Active Directory Security

Hello, My Name Is Domain Admin

Hello, My Name Is Domain Admin

  • Mickey Bresman
  • Aug 05, 2024

My friends know I'm a movie buff. Being also a mixed martial enthusiast, one of my all-time favorites is Fight Club, based on Chuck Palahniuk's first novel. The story is about an identity crisis: rebelling against consumerism, trying to find truth and meaning in life, and becoming a "real" person…

Strengthening Cyber Incident Response with Forest Druid

Strengthening Cyber Incident Response with Forest Druid

  • Huy Kha | Senior Identity & Security Architect
  • Aug 01, 2024

Forest Druid is a free cyber attack path discovery tool for hybrid identity environments, such as Active Directory and Entra ID. Unlike traditional tools that map attack paths from the external perimeter inwards, Forest Druid focuses on protecting the most critical assets first. This method prioritizes identifying and securing Tier…

New Ransomware Statistics Reveal Increased Need for Active Directory Security and Resilience

New Ransomware Statistics Reveal Increased Need for Active Directory Security and Resilience

  • Mickey Bresman
  • Jul 31, 2024

By now, we’re all familiar with the need for an “assume breach” mindset where ransomware and other cyber threats are concerned. To better understand the necessity and challenges of this approach, we partnered with international market research firm Censuswide to ask organizations about their experience with ransomware attacks. What we…

Identity Attack Watch: AD Security News, July 2024

Identity Attack Watch: AD Security News, July 2024

  • Semperis Research Team
  • Jul 31, 2024

As cyberattacks targeting Active Directory continue to rise, AD security, identity, and IT teams face mounting pressure to monitor the evolving AD-focused threat landscape. To assist IT professionals in comprehending and preventing attacks that involve AD, the Semperis Research Team publishes a monthly roundup of recent cyberattacks and provides additional…

How to Defend Against SPN Scanning in Active Directory

How to Defend Against SPN Scanning in Active Directory

  • Daniel Petri | Senior Training Manager
  • Jul 12, 2024

Service Principal Name (SPN) scanning is a reconnaissance technique that attackers use in Active Directory environments. This method enables attackers to discover valuable services and associated accounts, which can be potential targets for further attacks such as Kerberoasting. Related reading: Protect Active Directory against Kerberoasting What is SPN scanning? Understanding…

Forrester finds Semperis DSP provides 90% faster object and group level recovery

Forrester: Semperis Directory Services Protector users report 90% faster object- and group-level remediation

  • Sean Deuby | Principal Technologist
  • Jul 12, 2024

One of the nightmares that Active Directory admins dread is a simple human error in configuration that can cause crippling access or security problems across the organization. I’ve always said that one of the most unsettling remarks you may hear at work is an AD administrator saying “Oops”! As a…

Identity Attack Watch: AD Security News, June 2024

Identity Attack Watch: AD Security News, June 2024

  • Semperis Research Team
  • Jun 28, 2024

As cyberattacks targeting Active Directory continue to rise, AD security, identity, and IT teams face mounting pressure to monitor the evolving AD-focused threat landscape. To assist IT professionals in comprehending and preventing attacks that involve AD, the Semperis Research Team publishes a monthly roundup of recent cyberattacks and provides additional…

Active Directory ACL Management: The Importance of Tiered Delegation

Active Directory ACL Management: The Importance of Tiered Delegation

  • Daniel Petri | Senior Training Manager
  • Jun 27, 2024

Active Directory (AD) plays a critical role as the primary identity provider for numerous organizations throughout the world, forming the backbone of access control and authentication systems.  This also makes the Active Directory Environment a prime target for cyberattacks, however. A threat actor gaining control of your Active Directory can…