Home Security Sense of Security launches new free Active Directory Recon tool

The tool provides businesses with important insights to help them meet compliance standards and identify security threats, "which is necessary now more than ever in the wake of the Notifiable Data Breaches Scheme."

Cybersec firm Sense of Security has launched its new Active Directory Recon Tool, ADRecon

The tool extracts information from the Active Directory (AD) and "generates a cohesive report in Microsoft Excel, providing businesses with valuable information regarding the effectiveness of their AD configuration".

We're reminded that "Weak passwords, unauthorised user access, outdated/dormant user accounts and weak policies are all common catalysts for security breaches," and that "ADRecon will help organisations identify these shortcomings and address any compliance issues present in the directory".

The company also states ADRecon "makes it convenient for security professionals to access information pertaining to their AD environment, by providing a generated raw report, as well as visual aids such as graphs which summarise valuable information to assists CIOs in making security decisions".

ADRecon highlights include:

  • The tool extracts information from a user’s Active Directory (AD) and generates a report in Microsoft Excel, outlining the effectiveness of a business’ AD configuration.
  • ADRecon helps organisations identify shortcomings such as weak passwords, unauthorised user access and dormant user accounts, which are all common catalysts for cyber attacks.
  • Compliance issues such as generic accounts and lockout policies, dormant users and users whose passwords are stored with reversible encryption can all be identified by the reports
  • The tool is extremely simple to use and can even be used by people with a non-IT background, such as the CEO.

Prashant Mahajan, the tool author and Consultant at Sense of Security said the tool will add invaluable convenience to security professionals, including IT administrators and CIOs.

Mahajan continued: We wanted to make this tool as easy as possible to use, which is why there are no complex steps involved - even somebody with a non-IT background such as the CEO can run the script.

“Being able to access a holistic view of your AD environment will help businesses save time, money, and assist them in identifying potential security threats before a hack occurs. This will prove to be particularly useful since the introduction of the Notifiable Data Breaches Scheme, which puts threat identification and security at the forefront of the law.”

ADRecon "gathers the information using read-only queries and the report generated can assist with identifying issues regarding user accounts, privileges and host management. This can be used to discover deficiencies, enabling remediation and serving as evidence to demonstrate compliance requirements are met.

"Compliance issues such as generic accounts and lockout policies, dormant users, and users whose passwords are stored with reversible encryption can all be identified by the ADRecon reports. This information can then be used to tidy up an Active Directory, by removing users, computers and DNS records no longer required."

More information on the tool and the ability to download a free copy is here


With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Alex Zaharov-Reutt

One of Australia’s best-known technology journalists and consumer tech experts, Alex has appeared in his capacity as technology expert on all of Australia’s free-to-air and pay TV networks on all the major news and current affairs programs, on commercial and public radio, and technology, lifestyle and reality TV shows. Visit Alex at Twitter here.


Popular News




Sponsored News