{"id":1641,"date":"2025-05-20T14:42:57","date_gmt":"2025-05-20T12:42:57","guid":{"rendered":"https:\/\/staging.ubm-global.com\/wordpress\/?page_id=1641"},"modified":"2025-06-26T08:55:07","modified_gmt":"2025-06-26T06:55:07","slug":"pingcastle","status":"publish","type":"page","link":"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/","title":{"rendered":"PINGCASTLE"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1641\" class=\"elementor elementor-1641\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7515e314 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"7515e314\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3832e30d\" data-id=\"3832e30d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e8731bc elementor-widget elementor-widget-heading\" data-id=\"3e8731bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Netwrix Active Directory Risk Assessment (PingCastle)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b07420c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5b07420c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sicherer. Transparenter. AD-optimiert.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71341295 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71341295\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e183992\" data-id=\"1e183992\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7a408a12 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a408a12\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-74691adb\" data-id=\"74691adb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3035ab88 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3035ab88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Warum Active Directory Risk Assessment?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dc3e30 elementor-widget elementor-widget-text-editor\" data-id=\"6dc3e30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFalsche AD-Konfigurationen, verwaiste Konten oder unsichere Zugriffspfade bieten Angriffsfl\u00e4chen f\u00fcr Kriminelle. Das Risk Assessment-Tool von Netwrix (PingCastle) erkennt Schwachstellen in Ihrem Active Directory und Entra ID, bevor sie ausgenutzt werden \u2013 damit Sie gezielt gegensteuern und den Sicherheitsstandard steigern \n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-42b7e9e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42b7e9e9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-419d6aec\" data-id=\"419d6aec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-428a2fca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"428a2fca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6eabef8f\" data-id=\"6eabef8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a53782 jkit-equal-height-disable elementor-widget elementor-widget-jkit_icon_box\" data-id=\"3a53782\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-icon-box icon-position-left elementor-animation- jeg_module___69f26bab3dece\" ><div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-header elementor-animation-\"><div class=\"icon style-color\"><\/div><\/div><div class=\"icon-box icon-box-body\">\n                <h4 class=\"title\">Komplett-Scan Ihrer AD-Topographie<\/h4><p class=\"icon-box-description\">Erfassen Sie Ihre gesamte Dom\u00e4nen-Infrastruktur \u2013 inklusive alter Domain-Controller oder Fehlkonfigurationen \u2013 und eliminieren Sie \"Blind Spots\" proaktiv \n<\/p>\n            <\/div>\n            \n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e8f6178 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7e8f6178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"jki jki-arrow-up-right-line\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6d97b200 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d97b200\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-49ffebc2\" data-id=\"49ffebc2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-645d01fc jkit-equal-height-disable elementor-widget elementor-widget-jkit_icon_box\" data-id=\"645d01fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-icon-box icon-position-left elementor-animation- jeg_module__1_69f26bab3f08b\" ><div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-header elementor-animation-\"><div class=\"icon style-color\"><\/div><\/div><div class=\"icon-box icon-box-body\">\n                <h4 class=\"title\">Klare Handlungsempfehlungen<\/h4><p class=\"icon-box-description\">Step-by-Step-Anleitung hilft Ihnen, Risiken systematisch zu reduzieren \u2013 vom Passwortschutz bis zur GPO-Hygiene \n\n<\/p>\n            <\/div>\n            \n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362b3690 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"362b3690\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"jki jki-arrow-up-right-line\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-15d0327\" data-id=\"15d0327\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6ece6b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ece6b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3ba539f\" data-id=\"3ba539f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-843f7a5 jkit-equal-height-disable elementor-widget elementor-widget-jkit_icon_box\" data-id=\"843f7a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-icon-box icon-position-left elementor-animation- jeg_module__2_69f26bab40132\" ><div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-header elementor-animation-\"><div class=\"icon style-color\"><\/div><\/div><div class=\"icon-box icon-box-body\">\n                <h4 class=\"title\">Risiko-Scores &amp; Priorit\u00e4ten<\/h4><p class=\"icon-box-description\">\u00dcber 150 AD-Sicherheitsindikatoren bewertet nach MITRE ATT&amp;CK\u2122 und ANSSI. So fokussieren Sie genau auf gef\u00e4hrliche Schwachstellen \n\n<\/p>\n            <\/div>\n            \n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9e06a8 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"b9e06a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"jki jki-arrow-up-right-line\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9553a27 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9553a27\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-56ce7fa\" data-id=\"56ce7fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73cc82f jkit-equal-height-disable elementor-widget elementor-widget-jkit_icon_box\" data-id=\"73cc82f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-icon-box icon-position-left elementor-animation- jeg_module__3_69f26bab4121b\" ><div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-header elementor-animation-\"><div class=\"icon style-color\"><\/div><\/div><div class=\"icon-box icon-box-body\">\n                <h4 class=\"title\">Kontinuierliche \u00dcberwachung<\/h4><p class=\"icon-box-description\">Monitoring-Workflows mit w\u00f6chentlichen Scans zeigen Fortschritte und sichern Ihnen langfristig eine saubere, sichere AD-Umgebung \n<\/p>\n            <\/div>\n            \n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-093be80 elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"093be80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"jki jki-arrow-up-right-line\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7119feae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7119feae\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6323fc2e\" data-id=\"6323fc2e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4538b02e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4538b02e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4ff04a3e\" data-id=\"4ff04a3e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42334d0d elementor-widget elementor-widget-jkit_heading\" data-id=\"42334d0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-heading  align-left align-tablet- align-mobile- jeg_module__4_69f26bab44921\" ><div class=\"heading-section-title  display-inline-block\"><h2 class=\"heading-title\">Jetzt Netwrix Auditor erleben<\/h2><\/div><div class=\"heading-section-description\">Fordern Sie eine kostenlose Demo an oder werfen Sie einen Blick ins [Datenblatt].<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c2a0b90 elementor-widget elementor-widget-jkit_button\" data-id=\"5c2a0b90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-button  icon-position-after jeg_module__5_69f26bab46c6a\" ><a href=\"\" class=\"jkit-button-wrapper\">Let&#039;s Discuss your project<i aria-hidden=\"true\" class=\"jki jki-arrow-up-right-line\"><\/i><\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1964c806\" data-id=\"1964c806\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-456dd9bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"456dd9bb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42799554\" data-id=\"42799554\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3b3f322e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b3f322e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-74190797\" data-id=\"74190797\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3237b9ae elementor-widget elementor-widget-heading\" data-id=\"3237b9ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vollst\u00e4ndige AD-Sicherheit, auf einen Blick.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-63c0bba0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63c0bba0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3f1781f8\" data-id=\"3f1781f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75e7ca98 jkit-equal-height-disable elementor-widget elementor-widget-jkit_icon_box\" data-id=\"75e7ca98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-icon-box icon-position-left elementor-animation-float jeg_module__6_69f26bab48760\" ><div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-header elementor-animation-float\"><div class=\"icon style-color\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/div><\/div><div class=\"icon-box icon-box-body\">\n                <h4 class=\"title\">Agentenloser AD-Scan \u00fcber PingCastle<\/h4><p class=\"icon-box-description\">Ermittelt Struktur, Probleme und Schwachstellen \u2013 ohne Installation \n<\/p>\n            <\/div>\n            \n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-505c151f jkit-equal-height-disable elementor-widget elementor-widget-jkit_icon_box\" data-id=\"505c151f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-icon-box icon-position-left elementor-animation-float jeg_module__7_69f26bab49979\" ><div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-header elementor-animation-float\"><div class=\"icon style-color\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/div><\/div><div class=\"icon-box icon-box-body\">\n                <h4 class=\"title\">Empfehlungen &amp; Schritt-f\u00fcr-Schritt-Anleitungen<\/h4><p class=\"icon-box-description\">Handlungsleitf\u00e4den f\u00fcr alle gefundenen Risiken \u2013 klar, strukturiert, umsetzbar .\n<\/p>\n            <\/div>\n            \n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-33f3f004\" data-id=\"33f3f004\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5cc9515b jkit-equal-height-disable elementor-widget elementor-widget-jkit_icon_box\" data-id=\"5cc9515b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-icon-box icon-position-left elementor-animation-float jeg_module__8_69f26bab4ab8f\" ><div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-header elementor-animation-float\"><div class=\"icon style-color\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/div><\/div><div class=\"icon-box icon-box-body\">\n                <h4 class=\"title\">Rating-Dashboard &amp; Vergleich mit Standards<\/h4><p class=\"icon-box-description\">Scores visualisiert, nach SS, ANSSI etc., zur Priorisierung von Ma\u00dfnahmen \n<\/p>\n            <\/div>\n            \n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5538fd29 jkit-equal-height-disable elementor-widget elementor-widget-jkit_icon_box\" data-id=\"5538fd29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-icon-box icon-position-left elementor-animation-float jeg_module__9_69f26bab4bd76\" ><div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-header elementor-animation-float\"><div class=\"icon style-color\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg><\/div><\/div><div class=\"icon-box icon-box-body\">\n                <h4 class=\"title\">Regelm\u00e4\u00dfige Scans &amp; Trendverfolgung<\/h4><p class=\"icon-box-description\">Verfolgen Sie Verbesserungen Ihrer AD-Hygiene \u2013 ideal f\u00fcr IT-Compliance und Reporting .\n<\/p>\n            <\/div>\n            \n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-188134c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"188134c9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d6bb4ad\" data-id=\"3d6bb4ad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6ef39769 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ef39769\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-706c55a9\" data-id=\"706c55a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-280e0680 elementor-widget elementor-widget-heading\" data-id=\"280e0680\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jetzt AD-Governance verbessern\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2106ad51 elementor-widget elementor-widget-jkit_button\" data-id=\"2106ad51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-button  icon-position-after jeg_module__10_69f26bab4ca66\" ><a href=\"https:\/\/staging.ubm-global.com\/wordpress\/testen\/\" class=\"jkit-button-wrapper\">Risk Assessment anfordern<i aria-hidden=\"true\" class=\"jki jki-arrow-up-right-line\"><\/i><\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1db6c33\" data-id=\"1db6c33\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79cce8ff elementor-widget elementor-widget-text-editor\" data-id=\"79cce8ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOptimieren Sie Ihre Active Directory-Sicherheit \u2013 starten Sie mit einem unverbindlichen Risk Assessment und erhalten Sie klare Ergebnisse.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5bb2168f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5bb2168f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15460068\" data-id=\"15460068\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-270ca7fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"270ca7fe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-58af0ac5\" data-id=\"58af0ac5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5ae021b6 elementor-widget elementor-widget-heading\" data-id=\"5ae021b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">H\u00e4ufig gestellte Fragen (FAQ)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-596e330f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"596e330f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4ac14960\" data-id=\"4ac14960\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d86d5ce elementor-widget elementor-widget-text-editor\" data-id=\"1d86d5ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For custom software provides comprehensive answers to frequently asked questions, empowering clients to gain a deeper understanding of our services, processes, and solutions, and make informed decisions with confidence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27c7db89\" data-id=\"27c7db89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5172779a elementor-widget elementor-widget-jkit_accordion\" data-id=\"5172779a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jkit_accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div  class=\"jeg-elementor-kit jkit-accordion style-default jeg_module__11_69f26bab53bb9\" ><div class=\"card-wrapper \">\n                <div class=\"card-header\">\n                    <a href=\"#expand-faa513c\" class=\"card-header-button\" aria-expanded=\"false\" data-target=\"#expand-faa513c\" aria-controls=\"expand-faa513c\">\n                        <span class=\"title\">Was ist ein AD Risk Assessment?<\/span><div class=\"right-icon-group\">\n                <div class=\"normal-icon\"><i aria-hidden=\"true\" class=\"jki jki-plus-light\"><\/i><\/div>\n                <div class=\"active-icon\"><i aria-hidden=\"true\" class=\"jki jki-minus-light\"><\/i><\/div>\n            <\/div>\n                    <\/a>\n                <\/div>\n                <div class=\"card-expand\" id=\"expand-faa513c\" style=\"display:none\"><div class=\"card-body\">Ein automatisierter Scan zur Identifikation von Konfigurationsfehlern, Berechtigungsrisiken und vermutlich unsicheren Objekten in Ihrem Active Directory \u2013 inklusive Scores und Handlungsempfehlungen .\n\n<\/div><\/div>\n            <\/div><div class=\"card-wrapper \">\n                <div class=\"card-header\">\n                    <a href=\"#expand-6331713\" class=\"card-header-button\" aria-expanded=\"false\" data-target=\"#expand-6331713\" aria-controls=\"expand-6331713\">\n                        <span class=\"title\">Brauche ich einen Agenten?<\/span><div class=\"right-icon-group\">\n                <div class=\"normal-icon\"><i aria-hidden=\"true\" class=\"jki jki-plus-light\"><\/i><\/div>\n                <div class=\"active-icon\"><i aria-hidden=\"true\" class=\"jki jki-minus-light\"><\/i><\/div>\n            <\/div>\n                    <\/a>\n                <\/div>\n                <div class=\"card-expand\" id=\"expand-6331713\" style=\"display:none\"><div class=\"card-body\">Nein \u2013 der Scan erfolgt agentenlos via PingCastle, ohne dauerhafte Installation oder Daten\u00fcbertragung in die Cloud .\n\n<\/div><\/div>\n            <\/div><div class=\"card-wrapper \">\n                <div class=\"card-header\">\n                    <a href=\"#expand-55c5822\" class=\"card-header-button\" aria-expanded=\"false\" data-target=\"#expand-55c5822\" aria-controls=\"expand-55c5822\">\n                        <span class=\"title\">Welche Schwachstellen werden erkannt?<\/span><div class=\"right-icon-group\">\n                <div class=\"normal-icon\"><i aria-hidden=\"true\" class=\"jki jki-plus-light\"><\/i><\/div>\n                <div class=\"active-icon\"><i aria-hidden=\"true\" class=\"jki jki-minus-light\"><\/i><\/div>\n            <\/div>\n                    <\/a>\n                <\/div>\n                <div class=\"card-expand\" id=\"expand-55c5822\" style=\"display:none\"><div class=\"card-body\">Passwort-Risiken, verwaiste Konten, GPO-L\u00fccken, veraltete Protokolle, \u00fcbersch\u00fcssige Admins \u2013 inkl. Priorisierung .\n\n<\/div><\/div>\n            <\/div><div class=\"card-wrapper \">\n                <div class=\"card-header\">\n                    <a href=\"#expand-0949554\" class=\"card-header-button\" aria-expanded=\"false\" data-target=\"#expand-0949554\" aria-controls=\"expand-0949554\">\n                        <span class=\"title\">Wie oft sollte man scannen?<\/span><div class=\"right-icon-group\">\n                <div class=\"normal-icon\"><i aria-hidden=\"true\" class=\"jki jki-plus-light\"><\/i><\/div>\n                <div class=\"active-icon\"><i aria-hidden=\"true\" class=\"jki jki-minus-light\"><\/i><\/div>\n            <\/div>\n                    <\/a>\n                <\/div>\n                <div class=\"card-expand\" id=\"expand-0949554\" style=\"display:none\"><div class=\"card-body\">Idealerweise w\u00f6chentlich \u2013 zur Sicherstellung einer dauerhaft sicheren AD-Landschaft und nachvollziehbarer Compliance-Reports .\n\n<\/div><\/div>\n            <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Netwrix Active Directory Risk Assessment (PingCastle) Sicherer. Transparenter. AD-optimiert. Warum Active Directory Risk Assessment? Falsche AD-Konfigurationen, verwaiste Konten oder unsichere Zugriffspfade bieten Angriffsfl\u00e4chen f\u00fcr Kriminelle. Das Risk Assessment-Tool von Netwrix (PingCastle) erkennt Schwachstellen in Ihrem Active Directory und Entra ID, bevor sie ausgenutzt werden \u2013 damit Sie gezielt gegensteuern und den Sicherheitsstandard steigern Komplett-Scan Ihrer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1625,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1641","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PingCastle AD-Check \u2013 Schwachstellen in Minuten erkennen | UBM<\/title>\n<meta name=\"description\" content=\"Mit Netwrix PingCastle analysieren Sie Ihre Active Directory Umgebung in k\u00fcrzester Zeit \u2013 remote, klar verst\u00e4ndlich &amp; inklusive Management-Report.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PingCastle AD-Check \u2013 Schwachstellen in Minuten erkennen | UBM\" \/>\n<meta property=\"og:description\" content=\"Mit Netwrix PingCastle analysieren Sie Ihre Active Directory Umgebung in k\u00fcrzester Zeit \u2013 remote, klar verst\u00e4ndlich &amp; inklusive Management-Report.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/\" \/>\n<meta property=\"og:site_name\" content=\"UBM - Global\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T06:55:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/\",\"url\":\"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/\",\"name\":\"PingCastle AD-Check \u2013 Schwachstellen in Minuten erkennen | UBM\",\"isPartOf\":{\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/#website\"},\"datePublished\":\"2025-05-20T12:42:57+00:00\",\"dateModified\":\"2025-06-26T06:55:07+00:00\",\"description\":\"Mit Netwrix PingCastle analysieren Sie Ihre Active Directory Umgebung in k\u00fcrzester Zeit \u2013 remote, klar verst\u00e4ndlich & inklusive Management-Report.\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/staging.ubm-global.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Netwrix\",\"item\":\"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PINGCASTLE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/#website\",\"url\":\"https:\/\/staging.ubm-global.com\/wordpress\/\",\"name\":\"UBM - Global\",\"description\":\"United Business Machines\",\"publisher\":{\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.ubm-global.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/#organization\",\"name\":\"UBM - Global\",\"url\":\"https:\/\/staging.ubm-global.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.ubm-global.com\/wordpress\/wp-content\/uploads\/2023\/12\/ubm_logo.png\",\"contentUrl\":\"https:\/\/staging.ubm-global.com\/wordpress\/wp-content\/uploads\/2023\/12\/ubm_logo.png\",\"width\":102,\"height\":51,\"caption\":\"UBM - Global\"},\"image\":{\"@id\":\"https:\/\/staging.ubm-global.com\/wordpress\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PingCastle AD-Check \u2013 Schwachstellen in Minuten erkennen | UBM","description":"Mit Netwrix PingCastle analysieren Sie Ihre Active Directory Umgebung in k\u00fcrzester Zeit \u2013 remote, klar verst\u00e4ndlich & inklusive Management-Report.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"PingCastle AD-Check \u2013 Schwachstellen in Minuten erkennen | UBM","og_description":"Mit Netwrix PingCastle analysieren Sie Ihre Active Directory Umgebung in k\u00fcrzester Zeit \u2013 remote, klar verst\u00e4ndlich & inklusive Management-Report.","og_url":"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/","og_site_name":"UBM - Global","article_modified_time":"2025-06-26T06:55:07+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/","url":"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/","name":"PingCastle AD-Check \u2013 Schwachstellen in Minuten erkennen | UBM","isPartOf":{"@id":"https:\/\/staging.ubm-global.com\/wordpress\/#website"},"datePublished":"2025-05-20T12:42:57+00:00","dateModified":"2025-06-26T06:55:07+00:00","description":"Mit Netwrix PingCastle analysieren Sie Ihre Active Directory Umgebung in k\u00fcrzester Zeit \u2013 remote, klar verst\u00e4ndlich & inklusive Management-Report.","breadcrumb":{"@id":"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/pingcastle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/staging.ubm-global.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Netwrix","item":"https:\/\/staging.ubm-global.com\/wordpress\/netwrix\/"},{"@type":"ListItem","position":3,"name":"PINGCASTLE"}]},{"@type":"WebSite","@id":"https:\/\/staging.ubm-global.com\/wordpress\/#website","url":"https:\/\/staging.ubm-global.com\/wordpress\/","name":"UBM - Global","description":"United Business Machines","publisher":{"@id":"https:\/\/staging.ubm-global.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.ubm-global.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/staging.ubm-global.com\/wordpress\/#organization","name":"UBM - Global","url":"https:\/\/staging.ubm-global.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/staging.ubm-global.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/staging.ubm-global.com\/wordpress\/wp-content\/uploads\/2023\/12\/ubm_logo.png","contentUrl":"https:\/\/staging.ubm-global.com\/wordpress\/wp-content\/uploads\/2023\/12\/ubm_logo.png","width":102,"height":51,"caption":"UBM - Global"},"image":{"@id":"https:\/\/staging.ubm-global.com\/wordpress\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/pages\/1641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/comments?post=1641"}],"version-history":[{"count":13,"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/pages\/1641\/revisions"}],"predecessor-version":[{"id":2178,"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/pages\/1641\/revisions\/2178"}],"up":[{"embeddable":true,"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/pages\/1625"}],"wp:attachment":[{"href":"https:\/\/staging.ubm-global.com\/wordpress\/wp-json\/wp\/v2\/media?parent=1641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}