TCPWave DDI - Network Forensics with Microsoft Active Directory

TCPWave
Introduction

Network and security teams are challenged to find the correlation between the users and the network devices. It is a cumbersome task, and organizations look forward to an optimized solution to bridge the gap. The TCPWave's Microsoft Active Users report bridges the gap and provides greater visibility into devices accessing Microsoft-based services. It helps the administrators and the security teams with how network resources are consumed and by whom, thereby providing comprehensive troubleshooting solutions. This white paper provides insights into the TCPWave IPAM - Microsoft Active Users Report.

TCPWave IPAM - Microsoft Active Users Report

This report provides Active Directory (AD) domain user data whenever the TCPWave appliance is connected to a Microsoft server. Using the report statistics, the network teams can view all the active users currently logged in to AD domain services.

Example: The below screenshot depicts the active users on the Microsoft server:

To view the active users and their related data in the TCPWave IPAM application, navigate to Reports >> DHCP Reports >> Microsoft Active Users Report.

Generating Report
  • Select the organization and Microsoft appliance from the respective drop-downs.
    Note: The drop-down contains the Microsoft appliances defined in the TCPWave IPAM.
  • Click Generate. The following data is displayed in the grid with the searchable and sortable columns:
    • User Name: Displays the name of the user logged into the Microsoft server as a user.
    • IP Address: Displays the IP address of the machine the user logged into.
    • FQDN: Displays the domain name of the Microsoft server that the user is logged into.
    • MAC Address: Displays the MAC address of the client.
    • Threat Level: Displays the green icon if the appliance is not malicious. Red indicates that the appliance is malicious.
    • Created On: Displays the time stamp of the Microsoft user.
    • Updated On: Displays the updated time stamp of the Microsoft user.
    • Last Seen: Displays the time the user was last seen active on the Microsoft server.
  • To view detailed Identity Mapping data of a particular active user, right-click the icon next to the username. The system displays the IPAM details.
Business Advantages
  • Provides the network and security teams greater visibility by relating username information to IP through which they can operate quickly on how to troubleshoot and mitigate the issues using the user-focused approach.
  • Provides historical data through which the security teams can zero in on which devices within a network are involved in the security breach.
  • With the correlation of user information and IP address, the security teams can identify the user responsible for the compromised account.
Conclusion

Network forensic analysis helps the users in gathering, monitoring, and analyzing the network activities to uncover the source of attacks, viruses, intrusions, or security breaches that occur on a network or in network traffic and respond within a minimal time interval, quickly troubleshoot the issues in the instance of any security breach and make effective decisions to improve the network efficiency. For a quick demo, contact the TCPWave Sales Team.