0% found this document useful (0 votes)
167 views12 pages

Project Name: Multifactor Authentication For Users and Log Analysis

This document discusses implementing multifactor authentication (MFA) for user logins and log analysis. It introduces MFA and how it provides an additional layer of security beyond just a username and password by requiring a second form of authentication. The document outlines some technical and business challenges to consider for MFA implementation. It then discusses why MFA is needed to prevent unauthorized access and protect against various attack types. The document describes how MFA can help provide offline access and protect privileged accounts and RDP connections. It explains how MFA works and the benefits it provides like improved security. Finally, it mentions some limitations and references additional resources.

Uploaded by

Andrew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views12 pages

Project Name: Multifactor Authentication For Users and Log Analysis

This document discusses implementing multifactor authentication (MFA) for user logins and log analysis. It introduces MFA and how it provides an additional layer of security beyond just a username and password by requiring a second form of authentication. The document outlines some technical and business challenges to consider for MFA implementation. It then discusses why MFA is needed to prevent unauthorized access and protect against various attack types. The document describes how MFA can help provide offline access and protect privileged accounts and RDP connections. It explains how MFA works and the benefits it provides like improved security. Finally, it mentions some limitations and references additional resources.

Uploaded by

Andrew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Project Name

MULTIFACTOR AUTHENTICATION
FOR USERS AND LOG ANALYSIS
Introduction
Multifactor Authentication offers Endpoint for Windows logins. With Endpoint
MFA in place, users are first authenticated through Active Directory (AD)
domain credentials, and next through one of the supported authentication
techniques such as one-time passwords (OTPs) sent via SMS . So even if a
hacker steals user credentials, they still need access to the second factor: the
users mobile phone.
MFA Challenges
Technical challenges to consider:
- Hardware and Software requirements .
- Implementation, training and maintenance .
- Scalability , High availability and Disaster recovery .
- Post administration , device and user management .
- Reporting .
Business Challenges:
- The business thinks that there’s never any security breach ,there’s no need for it.
- Supporting feature already in place, are new one required?
- Ongoing maintenance and training.
Why do we need it?
- Prevent unauthorized users from logging into your account.
- Protect your identity.
- Protect your data.
- If username and password are compromised, MFA will protect from login.
- MFA protect from Phishing, Brute-force, Man in The Middle attack, Keylogger etc.
How it can help you?
Offline Access –
Offline Multi-Factor Authentication Secure On-Premise Hosting . No internet connection is needed.
MFA for Windows users-
Not connected to the LAN Protect access to any machine even when disconnected from the corporate
network.
MFA for All Users-
Including Privileged Accounts Protect workstation and server connections from even the most privileged
system and admin accounts.
MFA and Remote Desktop(RDP) Connections-
Enable MFA on all RDP logons, or for every RDP logon from outside the corporate network – including RD
Gateway connections.
How does MFA work?
It is important to clarify that there are two types of MFA:
Device MFA: An authentication process that implements MFA directly at the point of login to a
system.
Application MFA: An authentication process that implements MFA upon attempting to gain
access to one or more applications .
MFA works in roughly the same manner for both types. As the user attempts to gain access to a
particular resource, they are challenged to input multiple authentication factors, rather than just
one. The user credentials are then verified by a core identity provider (IdP) or directory services
platform. Once authenticated, the user gains access to the requested resource.
Benefits
- Improve security
- Decreasing identities becoming compromised
- Simplification on login process
- MFA is essential component of cybersecurity
Limitations
- Usability
- Cost
- Technical gaps
- Complexity
- Backup options
- Lack of bandwidth
- Varying risks
- Finding the right MFA solution
Result
Multi-factor authentication is designed to prevent unauthorized users from gaining access to an
account with nothing more than a stolen password. Users may be at greater risk of compromised
passwords than they realize, particularly if they use the same password on more than one
website. Downloading software and clicking on links in emails can also expose an individual to
password theft.

 
References
- Documentation of Adself service and Microsoft Active directory service
- Google.com
- https://ieeexplore.ieee.org/document/6997526
- https://transmitter.ieee.org/passwords-multi-factor-authentication-and-cybersecurity/
-VNI Cisco Global Mobile Data Traffic Forecast 2016–2021. White Paper, 2017. Available online:
https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-indexvn
i/complete-white-paper-c11-481360.pdf

You might also like