<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Active directory - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/active-directory-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/active-directory-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 31 Mar 2026 08:59:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Active directory - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/active-directory-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Overview of Active Directory security tools – version 2026 </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/03/overview-of-active-directory-security-tools-version-2026/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/03/overview-of-active-directory-security-tools-version-2026/#respond</comments>
		
		<dc:creator><![CDATA[Benoît Marion]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 08:59:36 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[AD Backup & Recovery]]></category>
		<category><![CDATA[AD Discovery]]></category>
		<category><![CDATA[Entra ID]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[security tools]]></category>
		<category><![CDATA[Vulnerability Discovery]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29578</guid>

					<description><![CDATA[<p>  In 2026, Active Directory remains at the heart of the now hybrid identity infrastructure of most large companies and is still widely used as an on-premises identity provider, even when organisations migrate to the cloud.  Wavestone incident response teams note that 38% of attacks begin with...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/overview-of-active-directory-security-tools-version-2026/">Overview of Active Directory security tools – version 2026 </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">In 2026, Active Directory remains at the heart of the now hybrid identity infrastructure</span></b><span data-contrast="auto"> of most large companies and is still widely used as an on-premises identity provider, even when organisations migrate to the cloud.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Wavestone incident response teams note that</span><b><span data-contrast="auto"> 38% of attacks begin with identity compromise </span></b><span data-contrast="auto">(vs. 20% in 2024).</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">More broadly,</span><b><span data-contrast="auto"> attackers frequently exploit on-premises identities to move laterally into cloud environments </span></b><span data-contrast="auto">(Microsoft Digital Defence Report 2025 [1]).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In a context where the </span><b><span data-contrast="auto">hybridisation of identities increases an already vast attack surface</span></b><span data-contrast="auto">, companies must be able to understand the challenges and equip themselves effectively.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Through this </span><b><span data-contrast="auto">new 2026 overview of Active Directory security tools</span></b><span data-contrast="auto">, we offer you:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol style="text-align: justify;">
<li><b><span data-contrast="auto">An updated map of Active Directory security tools</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">An overview of major market trends</span></b><span data-contrast="auto"> (consolidation, transition to platforms, cloud hybridisation)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Feedback on operational implementation challenges</span></b><span data-contrast="auto"> and key success factors</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><span data-contrast="none">An overview of AD 2026 security tools, which has been further enhanced </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span data-contrast="auto">By analysing the market, we have identified four main use cases for these tools:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol style="text-align: justify;">
<li><b><span data-contrast="auto">Analysis and audit</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Hardening and maintaining security </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Detection</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Response and reconstruction</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">A listing of publishers and tools offering features that meet one or more of these four use cases was conducted. It was designed to be as comprehensive as possible, including tools from the best-known and most widely used players on the market as well as those from lesser-known players, proprietary tools and open-source tools, tools with a wide range of features and tools offering a more limited set of features. All relevant tools were thus included in a list, with various information for each one (reputation, description of the tool and use cases covered, hosting, etc.).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The following overview selected a number of publishers from this list, for the functional coverage they offer and their large use within organisations.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The Microsoft Entra ID logo is added to tools that offer the possibility of integrating it into their operations in addition to on-premises AD coverage. This is a strong trend in the market.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-29566" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Image2-1.png" alt="" width="1582" height="890" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Image2-1.png 1582w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Image2-1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Image2-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Image2-1-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Image2-1-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/Image2-1-800x450.png 800w" sizes="(max-width: 1582px) 100vw, 1582px" /></span></p>
<h2> </h2>
<h2 style="text-align: justify;"><span data-contrast="none">1. A dynamic market undergoing consolidation</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h2>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">The Active Directory market has undergone several changes since 2022, with different major transactions. The </span><b><span data-contrast="auto">aim is most often for publishers to complement their offering </span></b><span data-contrast="auto">or to cover a new need for Active Directory security.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:533,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Among other things, we can note :</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:533,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><strong>Acquisition of PingCastle by Netwrix [2] :</strong><span data-contrast="auto"><strong> </strong>PingCastle, renowned for its expertise in AD security auditing, strengthens Netwrix&#8217;s offering. This acquisition enables Netwrix to expand its portfolio with a lightweight, quick-to-deploy tool that is popular with technical teams, while reaffirming its commitment to providing a unified platform covering the entire AD security lifecycle.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><strong>Acquisition of Attivo by SentinelOne [3] :</strong><span data-contrast="auto"> Attivo, a specialist in identity security and lateral movement detection, strengthens SentinelOne&#8217;s offering by integrating advanced AD protection capabilities into a unified platform combining EDR, XDR and identity security.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><strong>Acquisition of BrainWave by Radiant Logic [4] :</strong><span data-contrast="auto"> Radiant Logic strengthens identity and governance analysis capabilities. By combining BrainWave&#8217;s detailed rights mapping with Radiant Logic&#8217;s identity federation, the offering becomes more comprehensive in addressing AD challenges.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><strong>Integration of Stealthbits by Netwrix [5] :</strong><span data-contrast="auto"><strong> </strong>By merging with Stealthbits, Netwrix has integrated historical Active Directory auditing and detection components (StealthAUDIT, StealthDEFEND, etc.), strengthening its offering in the protection of identities and sensitive data and moving towards a unified platform focused on AD security.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">2. From specific tools to centralised platforms</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h2>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In 2022, our overview of Active Directory security tools mentioned </span><i><span data-contrast="auto">“specialised tools, each addressing part of the equation.” </span></i><span data-contrast="auto">[6]. In 2026, we are seeing the emergence of </span><b><span data-contrast="auto">centralised platforms</span></b><span data-contrast="auto"> capable of covering several needs around Active Directory and, often, Entra ID. This dynamic is </span><b><span data-contrast="auto">primarily driven by publishers</span></b><span data-contrast="auto"> seeking to broaden their value proposition and differentiate themselves with comprehensive platforms rather than specialised tools offering specific features.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:533,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Some publishers build their platforms through successive acquisitions</span></b><span data-contrast="auto">, such as Netwrix (AD auditing, data protection, vulnerability discovery, PingCastle, etc.) or SentinelOne (EDR/XDR enhanced by Attivo on identity), while </span><b><span data-contrast="auto">others are gradually enhancing their existing offerings </span></b><span data-contrast="auto">to provide modular suites, whether they are administration/monitoring tools such as ManageEngine ADAudit Plus or Quest Change Auditor, which add AD auditing, hardening and detection components across the entire Active Directory ecosystem.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:533,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">The promises made by publishers are clear:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:533,&quot;335559738&quot;:0,&quot;335559739&quot;:60,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Centralisation of data</span></b><span data-contrast="auto"> (accounts, groups, rights, security events)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1253,&quot;335559738&quot;:0,&quot;335559739&quot;:60,&quot;469777462&quot;:[720,1253,3684,6300],&quot;469777927&quot;:[0,0,0,0],&quot;469777928&quot;:[0,8,1,1]}"> </span></li>
<li><b><span data-contrast="auto">Unified view of attack paths</span></b><span data-contrast="auto"> between AD and Entra ID</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1253,&quot;335559738&quot;:0,&quot;335559739&quot;:60,&quot;469777462&quot;:[720,1253,3684,6300],&quot;469777927&quot;:[0,0,0,0],&quot;469777928&quot;:[0,8,1,1]}"> </span></li>
<li><b><span data-contrast="auto">Simplified management</span></b><span data-contrast="auto"> for security, infrastructure and IAM teams via consolidated consoles and dashboards</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1253,&quot;335559738&quot;:0,&quot;335559739&quot;:60,&quot;469777462&quot;:[720,1253,3684,6300],&quot;469777927&quot;:[0,0,0,0],&quot;469777928&quot;:[0,8,1,1]}"> </span></li>
</ul>
<p style="text-align: justify;"><b><span data-contrast="auto">From the customer&#8217;s point of view, the benefits are obvious, but the reality may be more nuanced:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:533,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></p>
<ul>
<li><span data-contrast="auto">Consolidation can reduce the number of tools and simplify integrations, but </span><b><span data-contrast="auto">it does not eliminate the need for AD expertise or specialised tools </span></b><span data-contrast="auto">(e.g. for post-incident reconstruction).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1253,&quot;469777462&quot;:[720,1253,3684,6300],&quot;469777927&quot;:[0,0,0,0],&quot;469777928&quot;:[0,8,1,1]}"> </span></li>
<li><span data-contrast="auto">Environments often remain </span><b><span data-contrast="auto">multi-vendor</span></b><span data-contrast="auto">, with a mix of global platforms (XDR, CNAPP, Identity Security) and targeted AD tools, particularly in large groups or organisations that are already heavily equipped.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1253,&quot;469777462&quot;:[720,1253,3684,6300],&quot;469777927&quot;:[0,0,0,0],&quot;469777928&quot;:[0,8,1,1]}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">In this context, the challenge is not simply to “choose a platform”, but rather to </span><b><span data-contrast="auto">put together a coherent whole</span></b><span data-contrast="auto">, ensuring that:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:708,&quot;335559738&quot;:0,&quot;335559739&quot;:60,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></p>
<ul>
<li><span data-contrast="auto">The AD/Entra ID scope is well covered throughout the entire lifecycle (prevention, detection, response, reconstruction).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:60,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></li>
<li><span data-contrast="auto">The tools can feed </span><b><span data-contrast="auto">existing processes</span></b><span data-contrast="auto"> (SOC, crisis management, PRA, IAM).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:60,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></li>
<li><span data-contrast="auto">Dependence on a single publisher is assessed and controlled.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:0,&quot;335559739&quot;:60,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684,6300],&quot;469777927&quot;:[0,0],&quot;469777928&quot;:[1,1]}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">3. Cloud hybridisation</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></h2>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">With the rise of Entra ID and SaaS applications, identity hybridisation has become the norm: AD accounts and groups are synchronised to the cloud, and the same credentials are used to access on-premises and cloud resources. Numerous recent incidents show that attackers are exploiting these hybrid architectures to pivot between AD and Entra ID, taking advantage of poor configurations or weak alignment between the two worlds. [7]</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:533}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This translates into several concrete needs:</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:533}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Joint supervision</span></b><span data-contrast="auto"> of AD and Entra ID: ability to correlate signals from the on-premises directory (changes, anomalies, lateral movement attempts) and the cloud (Entra ID Protection signals, connection anomalies, conditional access, etc.). </span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
<li><b><span data-contrast="auto">Security policy alignment</span></b><span data-contrast="auto">: hardening of AD (configuration, delegation, privileged accounts) in line with conditional access policies, MFA and Zero Trust requirements. </span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
<li><b><span data-contrast="auto">Hybrid reconstruction capabilities</span></b><span data-contrast="auto">: in the event of AD compromise, reconstruction and restoration must integrate Entra ID dependencies (synchronisation, service accounts, applications) to avoid side effects on the cloud, and vice versa.</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></li>
</ul>
<p style="text-align: justify;"><b><span data-contrast="auto">Publisher are gradually positioning themselves on this hybridisation. </span></b><span data-contrast="auto">Some are expanding their AD audit engines to include Entra ID (on-premises to cloud) and offer a unified view of identity vulnerabilities: Netwrix Auditor now allows Entra ID to be monitored in parallel with Active Directory with a single view of hybrid threats. Tenable Identity Exposure extends its exposure indicators to specific Entra ID risks, and Semperis Directory Services Protector correlates AD and Entra ID changes in a single console to reduce the hybrid attack surface.</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:533}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Other tools start in the cloud (Entra ID, SaaS) and move down to on-premises AD (cloud to on-premises), using a hybrid identity threat detection and response approach: Microsoft Defender for Identity provides a consolidated inventory of AD and Entra ID identities and new detection capabilities on hybrid components (Entra Connect, AD FS, etc.), while CrowdStrike Falcon Identity Threat Protection analyses hybrid accounts present in both AD and Entra ID/Azure AD.</span><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></p>
<h1 style="text-align: justify;"><span data-contrast="none">Operational implementation still has room for improvement</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h1>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">The Active Directory security market is seeing growing and structured adoption of sophisticated tools. In many organisations, functional coverage is now adequate, or even advanced, across the various aspects of AD security (auditing, hardening, detection, backup).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, technological maturity contrasts with operational implementation that is still incomplete. AD disaster recovery plans (DRPs) often remain theoretical, untested, or disconnected from the backup and reconstruction tools deployed. Regular reviews (of privileges, delegations, approval relationships) are still rarely industrialised: they often depend on a few experts, with a limited level of automation.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The effectiveness of implementation is also impacted by the constant evolution of the ecosystem, between the platformisation of tools and the hybridisation of identities. The challenge for the coming years will therefore be to align tools (both existing and future) with robust, documented and tested processes:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol>
<li><b><span data-contrast="auto">Clarify responsibilities</span></b><span data-contrast="auto"> between infrastructure, IAM, security and SOC teams,</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Formalise and automate recurring controls </span></b><span data-contrast="auto">(rights reviews, configuration validation, restoration tests).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-contrast="auto">Only then will investments in Active Directory security tools, both on-premises and in the cloud, enable true resilience to be achieved.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:1,&quot;335551620&quot;:1}"> </span></p>
<h1><span data-contrast="none">Methodology overview</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:360}"> </span></h1>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">We have identified four main categories for grouping tools:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3><span data-contrast="none">Analysis and audit:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<ul>
<li><b><span data-contrast="auto">Account and Privilege</span></b><span data-contrast="auto">: Inventory of accounts, groups and associated rights to detect excessive or non-compliant privileges.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">AD Discovery</span></b><span data-contrast="auto">: Exploration of the AD structure (OUs, GPOs, objects) to deduce the architecture, relationships and dependencies.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Vulnerability Discovery</span></b><span data-contrast="auto">: Identification of security vulnerabilities (configuration, obsolete accounts, weak passwords, etc.).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Attack Path Discovery</span></b><span data-contrast="auto">: Modelling potential attack paths to privileged accounts.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<h3><span data-contrast="none">Hardening and management:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<ul>
<li><b><span data-contrast="auto">Password Management</span></b><span data-contrast="auto">: Management of password policies, synchronisation, password auditing (strength, reuse, compromise, etc.).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Rights &amp; Privilege Management</span></b><span data-contrast="auto">: Delegation, access control, role and permission management.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">GPOs Management</span></b><span data-contrast="auto">: Creation, analysis, modification of group policy objects.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Change Management</span></b><span data-contrast="auto">: Change tracking, traceability, change management and migration tools.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<h3><span data-contrast="none">Monitoring:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<ul>
<li><b><span data-contrast="auto">Threat Detection</span></b><span data-contrast="auto">: Proactive detection of suspicious behaviour, privilege escalation, lateral movement.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Security Incident Detection: </span></b><span data-contrast="auto">Identification of security incidents, real-time alerts, event correlation.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="none">Backup and Recovery:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">AD Backup &amp; Recovery</span></b><span data-contrast="auto">: Partial or complete backup of AD objects, rapid disaster recovery.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Investigation &amp; Forensics</span></b><span data-contrast="auto">: Post-incident analysis, traceability of malicious actions, evidence collection.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1619}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">For each of the tools classified, a badge (Microsoft Entra ID logo) is added when the tool offers the possibility of integrating Microsoft Entra ID into its operation.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0}"> </span></p>
<h1>Conclusion</h1>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">The 2026 overview is based on an analysis of 180 tools, compared to 150 in 2022. It was constructed using a similar approach to that of 2002. It is based on a listing of tools on the market. On this basis, and in line with recurring themes in Active Directory security, a categorisation has been established to facilitate reading.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The list of tools mentioned is not intended to be exhaustive, as the list of tools that can contribute directly or indirectly to Active Directory security is vast. This overview is therefore a summary of the main existing tools, particularly those that Wavestone consultants encounter most often in large organisations (considered, studied, tested or deployed).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p> </p>
<h1 style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}">References</span></h1>
<p style="text-align: justify;"><span data-contrast="none">[1] </span><a href="https://www.microsoft.com/en-us/corporate-responsibility/cybersecurity/microsoft-digital-defense-report-2025/"><span data-contrast="none">Microsoft Digital Defense Report 2025 | Microsoft</span></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">[2] </span><a href="https://netwrix.com/en/resources/news/netwrix-acquires-pingcastle/"><span data-contrast="none">Netwrix Acquires PingCastle | Netwrix</span></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">[3] </span><a href="https://investors.sentinelone.com/press-releases/news-details/2022/SentinelOne-Completes-Acquisition-of-Attivo-Networks/default.aspx?utm_source=chatgpt.com"><span data-contrast="none">SentinelOne, Inc. &#8211; SentinelOne Completes Acquisition of Attivo Networks</span></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">[4] </span><a href="https://www.radiantlogic.com/news/radiant-logic-signs-definitive-agreement-to-acquire-brainwave-grc/?utm_source=chatgpt.com"><span data-contrast="none">Radiant Logic Signs Definitive Agreement to Acquire Brainwave GRC &#8211; Radiant Logic | Unify, Observe, and Act on ALL Identity Data</span></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">[5] </span><a href="https://netwrix.com/fr/resources/news/netwrix-stealthbits-merge-to-address-demand-for-data-protection/"><span data-contrast="none">Netwrix annonce sa fusion avec Stealthbits | Netwrix</span></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">[6] </span><a href="https://www.riskinsight-wavestone.com/en/2022/05/active-directory-security-tools-radar/"><span data-contrast="none">Radar des outils pour renforcer la sécurité d’Active Directory &#8211; RiskInsight</span></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">[7] </span><span data-contrast="none">Microsoft Incident Response lessons on preventing cloud identity compromise | Microsoft Security Blog</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;469777462&quot;:[3684],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/overview-of-active-directory-security-tools-version-2026/">Overview of Active Directory security tools – version 2026 </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/03/overview-of-active-directory-security-tools-version-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LeHack 2025: What to Remember</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/#respond</comments>
		
		<dc:creator><![CDATA[Benjamin Garo]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 05:55:51 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[AD]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Browser Cache Smuggling]]></category>
		<category><![CDATA[Climate change]]></category>
		<category><![CDATA[Conference]]></category>
		<category><![CDATA[Conference France]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity conference]]></category>
		<category><![CDATA[Cybersecurity conference France]]></category>
		<category><![CDATA[DCOM turns 20]]></category>
		<category><![CDATA[environmental industrial infrastructures]]></category>
		<category><![CDATA[environmental warfare]]></category>
		<category><![CDATA[GPO parser]]></category>
		<category><![CDATA[Le Hack]]></category>
		<category><![CDATA[Le Hack 2025]]></category>
		<category><![CDATA[Le Hack France 2025]]></category>
		<category><![CDATA[LeHack]]></category>
		<category><![CDATA[LeHack 2025]]></category>
		<category><![CDATA[YoloSw4g]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26829</guid>

					<description><![CDATA[<p>LeHack is one of the oldest and most well-known security conventions in France. It took place from June 26th to June 29th, 2025. The technical presentations held throughout the convention provided an opportunity to explore some of the current cybersecurity...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/">LeHack 2025: What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">LeHack is one of the oldest and most well-known security conventions in France. It took place from June 26<sup>th</sup> to June 29<sup>th</sup>, 2025. The technical presentations held throughout the convention provided an opportunity to explore some of the current cybersecurity challenges. This article reviews four notable conferences that provided practical insights into contemporary attack vectors and defensive strategies: Synacktiv&#8217;s GPO parser research, the evolution of DCOM-based threats, emerging browser cache smuggling techniques, and the focus of APTs on vital environmental industrial infrastructures. </p>
<p style="text-align: justify;">The event also featured a CTF competition running from Saturday night to Sunday morning, where <strong>our team YoloSw4g secured 6th place among 120 participating teams</strong>.  </p>
<p style="text-align: justify;"> </p>
<figure id="attachment_26831" aria-describedby="caption-attachment-26831" style="width: 397px" class="wp-caption aligncenter"><img decoding="async" class=" wp-image-26831" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Scoreboard-1-345x191.png" alt="Scoreboard Le Hack 2025" width="397" height="220" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Scoreboard-1-345x191.png 345w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Scoreboard-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Scoreboard-1.png 414w" sizes="(max-width: 397px) 100vw, 397px" /><figcaption id="caption-attachment-26831" class="wp-caption-text"><em>Scoreboard Le Hack 2025</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The following technical analyses focus on the key takeaways from each presentation, emphasizing practical implications for security professionals. </p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">GPO parser (Synacktiv) </h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>Speaker: Wilfried Bécard</em></p>
<p style="text-align: justify;">Synacktiv’s offensive security team introduced a new open-source tool designed to simplify a task that’s both important and often frustrating when dealing with Active Directory compromises: analyzing Group Policy Objects (GPOs). </p>
<p style="text-align: justify;">GPOs are a key mechanism used by organizations to manage configurations across their Windows environments. They can enforce security policies, run scripts, install software, and more, often without users even realizing it. From an attacker’s perspective, understanding how these policies are set up can provide valuable insight into where to escalate privileges or how to move laterally. But going through GPOs manually to spot those opportunities is time-consuming and not always straightforward. </p>
<p style="text-align: justify;">Synacktiv’s tool takes things a step further than what’s currently out there for parsing GPOs. While many tools focus on who can apply which policies (by looking at access control lists (ACLs) and linked objects) this one digs into what the policies actually <em>do</em>. It pulls out useful details like which users or groups are being added, what scripts are being run, or which software gets pushed to machines. That deeper look can uncover more complex paths an attacker might take to move through a network, especially ones that aren’t visible when you&#8217;re just looking at ACLs. </p>
<p style="text-align: justify;">The tool also integrates smoothly with BloodHound. By feeding it richer GPO data, BloodHound can show privilege escalation routes that might not show up with simpler analysis. That means defenders, red teamers, and anyone working in AD environments get a clearer picture of how an attacker might chain together GPO behavior to gain access or move around. </p>
<p style="text-align: justify;">Synacktiv plans to release the tool soon on <span style="color: #333399;"><a style="color: #333399;" href="https://github.com/synacktiv">their GitHub</a>.</span> Whether you’re securing a domain or testing one, it’s definitely worth keeping an eye on. </p>
<p style="text-align: justify;">  </p>
<h2 style="text-align: justify;">DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape </h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>Speaker: Julien Bedel</em></p>
<h3 style="text-align: justify;">DCOM Architecture </h3>
<p style="text-align: justify;">The &#8220;DCOM Turns 20&#8221; conference presented a technical analysis of the <strong>evolving threats</strong> related to Component Object Model (COM) and its distributed version (DCOM). Throughout the years, COM has established itself as<strong> a central element </strong>of the Windows ecosystem by enabling <strong>interoperability </strong>between applications through <strong>unique identifiers</strong> (GUID and ProgID). This design facilitates interactions between programs of different languages (i.e. C++, VBS, PowerShell &#8230;) but now represents a considerable attack surface with<strong> over 30,000 interfaces </strong>available on a single Windows 11 workstation.  </p>
<p style="text-align: justify;">This functional richness offers attackers multiple initial access possibilities, ranging from command execution to file downloading, making restriction of access to COM classes technically impossible without compromising system stability. </p>
<p style="text-align: justify;">Organizations must therefore rely on compensating controls such as AppLocker policies to restrict executable paths and EDR solutions to detect suspicious COM-based activities. </p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Persistence Techniques and Lateral Movement </h3>
<p style="text-align: justify;">Attackers can inject specific registry keys into HKCU (taking priority over HKLM) to <strong>redirect </strong>COM calls to malicious DLLs. This method requires a sophisticated approach:<strong> proxying legitimate functions </strong>of the original DLL and targeting specific processes (office applications, browsers, VPN clients, EDR solutions) that remain active during the session and communicate regularly with external networks. For lateral movement, DCOM uses <strong>AppIDs </strong>to identify groups of COM classes accessible remotely. </p>
<p style="text-align: justify;">The accessibility of port 135 (RPC) signals DCOM availability, enabling the use of tools like <strong>DcomExec</strong> for remote command execution, particularly through Excel and Office suite interfaces. </p>
<p style="text-align: justify;">Defense against these lateral movement techniques requires implementing network firewalls to restrict RPC traffic, deploying IDS/IPS solutions to monitor suspicious DCOM communications, and establishing proper network segmentation to limit attackers&#8217; ability to pivot across systems. </p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Privilege Escalation and Bypasses </h3>
<p style="text-align: justify;">The conference demonstrated how DCOM serves as the underlying foundation for many widely used privilege escalation techniques. A significant portion of these exploits are commonly known as &#8220;Potato&#8221; attacks. These techniques have proliferated because Microsoft does not consider them as constituting a breach of security boundaries, leading to the development of multiple variants over time, despite occasional patches being released to address specific implementations.  </p>
<p style="text-align: justify;">The presentation further illustrated how DCOM interfaces serve as a versatile exploitation platform, enabling attackers to achieve diverse objectives through various Windows-specific techniques, from NTLM relay attacks against RDP users to UAC bypass mechanisms, highlighting the breadth of attack vectors available within Microsoft&#8217;s DCOM architecture. </p>
<p style="text-align: justify;">To counter these threats, organizations must implement a defense in depth strategy encompassing protocol signing, NTLM disabling and the use of security solutions such as EDR, IDS or IPS. </p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Browser Cache Smuggling: the return of the dropper </h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>Speaker : Aurélien Chalot</em></p>
<p style="text-align: justify;">The “Browser Cache Smuggling: the return of the dropper” conference presented a different approach to malware delivery and execution during a Red Team assignment. Today, the analysis of attachments in mailboxes is increasingly monitored by security tools. This is an innovative way of delivering a payload to a victim&#8217;s machine. Two interesting ideas have been highlighted: </p>
<ul style="text-align: justify;">
<li>Browsers are caching web files to reduce the bandwidth meaning that the files have to be downloaded into victim’s machine </li>
</ul>
<ul style="text-align: justify;">
<li>Well-known software’s such as Teams can still suffer from DLL Load Order hijacking   </li>
</ul>
<p style="text-align: justify;">Basically, the attack path relies on the fact that a victim will be tricked into visiting a website controlled by an attacker and where an object with a malicious payload is set up into the HTML page. As browser’s only caches certain file based on the mime-type, the attackers must force the Content-Type of the delivered file to a cacheable value such as image/jpeg. The payload will be then silently downloaded into a temporary folder into the victim’s machine and this file is readable and writable by the current user on the system.  </p>
<p style="text-align: justify;">When the payload is delivered, the attacker needs a way to execute it. The second part of the conference explained how trusted software can be used to hide code and traffic. The example of a certain version of Microsoft Teams has been used to demonstrate how DLL proxying can be used to achieve such executions discreetly. When Teams is executed, the software will try to load multiple DLLs following the Windows Search Order. As some DLL are missing, it will finally search into the current folder where Team’s is installed. As this folder is readable and writable by the current user, then the attacker can force a user to move the malicious payload (i.e the malicious DLL) from the browser cache folder into the Teams folder.  </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em><span style="text-decoration: underline;">Limits of this attack: </span></em></p>
<ul style="text-align: justify;">
<li>The cache folder will be scanned by an EDR (and not only Microsoft Defender on the article) and the temporary file could be quarantined with alerts. </li>
</ul>
<ul style="text-align: justify;">
<li>The moving of the payload from the cache folder to the vulnerable software folder relies on social engineering and doesn’t provide a 0-click compromise path.  </li>
</ul>
<ul style="text-align: justify;">
<li>Firefox is not the default browser used by companies nowadays and Google Chrome or Microsoft Edge use more advanced storage mechanisms for cached files. </li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><em>Countermeasures: </em></span></p>
<ul style="text-align: justify;">
<li>Set a purge a regular purge of the cached files into the browser configuration </li>
</ul>
<ul style="text-align: justify;">
<li>Ensure that EDR/AV scans temporary files  </li>
</ul>
<ul style="text-align: justify;">
<li>Restrict the modification of the temporary folder of the browser by a normal user </li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em><span style="text-decoration: underline;">Links to the articles:  </span></em></p>
<ul style="text-align: justify;">
<li><span style="color: #333399;"><a style="color: #333399;" href="_wp_link_placeholder" data-wplink-edit="true">https://blog.whiteflag.io/blog/browser-cache-smuggling/ </a></span></li>
</ul>
<ul style="text-align: justify;">
<li><span style="color: #333399;"><a style="color: #333399;" href="https://blog.whiteflag.io/blog/brower-cache-smuggling-the-return-of-the-dropper/">https://blog.whiteflag.io/blog/brower-cache-smuggling-the-return-of-the-dropper/</a> </span></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">When climate change benefits to APTs </h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>Speaker: Cybelle Oliveira</em></p>
<p style="text-align: justify;">Cybelle Oliveira presented a conference on the evolution of several APTs observed during the last few years: the specialization of a dozen APTs groups now engaged in an “environmental warfare”. These APTs now target vital environmental industrial infrastructures (water treatment, power grids, carbon capture labs, etc.), especially those protecting populations from climate change effects. To quote numbers given during the conference, a steep rise of 340% in malicious activity targeting climate infrastructure has been noted between 2022 and 2025. In 89% percents of these attacks, populations were physically impacted. </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">So why change targets from private companies to climate infrastructures? One of the main answers is climate change. Attackers seem to have perfectly understood its challenges and turned them into opportunities. Indeed, weaponization of extreme temperatures and availability of infrastructures helping populations to deal with changing climate become powerful extorsion arguments as the impacts may affect the population of whole regions. How would a state react if hundreds of thousands of its citizens were to be deprived of heat during winter or ventilation during ever hotter summers? </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">This growing trend is reinforced by the lack of preparation of said industries to face advanced cyber threats. It is well known that industrial information systems do not have the same lifecycles as classic IT: the need for availability results in heavy delays for updates and systems are often used for more than a decade. Consequently, the obsolescence of equipment and protocols used in OT environments makes them easy targets for attackers. In particular, Modbus protocol, a historical OT communication protocol without security features (authentication, integrity checks, etc.), is still widely spread across networks, even though new secure protocols such as OPC-UA have emerged since. Worse, thousands of these Modbus ports can easily be found open over the Internet, creating entry points right within industrial networks. This denotes the lack of inventory and cartography of vital climate infrastructures, preventing Blue Teams from efficiently identifying the attack surface and securing it. </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In conclusion, climate change and its effects should now be accounted for in CTI to better anticipate risk periods and new menaces as attackers already plan their actions based on these criteria. In addition, helping industry securing climate infrastructures becomes a priority to protect populations as well as secure climate action globally. </p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/">LeHack 2025: What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Resilience Entra ID</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/#respond</comments>
		
		<dc:creator><![CDATA[Pierre LALIN]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 08:42:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[Entra ID]]></category>
		<category><![CDATA[risk management strategy & governance]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26544</guid>

					<description><![CDATA[<p>Entra ID (formally known as Azure AD) is an Identity and Access Management solution. Through a Cloud-based directory, administrators provision and manage the lifecycle of various identities from Users, Applications to Devices. Unlike Microsoft Active Directory, Entra ID extends its...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/">Resilience Entra ID</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Entra ID (formally known as Azure AD) is an Identity and Access Management solution. Through a Cloud-based directory, administrators provision and manage the lifecycle of various identities from Users, Applications to Devices. Unlike Microsoft Active Directory, Entra ID extends its authentication and authorization capabilities beyond the company&#8217;s network to cover SaaS applications, on-premises and Cloud workloads using either company-owned devices or BYOD. These new features and connections are achieved thanks to web-based protocols like SAML and simplified identity structure (AD forest vs Entra ID tenant).</p>
<p style="text-align: justify;">In this article, we will expose the cyber-resilience challenge of Entra ID, explain why native features are incomplete and present the result of a PoC conducted on an open-source tool, Microsoft 365 DSC, to backup and recover Entra ID’s data.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The challenge of cyber-resilience in managed Cloud services</h2>
<p> </p>
<p style="text-align: justify;">With Entra ID, the directory management strategy is in line with the Cloud paradigm. It means that the various network, storage, computer, OS and application layers are handled by Microsoft, leaving the customer to focus solely on his identity data.</p>
<p><img decoding="async" class="aligncenter wp-image-26527 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1.jpg" alt="" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1.jpg 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-768x432.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-800x450.jpg 800w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<p style="text-align: justify;">This fundamental difference has an impact on the resiliency of the service. Indeed, the creation of snapshots to back up the integrality of the system, which is a common practice on AD, is not native on a managed service such as Entra ID. Thus, in order to face a disaster recovery scenario linked to malicious activities, we can only rely on native Microsoft functionalities: the identity lifecycle model, RBAC administration model and import/export capabilities.</p>
<p> </p>
<h2 style="text-align: justify;">The incomplete soft delete model</h2>
<p> </p>
<p style="text-align: justify;">To ensure resilience, Cloud services are widely using a soft delete mechanism. Its main purpose is to recover data in the event of an accidental deletion. For example, in Azure Recovery Service Vault, the soft delete is the last safeguard in the event of intentional or unintentional deletion of the vault. Combined with immutability parameters, the vault cannot be erased regardless of admin permissions.</p>
<p style="text-align: justify;">In Entra ID, the concept of soft delete exists but is insufficient to ensure data resilience for two reasons. On the one hand, there is neither role distinction between soft-delete and hard-delete nor Recovery role, i.e. the permissions required to delete an object are sufficient to allow for permanent deletion. On the other hand, the life cycle of objects in Entra ID (create, manage, delete) is governed by the same role:</p>
<ul>
<li>The role User Administrator can both create and hard-delete a user</li>
<li>The role Cloud Application Administrator can register an application, configure all aspects of the application and hard-delete the application</li>
<li>The role Cloud Device Administrator can add a device, configure all aspects of the device and unregister a device</li>
</ul>
<h2> </h2>
<h2 style="text-align: justify;">The impact of a deletion on Entra ID</h2>
<p> </p>
<p style="text-align: justify;">This design makes the User Administrator, Privileged Authentication Administrator, Cloud Application Administrator, Application Administrator, Cloud Device Administrator, Intune Administrator and Windows 365 Administrator roles all the more critical, as their compromise can lead to the permanent loss of identity data. The impact of such a deletion can be a loss of access to applications and data, a loss of permissions, and an inability to administrate.</p>
<p style="text-align: justify;">Although the deletion of hybrid users synchronized with an on-premise AD is reversible, information such as role assignment will be lost, threatening the rights and access model. This is not the case for Cloud identities, which are generally part of the Control Plane. As part of the Enterprise Access Model, the Control Plane includes the most sensitive access, leading to a global compromise of an Information System.</p>
<p style="text-align: justify;">In a disaster recovery scenario, some assets are more critical than others and should be backed up as a priority. These include:</p>
<ul>
<li>Control Plane users, groups and roles assigned</li>
<li>Enterprise Applications (service principals) with critical permissions over Azure or Microsoft 365</li>
<li>Administrative workstations</li>
</ul>
<h2> </h2>
<h2 style="text-align: justify;">Comparison of backup open-source methods</h2>
<p> </p>
<p style="text-align: justify;">To reduce the likelihood of Entra ID malicious data loss risk, the implementation of a backup solution seems essential, at least for the Control Plane in order to maintain control over your Information System and rebuild. We have therefore analyzed 3 open-source methods for ensuring data backup:</p>
<ul style="text-align: justify;">
<li><strong>Microsoft Graph PowerShell</strong>: this is the PowerShell library for Microsoft Graph APIs. You can build your own script(s) to export and import Entra ID objects attributes that fit with organization needs</li>
<li><strong>Microsoft Entra Exporter</strong>: this is a PowerShell module that export a local copy of some Entra ID attributes (Users, Applications, Service Principals, Roles, etc.) into JSON file</li>
<li><strong>Microsoft 365 Desired State Configuration (DSC)</strong>: this is a PowerShell module for declarative configuration, deployment and management of Microsoft 365 services</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Backing up Entra ID objects with Microsoft 365 DSC</h2>
<p> </p>
<p style="text-align: justify;">In this part, we will explain how we tested the open-source solution Microsoft 365 DSC and share the results and conclusions we got.</p>
<p style="text-align: justify;">Our PoC</p>
<p style="text-align: justify;">Microsoft 365 DSC enables the management of the configuration and state of Microsoft 365 services following a declarative approach. By defining the desired state rather than specific steps, it simplifies the management of complex cloud configurations and ensures consistency across the environment.</p>
<p style="text-align: justify;">In the context of a PoC, the test population deployed in our test tenant is as follows:</p>
<ul style="text-align: justify;">
<li>30 Cloud Only Users (randomly generated by Microsoft as part of the test’s tenant creation process)</li>
<li>10 Security Groups (randomly assigned to Users)</li>
</ul>
<p style="text-align: justify;">The purpose of this PoC is to identify the benefits and limitations of the solution through a series of tested and documented uses cases:</p>
<table>
<tbody>
<tr>
<td style="text-align: center;" colspan="3" width="623">
<p><strong>Users</strong></p>
</td>
</tr>
<tr>
<td style="text-align: center;" colspan="2" width="365">
<p><strong>Use cases</strong></p>
</td>
<td style="text-align: center;" width="257">
<p><strong>Findings</strong></p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we delete a user and then restore a backup?</strong></p>
</td>
<td width="204">
<p>Does the user return with all the data that was attached to them?</p>
<p>Does their password come back, or do they have a new password?</p>
<p>Do their information return or not?</p>
</td>
<td width="257">
<p>Not all the attributes related to deleted users are retrieved. However, their password is replaced with a default password. In case of inconsistency, a non-blocking error occurs in the script, preventing the user from being set with attributes that point to non-existent object.</p>
<p>If the user has the “Ensure” attribute set to “Absent”, then they will not be retrieved.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a user is deactivated but, in the backup, they are active?</strong></p>
</td>
<td width="204">
<p>Do they get reactivated?</p>
</td>
<td rowspan="2" width="257">
<p>We cannot know the state of users (active or deactivated) from the backup.</p>
<p>Depending on the situation, we can set the “Ensure” parameter to “Absent” or “Present” to ensure consistency between our tenant state and our export.</p>
<p>When set to “Absent”, the user will be considered as deactivated and not be deployed during the restoration process. When set to “Present”, the user will be considered as active and be deployed during the restoration process.</p>
<p>If we attempt to recover a user marked as &#8216;Absent&#8217; and they do not exist on Entra ID, we simply get a confirmation of their non-existence.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a user is active but, in the backup, they are deactivated?</strong></p>
</td>
<td width="204">
<p>Do they get deactivated?</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we add a user, and the backup doesn&#8217;t contain this new user?</strong></p>
</td>
<td width="204">
<p>Does the user get deleted?</p>
<p>Do their data remain intact?</p>
</td>
<td width="257">
<p>There is no impact observed on the new user.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we make a backup without changing the user?</strong></p>
</td>
<td width="204">
<p>If nothing changed, what happens?</p>
<p>If only an attribute of the user (like a group) was deleted, what happens?</p>
<p>If an attribute of the user (like a group) was added, what happens?</p>
<p>If an attribute was modified (like a password), what happens?</p>
<p>If a group they belonged to was deleted, what happens?</p>
<p>What happens with the licenses assigned to a user if a backup is made before the modification?</p>
<p>What happens if we modify a user’s role before making the backup?</p>
</td>
<td width="257">
<p>Because the username is used to associate attributes with the user, if it changes, the user cannot be found from the backup (unless it is also changed there).</p>
<p>The attributes from the backup overwrite the existing ones. Everything else remains untouched. Therefore, if an attribute is not included in the snapshot, it will stay as it was.</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<table>
<tbody>
<tr>
<td style="text-align: center;" colspan="3" width="623">
<p><strong>Groups</strong></p>
</td>
</tr>
<tr>
<td style="text-align: center;" colspan="2" width="365">
<p><strong>Use cases</strong></p>
</td>
<td style="text-align: center;" width="257">
<p><strong>Findings</strong></p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if I delete a group and then restore a backup?</strong></p>
</td>
<td width="204">
<p>Does the group return with all the data that was attached to it?</p>
<p>Are the members of this group reintegrated?</p>
<p>Does the snapshot save who belongs to which group?</p>
<p>Are all groups saved in the snapshot?</p>
<p>Does the snapshot save the rights within the group?</p>
</td>
<td width="257">
<p>Only the security groups and Microsoft 365 groups with the right confidentiality label are backed-up.</p>
<p>The snapshot contains the members of the group and the owner but does not save the rights within the group.</p>
<p>It is necessary to redo the snapshot as the newly created group no longer has the same ID as the previous one. It won’t be recognized by the snapshot which will consider that the group does not exist.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if I back up a group that already exists but has modified attributes?</strong></p>
</td>
<td width="204">
<p>What happens if the name has changed?</p>
<p>What happens if a user has left the group after the snapshot?</p>
<p>What happens if there are new users after the snapshot?</p>
</td>
<td width="257">
<p>The backup overwrites the old attributes except for the name.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a group exists in the tenant but not in the backup?</strong></p>
</td>
<td width="204">
<p>Does it get deleted or impacted after restoration?</p>
</td>
<td width="257">
<p>There is no impact observed apart from the information defined in the configuration file.</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The process required configuring a service account with the right permissions (<em>User.ReadWrite.All,</em> <em>Group.ReadWrite.All</em>) in Entra ID to interact with Microsoft Graph API for data export and import.</p>
<p style="text-align: justify;">These permissions enabled the service account to retrieve the necessary configuration and data from Entra ID and later re-import it.</p>
<p style="text-align: justify;">Result of the PoC Microsoft 365 DSC</p>
<p style="text-align: justify;">As a result of these tests, we were able to gather conclusive information on the solution’s benefits and limitations. On the positive side:</p>
<ul>
<li><strong>Granular Configuration Selection: </strong>The solution allows precise targeting of configurations for backup, enabling users to select specific settings.</li>
<li><strong>Recovery without deletion: </strong>During recovery, current users and groups are retained, preventing accidental deletion.</li>
<li><strong>Overwrite of Outdated Attributes: </strong>Backed-up attributes replace the old ones.</li>
<li><strong>Language of the Data Storage: </strong>Data is stored in JSON format, making it easy to manipulate and modify backup files.</li>
<li><strong>Automation Capabilities: </strong>Once the necessary tools are installed, the solution is easy to automate.</li>
<li><strong>Monitoring and Alerts: </strong>Microsoft 365 DSC can be used to monitor data consistency and receive alerts in the event of suspicious changes</li>
<li><strong>Snapshot Versions management: </strong>It enables easy maintenance and administration of multiple snapshot versions</li>
<li><strong>Detailed Logging Functionality: </strong>It offers the possibility to generate highly detailed logs, providing records of all operations for enhanced oversight.</li>
</ul>
<p style="text-align: justify;">Despite these advantages, the study revealed several limitations:</p>
<ul>
<li><strong>Incomplete Data in Backup: </strong>The backup process does not capture all attributes, leading to potential loss of important information.</li>
<li><strong>Backup Size Limit: </strong>The backup size is capped at 11MB, which may be insufficient for larger configurations or datasets.</li>
<li><strong>Deactivation Status Not Captured: </strong>Snapshots do not store deactivation statuses for users, potentially re-enabling disabled users during recovery.</li>
<li><strong>Unencrypted Data and Credentials: </strong>Security concerns arise from data and credentials being stored unencrypted, posing risks to sensitive information.</li>
<li><strong>Object IDs’ Loss: </strong>During imports, object IDs are lost, causing recreated objects to have new IDs, which can lead to duplicate entries in subsequent imports.</li>
<li><strong>Privileged Service Principal: </strong>The service principal involved has elevated privileges, increasing the risk of security vulnerabilities if not properly managed.</li>
</ul>
<p style="text-align: justify;">It is important to note that this tool does not really support “restoration” as it is possible to re-create objects, but it does not ensure service restoration and continuity. The reason being that it currently cannot restore links between new ID objects and applications, which is an issue native to Entra ID.</p>
<p style="text-align: justify;">Our opinion about Microsoft 365 DSC</p>
<p style="text-align: justify;">Microsoft 365 DSC is a great tool when it comes to basic uses and documentation as it is simple to use and to deploy on test environments. It is also quite efficient as a monitoring tool thanks to its version control and detailed logs. However, it is not adapted to large environments because of the limited scalability, the poor user experience and security issues related to configurations and credentials. It can also lead to inconsistencies or duplication as object IDs that can be referenced elsewhere are unrecoverable.</p>
<p style="text-align: justify;">Additional solutions may be required such as scripting for handling configuration files and ensuring the consistency of the modifications, as well as well-defined encryption and backup processes. Therefore, we recommend always carefully evaluating the specific needs, planning additional developments and mainly using the solution for supervision and testing purposes.</p>
<p style="text-align: justify;">Given the limitations of Microsoft&#8217;s open-source tools, it could be worthwhile to explore what third-party vendors, such as Semperis or Quest who are pure players on the subject, have to offer. These alternatives might address some of the challenges related to scalability, reliability and security, providing options that better suit larger environments. It is important to remain open to these possibilities and evaluate them based on the specific requirements of your organization.</p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/">Resilience Entra ID</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ACTIVE DIRECTORY RECOVERY: HOW TO BE READY ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/#respond</comments>
		
		<dc:creator><![CDATA[Alexandre Lukat]]></dc:creator>
		<pubDate>Fri, 17 Feb 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[Recovery]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19676</guid>

					<description><![CDATA[<p>In nearly 90% of the incidents managed by Wavestone CERT [1], the Active Directory domain was compromised: rapid rebuilding capabilities are no longer an option. However, the backup and recovery of Active Directory environments is a subject that has long...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/">ACTIVE DIRECTORY RECOVERY: HOW TO BE READY ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">In nearly 90% of the incidents managed by Wavestone CERT <a href="#ref1" name="ref1-retour">[1]</a>, the Active Directory domain was compromised: rapid rebuilding capabilities are no longer an option. However, the backup and recovery of Active Directory environments is a subject that has long been assumed to be under control: backups are made daily, recovery tests are performed often and at regular intervals, BCP/DRP tests are conducted to ensure business continuity and recovery capabilities. But very often these processes have not evolved for several years and have not kept pace with the evolution of the cyber threat.</p>
<p style="text-align: justify;">Thinking about the right way to deal with this topic in organisations is at the crossroads of AD security enhancement and cyber resilience projects.</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">Infrastructure and backup agents: weak points</h1>
<p style="text-align: justify;">Our various assessments over the last few months have shown that backup strategies have not always evolved towards the state of the art.</p>
<p style="text-align: justify;">First problem: backup infrastructures are not resilient to cyber risk by default. For example, authentication on these backup infrastructures is very often linked to the Active Directory itself. Subsequently, the backup system could be compromised by the attacker, leading to a potential destruction of the backups&#8230; including those of the Active Directory!</p>
<p style="text-align: justify;">And backups are a prime target for attackers. In more than 20% of the incidents managed by the Wavestone CERT in 2021, backups were impacted. It is therefore important to consider the cyber scenario &#8211; and especially the ransomware scenario &#8211; when thinking about the resilience of backups.</p>
<p style="text-align: justify;">The second problem is that Domain Controllers (DC) backups are hosted in the backup tool, which often has a lower level of security than Active Directory. Indeed, an organisation that has already done some work to secure AD will have potentially greatly strengthened its tier 0 (always back to <a href="https://www.riskinsight-wavestone.com/en/2022/10/security-bastion-pam-and-active-directory-tiering-mode-how-to-reconcile-the-two-paradigms/">the tiering model</a>!): setting up dedicated workstations for administration, multi-factor authentication, network filtering, dedicated hardware, limiting the number of privileged accounts, etc. Unfortunately, this will not necessarily be the case for the backup infrastructure. As these backups are not necessarily encrypted, an attacker could recover and exfiltrate them from a DC via the backup infrastructure, which is easier to compromise. Once the backup has been depleted, the attacker will be able to extend the scope of his compromise via a ‘pass the hash’ attack, after recovering the hashes, or a brute force attack, after extracting the secrets from the ntds.dit database to recover passwords in clear text, to be replayed on services whose authentication is not based on Active Directory.</p>
<p style="text-align: justify;">Third problem: traditional backup methods rely on agents installed on Domain Controllers, whose high privileges sometimes increase the risk of systems becoming compromised. Backup agents almost always require administrative rights to the asset being backed up, which mechanically exposes the Domain Controllers and therefore the Active Directory domains. This leads to the paradoxical situation where the measure to reduce the risk of unavailability (installation of a backup agent on a DC) becomes the vulnerability itself that causes a risk that can become critical (unavailability of the entire information system).</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">Backup on disconnected media, on immutable infrastructure, or in the cloud: multiple strategies for multiple scenarios</h1>
<p style="text-align: justify;">To solve these two problems, multiple solutions exist, and their combination facilitates the construction of a robust strategy. This strategy must consider the context of the organisation as well as its cybersecurity maturity.</p>
<p style="text-align: justify;">To address the first problem induced by the vulnerable agent, two approaches exist, both viable:</p>
<ol style="text-align: justify;">
<li>Reduce the probability of exploitation of the vulnerability induced by the backup agent. In addition to the classic security maintenance issues (regular updates, rapid correction of agent vulnerabilities, etc.), this involves integrating a dedicated backup tool into tier 0, whose security level will have been reinforced.</li>
<li>Get rid of the backup agent. How can this be done? By using the native Windows Backup feature, which allows a backup to be made and exported, which can be encrypted and taken out of the tier 0 asset, to a tier 1 asset, which itself can be backed up by the company&#8217;s standard backup solution.</li>
</ol>
<p style="text-align: justify;">To increase the resilience of Active Directory backups, a combination of measures should be taken wherever possible:</p>
<ol style="text-align: justify;">
<li>Externalize the backup on media (offline version). The first variant can be set up quickly and at low cost: it involves setting up an external hard disk which will be disconnected once the backup has been made. Then, it is simply a matter of setting up the associated organisational processes so that the necessary actions can be carried out without the relevant agents forgetting. The second option, for the rare organisations that still have them, is to rely on tapes. This option is also dependent on a key process: the regular backup and outsourcing of the backup catalogue, so as not to lose time in the event of restoration, should it also disappear (a story inspired by real events encountered by our incident response teams). A word of caution: tape backups should be seen as a last resort to ensure that a copy of the data is retained in the event of a disaster scenario. In fact, this backup format does not lend itself to rapid reconstruction, due to the considerable time required before restoration to the production IS can begin: time required to repatriate the tapes and time required to read their content.</li>
<li>Outsource the backup outside the (online) information system. Whether this is done using in-house scripts or market solutions (see our radar), after robust encryption, a backup can be outsourced. The advantage of market solutions is that they directly integrate the rapid reconstruction element (see next section) of a DC.</li>
<li>Rely on a complementary but independent backup. To increase the availability of the backup infrastructure, it is sufficient to (redundantly) ensure that there is no risk of simultaneous compromise. To this end, taking advantage of their transition to the cloud, many organisations have recently chosen to add an additional DC, but hosted in the cloud (the others being traditionally still on-premises), thus naturally benefiting from its own backup mechanisms. Due to the internal replication mechanisms of AD, the DC hosted in the cloud will be compromised (compromise of some accounts or AD configurations) in the same time scale as the on-premises ones, but due to the closeness between the backed-up assets and the backup system, one will have a greater chance of having a backup of a DC still available.</li>
<li>Make your backup infrastructure immutable by relying as much as possible on the solutions offered by backup software publishers. Indeed, most publishers now offer immutability mechanisms, which sometimes do not require the purchase of additional storage bays. By making backups immutable within their primary storage, you can be sure of an optimal reconstruction time since it will not be necessary to repatriate backups from offline storage (1.) or online storage (2.) before being able to start restoring. <span style="text-decoration: underline;">N.B.</span>: 2. can and should benefit from this concept (Amazon S3, Azure blob, etc.).</li>
</ol>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; text-align: justify; border-style: solid; border-color: #503078; background-color: #dacdeb;"><span style="color: #503078;"><strong style="font-size: revert; font-family: inherit;">Immutable backup:</strong><span style="font-size: revert; font-family: inherit; font-weight: inherit;"> The adage often associated with this is &#8220;write once, read many&#8221;, which sums up the concept. This is a backup that relies on files whose state cannot be changed after they have been created, making them resistant to attackers trying to delete them. In practice, neither the administrator of the backup software nor the administrator of the storage arrays can delete or alter a backup identified as immutable.</span></span></td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19649 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1.png" alt="" width="4400" height="2475" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1.png 4400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-2048x1152.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-800x450.png 800w" sizes="auto, (max-width: 4400px) 100vw, 4400px" /></p>
<p>&nbsp;</p>
<p style="text-align: justify;">Finally, one last point of detail, knowing which DCs to back up and use for restoration when necessary is essential (DC Global Catalog, most recent OS version, etc.), as is knowledge of the frequency (ideally daily) and the retention period (a much more subjective subject).</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">Fast rebuilding : often incompletely tested capabilities</h1>
<p style="text-align: justify;">Rebuilding tests are as old as the concept of DRP. But again, one can&#8217;t just rely on these annual tests to consider oneself prepared, given the state of the threat. Indeed, these tests are very often based on assumptions that will not be verified in the event of a major cyber-attack: available backups, confidence in the state of the information system, functional collaborative tools (workstations, messaging, ticketing tools, etc.), ready and available target hosting infrastructure, etc.</p>
<p style="text-align: justify;">From what we observe in organisations, the times displayed and communicated on the reconstruction times of an AD domain are often underestimated a priori. The start and stop times of the stopwatch are often questionable: it starts when the backup recovery start button is pressed and stops when a DC is restored and operational (AD forest recovery procedure executed <a href="#ref2" name="ref2-retour">[2]</a>). However, some points are often overlooked when comparing this time to the RTO time:</p>
<ul style="text-align: justify;">
<li>unsatisfied dependency on another indispensable domain (domain with one or more approval relationships with other domains),</li>
<li>ability to handle the authentication load that a service reopening will represent,</li>
<li>execution time for &#8220;grooming&#8221; operations (mass password change, deactivation of certain services or accounts, clean-up in objects and groups, etc.),</li>
<li>etc.</li>
</ul>
<p style="text-align: justify;">When the AD infrastructure is paralysed by a major cyber-attack, rebuilding it will quickly become the crisis unit&#8217;s priority, because of the dependence of applications and users on it. It is also the service with the lowest RTO. In the case where backups are available, certain questions quickly arise that must be addressed in the cyber defense strategy that is being defined (see our article on <a href="https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/">Successful Ransomware Crisis Management: Top 10 pitfalls to avoid</a>):</p>
<ul style="text-align: justify;">
<li>Is there a need for an area to accommodate sensible future infrastructure?</li>
<li>Does creating users in Azure AD during the crisis allow the service to be reopened more quickly?</li>
<li>If there are many AD domains (as is the case with very large organisations), in what order should they be created?</li>
</ul>
<p style="text-align: justify;">On the infrastructure side, firstly, in most cases, having an isolated and secure rebuild area saves time. This must be available, ready to host the number of VMs required to achieve the level of service considered acceptable in such a situation and under the control (accounts with sufficient rights, accessibility, etc.) of the team responsible for the Active Directory service only. This is to reduce the risk of compromise but also to avoid creating obstacles (requests to be made to another team) the day the need arises.</p>
<p style="text-align: justify;">This zone can be on-premises or in a cloud service, depending on the costs and the organisation&#8217;s cybersecurity posture with regard to hosting DC on a cloud (if it is public). This dormant zone can also be used to host regular Active Directory recovery tests, to get as close as possible to a real situation. Finally, this infrastructure must obviously be in tier 0, if the organisation relies on this framework.</p>
<p style="text-align: justify;">Then, on the process side, it is advisable to prepare several pieces of information in advance that will be essential when the need to rebuild the service arises:</p>
<ul style="text-align: justify;">
<li>determine the minimum number of DCs and their location (rebuilding area in the cloud / on-premises, but also geographically in case of presence in multiple locations),</li>
<li>determine the replication method (standard replication or use of IFM <a href="#ref3" name="ref3-retour">[3]</a>) of the DCs to minimise the time between the availability of the first and last DC required to reopen the service,</li>
<li>determine ready and deactivated filtering rules, which only need to be activated before the service is opened,</li>
<li>establish the acceptable level of risk for the rebuild (simple rebuild and object grooming or pivot method),</li>
<li>(in organisations with multiple domains serving multiple businesses) establish a rebuild sequence, which should have been determined in advance with the business managers, to reopen the service with the right priorities.</li>
</ul>
<p style="text-align: justify;">Here again, specialised AD backup and recovery tools provide value: they allow the recovery process of an AD forest to be carried out in a few clicks and in an automated manner. Parallelization of these operations is also made possible, making these tools an undeniable accelerator to consider for organizations with many forests!</p>
<p style="text-align: justify;">Finally, on the resources side, it is important to have an organisation that can respond to this occasional but very important work overload. For this, the automation of reconstruction activities that can be automated, but also the existence of teams that have already practised the exercise many times, is often decisive.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19653 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN.png" alt="" width="4400" height="2475" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN.png 4400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-2048x1152.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-800x450.png 800w" sizes="auto, (max-width: 4400px) 100vw, 4400px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19657 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN.png" alt="" width="4400" height="2475" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN.png 4400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-2048x1152.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-800x450.png 800w" sizes="auto, (max-width: 4400px) 100vw, 4400px" /></p>
<p>&nbsp;</p>
<p style="text-align: justify;">Some organisations take advantage of Disaster Recovery testing to simulate the worst possible situation for the Active Directory service, rather than just simulating a partial recovery. This is undoubtedly good practice.</p>
<p style="text-align: justify;">Ultimately, asking the question of the resilience of one&#8217;s Active Directory infrastructure draws on the more global subject of information system resilience, but also concepts around tiering, and considerations regarding regularly scheduled full-scale exercises. We could even make a bridge with DevOps: wouldn&#8217;t we dream of being able to redeploy an AD infrastructure almost automatically, in the image of what DevOps manages to do thanks to the ‘Infrastructure as Code’ concept? In the meantime, regular training remains the only way to develop confidence about one&#8217;s ability to quickly reopen a minimal AD service if it were to be completely destroyed.</p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;"><a href="#ref1-retour">[1]</a> <a href="https://www.wavestone.com/en/insight/cert-w-2022-cybersecurite-trends-analysis/" name="ref1">https://www.wavestone.com/en/insight/cert-w-2022-cybersecurite-trends-analysis/</a></p>
<p style="text-align: justify;"><a href="#ref2-retour">[2]</a> <a href="https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/manage/ad-forest-recovery-guide" name="ref2">https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/manage/ad-forest-recovery-guide</a></p>
<p style="text-align: justify;"><a href="#ref3-retour">[3]</a> Install From Media&nbsp;: <a href="https://social.technet.microsoft.com/wiki/contents/articles/8630.active-directory-step-by-step-guide-to-install-an-additional-domain-controller-using-ifm.aspx" name="ref3">https://social.technet.microsoft.com/wiki/contents/articles/8630.active-directory-step-by-step-guide-to-install-an-additional-domain-controller-using-ifm.aspx</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/">ACTIVE DIRECTORY RECOVERY: HOW TO BE READY ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active Directory security tools radar</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/05/active-directory-security-tools-radar/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/05/active-directory-security-tools-radar/#respond</comments>
		
		<dc:creator><![CDATA[Alexandre Lukat]]></dc:creator>
		<pubDate>Wed, 25 May 2022 08:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17988</guid>

					<description><![CDATA[<p>Active Directory (AD) is a directory provided by Microsoft since Windows 2000 Server, that centralises the mechanisms for identifying, authenticating, and managing access rights to the organisation&#8217;s resources. This component is adopted by a significant number of organisations (approximately 90 to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/active-directory-security-tools-radar/">Active Directory security tools radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Active Directory (AD) is a directory provided by Microsoft since Windows 2000 Server, that centralises the mechanisms for identifying, authenticating, and managing access rights to the organisation&#8217;s resources. This component is adopted by a <strong>significant number of organisations</strong> (approximately 90 to 95 percent of companies with more than 1,000 employees use Active Directory [1] [2]), making it a real market standard.</p>
<p style="text-align: justify;">In recent years, <strong>AD has been frequently targeted by attackers</strong>, as it <strong>has been compromised in 100% of the cyber-attacks</strong> managed by CERT-Wavestone, with the intention of using the access gained to spread malware (e.g., ransomware) throughout the IS or to access and leak a large amount of sensitive information from an organisation.</p>
<p style="text-align: justify;">However, its degree of security remains highly inadequate: In 2018, 96% of <strong>penetration tests</strong> carried out by Wavestone on 25 information systems of prominent companies <strong>resulted in total compromise</strong>. Even though this value has been decreasing over the past two years, it is still close to 90%.</p>
<p style="text-align: justify;">As this has become an <strong>absolute priority</strong> for most organisations, corporate cybersecurity teams have launched major programmes to strengthen the AD’s security level. Organisations are searching for solutions to help them in addressing this complex, wide-ranging project, that includes top priority topics such as the implementation of <strong>tiering</strong>.</p>
<p style="text-align: justify;">By analysing the market, we have identified 4 use cases on which these tools are positioned:</p>
<ol style="text-align: justify;">
<li>Analysis and audit</li>
<li>Hardening and maintenance in security condition</li>
<li>Detection</li>
<li>Response and Rebuild</li>
</ol>
<p style="text-align: justify;">The following radar shows a set of vendors providing solutions for these four use cases related to Active Directory security.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20297 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23good.png" alt="" width="1496" height="1112" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23good.png 1496w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23good-257x191.png 257w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23good-52x39.png 52w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23good-768x571.png 768w" sizes="auto, (max-width: 1496px) 100vw, 1496px" /></p>
<p><em style="font-size: revert; color: initial;">Last update : April 2023</em></p>
<p> </p>
<h1 style="text-align: justify;">SPECIALISED TOOLS, EACH ANSWERING A PART OF THE EQUATION</h1>
<h2 style="text-align: justify;"> </h2>
<h2 style="text-align: justify;">&#8220;AUDIT&#8221;: MAP THE AD AND IDENTIFY ITS VULNERABILITIES TO STRUCTURE AN ACTION PLAN</h2>
<p style="text-align: justify;"> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20291 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23bis.png" alt="" width="2139" height="644" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23bis.png 2139w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23bis-437x132.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23bis-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23bis-768x231.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23bis-1536x462.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Avril23bis-2048x617.png 2048w" sizes="auto, (max-width: 2139px) 100vw, 2139px" /></p>
<p style="text-align: justify;">Before starting any action to improve security, it is necessary to identify the starting point, by establishing an <strong>initial inventory</strong>. To do so, you can use an audit tool to examine various aspects of the AD configuration, such as obsolete protocols, obsolete OS versions, out-of-date functional levels, password policies, approval relationships with other AD forests, privileged accounts, and the granting of rights that could lead to compromise paths, among other things.</p>
<p style="text-align: justify;">These tools are <strong>traditionally used</strong> by offensive security teams (internal or external), but we are increasingly observing a recurrent use of this tool by teams in charge of Active Directory MCO and security teams throughout the project to track the rectification of identified vulnerabilities month after month.</p>
<p style="text-align: justify;">For the identification of AD vulnerabilities, tools such as PingCastle (<em>open source</em>), Purple Knight (Semperis), Group3r (<em>open source</em>) ADAnlyzer (Cogiceo) and OAADS (Microsoft) can be used. For compromise paths, BloodHound (<em>open source</em>) or AD Control Path (<em>open source</em>, ANSSI) can be used.</p>
<p style="text-align: justify;">Finally, for regulated and public-sector operators in France, ANSSI offers the Active Directory Security (ADS) service [3], which enables critical operators in assessing their security level.</p>
<p style="text-align: justify;">It should be noted that all audit solutions produce security reports on various reviewed elements, sometimes with a maturity score (that may be based on the Active Directory checkpoints provided by the ANSSI [4]) and technical indications for the correction to be made. <strong>The cybersecurity teams should then analyse and put various vulnerabilities in the light of the company&#8217;s context</strong> (e.g., priority areas, links with other ongoing projects, a more global security trajectory, etc.), create an action plan by first <strong>identifying the impacts</strong> associated with their implementation, prioritise the deployment of corrective actions, and <strong>ensure that they are effective</strong>.</p>
<p> </p>
<h2 style="text-align: justify;">&#8220;HARDEN &amp; MANAGE&#8221;: STRENGTHENING THE SECURITY LEVEL OF THE AD BY APPLYING GOOD PRACTICES</h2>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17962 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/3.png" alt="" width="874" height="67" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/3.png 874w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/3-437x34.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/3-71x5.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/3-768x59.png 768w" sizes="auto, (max-width: 874px) 100vw, 874px" /></p>
<p style="text-align: justify;">It is not easy to keep <strong>Active Directory secure on a daily basis</strong>. Every day, changes are made at various levels (e.g., creating accounts, adding accounts to groups, granting rights to accounts, modifying GPOs, changing security policies, etc.), which can, in some cases, expose the Active Directory more than one can imagine.</p>
<p style="text-align: justify;">Firstly, <strong>detecting vulnerabilities without delay and without taking manual actions</strong> might be an accelerator if adequate governance is in place to deal with the alarms raised. To this end, products such as Tenable.ad (Tenable), Directory Services Protector (Semperis), and Security Compliance Toolkit (Microsoft) can provide real-time visibility of vulnerabilities, allowing for increased reactivity in remediation. It should be noted that some organisations prefer to use auditing tools on a regular basis (i.e., many times a month) to identify and address the delta.</p>
<p style="text-align: justify;">In addition, a range of tools exist to <strong>improve overall visibility, simplify day-to-day management</strong>, and thus enhance security, or to <strong>identify configuration changes</strong> that have been made. For example, AD Audit Plus (Manage Engine) or DatAdvantage for Directory Services (Varonis) allows you to receive all the details concerning a change and be notified, if necessary, while Booster for Active Directory (Brainwave) or Privilege Assurance (QOMPLEX) boosts the overall visibility of the AD. Furthermore, Quest&#8217;s suite of tools, ActiveRoles For Server to complete delegation management, Change Auditor to identify configuration changes, and GPOAdmin to maintain control of GPOs can complement the tools available to the AD MCO team.</p>
<p style="text-align: justify;">Finally, in terms of improving <strong>privileged account management</strong>, we can refer to Stealthbits Privileged Activity Manager (Netwrix), which incorporates a PAM solution that makes possible, for example, just-in-time administration (granting privileges to an account only for an operation to be carried out and not permanently).</p>
<h2 style="text-align: justify;"> </h2>
<h2 style="text-align: justify;">&#8220;MONITOR&#8221;: DETECT COMPROMISE ATTEMPTS BEFORE THEY SUCCEED</h2>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20299 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Monitor.png" alt="" width="1783" height="686" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Monitor.png 1783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Monitor-437x168.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Monitor-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Monitor-768x295.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/Monitor-1536x591.png 1536w" sizes="auto, (max-width: 1783px) 100vw, 1783px" /></p>
<p style="text-align: justify;">With the security configurations now enabled, Active Directory is more difficult to compromise, but it is not immune. It is therefore essential to <strong>continuously monitor it</strong>, in order to be able to detect the first signs of an attack.</p>
<p style="text-align: justify;">In addition to the detection scenarios implemented in the SIEM by the SOC teams, based on the correlation of previously collected logs, specialised tools can complete the system. The latter retrieve data directly from the Domain Controllers either through an agent or an account, and then perform their own correlation and detection processes.</p>
<p style="text-align: justify;">In this category of tools, we can cite Tenable.ad (Tenable), Directory Services Protector (Semperis), Falcon Identity Threat Detection (CrowdStrike), Ranger AD &amp; Singularity Identity (SentinelOne) or DatAlert (Varonis).</p>
<h2 style="text-align: justify;">&#8220;RESPOND &amp; RECOVER&#8221;: INVESTIGATE COMPROMISES AND REBUILD THE ACTIVE DIRECTORY</h2>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20301 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/RR.png" alt="" width="1333" height="421" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/RR.png 1333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/RR-437x138.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/RR-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/05/RR-768x243.png 768w" sizes="auto, (max-width: 1333px) 100vw, 1333px" /></p>
<p style="text-align: justify;">In the event of a <strong>partial or total compromise of the AD</strong>, two actions should be carried out quickly and in parallel</p>
<p style="text-align: justify;">&#8211; Forensics, to understand how the attacker proceeded and what level of confidence one can have in the AD in its current state.</p>
<p style="text-align: justify;">&#8211; Restoration / reconstruction of the AD, depending on the case.</p>
<p style="text-align: justify;">To carry out the <strong>necessary investigations</strong> and attempt to trace the source of the initial compromise, we can suggest the ADTimeline tool (open source, ANSSI), that allows to trace the modifications made to an AD via replication data.</p>
<p style="text-align: justify;">Completely rebuilding an AD environment can take several days or even weeks, which can have a major impact on the organisation. <strong>Minimising this time can be vital in some cases</strong>. Some tools that can help reduce this time include Active Directory Forest Recovery (Semperis), which automates the Microsoft Forest recovery process, and Recovery Manager for Active Directory (Veeam), which combines compromise-proof backup and recovery when needed.</p>
<p style="text-align: justify;">It should be noted that some organisations choose to outsource (after encryption) the backup as well as to automate and regularly practice the reconstruction, or even to host one of the forest&#8217;s Domain Controllers on a third-party platform to maximise the chances of successful restoration, by diversifying the means of backup.</p>
<h1 style="text-align: justify;">WHAT ABOUT AZURE AD?</h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Given that many companies are now in a hybrid mode, it is advisable to integrate Azure AD into the scope of the security project as soon as possible. Some tools that can be mentioned within this context are:</p>
<p style="text-align: justify;">&#8211; On the &#8220;<strong>Audit</strong>&#8221; section: Microsoft 365 DSC, BloudHound (now including an Azure AD part)</p>
<p style="text-align: justify;">&#8211; On the &#8220;<strong>Harden &amp; Manage</strong>&#8221; section: CoreView, Idecsi, Microsoft tools (Azure AD Access Reviews, Azure AD Entitlement Management, Azure AD Privileged Identity management, etc.)</p>
<p style="text-align: justify;">&#8211; On the &#8220;<strong>Monitor</strong>&#8221; section: Azure AD Identity Protection, Microsoft 365 DSC</p>
<p style="text-align: justify;">&#8211; On the &#8220;<strong>Respond &amp; Recover</strong>&#8221; section: Azure AD Identity Protection, Quest On Demand Recovery</p>
<h1 style="text-align: justify;">IMPORTANT POINTS ABOUT USING TOOLS</h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Deploying a tool alone does not increase the security level of AD environments. Once a tool has been acquired, <strong>it is important not to neglect the rest</strong>: defining and implementing <strong>governance</strong> (processes, organisational model, comitology, steering, reporting, control, continuous improvement, etc.) and the <strong>resources with the right expertise</strong> to make security improvements effective (dealing with alerts, correcting vulnerabilities, carrying out continuous improvement actions, etc.).</p>
<p style="text-align: justify;">Also, a series of r<strong>elated projects to be carried out and processes to be reviewed</strong> during AD security projects, should <strong>not be underestimated</strong>: patch management, inventory, rationalisation (limiting the number of domains/forests in order to make it easier to maintain them in a secure condition), review of the backup strategy, reconstruction training, construction of restoration/clean-up infrastructure, etc.</p>
<p style="text-align: justify;">Finally, when deploying these tools, keep in mind not to further expose the Active Directory: installing agents on Domain Controllers, opening network flows, granting privileges to accounts or service accounts, etc.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">ABOUT OUR METHOD</h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The radar was built on the basis of a survey of tools on the market. On this basis and in relation to the recurring themes of Active Directory security, a categorisation has been established to facilitate reading.</p>
<p style="text-align: justify;">The tools presented do not claim to be exhaustive, as the number of tools that can contribute to Active Directory security in any way is extensive. This radar is thus a review of the prominent existing tools, notably those encountered frequently by Wavestone consultants in organisations (considered, studied, tested and even deployed).</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">[1] <a href="https://docs.aws.amazon.com/whitepapers/latest/active-directory-domain-services/active-directory-domain-services.html">https://docs.aws.amazon.com/whitepapers/latest/active-directory-domain-services//active-directory-domain-services.html</a></p>
<p style="text-align: justify;">[2] <a href="https://www.silicon.fr/avis-expert/repenser-la-securite-dactive-directory-a-lere-du-cloud">https://www.silicon.fr/avis-expert/repenser-la-securite-dactive-directory-a-lere-du-cloud</a></p>
<p style="text-align: justify;">[3] <a href="https://www.ssi.gouv.fr/actualite/le-service-active-directory-security-ads-accompagner-la-securisation-des-annuaires-active-directory-des-acteurs-critiques/">https://www.ssi.gouv.fr/actualite/le-service-active-directory-security-ads-accompagner-la-securisation-des-annuaires-active-directory-des-acteurs-critiques/</a></p>
<p style="text-align: justify;">[4] <a href="https://www.cert.ssi.gouv.fr/uploads/guide-ad.html">https://www.cert.ssi.gouv.fr/uploads/guide-ad.html</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/active-directory-security-tools-radar/">Active Directory security tools radar</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/05/active-directory-security-tools-radar/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
