. If the script fails or causes disruption in the live environment, there is no way to roll-back
to the last known setting or configuration. As you can imagine, the consequences of malicious or
unintended changes to Group Policy can have devastating and permanent effects on the IT environment
and the business.

To prevent Group Policy changes that can negatively impact the business, IT organizations often restrict
administrative privilege to a few highly-skilled administrators. As a result, these staff members are tasked
and overburdened with administering Group Policy rather than supporting the greater and more strategic
goals of the business.

To securely leverage the powerful capabilities of Group Policy, it is necessary to have a solution in place
that provides a secure offline repository to model and predict the impact of Group Policy changes prior to
pushing them live. The ability to plan, control, and troubleshoot Group Policy changes—coupled with an
approved change and release management process—enables you to improve the security and
compliance of your Windows environment without making business-crippling administrative errors.
Organizations should also employ a solution for managing Group Policy that enables easy and flexible
reporting that clearly demonstrates that audit requirements have been met.


User Provisioning, Re-Provisioning and De-Provisioning
Most employees require access to several systems and applications, each with its own account and log-
on information. Even with today’s more advanced processes and systems, employees often find
themselves waiting for days for access to the systems they need. This can cost organizations directly in
lost productivity and employee downtime. To minimize workloads and expedite the provisioning process,
many organizations look to Active Directory to be the commanding data store for managing user account
information and access rights to IT resources and assets.

Provisioning, re-provisioning and de-provisioning access via Active Directory is often a manual process.
In the case of a large organization, maintaining appropriate user permissions and access can be an
extraordinarily time-consuming activity, especially when the business has significant turnover in
personnel. Systems administrators often spend hours creating, modifying, and removing credentials.

In a large, complex business, manual provisioning can take days. There are no automation or policy
enforcement capabilities natively available in Active Directory. With little to no control in place, there is no

                                           WHITE PAPER: The Challenges of Administering Active Directory | 2
way to ensure that users will receive the access they need within the timeframe they need it. In addition,
there is no system of checks and balances, so administrative errors can easily result in elevated user
privileges that can lead to a security breach, malicious activity, or unintended error that can expose the
business to significant risk.

Organizations should look for an automated solution to execute provisioning activities. Pursuing an
automated solution with approval capabilities drastically reduces the time and burden on administrators,
improves adherence to security policies by minimizing human interaction with the process, improves
standardization, and decreases the time the user must wait for access. It also expedites the removal of
user access, which minimizes the ability for a user with malicious intent to access sensitive business data.


Secure Delegation of User Privilege
Reducing the number of users with elevated administrative privileges is a constant challenge for the
owners of Active Directory. Many user and helpdesk requests require interaction with Active Directory.
These common interactions with Active Directory often result in administrative privileges for users who do
not require elevated access to perform their jobs.

Because there are only two levels of administrative access in Active Directory (Domain Administrator
access or Enterprise Administrator access), it is very difficult to control what a user can see and do once
they have gained administrative privileges. In addition, once a user has acquired powerful administrative
capabilities, they can easily access sensitive business and user information, further elevate their
privileges, and have the capability to make changes within Active Directory. Elevated administrative
privileges, especially when in the hands of someone with malicious intent, dramatically increase the risk
exposure of Active Directory and the applications, users, and systems that rely upon it (i.e., Human
Resource systems or proprietary business information).

It is not uncommon for a business to discover that thousands of users have elevated administrative
privileges. Each user with unauthorized administrative privileges presents a unique threat to the security
of the IT infrastructure and business. Coupled with the vulnerabilities native to Active Directory, it is very
easy for someone to make business-crippling administrative changes. When this occurs, troubleshooting
becomes a nightmare, as auditing and reporting limitations discussed earlier in this paper make it nearly
impossible to quickly gather a clear picture of the problem.

To ultimately reduce the risk associated with elevated user privilege and help ensure that users have
access to only the information they require to perform their jobs, organizations should seek a solution that
can securely delegate entitlements. This is a requirement to meet separation of duties mandates, as well
as a way to share administrative load by securely pushing restricted change privileges out to the less
expensive resources.

For example, an administrator may wish to delegate the ability to reset passwords to the members of the
help desk in order to more quickly resolve user requests and reduce administrative burden. With granular
privilege delegation, the help desk would be able to reset passwords but would not have the ability to take
other administrative actions in Active Directory, ultimately improving efficiency and reducing business risk.


Change Auditing and Monitoring
To achieve and maintain a secure and compliant environment, you must control change and monitor for
unauthorized change that may negatively impact the business. Active Directory change auditing is an
important procedure for identifying and limiting unauthorized changes and errors to Active Directory



                                          WHITE PAPER: The Challenges of Administering Active Directory | 3
configuration. One single change can put your organization at risk, introducing security breaches and
compliance issues.

Native Active Directory tools fail to proactively track, audit, report, and alert on vital configuration
changes. In addition, real-time auditing and reporting on configuration change (including Group Policy
Objects), day-to-day operational change, and critical group change does not exist natively. This exposes
the business to exponential risk—as once a change has occurred, your ability to correct and limit the
negative impact is completely dependent upon your ability to detect the change that has been made and
to pinpoint and troubleshoot the change.

A change that goes undetected can have a drastic impact on the business. For example, someone who
was able to elevate their privileges and change their identity to that of a senior member of the finance
department could potentially access company funds resulting in theft, wire transfers, and so forth.

To reduce risk and help prevent security breaches, organizations should employ a solution that provides
comprehensive change monitoring. This solution should include real-time change detection, intelligent
notification, human-readable events, centralized auditing, and detailed reporting. Employing a solution
that encompasses all of these elements will help enable you to quickly and easily identify unauthorized
change, pinpoint the source of the change, and efficiently resolve the change before the business is
negatively impacted.


Maintaining Data Integrity
It is important for organizations to ensure that the data housed within Active Directory supports the needs
of the business, especially as other business applications further rely on Active Directory for content and
information.

Data integrity involves both the consistency of data and the completeness of information. For example,
there are multiple ways to enter a phone number:

    •   +1.713.418.5555
    •   713 418-5555
    •   7134185555
    •   1-713-418-5555
    •   (713) 415-5555

Entering data in inconsistent formats creates data pollution. Data pollution inhibits the business from
organizing and efficiently accessing important information. Another example of data in-consistency is the
ability to abbreviate a department name. Think of all the different ways to abbreviate accounting. If there
is not consistency in the data entered in Active Directory, there is no way to ensure that all members of
accounting can be organized or grouped together, which can be necessary for payroll, communications,
systems access, and so on.

Completeness of information is another aspect of data integrity that is necessary for organizations to gain
meaningful information from Active Directory. For example, if an employee is transferred to a new
department in a new city and state, the HR system in the company would leverage Active Directory to
update benefits and payroll information. However, if the administrator did not enter the employees’ zip
code, the HR system would not know where to send the employee’s paystub.

Active Directory provides no control over content that is entered natively. If no controls are in place,
administrators can enter information in any format they wish and leave fields void of information that the
business relies upon.

                                         WHITE PAPER: The Challenges of Administering Active Directory | 4
To help ensure that all aspects of the business that rely upon Active Directory are supported and provided
with meaningful and trustworthy information, organizations should employ a solution that controls both the
format and the completeness of data entered in Active Directory. By putting these controls in place, you
can drastically reduce data pollution and significantly improve the uniformity and completeness of the
content in Active Directory.


Self-Service Administration
Most requests that are made by the business or by users require Active Directory to be accessed and
administered. This work is often highly manual and there are few controls in place to prevent
administrative errors. Active Directory’s inherent complexity makes administrative errors common—just
one mistake could do damage to the entire security infrastructure. Given the lack of controls—and the
business cannot have just anyone administering Active Directory.

While it may be practical to employ engineers and consultants to install and maintain Active Directory,
organizations cannot afford to have their highly-skilled and valuable resources spending the majority of
their time responding to menial user requests.

Self-service administration and automation are logical solutions for organizations looking to streamline
operations, to become more efficient, and to improve compliance. This is achieved by placing controls
around common administrative tasks and enabling user requests to be performed without tasking highly-
skilled administrators. Organizations should identify processes that are routine yet highly manual, and
consider solutions that provide user self-service and automation of the process. Automation of highly-
manual processes not only reduces the workload on highly-skilled administrators, it also improves
compliance with policies, as automation does not allow for steps in the process to be skipped.
Organizations should also look for self-service and automation solutions that allow for approval and
provide a comprehensive audit trail of events to help demonstrate policy compliance.



Conclusion
Active Directory has found its home as a mission-critical component of the IT infrastructure. As
businesses continue to leverage it for its powerful capabilities as a commanding repository, Active
Directory is a critical component of enterprise security. Therefore, it must be diligently controlled,
monitored, administered, and protected with the same degree of discipline currently applied to other high-
profile information (e.g., credit card data, customer data, and so forth).

Because native tools do not enable or support the secure and disciplined administration of Active
Directory, organizations must look for solutions that enable its controlled and efficient administration.
These solutions help ensure the business information housed in Active Directory is both secure and
appropriately serving the needs of the business.

This paper has explored some of the most challenging aspects of securely administering Active Directory.
NetIQ provides Active Directory Management and Security solutions that increase your control over
Active Directory administration and improve your ability to achieve and maintain compliance. In addition,
solutions from NetIQ decrease the cost and complexities associated with administering Active Directory.




                                          WHITE PAPER: The Challenges of Administering Active Directory | 5
About NetIQ
NetIQ is an enterprise software company with relentless focus on customer success. Customers and
partners choose NetIQ to cost-effectively tackle information protection challenges and IT operations
complexities. Our portfolio of scalable, automated management solutions for Security & Compliance,
Identity & Access, and Performance & Availability and our practical, focused approach to solving IT
challenges help customers realize greater strategic value, demonstrable business improvement and cost
savings over alternative approaches.

For more information, visit NetIQ.com.

Mais conteúdo relacionado

Mais procurados

Security AD Directory Redesign
Security AD Directory RedesignSecurity AD Directory Redesign
Security AD Directory RedesignKaren E. Semonson
 
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Christopher Wynder
 
Governance sharepointserver-2010
Governance sharepointserver-2010Governance sharepointserver-2010
Governance sharepointserver-2010Chad Solomonson
 
Why Data Quality is Key To Solvency II
Why Data Quality is Key To Solvency IIWhy Data Quality is Key To Solvency II
Why Data Quality is Key To Solvency IIcolinrickard
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5Eryk Budi Pratama
 
Document management the buyers handbook by Laserfiche.
Document management  the buyers handbook by Laserfiche.Document management  the buyers handbook by Laserfiche.
Document management the buyers handbook by Laserfiche.Luis Santos
 
Ensuring document control for healthcare vendors
Ensuring document control for healthcare vendorsEnsuring document control for healthcare vendors
Ensuring document control for healthcare vendorsChristopher Wynder
 
Legislative Compliance Management Solution (LCMS)
Legislative Compliance Management Solution (LCMS)Legislative Compliance Management Solution (LCMS)
Legislative Compliance Management Solution (LCMS)John Zarei
 
Removing Silos and Operating a Shared Services Center with EBS
Removing Silos and Operating a Shared Services Center with EBSRemoving Silos and Operating a Shared Services Center with EBS
Removing Silos and Operating a Shared Services Center with EBSeprentise
 
Ecm Concept
Ecm ConceptEcm Concept
Ecm ConceptDJDhiren
 
Gaining financial and operational efficiencies through centralized processing.
Gaining financial and operational efficiencies through centralized processing. Gaining financial and operational efficiencies through centralized processing.
Gaining financial and operational efficiencies through centralized processing. Lisa Baergen, APR
 
09 mdm tool comaprison
09 mdm tool comaprison09 mdm tool comaprison
09 mdm tool comaprisonSneha Kulkarni
 

Mais procurados (13)

Security AD Directory Redesign
Security AD Directory RedesignSecurity AD Directory Redesign
Security AD Directory Redesign
 
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...Laserfiche10 highlights- how the new features can benefit your mobile and wor...
Laserfiche10 highlights- how the new features can benefit your mobile and wor...
 
Governance sharepointserver-2010
Governance sharepointserver-2010Governance sharepointserver-2010
Governance sharepointserver-2010
 
Why Data Quality is Key To Solvency II
Why Data Quality is Key To Solvency IIWhy Data Quality is Key To Solvency II
Why Data Quality is Key To Solvency II
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
 
Document management the buyers handbook by Laserfiche.
Document management  the buyers handbook by Laserfiche.Document management  the buyers handbook by Laserfiche.
Document management the buyers handbook by Laserfiche.
 
Ensuring document control for healthcare vendors
Ensuring document control for healthcare vendorsEnsuring document control for healthcare vendors
Ensuring document control for healthcare vendors
 
Legislative Compliance Management Solution (LCMS)
Legislative Compliance Management Solution (LCMS)Legislative Compliance Management Solution (LCMS)
Legislative Compliance Management Solution (LCMS)
 
Data Flux
Data FluxData Flux
Data Flux
 
Removing Silos and Operating a Shared Services Center with EBS
Removing Silos and Operating a Shared Services Center with EBSRemoving Silos and Operating a Shared Services Center with EBS
Removing Silos and Operating a Shared Services Center with EBS
 
Ecm Concept
Ecm ConceptEcm Concept
Ecm Concept
 
Gaining financial and operational efficiencies through centralized processing.
Gaining financial and operational efficiencies through centralized processing. Gaining financial and operational efficiencies through centralized processing.
Gaining financial and operational efficiencies through centralized processing.
 
09 mdm tool comaprison
09 mdm tool comaprison09 mdm tool comaprison
09 mdm tool comaprison
 

Semelhante a The Top 7 Active Directory Admin Challenges Overcome White Paper

Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseNetwrix Corporation
 
L Holution Srochure Bperation Oerf Penter V1
L Holution Srochure Bperation Oerf Penter V1L Holution Srochure Bperation Oerf Penter V1
L Holution Srochure Bperation Oerf Penter V1James McDermott
 
10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
 10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you... 10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...eprentise
 
Introduction to master data services
Introduction to master data servicesIntroduction to master data services
Introduction to master data servicesKlaudiia Jacome
 
Transforming your IT Organization to Infrastructure-as-a-Service (Iaas)
Transforming your IT Organization to Infrastructure-as-a-Service (Iaas)Transforming your IT Organization to Infrastructure-as-a-Service (Iaas)
Transforming your IT Organization to Infrastructure-as-a-Service (Iaas)mstockwell
 
Data Governance for EPM Systems with Oracle DRM
Data Governance for EPM Systems with Oracle DRMData Governance for EPM Systems with Oracle DRM
Data Governance for EPM Systems with Oracle DRMUS-Analytics
 
Data archiving, Data Management,
Data archiving, Data Management,Data archiving, Data Management,
Data archiving, Data Management,jobsref
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Christian Buckley
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxhealdkathaleen
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxtodd271
 
3dPerfTunWhitePaperFINAL
3dPerfTunWhitePaperFINAL3dPerfTunWhitePaperFINAL
3dPerfTunWhitePaperFINALJoe Holland
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceKlaudiia Jacome
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceKlaudiia Jacome
 
DBA Role Shift in a DevOps World
DBA Role Shift in a DevOps WorldDBA Role Shift in a DevOps World
DBA Role Shift in a DevOps WorldDatavail
 
Understanding_IT_Assets_Today
Understanding_IT_Assets_TodayUnderstanding_IT_Assets_Today
Understanding_IT_Assets_TodayDavid Messineo
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data IntegrationAnalytiX DS
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...AnalytixDataServices
 
White Paper - Data Warehouse Governance
White Paper -  Data Warehouse GovernanceWhite Paper -  Data Warehouse Governance
White Paper - Data Warehouse GovernanceDavid Walker
 

Semelhante a The Top 7 Active Directory Admin Challenges Overcome White Paper (20)

Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
 
L Holution Srochure Bperation Oerf Penter V1
L Holution Srochure Bperation Oerf Penter V1L Holution Srochure Bperation Oerf Penter V1
L Holution Srochure Bperation Oerf Penter V1
 
10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
 10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you... 10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
10 Steps to Reduce Complexity, Increase Transparency, and Get Value from you...
 
Introduction to master data services
Introduction to master data servicesIntroduction to master data services
Introduction to master data services
 
Transforming your IT Organization to Infrastructure-as-a-Service (Iaas)
Transforming your IT Organization to Infrastructure-as-a-Service (Iaas)Transforming your IT Organization to Infrastructure-as-a-Service (Iaas)
Transforming your IT Organization to Infrastructure-as-a-Service (Iaas)
 
Data Governance for EPM Systems with Oracle DRM
Data Governance for EPM Systems with Oracle DRMData Governance for EPM Systems with Oracle DRM
Data Governance for EPM Systems with Oracle DRM
 
Data archiving, Data Management,
Data archiving, Data Management,Data archiving, Data Management,
Data archiving, Data Management,
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
 
Running head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docxRunning head Database and Data Warehousing design1Database and.docx
Running head Database and Data Warehousing design1Database and.docx
 
3dPerfTunWhitePaperFINAL
3dPerfTunWhitePaperFINAL3dPerfTunWhitePaperFINAL
3dPerfTunWhitePaperFINAL
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligence
 
Microsoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligenceMicrosoft sql server 2008 r2 business intelligence
Microsoft sql server 2008 r2 business intelligence
 
DBA Role Shift in a DevOps World
DBA Role Shift in a DevOps WorldDBA Role Shift in a DevOps World
DBA Role Shift in a DevOps World
 
It housekeeping
It housekeepingIt housekeeping
It housekeeping
 
Understanding_IT_Assets_Today
Understanding_IT_Assets_TodayUnderstanding_IT_Assets_Today
Understanding_IT_Assets_Today
 
Governance and Architecture in Data Integration
Governance and Architecture in Data IntegrationGovernance and Architecture in Data Integration
Governance and Architecture in Data Integration
 
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
White Paper-1-AnalytiX Mapping Manager-Governance And Architecture In Data In...
 
White Paper - Data Warehouse Governance
White Paper -  Data Warehouse GovernanceWhite Paper -  Data Warehouse Governance
White Paper - Data Warehouse Governance
 

Mais de NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your BusinessNetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 

Mais de NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 

Último

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

The Top 7 Active Directory Admin Challenges Overcome White Paper

  • 1. The Challenges of Administering Active Directory As Active Directory’s role in the enterprise has drastically increased, so has the need to secure the data it stores and to which it enables access. The lack of native control makes the secure administration of Active Directory a challenging task at best for administrators. As a result, organizations need assistance in creating repeatable, enforceable processes that will ultimately reduce their administrative overhead, while simultaneously helping increase availability and security of their systems. This white paper outlines seven common challenges associated with securely administering Active Directory and provides some helpful insight into what NetIQ can do to assist you with these difficulties.
  • 2. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2010 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the USA. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. WHITE PAPER: The Challenges of Administering Active Directory
  • 3. Table of Contents  Introduction: Active Directory and Its Central Role in Enterprise Environments........................................... 1  Compliance Auditing and Reporting .......................................................................................................... 1  Group Policy Management ........................................................................................................................ 2  User Provisioning, Re-Provisioning and De-Provisioning ......................................................................... 2  Secure Delegation of User Privilege ......................................................................................................... 3  Change Auditing and Monitoring ............................................................................................................... 3  Maintaining Data Integrity .......................................................................................................................... 4  Self-Service Administration ....................................................................................................................... 5  Conclusion .................................................................................................................................................... 5  About NetIQ .................................................................................................................................................. 6  WHITE PAPER: The Challenges of Administering Active Directory
  • 4. Introduction: Active Directory and Its Central Role in Enterprise Environments Since its availability with Microsoft Windows (Windows) 2000, Microsoft Active Directory (Active Directory) has been used to help organizations administer and secure their Windows environments. As deployment of, and reliance upon, Active Directory in the enterprise has grown, it has increasingly become the central data store for sensitive user data and the gateway to critical business information. This provides organizations with a consolidated, integrated, and distributed directory service, which enables the business to better manage user and administrative access to business applications and services. As Active Directory’s role in the enterprise has drastically increased, so has the need to secure the data it stores and to which it enables access. Unfortunately native Active Directory administration tools provide little control over user and administrative permissions and access. The lack of native control makes the secure administration of Active Directory a challenging task at best for administrators. In addition to limited control over what users and administrators can do in Active Directory, there is a limited ability to report on activities performed in Active Directory which makes it very difficult to meet audit requirements and secure Active Directory. As a result, organizations need assistance in creating repeatable, enforceable processes that will ultimately reduce their administrative overhead, while simultaneously helping increase availability and security of their systems. As an essential part of the IT infrastructure, Active Directory must be thoughtfully and diligently managed—that is, controlled, secured, and audited. Not surprisingly, an application of this importance that has minimal native controls presents management challenges that must be confronted and resolved in order to reduce risk, while deriving maximum value for the business. This paper examines seven of the most challenging administrative tasks in Active Directory. Compliance Auditing and Reporting In the face of diverse regulatory mandates—such as HIPAA, Sarbanes-Oxley, and PCI-DSS—achieving, demonstrating, and maintaining compliance is challenging. To satisfy audit requirements, organizations must be able to demonstrate control over the security of sensitive and business-critical data. However, without additional tools, the ability to demonstrate regulatory compliance with Active Directory natively is time-consuming, tedious, and complex at best. Auditors and stakeholders require detailed information about privileged-user activity. This level of granular information enables interested parties to troubleshoot problems and also provides the information necessary to improve the performance and availability of Active Directory. Auditing and reporting on Active Directory has always been a challenge. Prior to the release of Windows Server 2008, there were no granular reporting capabilities. However, with the release of Windows Server 2008, there is now limited reporting on some of the details auditors require. While this limited information is a move in the right direction, it is not robust enough to meet stringent audit requirements or to support business changes or decisions. To more easily achieve, demonstrate, and maintain compliance, organizations should employ a solution that provides robust, customizable reporting and auditing capabilities. Reporting should provide information on who made a change, what change was made, when the change was made, and where the change was made. Reporting capabilities should be flexible enough to provide graphical trend information for business stakeholders, while also providing granular detail necessary for administrators to improve WHITE PAPER: The Challenges of Administering Active Directory | 1
  • 5. their Active Directory deployment. Solutions should also securely store audit events for as long as necessary to meet data retention requirements and enable the easy search of these audit events. Group Policy Management Microsoft recommends that Group Policy be utilized as a cornerstone of Active Directory security. Leveraging the powerful capabilities of Group Policy, IT organizations can centrally manage and configure user and asset settings, applications, and operating systems from a central console. It is an indispensable resource for managing user access, permissions, and security settings in the Windows environment. Maintaining a large number of Group Policy Objects (GPOs), where policy settings are stored, can be a challenging task. In large IT environments with many systems administrators, for example, special care must be taken because changes made to GPOs can affect every computer or user in a domain in real time; yet Group Policy lacks true change-management and version-control capabilities. Due to the limited native controls available in Group Policy, accomplishing something as simple as deploying a shortcut requires writing a script. Custom scripts are often complex to create and difficult to debug and test. If the script fails or causes disruption in the live environment, there is no way to roll-back to the last known setting or configuration. As you can imagine, the consequences of malicious or unintended changes to Group Policy can have devastating and permanent effects on the IT environment and the business. To prevent Group Policy changes that can negatively impact the business, IT organizations often restrict administrative privilege to a few highly-skilled administrators. As a result, these staff members are tasked and overburdened with administering Group Policy rather than supporting the greater and more strategic goals of the business. To securely leverage the powerful capabilities of Group Policy, it is necessary to have a solution in place that provides a secure offline repository to model and predict the impact of Group Policy changes prior to pushing them live. The ability to plan, control, and troubleshoot Group Policy changes—coupled with an approved change and release management process—enables you to improve the security and compliance of your Windows environment without making business-crippling administrative errors. Organizations should also employ a solution for managing Group Policy that enables easy and flexible reporting that clearly demonstrates that audit requirements have been met. User Provisioning, Re-Provisioning and De-Provisioning Most employees require access to several systems and applications, each with its own account and log- on information. Even with today’s more advanced processes and systems, employees often find themselves waiting for days for access to the systems they need. This can cost organizations directly in lost productivity and employee downtime. To minimize workloads and expedite the provisioning process, many organizations look to Active Directory to be the commanding data store for managing user account information and access rights to IT resources and assets. Provisioning, re-provisioning and de-provisioning access via Active Directory is often a manual process. In the case of a large organization, maintaining appropriate user permissions and access can be an extraordinarily time-consuming activity, especially when the business has significant turnover in personnel. Systems administrators often spend hours creating, modifying, and removing credentials. In a large, complex business, manual provisioning can take days. There are no automation or policy enforcement capabilities natively available in Active Directory. With little to no control in place, there is no WHITE PAPER: The Challenges of Administering Active Directory | 2
  • 6. way to ensure that users will receive the access they need within the timeframe they need it. In addition, there is no system of checks and balances, so administrative errors can easily result in elevated user privileges that can lead to a security breach, malicious activity, or unintended error that can expose the business to significant risk. Organizations should look for an automated solution to execute provisioning activities. Pursuing an automated solution with approval capabilities drastically reduces the time and burden on administrators, improves adherence to security policies by minimizing human interaction with the process, improves standardization, and decreases the time the user must wait for access. It also expedites the removal of user access, which minimizes the ability for a user with malicious intent to access sensitive business data. Secure Delegation of User Privilege Reducing the number of users with elevated administrative privileges is a constant challenge for the owners of Active Directory. Many user and helpdesk requests require interaction with Active Directory. These common interactions with Active Directory often result in administrative privileges for users who do not require elevated access to perform their jobs. Because there are only two levels of administrative access in Active Directory (Domain Administrator access or Enterprise Administrator access), it is very difficult to control what a user can see and do once they have gained administrative privileges. In addition, once a user has acquired powerful administrative capabilities, they can easily access sensitive business and user information, further elevate their privileges, and have the capability to make changes within Active Directory. Elevated administrative privileges, especially when in the hands of someone with malicious intent, dramatically increase the risk exposure of Active Directory and the applications, users, and systems that rely upon it (i.e., Human Resource systems or proprietary business information). It is not uncommon for a business to discover that thousands of users have elevated administrative privileges. Each user with unauthorized administrative privileges presents a unique threat to the security of the IT infrastructure and business. Coupled with the vulnerabilities native to Active Directory, it is very easy for someone to make business-crippling administrative changes. When this occurs, troubleshooting becomes a nightmare, as auditing and reporting limitations discussed earlier in this paper make it nearly impossible to quickly gather a clear picture of the problem. To ultimately reduce the risk associated with elevated user privilege and help ensure that users have access to only the information they require to perform their jobs, organizations should seek a solution that can securely delegate entitlements. This is a requirement to meet separation of duties mandates, as well as a way to share administrative load by securely pushing restricted change privileges out to the less expensive resources. For example, an administrator may wish to delegate the ability to reset passwords to the members of the help desk in order to more quickly resolve user requests and reduce administrative burden. With granular privilege delegation, the help desk would be able to reset passwords but would not have the ability to take other administrative actions in Active Directory, ultimately improving efficiency and reducing business risk. Change Auditing and Monitoring To achieve and maintain a secure and compliant environment, you must control change and monitor for unauthorized change that may negatively impact the business. Active Directory change auditing is an important procedure for identifying and limiting unauthorized changes and errors to Active Directory WHITE PAPER: The Challenges of Administering Active Directory | 3
  • 7. configuration. One single change can put your organization at risk, introducing security breaches and compliance issues. Native Active Directory tools fail to proactively track, audit, report, and alert on vital configuration changes. In addition, real-time auditing and reporting on configuration change (including Group Policy Objects), day-to-day operational change, and critical group change does not exist natively. This exposes the business to exponential risk—as once a change has occurred, your ability to correct and limit the negative impact is completely dependent upon your ability to detect the change that has been made and to pinpoint and troubleshoot the change. A change that goes undetected can have a drastic impact on the business. For example, someone who was able to elevate their privileges and change their identity to that of a senior member of the finance department could potentially access company funds resulting in theft, wire transfers, and so forth. To reduce risk and help prevent security breaches, organizations should employ a solution that provides comprehensive change monitoring. This solution should include real-time change detection, intelligent notification, human-readable events, centralized auditing, and detailed reporting. Employing a solution that encompasses all of these elements will help enable you to quickly and easily identify unauthorized change, pinpoint the source of the change, and efficiently resolve the change before the business is negatively impacted. Maintaining Data Integrity It is important for organizations to ensure that the data housed within Active Directory supports the needs of the business, especially as other business applications further rely on Active Directory for content and information. Data integrity involves both the consistency of data and the completeness of information. For example, there are multiple ways to enter a phone number: • +1.713.418.5555 • 713 418-5555 • 7134185555 • 1-713-418-5555 • (713) 415-5555 Entering data in inconsistent formats creates data pollution. Data pollution inhibits the business from organizing and efficiently accessing important information. Another example of data in-consistency is the ability to abbreviate a department name. Think of all the different ways to abbreviate accounting. If there is not consistency in the data entered in Active Directory, there is no way to ensure that all members of accounting can be organized or grouped together, which can be necessary for payroll, communications, systems access, and so on. Completeness of information is another aspect of data integrity that is necessary for organizations to gain meaningful information from Active Directory. For example, if an employee is transferred to a new department in a new city and state, the HR system in the company would leverage Active Directory to update benefits and payroll information. However, if the administrator did not enter the employees’ zip code, the HR system would not know where to send the employee’s paystub. Active Directory provides no control over content that is entered natively. If no controls are in place, administrators can enter information in any format they wish and leave fields void of information that the business relies upon. WHITE PAPER: The Challenges of Administering Active Directory | 4
  • 8. To help ensure that all aspects of the business that rely upon Active Directory are supported and provided with meaningful and trustworthy information, organizations should employ a solution that controls both the format and the completeness of data entered in Active Directory. By putting these controls in place, you can drastically reduce data pollution and significantly improve the uniformity and completeness of the content in Active Directory. Self-Service Administration Most requests that are made by the business or by users require Active Directory to be accessed and administered. This work is often highly manual and there are few controls in place to prevent administrative errors. Active Directory’s inherent complexity makes administrative errors common—just one mistake could do damage to the entire security infrastructure. Given the lack of controls—and the business cannot have just anyone administering Active Directory. While it may be practical to employ engineers and consultants to install and maintain Active Directory, organizations cannot afford to have their highly-skilled and valuable resources spending the majority of their time responding to menial user requests. Self-service administration and automation are logical solutions for organizations looking to streamline operations, to become more efficient, and to improve compliance. This is achieved by placing controls around common administrative tasks and enabling user requests to be performed without tasking highly- skilled administrators. Organizations should identify processes that are routine yet highly manual, and consider solutions that provide user self-service and automation of the process. Automation of highly- manual processes not only reduces the workload on highly-skilled administrators, it also improves compliance with policies, as automation does not allow for steps in the process to be skipped. Organizations should also look for self-service and automation solutions that allow for approval and provide a comprehensive audit trail of events to help demonstrate policy compliance. Conclusion Active Directory has found its home as a mission-critical component of the IT infrastructure. As businesses continue to leverage it for its powerful capabilities as a commanding repository, Active Directory is a critical component of enterprise security. Therefore, it must be diligently controlled, monitored, administered, and protected with the same degree of discipline currently applied to other high- profile information (e.g., credit card data, customer data, and so forth). Because native tools do not enable or support the secure and disciplined administration of Active Directory, organizations must look for solutions that enable its controlled and efficient administration. These solutions help ensure the business information housed in Active Directory is both secure and appropriately serving the needs of the business. This paper has explored some of the most challenging aspects of securely administering Active Directory. NetIQ provides Active Directory Management and Security solutions that increase your control over Active Directory administration and improve your ability to achieve and maintain compliance. In addition, solutions from NetIQ decrease the cost and complexities associated with administering Active Directory. WHITE PAPER: The Challenges of Administering Active Directory | 5
  • 9. About NetIQ NetIQ is an enterprise software company with relentless focus on customer success. Customers and partners choose NetIQ to cost-effectively tackle information protection challenges and IT operations complexities. Our portfolio of scalable, automated management solutions for Security & Compliance, Identity & Access, and Performance & Availability and our practical, focused approach to solving IT challenges help customers realize greater strategic value, demonstrable business improvement and cost savings over alternative approaches. For more information, visit NetIQ.com.