directory-services-protector-bg-desktop-blue
AD Threat Detection & Response

Directory Services Protector

See and stop identity attacks in Active Directory and Entra ID before they become outages.

Get AI-powered, tamperproof threat detection for hybrid AD and Entra ID

Semperis delivers identity threat detection and response that goes beyond traditional logging tools, combining tamperproof tracking of every directory change with automatic rollback of malicious activity to stop attacks in real time. Our AI-powered detection engine recognizes suspicious patterns that evade rules-based systems, while built-in service account protection uncovers and locks down the non-human identities attackers love to abuse.

Shrink your hybrid identity attack surface

Continuously uncover misconfigurations and exposures across AD and Entra ID before attackers do.

Catch stealthy identity attacks

Detect changes that bypass logs and agents using tamperproof AD replication stream monitoring.

Stop damage automatically

Automatically roll back malicious changes in AD and Entra ID faster than humans can.

What our customers say

Hybrid AD and Entra ID create a massive, shifting attack surface

Securing legacy AD alone is hard. Securing hybrid AD and Entra ID systems is even harder. Misconfigurations and unpatched vulnerabilities pile up over years, while attackers pivot between on-prem and cloud identity systems in search of elevated privileges. In hybrid environments, any connected device or misconfigured account can expose the heart of your identity infrastructure. DSP gives you a single view of vulnerabilities and changes across AD, Entra ID, and service accounts so you can regain control of hybrid identity security.

Stop attackers from gaining access to AD and Entra ID
Capture attacks that bypass security logs
Automatically remediate malicious changes
Use AI-powered attack pattern detection

Assess, detect, and auto-remediate hybrid AD and Entra ID exposures

Directory Services Protector dashboard screenshot
Continuously monitor hybrid AD and Entra ID systems

Use hundreds of built-in, constantly updated security indicators in DSP to monitor your hybrid AD/Entra ID environment for legacy vulnerabilities and emerging threats. See status in a clear dashboard that highlights severity levels, so you can quickly prioritize actions to improve security posture.

  • See overall security posture score in a clear dashboard
  • View security indicator status by severity level at a glance
  • Get hundreds of security indicators constantly updated by an in-house expert threat research team
  • See AD and Entra ID vulnerabilities in a single dashboard to catch attacks that move from on-prem to cloud, and vice versa
Automatically roll back unwanted changes in AD and Entra ID

Cyberattacks move too fast for human intervention. Use DSP’s automated rollback to undo unwanted or malicious changes in both AD and Entra ID.

  • Create audit notifications on risky changes to critical AD and Entra ID objects and attributes.
  • Build custom rules to automatically roll back risky Entra ID changes to objects, users, roles.
  • Use automated actions to create ServiceNow tickets, require password changes, and disable either the “ChangedBy” user or the target object
Protect service accounts (NHIs) with monitoring and alerting

Service accounts are a non-human identity type frequently targeted by threat actors. Use DSP to identify service accounts, build an inventory, and continually monitor with specialized indicators developed by Semperis’ expert threat research team.

  • Discover unknown and misplaced service accounts
  • Detect stale and misconfigured accounts
  • Identify risky configurations and critical exposures
  • Alert on malicious and anomalous behavior
Learn more about DSP’s service account protection
Use AI-powered attack pattern detection to thwart legacy and emerging attack types

Use AI-powered attack detection with a specialized identity risk focus to cut through the noise and accelerate incident response for the most widespread and successful attacks.

  • Get attack detection powered by AI models developed by identity security experts to detect widespread and successful attack patterns such as password spray, credential stuffing, other brute force attacks, and risky anomalies
  • Detect sophisticated identity attacks traditional AI solutions miss
  • Reduce signal noise and accelerate remediation by layering identity-risk context drawn from multiple sources
Learn more about AI-powered attack pattern detection
Semperis Directory Services Protector Splunk integration dashboard view
Seamless integration with Microsoft Sentinel and Splunk

See identity-rich data within your SIEM with out-of-the-box integrations for both Splunk and Microsoft Sentinel that forward AD and Entra ID change data, DSP security indicator results, and notification rule events via Windows event logs and Syslog/CEF connectors so identity signals are visible alongside other security telemetry.

  • Use prebuilt dashboards and alerts for Splunk that visualize AD security changes and can be customized or piped into SOAR and ticketing workflows.
  • View DSP data in Microsoft Sentinel with an Azure Marketplace solution that deploys data connectors, parsers, a DSP workbook (Quickview, AD Changes, Notifications, Security Indicators), and sample analytic rules to surface IOEs/IOCs and drive high-fidelity, identity-aware detections

See Directory Services Protector in action

Any connected device can expose the heart of your IT infrastructure. The systems you rely on to communicate, to coordinate, and to share data will be inaccessible if an attacker breaches your hybrid AD/Entra ID system. And in a hybrid AD and Entra ID scenario, the potential attack surface expands.

Directory Services Protector is the only threat detection and response solution that provides a single view of security vulnerabilities across the hybrid AD/Entra ID environment, including non-human identities, or service accounts. Check out these videos to see how it works.

Minimize the attack surface
Minimize the attack surface

Discover AD and Entra ID vulnerabilities and risky configurations in hybrid environments before attackers do. Get prioritized, action-oriented guidance from a community of AD security threat researchers. Reduce your hybrid identity system attack surface and stay ahead of the ever-evolving threat landscape.

Request a demo
Detect advanced attack patterns
Detect advanced attacks

Use AI-powered attack detection with a specialized identity risk focus to cut through the noise and accelerate incident response for the most widespread and successful attacks, including password spray, credential stuffing, other brute force attacks, and risky anomalies.

Request a demo
Automate remediation
Orchestrate response with automated actions

Implement an immediate, orchestrated response to risky identity system changes with automated actions to create ServiceNow tickets, require password changes, and disable users and target objects.

Request a demo
Protect service accounts
Protect service accounts from attack

Discover dormant and unmanaged service accounts, continuously detect misuse, and receive alerts on malicious service account behavior with Service Accounts Protection in Directory Services Protector.

Request a demo

Is your Active Directory vulnerable to a cyberattack?

Identity has become the primary blast radius in modern attacks, with hybrid Active Directory and Entra ID now at the center of most intrusions. AD still underpins identity for about 90% of organizations worldwide, and attackers increasingly move laterally between on-prem AD and Entra ID—using techniques like password spray, token theft, and privilege escalation across both environments—to achieve maximum impact, as seen in recent high-profile ransomware and nation-state campaigns.

increase in the number of identity-related attacks in the first half of 2025
of ransomware attacks target hybrid identity environments
average time to identify and contain attacks that start with stolen credentials

Frequently asked questions

What is Directory Services Protector?

Directory Services Protector (DSP) is a Gartner-recognized identity threat detection and response (ITDR) solution that puts hybrid Active Directory security on autopilot with continuous monitoring and unparalleled visibility across on-premises AD and Entra ID environments, tamperproof tracking, and automatic rollback of malicious changes.

Does Directory Services Protector use AI or machine learning to detect identity attacks?

Yes: DSP’s Identity Runtime Protection uses machine-learning models built by identity security experts to detect high-signal attack types like password spray, credential stuffing, other brute force attempts, and risky anomalies, surfacing them as incidents with rich investigation context.

How does DSP protect service accounts and other non-human identities?

DSP’s Service Accounts Protection discovers and inventories service accounts, continuously monitors them with specialized security indicators, highlights stale or misconfigured accounts, and alerts on malicious or anomalous behavior to reduce the risk of unauthorized access through these high-value non-human identities.

How does DSP work with my SIEM tools like Microsoft Sentinel or Splunk?

In AD-based attacks, the only unalterable data source is the AD replication stream, which is outside the scope of any SIEM’s view. Additionally, most agent-based AD change auditing tools lack deep visibility to detect and thwart such attacks. The AD replication stream is the only reliable method of catching every change (pre-attack and during an attack), no matter how an attacker might attempt to cover their tracks. DSP streams enriched AD and Entra ID change data, security indicator results, and notification rule events into SIEM platforms—including dedicated integrations for Microsoft Sentinel and Splunk—so SOC teams get tamperproof hybrid identity signals alongside the rest of their security telemetry.

Does Directory Services Protector’s capabilities include AD vulnerability assessments?

DSP provides continuous security vulnerability assessment across your on-prem and hybrid AD environment, scanning for hundreds of Indicators of Exposure (IOEs) and compromise (IOCs) across various categories of AD security, including account security, Group Policy, Kerberos, AD delegation, AD infrastructure, and Entra ID. DSP provides a dashboard of the overall security posture score, category scores, security indicators grouped by severity, and prioritized remediation guidance from AD security experts.

Does DSP remediate unwanted changes in both on-prem AD and Entra ID?

Yes. DSP not only rolls back malicious changes in on-prem AD and Entra ID but, through alert & response rules, can also require password changes, disable compromised accounts, and trigger additional automated actions when attacks move too fast for human intervention.

What is DSP’s performance impact on AD?

DSP is non-intrusive and built for compatibility with AD. This unique approach captures changes without compromising AD stability. 

Can DSP support complex AD environments?

DSP is purpose-built for AD and can support even the most complex AD environments, including multi-organization and multi-forest deployments. Large and small organizations rely on Semperis to help them spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies. With processing optimized for some of the largest organizations in the world, DSP can handle the large volume of daily and hourly changes that are common in massive AD environments. 

How is Directory Services Protector different from Microsoft Defender for Identity?

Both Microsoft Defender for Identity (MDI) and Semperis solutions have critical roles in protecting identity systems from attack:

  • MDI uses user-based analytics (UBA) to monitor and alert on user behaviors that fit into known user identity attack models.
  • Semperis protects the entire hybrid AD service—the common attack vector in 90 percent of incidents—with patented technology purpose-built to prevent, mitigate, and recover from identity-based attacks.

Combining Semperis solutions with Microsoft Defender for Identity (MDI) provides a layered defense against attacks that exploit user identities and the AD identity service.

Does DSP help with compliance reporting?

Directory Services Protector includes compliance report templates that align with common compliance standards, including GDPR, HIPAA, PCI, and SOX. You can import individual compliance bundles into DSP to support your organization’s needs. You also can schedule any DSP report, including compliance reports, for recurring generation and distribution.

What criteria does DSP use for generating the security score?

The Directory Services Protector scoring method comprises various factors, including the potential consequences of an exploited vulnerability, ease of exploitation, and the overall prevalence. Based on these factors, each indicator is assigned a severity rating (level and number) that reflects the potential impact on security posture, availability, and performance. The severity rating is then used in the scoring formula to calculate the overall risk posed by the vulnerability.

Does DSP let me specify which events trigger an alert?

DSP lets you add individual objects or conditions that are a known risk to an ignore list so they no longer trigger an alert in DSP or affect the overall security posture score. This approach helps you accurately assess risk and accelerate remediation.

Our mission resonates with industry leaders

See Directory Services Protector in action

Request a demo and talk with an Active Directory security expert.