June 2017
Beginner to intermediate
742 pages
18h 29m
English
Continuous monitoring and auditing is a must for an identity infrastructure to identify potential security threats and maintain a healthy environment. There are a lot of tools and methods out there to do this, but the success of these solutions depend on the accuracy of detection, the way it presents data, and how it helps identify the root cause.
In this chapter, we started with looking at Windows inbuilt tools and methods which we can use to monitor and audit Active Directory environments. First, we started with GUI tools and then moved to PowerShell-based auditing. Then we looked at Microsoft ATA and how it can help identify security threats in the infrastructure that cannot be detected using traditional tools and methods. Last ...