Windows Account Usage

User account information can be collected and audited. Tracking local account usage can help detect Pass the Hash activity and other unauthorized account usage. Additional information such as remote desktop logins, users added to privileged groups, and account lockouts can also be tracked. User accounts being promoted to privileged groups should be audited very closely to ensure that users are in fact supposed to be in a privileged group. Unauthorized membership in privileged groups is a strong indicator that malicious activity has occurred. Lockout events for domain accounts are generated on the domain controller whereas lockout events for local accounts are generated on the local computer.
AIS Managed SIEM

Explore our Solutions

AIS delivers a wide range of technology solutions, managed services, and consulting services that allow businesses to compete in today’s market. Whether deploying AIS solutions or other best-of-breed tools, the experienced, reliable AIS team delivers projects on time while streamlining IT services.
Headphones

AIS Labs

AIS offers a variety of technology solutions leveraging enterprise open-source software, developed and maintained by AIS engineers. These include AIS Managed Firewall, NMS, SIEM, and VoIP.

computer illustration

Managed Services

Partner with our experienced team for peace of mind when it comes to your IT needs. AIS offers proactive, ongoing IT support and maintenance, including regular monitoring, break/fix support, preventive maintenance, software upgrades and more.

Headphones

Consulting

Leverage our team of experts for on-demand consulting and project-based support. AIS can advise on and support all of your urgent and critical IT projects, from upgrades and migrations to departmental IT budgets and information security.

AIS offers top-notch security solutions to keep your business safe from potential breaches. Don't leave your data vulnerable - partner with AIS for peace of mind.

Last modified September 14, 2021