Semperis University

Exploiting the Intruder’s Dilemma for Active Directory Defense

Exploiting the Intruder’s Dilemma for Active Directory Defense

  • Huy Kha | Senior Identity & Security Architect
  • May 20, 2025

Can you create an AD defense that exploits intruder attack techniques? Learn how to selectively use an attacker’s own methods to detect and expel them.

Defending Against Cable: Prevent Malicious Use of Post-Exploitation Tool

Defending Against Cable: Prevent Malicious Use of Post-Exploitation Tool

  • Huy Kha | Senior Identity & Security Architect
  • May 06, 2025

Post-exploitation tools—such as Cable, the Active Directory-specific pentesting tool—are meant to educate security teams. But attackers use them too. Here’s how to detect and defend against malicious use of the Cable tool.

How to Automatically Undo Risky Changes in Active Directory

How to Automatically Undo Risky Changes in Active Directory

  • Huy Kha | Senior Identity & Security Architect
  • Apr 21, 2025

For most organizations, manually auditing and rolling back every risky Active Directory change isn’t practical—or even possible. Discover how the Auto Undo feature in DSP works to automate change mitigation to protect sensitive AD and Entra ID objects and attributes.

Effective GPO Change Auditing with Directory Services Protector

Effective GPO Change Auditing with Directory Services Protector

  • Huy Kha | Senior Identity & Security Architect
  • Mar 01, 2025

Tracking Group Policy changes can be tricky, especially in large environments with numerous Group Policy Objects (GPOs) linked to different organizational units (OUs). Yet GPO change auditing is a vital part of effective cybersecurity. Without proper visibility, critical changes—whether due to accidental misconfigurations or malicious activity—can easily slip under the…