
“Hey buddy, can you give me admin rights so I can finish these changes?”
Sounds like a pretty common quote you might hear in your organization, right? It happens all the time, but is a poor security practice. Giving out privileges presents an unnecessary attack vector, since change control and the revocation of these privileges is rarely performed after they are assigned. The question becomes, though, if this does occur, how can you stop it—or at least monitor it? BeyondTrust’s PowerBroker Auditing & Security Suite provides centralized real-time change auditing and monitoring for Microsoft’s Active Directory, file systems, Exchange, SQL, and NetApp filers. The solution helps to establish and enforce entitlements across the Windows infrastructure by documenting when changes occur by attribute, asset, and user to alert, report, and even deny, when changes occur; authorized or not. Auditors, security professionals, and information technology professionals can mitigate the risks of unwanted changes and better understand user activity to meet compliance requirements – and eliminate friends helping friends do “bad things.” The PowerBroker Auditing and Security Suite is available in three editions based on the most important drivers to achieving your auditing and protection needs:- Essentials Edition: Provides complete auditing and protection for Active Directory, and satisfies the primary use case we are discussing.
- Advanced Edition: Extends auditing to File Systems, and provides entitlement reporting for Active Directory and File Systems to ensure friends don’t help friends inappropriately modify or access files.
- Ultimate Edition: Provides complete protection of the Windows environment with the addition of Microsoft Exchange and Microsoft SQL auditing and reporting. This helps make sure friends don’t tamper with email or critical databases containing sensitive information.

Morey J. Haber, Chief Security Officer, BeyondTrust
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.