NEW Stealthbits Module: The Active Directory Permissions Analyzer

Stealthbits has launched a new StealthAUDIT Active Directory Permissions Analyzer Module. It provides advanced analysis and reporting on AD activity.

 

What’s Stealthbits?

Stealthbits not only protects an organisation’s sensitive data, but the credentials used to access that data. It removes inappropriate data access, enforces security policies, and detects advanced threats.

Stealthbits covers three main areas:

  • Data access and governance
  • Active Directory security
  • Privileged access management

 

What’s StealthAUDIT?

StealthAUDIT is a management platform designed by Stealthbits. Simply put, it offers a fresh perspective on your data, allowing you to derive key information about how and where it’s being accessed. The platform automates the collection and analysis of the data you need to answer complex questions regarding the management and security of critical IT assets.

StealthAUDIT contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms.

A brand new module has been added to the platform: the StealthAUDIT Active Directory Permissions Analyzer.

 

Tell me more?

The Active Directory is a directory service developed by Microsoft for Windows domain networks. It stores information about objects on the network and makes this information easy for administrators and users to access.

Convenient? Sure. Active Directory is always authenticating users and granting access to connected resources. But as helpful and efficient this is, sometimes users gain too much access by accident, which can compromise Active Directory security.

The Active Directory Permissions Analyzer module provides you with key information about the permissions available to specific users and what they’re able to do with those capabilities.

 

How can the StealthAUDIT Active Directory Permissions Analyzer protect my organisation?

  • Shadow access rights. Users can proactively identify attack paths that bad actors can take to move laterally, escalate privileges, compromise domains, and gain access to confidential data.
  • User object permissions. Users can pinpoint instances where permissions are applied to Active Directory user objects. This ensures that information isn’t read, written or deleted without authorisation.
  • Group membership change permissions. Users can understand which trustees can change the membership of Active Directory group objects.
  • Group object permissions. Users can identify instances where permissions are applied to Active Directory group objects.
  • OU permissions. Users can quickly analyse and report on where permissions are applied to Active Directory organisational units.
  • Computer permissions. Users can identify instances where permissions are applied to Active Directory computer objects. This helps to pinpoint rogue computer devices on the network.
  • Open access permissions. Users can assess instances of open access on AD objects.
  • Broken inheritance in AD permissions. Users can gain immediate insight into instances of broken inheritance on Active Directory objects.
  • AdminSDHolder permissions. Users can determine what permissions exist on the AdminSDHolder container within AD. If a breach occurs, the AdminSDHolder container can be exploited by an attacker to achieve persistence in an environment.
  • Domain replication permissions. Users can identify and track which accounts can replicate Active Directory information.
  • DCShadow permissions report. Users can identify accounts that have the capability of launching a DCShadow attack. This is when attackers create a fake domain controller in order to get access to AD resources.

 

Do you want to learn more about who can access what in your Active Directory?

Are you an existing StealthAUDIT user and are keen to add this module to your platform?

Let’s talk!

Our expert team is more than happy to discuss the technology in more detail and highlight how it can meet your organisation’s unique needs.

Get in touch with us today to learn more.

Jan 20 2026

Join Us in Supporting the Great Gloucestershire Mouse Hunt

Core to Cloud is proud to support the Great Gloucestershire Mouse Hunt, a county-wide campaign collecting essential computer peripherals to help improve access to...
Jan 14 2026

From Defence to Resilience: A Strategic Framework for Ransomware Preparedness

Ransomware has evolved into a highly organised and commercially driven threat, capable of bypassing traditional cyber security controls. As attacks become more...
Nov 11 2025

Core to Cloud Partners with The ITSA Digital Trust to Empower Digital Inclusion and Support Sustainable Technology

At Core to Cloud, we’ve always believed that technology should make a positive difference by protecting people, enabling innovation, and building a more inclusive...
Oct 27 2025

Human-led, AI-Enhanced MDR: Rethinking the Balance of People and Technology

By Phil Howe, CTO at Core to Cloud It’s getting colder and wetter outside, and to some the security landscape may feel more complex than ever. Threat actors are faster,...
Oct 22 2025

From Warning to Action: The NCSC Calls on UK Organisations to Build Resilience

In its 2025 Annual Review, the UK’s National Cyber Security Centre (NCSC) issued one of its clearest warnings to date: organisations must prepare for a day when their...
Jun 25 2025

Think You’re Ready for a Cyberattack? Prove It.

In the face of increasing cyber threats, most organisations have invested heavily in technology - firewalls, antivirus, endpoint protection, and cloud security. But...
Jun 13 2025

Secure & Strong Partners with Women in Tech & Cyber Hub (WITCH)

At Core to Cloud, we believe the future of cybersecurity is inclusive, empowering, and community-driven. That’s why we’re proud to announce a meaningful new partnership...
Jun 13 2025

Core to Cloud Expands Strategic Partnership with Vectra AI to Strengthen 24/7 SOC Capabilities

Cirencester, UK, 13 June 2025: Core to Cloud, a leading UK-based provider of cybersecurity services, is deepening its strategic partnership with Vectra AI, the...
May 19 2025

Supply Chain Cyberattacks: Lessons from a Retail Incident

In early May 2025, the UK retail sector experienced a wake-up call. A ransomware attack targeting a retailer’s IT infrastructure disrupted supply chains, impacted...
Mar 14 2025

Rev Up Your Security: Why Cybersecurity is a High-Speed Race, Not a Sunday Drive

Picture this: You’re on the starting grid. The engines roar. The stakes are high. In the relentless Grand Prix of cybersecurity, there’s no cruising—only speed,...

Trusted by CISOs and IT teams at over 150 organisations