Most identity recovery strategies primarily focus on users and groups. But in Entra ID, that’s only part of the story. After an attack, if access signals are missing or misaligned, you may technically have your users back, but you still can’t safely run the business. Take a look at how…
An identity an outage anywhere can become a business crisis everywhere. And effective defense means resilience—not just prevention—so operations can continue, even under attack. Learn how Semperis’ acquisition of MightyID expands our comprehensive identity resilience across your entire identity fabric.
Active Directory is attackers’ favorite path to domain dominance. Learn how mapping your defenses to the NIST Cybersecurity Framework can improve cyber incident response and recovery.
For anyone safeguarding hybrid identity systems, continuous learning and cyber community engagement are critical. Here are our top picks for conferences that deliver a laser-focus on identity security—and the technical knowledge you need to stay ahead of threats.
Dive into EntraGoat Scenario 3, where you’ll discover how individually legitimate Entra ID features, when combined with misconfigured group ownership, can cascade into a privilege escalation chain that elevates a low-level account into a tenant-wide threat.
The Semperis-Cohesity partnership is the convergence of two industry leaders, each with singular expertise. With Cohesity Identity Resilience, organizations can be confident that their critical identity systems are secure and recoverable.
Editor’s note This scenario is part of a series of examples demonstrating the use of EntraGoat, our Entra ID simulation environment. You can read an overview of EntraGoat and its value here. Certificate Bypass Authority–Root Access Granted EntraGoat Scenario 6 details a privilege escalation technique in Microsoft Entra ID where…
In our second EntraGoat attack scenario, follow the steps from a carelessly leaked certificate to capture the Global Admin password—and full Entra ID compromise.