dcsimg

Securing AD for Hybrid Cloud Environments

  • Securing AD for Hybrid Cloud Environments-

    Detect and Alert Suspicious Changes

    Step 2: Detect and alert suspicious changes at all user levels.

    Businesses should have a system in place to automatically detect and notify the IT administrator when suspicious changes occur. These might include anything from password changes by non-owners, membership changes on privileged groups, a mass deletion of accounts to multiple failed logons followed by successful logons to domain controllers.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Securing AD for Hybrid Cloud Environments

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • Securing AD for Hybrid Cloud Environments-3

    Detect and Alert Suspicious Changes

    Step 2: Detect and alert suspicious changes at all user levels.

    Businesses should have a system in place to automatically detect and notify the IT administrator when suspicious changes occur. These might include anything from password changes by non-owners, membership changes on privileged groups, a mass deletion of accounts to multiple failed logons followed by successful logons to domain controllers.

Adoption of cloud services has undeniably soared, with Microsoft calling Office 365 its fastest growing commercial product ever, and more than 70 percent of Fortune 500 companies now using at least two different Microsoft cloud services. However, while organizations are actively deploying more cloud applications, they are also keeping on-premises solutions, creating a hybrid environment of both on-premises and cloud-based applications.

To manage employee authentication, identity management and access control policies across hybrid environments, companies often leverage the Azure Active Directory (AD) Connect management tool, which performs a one-way sync from on-premises AD to the online Azure AD. The problem is that on-premises AD does not include the same types of security controls that the cloud-based version does, leaving a big hole in an organization's security program that exposes the business to risk.

In this slideshow, Alvaro Vitta, principal solutions consultant specializing in security at Quest Systems and Information Management, recommends six steps for organizations to strengthen their hybrid directory environment to ensure successful hybrid cloud environment performance.