Active Directory Security

Active Directory Security

Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…

  • Home
  • About
  • AD Resources
  • Attack Defense & Detection
  • Contact
  • Mimikatz
  • Presentations
  • Schema Versions
  • Security Resources
  • SPNs
  • Top Posts

Tag: User Access Administrator

May 27 2020

From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path

  • By Sean Metcalf in Cloud Security, Microsoft Security, TheCloud

For most of 2019, I was digging into Office 365 and Azure AD and looking at features as part of the development of the new Trimarc Microsoft Cloud Security Assessment which focuses on improving customer Microsoft Office 365 and Azure AD security posture. As I went through each of them, I found one that was …

Continue reading

  • Access management for Azure resources, ActiveDirectory, Azure AD PIM, Azure Owner, Azure RBAC, Azure root, AzureAD, Company Administrator, Compromise Azure Domain Controller, Compromise Azure VM, Elevate Access, EnableAdminAccount, From Azure AD to Azure, Global Admin to Azure, Global Administrator, Global Administrator Elevate Access, MFA, Microsoft.Compute/virtualMachines/runCommand/, net localgroup, Office 365 Security, PIM, Privileged Identity Manager, Run PowerShell on Azure VM, runCommand, RunPowerShellScript, User Access Administrator, Virtual Machine Contributor
  • 5 comments

Recent Posts

  • Attacking Active Directory Group Managed Service Accounts (GMSAs)
  • From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path
  • What is Azure Active Directory?
  • Slides Posted for Black Hat USA 2019 Talk: Attacking & Defending the Microsoft Cloud
  • AD Reading: Windows Server 2019 Active Directory Features

Trimarc Active Directory Security Services

Have concerns about your Active Directory environment? Trimarc helps enterprises improve their security posture.

Find out how... TrimarcSecurity.com

Popular Posts

  • Attack Methods for Gaining Domain Admin Rights in…
  • PowerShell Encoding & Decoding (Base64)
  • Kerberos & KRBTGT: Active Directory’s…
  • Finding Passwords in SYSVOL & Exploiting Group…
  • Securing Domain Controllers to Improve Active…
  • Securing Windows Workstations: Developing a Secure Baseline
  • Mimikatz DCSync Usage, Exploitation, and Detection
  • Detecting Kerberoasting Activity
  • Scanning for Active Directory Privileges &…
  • The Most Common Active Directory Security Issues and…

Categories

  • ActiveDirectorySecurity
  • Apple Security
  • Cloud Security
  • Continuing Education
  • Entertainment
  • Exploit
  • Hacking
  • Hardware Security
  • Hypervisor Security
  • Linux/Unix Security
  • Malware
  • Microsoft Security
  • Mitigation
  • Network/System Security
  • PowerShell
  • RealWorld
  • Security
  • Security Conference Presentation/Video
  • Security Recommendation
  • Technical Article
  • Technical Reading
  • Technical Reference
  • TheCloud
  • Vulnerability

Tags

ActiveDirectory Active Directory ActiveDirectoryAttack ActiveDirectorySecurity Active Directory Security ADReading ADSecurity AD Security DCSync DEFCON DomainController EMET5 GoldenTicket HyperV Invoke-Mimikatz KB3011780 KDC Kerberos KerberosHacking KRBTGT LAPS LSASS MCM MicrosoftEMET MicrosoftWindows mimikatz MS14068 PassTheHash PowerShell PowerShellCode PowerShellHacking PowerShellv5 PowerSploit Presentation Security SIDHistory SilverTicket SneakyADPersistence SPN TGS TGT Windows10 WindowsServer2008R2 WindowsServer2012 WindowsServer2012R2

Copyright

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned. Content Ownership: All content posted here is intellectual work and under the current law, the poster owns the copyright of the article. Terms of Use Copyright © 2011 - 2020.

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned.

Made with by Graphene Themes.