Active Directory Security

Group Policy Preferences Abuse Explained

Group Policy Preferences Abuse Explained

  • Huy Kha | Senior Identity & Security Architect
  • May 13, 2025

The Group Policy Preferences feature provides a well-known pathway for cyber attackers to discover easily decoded passwords in Active Directory. Learn to spot and defend against this vulnerability.

Defending Against Cable: Prevent Malicious Use of Post-Exploitation Tool

Defending Against Cable: Prevent Malicious Use of Post-Exploitation Tool

  • Huy Kha | Senior Identity & Security Architect
  • May 06, 2025

Post-exploitation tools—such as Cable, the Active Directory-specific pentesting tool—are meant to educate security teams. But attackers use them too. Here’s how to detect and defend against malicious use of the Cable tool.

ESC1 Attack Explained

ESC1 Attack Explained

  • Huy Kha | Senior Identity & Security Architect
  • May 01, 2025

Discover how certificate template misconfigurations in Active Directory Certificate Services (AD CS) enable ESC1 attacks—allowing cyber attackers to rapidly escalate privileges and potentially compromise entire networks.

AD Security: How to Use Delegation of User Management and Windows Password Options

AD Security: How to Use Delegation of User Management and Windows Password Options

  • Guido Grillenmeier | Principal Technologist, EMEA
  • Apr 29, 2025

Permission delegation in Active Directory can be complex. Learn how you can use Windows password options with delegation management to support your user management structure without sacrificing AD security.

How to Automatically Undo Risky Changes in Active Directory

How to Automatically Undo Risky Changes in Active Directory

  • Huy Kha | Senior Identity & Security Architect
  • Apr 21, 2025

For most organizations, manually auditing and rolling back every risky Active Directory change isn’t practical—or even possible. Discover how the Auto Undo feature in DSP works to automate change mitigation to protect sensitive AD and Entra ID objects and attributes.

Pass the Hash Attack Explained

Pass the Hash Attack Explained

  • Huy Kha | Senior Identity & Security Architect
  • Apr 09, 2025

Cyber attackers can choose from numerous credential compromise methods to gain access to Active Directory. The Pass the Hash attack is one that is stealthy and efficient.

Hospital Cyberattacks Highlight Importance of Active Directory Security

Hospital Cyberattacks Highlight Importance of Active Directory Security

  • Michael Choo
  • Mar 24, 2025

Two back-to-back incidents—part of a global increase in cyberattacks on healthcare organizations—followed common pathways to exploit AD security vulnerabilities.

Introduction to Identity Forensics & Incident Response (IFIR)

Introduction to Identity Forensics & Incident Response (IFIR)

  • Huy Kha | Senior Identity & Security Architect
  • Mar 21, 2025

From my experience at Microsoft Detection and Response Team (DART), I know that ransomware operators almost always target high-privileged identities. Once attackers gain control, they use those identities to spread ransomware; for example, through Group Policy or PsExec. Ransomware attacks are usually loud and destructive, aiming to cause maximum impact…