Active Directory Security Resources

Identity-first resources for defenders and buyers.

FeaturedStart Here
8 min

What is an Active Directory Security Assessment?

Learn what an Active Directory security assessment covers, how it differs from standard penetration tests, and why identity-first testing matters for domain takeover prevention.

assessmentsactive directorybuyer guides
FeaturedBuyer Guides
10 min

Internal Pentest vs Active Directory Security Assessment

Understand the differences between a standard internal penetration test and an identity-focused AD assessment, and when each approach makes sense.

assessmentsbuyer guidescomparison
FeaturedHardening
12 min

Active Directory Hardening & Hygiene Checklist

A practical checklist to reduce identity-driven attack paths across Active Directory.

hardeninghygienechecklist+1 more
Attack Paths
14 min

How Attackers Become Domain Admin

Understand the common attack paths from initial access to domain compromise: privilege escalation, lateral movement, and credential theft.

attack pathsprivilege escalationdomain admin
AD CS
13 min

ADCS ESC1 and ESC4 Explained

Understanding Active Directory Certificate Services vulnerabilities: ESC1 and ESC4 attack techniques, how they work, and how to prevent them.

adcscertificatesattack paths+2 more
Attack Paths
15 min

Top Active Directory Misconfigurations

Common AD misconfigurations that create attack paths: weak delegation, permissive ACLs, trust abuse, and GPO issues.

misconfigurationsattack pathshardening
Hardening
11 min

AD Permissions and ACLs Explained

How Active Directory permissions and Access Control Lists work, common misconfigurations, and how to audit them effectively.

permissionsaclshardening+1 more
Hardening
8 min

KRBTGT Rotation: Why It Matters

Understanding the KRBTGT account, why regular password rotation is critical, and how to perform it safely without breaking authentication.

hardeningkrbtgtauthentication+1 more
Hardening
10 min

GPO Misconfigurations and Risk

Common Group Policy Object misconfigurations that create security risks: overly broad scope, permissive permissions, and legacy policies.

gpogroup policyhardening+1 more
Hardening
9 min

SMB and LDAP Signing: Why It Matters

Why SMB and LDAP signing are critical for preventing relay attacks and man-in-the-middle attacks in Active Directory environments.

hardeningsmbldap+1 more

Need help validating this in your environment?

Our Active Directory security assessment identifies misconfigurations, privilege escalation paths, and attack chains in your environment.