GPO FundamentalsGroup Policy & Endpoint Policy

Monitoring Group Policy for backdoors

Monitoring Group Policy for Backdoors (GPO Tampering Detection & Response) Group Policy is one of the most powerful configuration channels in Active Directory—and that’s exactly why attackers love it. If a threat actor gains the ability to edit a Group Policy Object (GPO) (or its SYSVOL content), they can push “legitimate” settings that…
Read more
Attack Techniques & Threat ModelingSecurity Operations for Identity

Detecting Pass-the-Hash attacks

Pass-the-Hash (PtH) is a credential abuse technique where an attacker uses a captured NTLM password hash to authenticate to other systems—without ever knowing the user’s plaintext password. In an Active Directory environment, PtH is primarily a lateral movement and privilege expansion tactic: once a usable hash is obtained (often from a workstation), the attacker pivots to servers, file…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

How to detect circular group nesting and resolving token bloat

Detecting circular group nesting and resolving token bloat Group nesting is one of Active Directory’s most powerful features: it lets you express roles, aggregate access, and scale delegation without touching every user object. It’s also one of the easiest ways to accidentally create circular membership (loops) and quietly inflate a user’s logon token until…
Read more