OS support: VM must be a new WINDOWS SERVER 2012 R2 Standard or SERVER 2012 R2 Datacenter, NOT an eval version.
2 CPUs.
8GB of RAM.
200 GB free hard drive space for application (same or different drive).
From the endpoint, Threat Defense for AD effectively controls the attacker’s perception of the organization’s internal resources—all endpoints, servers, users, applications, and locally stored credentials. This solution autonomously learns the organization’s Active Directory structure in its entirety and uses this data to create an authentic and unlimited obfuscation.
With real time breach visibility and automated attack containment, this solution provides real-time forensics reporting that captures actual reconnaissance, credential theft, and lateral movement phases that were performed by the attacker. Automatic mitigation stops the malicious process on the endpoint to contain the breach.
Threat Defense for AD uses attack simulation technology to continuously probe your domain for misconfigurations, vulnerabilities, and persistence, and presents the Active Directory Administrator their domain from the attacker’s perspective, allowing for immediate risk mitigation to reduce the attack surface.
Need to protect active directory for more complete endpoint defense? Only from us. Select a suite with the right level of endpoint defense for your organization.
OS support: VM must be a new WINDOWS SERVER 2012 R2 Standard or SERVER 2012 R2 Datacenter, NOT an eval version.
2 CPUs.
8GB of RAM.
200 GB free hard drive space for application (same or different drive).
OS support: Win7+/Server 2008+
Min Ram: 4GB
Disk Space: Minimum 10MB