Active Directory Pro

Active Directory Pro Security Policy

Last Updated: 6/6/2025

At Active Directory Pro, we prioritize the security and privacy of our customers’ data. As a software vendor, we understand the importance of safeguarding your information and maintaining trust. This Security Policy outlines the measures we take to protect your data, ensure service reliability, and comply with industry standards. This document is provided to give our customers transparency into our security practices.

Customer Data

We do not store or collect customer data.

Our products are not SaaS; they are installed on your local network and system of choice. Our software does not send any data back to our servers.

Access Control

  • Role-Based Access: Access to our systems is restricted to authorized personnel based on their role and necessity. We use least-privilege principles to minimize access.
  • Multi-Factor Authentication (MFA): MFA is enforced for all employees.

Employee Training and Security Awareness Training

  • All employees receive regular security awareness training to stay informed about best practices and emerging threats.
  • Each employee undergoes a background verification check.

System and Network Security

  • Infrastructure Security: Our systems are hosted in secure, industry-leading data centers with robust physical and environmental controls.
  • Network Protection: Firewalls, intrusion detection/prevention systems, and continuous monitoring protect our infrastructure from unauthorized access and threats.
  • Patching and Updates: We regularly apply security patches and updates to our software, systems, and dependencies to mitigate vulnerabilities.
  • Vulnerability management: Our systems are regularly scanned for vulnerabilities. If a vulnerability is found it is prioritized and remediated as soon as possible.

Secure Code Development

  • Secure Development: Our software is developed following secure coding practices, with regular code reviews and vulnerability scanning.
  • Version control: We track and maintain a history of changes to our software code development.
  • Testing: All updates to our software are testing in our lab environment before being released to the general public.
  • Code signing: Our software uses code signing to ensure the authenticity and integrity upon installation and execution

Business Continuity and Disaster Recovery

We use highly resilient data centers that replicate across multiple data centers. In case of a failure, we can be operational with minimal downtime.

Policy Updates

This Security Policy is reviewed and updated annually or as needed to reflect changes in our practices, technology, or regulatory requirements.