{"id":4216,"date":"2019-07-10T10:57:28","date_gmt":"2019-07-10T09:57:28","guid":{"rendered":"https:\/\/10.0.10.213\/?page_id=4216"},"modified":"2019-07-10T10:57:30","modified_gmt":"2019-07-10T09:57:30","slug":"symantec-endpoint-threat-defense-for-active-directory","status":"publish","type":"page","link":"https:\/\/sertalink.com\/fr\/symantec-endpoint-threat-defense-for-active-directory\/","title":{"rendered":"Symantec Endpoint Threat Defense for Active Directory"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/etdad-banner.png&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">How do I stop a compromised endpoint from doing greater harm?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">By protecting your Active Directory (AD) environment against malicious use by attackers.<\/h4>\n<p>From the endpoint, Threat Defense for AD effectively controls the attacker\u2019s perception of the organization\u2019s internal resources\u2014all endpoints, servers, users, applications, and locally stored credentials. This solution autonomously learns the organization\u2019s Active Directory structure in its entirety and uses this data to create an authentic and unlimited obfuscation.<\/p>\n<ul>\n<li>Disrupt reconnaissance activity and contain the attack at the point of<br \/>breach<\/li>\n<li>Prevent attackers from using Active Directory to steal credentials and move laterally<\/li>\n<li>Force attackers to give themselves away quickly by creating a false AD environment on the endpoint<\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">How do I shorten dwell time and mean time to containment?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">It takes just 7 minutes for an attacker to obtain complete domain dominance.<\/h4>\n<p>With real time breach visibility and automated attack containment, this solution provides real-time forensics reporting that captures actual reconnaissance, credential theft, and lateral movement phases that were performed by the attacker. Automatic mitigation stops the malicious process on the endpoint to contain the breach.<\/p>\n<ul>\n<li>Full forensic reporting, created within seconds of the alert, provides a snapshot of the endpoint at the time of attack along with full attack chain analysis.<\/li>\n<li>Automated mitigation stops malicious processes at the endpoint, containing the breach in real time to ensure it cannot spawn another process, overwrite another part of memory, run recon commands, or communicate via the network.<\/li>\n<li>See only high-priority, legitimate alerts with automated forensics that scan\u00a0for the right\u00a0information\u00a0only when\u00a0an\u00a0attack\u00a0is\u00a0detected, reducing alert fatigue.<\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">How do I avoid an Active Directory attack?<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecRed textproofleft\">With ongoing and automated attack simulations on your Active Directory environment.<\/h4>\n<p>Threat Defense for AD uses attack simulation technology to continuously probe your domain for misconfigurations, vulnerabilities, and persistence, and presents the Active Directory Administrator their domain from the attacker\u2019s perspective, allowing for immediate risk mitigation to reduce the attack surface.<\/p>\n<ul>\n<li>Identify domain network and Active Directory service vulnerabilities by assessing Active Directory configuration settings and the ways security enhancements are implemented.<span>\u00a0<\/span><\/li>\n<li>Autonomously analyze the domain network and Active Directory structure for back doors, persistence hooks, and other openings that allow attackers to come back any time.<\/li>\n<li>Get alerts on misconfigurations and back doors that include recommendations for remediation.<\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_image align=&#8221;center&#8221; src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/etdad-2.png&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<h3 class=\"textproofleft\">Upgrade to Symantec Complete Endpoint Defense\u2014Active Directory Protection<\/h3>\n<p>Need to protect active directory for more complete endpoint defense? Only from us. Select a suite with the right level of endpoint defense for your organization.<\/p>\n<ul>\n<li>Broaden your defense with additional prevention, detection, remediation, and additional hardening technologies.<\/li>\n<li>Utilize interlocking defenses at the device, the app, and the network level.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"multipleCTAs parbase\"><\/div>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>How do I stop a compromised endpoint from doing greater harm? By protecting your Active Directory (AD) environment against malicious use by attackers. From the endpoint, Threat Defense for AD effectively controls the attacker\u2019s perception of the organization\u2019s internal resources\u2014all endpoints, servers, users, applications, and locally stored credentials. This solution autonomously learns the organization\u2019s Active [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-4216","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symantec Endpoint Threat Defense for Active Directory | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/fr\/symantec-endpoint-threat-defense-for-active-directory\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symantec Endpoint Threat Defense for Active Directory | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/fr\/symantec-endpoint-threat-defense-for-active-directory\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-10T09:57:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-threat-defense-for-active-directory\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-threat-defense-for-active-directory\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/fr\/#website\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-threat-defense-for-active-directory\/#webpage\",\"url\":\"https:\/\/sertalink.com\/symantec-endpoint-threat-defense-for-active-directory\/\",\"name\":\"Symantec Endpoint Threat Defense for Active Directory | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#website\"},\"datePublished\":\"2019-07-10T09:57:28+00:00\",\"dateModified\":\"2019-07-10T09:57:30+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/symantec-endpoint-threat-defense-for-active-directory\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-threat-defense-for-active-directory\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/symantec-endpoint-threat-defense-for-active-directory\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/4216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=4216"}],"version-history":[{"count":0,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/4216\/revisions"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=4216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}