<!– wp:acf/campaign-overview { "id": "block_607440f29fa9f", "name": "acf\/campaign-overview", "data": { "heading": "Active Directory Audit Tool", "_heading": "field_5f11c71007880", "body_text": "Specops Password Auditor is a freeware utility that scans Active Directory for breached passwords, weak password policies, and stale accounts.\r\n\r\nIdentify security weaknesses related to user accounts and passwords. Find users with administrator privileges, inactive accounts, and expired passwords. The results can help you fix any violations to your security policy by detecting groups of user accounts that have the same password. Surprisingly, this can be common if a Windows administrator is using the same password for both privileged and day-to-day accounts.\r\n\r\nOur Active Directory audit tool is free and runs on Windows Server 2008 and later.”, “_body_text”: “field_5f11c95007881”, “image”: “”, “_image”: “field_5f11ca1907882”, “form_heading”: “Free Tool for SysAdmins”, “_form_heading”: “field_5f20434ba807c”, “form_body_text”: “Specops Password Auditor is read-only and does not store or send your Active Directory data.”, “_form_body_text”: “field_5f204361a807d”, “form_html”: “”, “_form_html”: “field_5f2043a6a807e” }, “align”: “”, “mode”: “auto” } /–>
specops password auditor interface

How to Audit Active Directory

If Active Directory security audits are a part of your ongoing IT operations, you’ve likely developed a methodology to evaluate your risks. With the sophistication of cyberattacks growing, you must rely on auditing tools to support your security plan. While there is no single tool or formula that can help you win the battle against cybercrime, your security risks can be distilled into a minority of vulnerabilities creating the majority of problems.

What are the top security threats facing your organization? It is a well-known fact that users reuse passwords across different systems. It is also common for applications to require corporate email addresses as the username. The duplication of corporate credentials on external systems is a serious threat facing IT departments.

<!– wp:acf/campaign-image-text { "id": "block_60705e9e008bf", "name": "acf\/campaign-image-text", "data": { "image_text_0_background_color": "bg-white", "_image_text_0_background_color": "field_5f11cda811233", "image_text_0_layout_distribution": "half-width", "_image_text_0_layout_distribution": "field_5f11d09811237", "image_text_0_content_image": 15420, "_image_text_0_content_image": "field_5f15e14246c93", "image_text_0_content_caption": "", "_image_text_0_content_caption": "field_5f1afc0f05ab5", "image_text_0_content_caption_source": "", "_image_text_0_content_caption_source": "field_5f1afd65293a9", "image_text_0_content_heading": "Active Directory Audit Results ", "_image_text_0_content_heading": "field_5f15e10d46c91", "image_text_0_content_body_text": "Are dormant accounts causing issues? Perhaps password policies aren't meeting the NIST compliance requirements. Specops Password Auditor can shed light on these issues.\r\n\r\nThe Active Directory audit results include several interactive reports for you to explore as well as an exportable executive summary PDF report you can share with decision makers who may not share your technical background. The report includes the following:\r\n
    \r\n \t
  • Breached passwords (and their corresponding users)\r\n \t
  • Identical passwords (and matching users)\r\n \t
  • Admin account names, and stale variants\r\n \t
  • Accounts with expired passwords\r\n \t
  • Various password policies according to users, roles, and security\r\n \t
  • Password policy usage and compliance (pass, caution, fail)\r\n”, “_image_text_0_content_body_text”: “field_5f15e11a46c92”, “image_text_0_content”: “”, “_image_text_0_content”: “field_5f15e0e146c90”, “image_text”: 1, “_image_text”: “field_5f11cb0d11231” }, “align”: “”, “mode”: “auto” } /–>

    Features


    • Overview of password policies including change interval, dictionary enforcement, as well as relative strength
    • Identify accounts using leaked passwords
    • Identify user accounts without a minimum password length requirement
    • Identify dormant user accounts
    • Password expiration reports to curb password-related helpdesk calls
    • Use standalone or integrate with Specops Password Policy
    • Export report data to CSV for further processing
    • Generate an executive summary PDF report to share your results with decision makers

    About Specops Software

    Specops Software is the leading provider of password management and authentication solutions. Specops protects your business data by blocking weak passwords and securing user authentication. With a complete portfolio of solutions natively integrated with Active Directory, Specops ensures sensitive data is stored on-premises and in your control. Every day thousands of organizations use Specops Software to protect business data.