Top 10 indicators of active directory admin accounts tampering

A Randy Franklin Smith white paper

Published June 2016

When it comes to your Windows infrastructure, you need to plan for Active Directory (AD) breaches and misuse and then devise ways to limit the impact of external attackers and internal threats. If someone can gain elevated access, they can obviously move through your network much faster and more freely. So being vigilant to signs of Windows elevated account abuse or tampering is crucial.

But there are many levels in “the stack” where elevated authority can be obtained, and there are many ways to obtain it. In this paper, we explore both these dimensions of elevated authority risks and show you how to detect and respond to each.