Advanced Threat Analytics provides a solution to help detect advanced attacks such as, Pass the Hash, Ticket and Malware.
7 Days Free Trial Schedule Demo Take Tour DatasheetAdvanced Threat Analytics provides a solution to help detect advanced attacks such as, Pass the Hash, Ticket and Malware.
ATA begins to understand entity behaviors while also automatically adjusting to known and approved changes within the business.
Simple actionable attack timeline to make your job easier, by detailing questionable activities and providing relevant recommendations.
Mobility Support to closely monitor your external assets like devices, as closely as your internal assets.
ATA functions as an appliance, either hardware or virtual. It utilises port mirroring to allow seamless deployment alongside Active Directory without affecting existing network topology.
configured send an email to specific users or groups in your organisation when it detects a suspicious activity.
ATA builds an Organizational Security Graph, which is a map of entity interactions representing the context and activities of the users, devices, and resources.
ATA can be deployed either as an out of band solution by utilizing port mirroring without effecting the existing environment. ATA can also be deployed directly on the domain controllers without the added overhead of additional servers. Once deployed ATA automatically starts analyzing and detecting suspicious activities.
ATA leverages a proprietary network parsing engine to capture and parse network traffic of multiple protocols (such as Kerberos, DNS, RPC, NTLM, and others) for authentication, authorization, and information gathering. This information is collected by ATA via
ATA takes information from multiple data-sources, such as logs and events in your network, to learn the behavior of users and other entities in the organization, and builds a behavioral profile about them. ATA can receive events and logs from
Malicious attack are detected deterministically, by looking for the full list of known attack types including
ATA consists of the following components
An ATA deployment can consist of a single ATA Center connected to all ATA Gateways, all ATA Lightweight Gateways, or a combination of ATA Gateways and ATA Lightweight Gateways.
You can deploy ATA using the following combination of gateways
In all these scenarios, all the gateways send their data to the ATA Center.
-Dilip Joshi
-karan soni
-asma khan
Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats.
Microsoft ATA uses data gathered by on-premise ATA gateways, machine learning, network logs and events as well as past user and device behavior to detect suspicious activity and malicious attacks. ... Microsoft ATA can also detect malicious attacks, including brute force attacks and remote execution.
The ATA Lightweight Gateway supports installation on a domain controller running Windows Server 2008 R2 SP1 (not including Server Core), Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 and Windows Server 2019 (including Core but not Nano
Microsoft Advanced Threat Analytics leverages deep packet inspection technology, as well as information from additional data sources (Security Information and Event Management and Active Directory) to build an Organizational Security Graph and detect advanced attacks in near real time.
The ATA Gateway receives network traffic and Windows Events from your network and processes it in the following main components: Gateway core functionality. Type. Description. Network Listener.
Detect suspicious activity proactively with Microsoft Advanced Threat Analytics Protect your organisation from advanced threat capabilities Advanced Threat Analytics provides a solution to help detect advanced attacks such as, Pass the Hash, Ticket and Malware.
Learn MoreOur Business Email package comes with a storage space of 5GB per account. This is dedicated to file storage and also backs up all your mails on our state of the art infrastructure, making sure you never experience a loss of mails
Includes Office 365, Windows 10 & Enterprise Mobility + Security. Learn More Now. Trusted & Secure. Secure Cloud Service. Intelligent Security. Built For Teamwork. Achieve More Together.
Microsoft Office 365, Exchange Server and G Suite solutions for email signatures, archiving, email utilities & more.
Keep up with the latest blog posts, product updates & offers by signing up to our newsletter.
Top Services
Blog Feeds
Security
XcellHost Cloud Services – a leading Managed Cloud Service Provider since 1999 based out of Mumbai, INDIA. which provides Managed Cloud Services across the globe helping customers manage Public Clouds (AWS, Azure, GCP, Alibaba) + Private clouds to manage the entire Cloud Management Lifecycle i.e Cloud Assessment, Cloud Migration, Cloud Deployment, Cloud Management, Cloud Monitoring, Cloud Security, Cloud DevOps delivered through Cloud-based ServiceDesk + Cloud-based Management Platform. Our SaaS-based Cloud Marketplace Platform helps enterprises consume over 80+ Cloud Services & help them overcome the complexities of Cloud Billing + Provisioning + Reseller Management combined with our 24 x 7 NOC + SOC Services.