• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

The 3 Most Common Misconfigurations in Microsoft Active Directory (and How to Fix Them)

Research has revealed that AD also presents significant security risk for these enterprises thanks to misconfigurations and cyberattacks.

October 29, 2021 Andy Robbins Leave a Comment

Most Common Active Directory Misconfigurations

Microsoft Active Directory (AD) is one of, if not THE, most critical services used by organizations of all sizes. In fact, for roughly 90% of Global Fortune 1000 companies, AD is the primary method utilized for seamless authentication and authorization when connecting and managing individual endpoints inside corporate networks. Research has revealed that AD also presents significant security risk for these enterprises, as mountains of misconfiguration debt in AD compound the largely unseen, unmanaged and growing problem of AD Attack Paths for enterprises.

In fact, there are three very common misconfigurations we’ve seen across the majority of AD environments:

  1. Privileged kerberoastable users – Highly privileged users that are susceptible to the “Kerberoast” attack, as first described by Tim Medin. Combining a particular kerberos configuration, a weak password, and a high degree of privilege, attackers can reliably abuse this misconfiguration in nearly every Active Directory domain.
  2. Domain Controller object ownership – It is very common to see normal users or lower-privileged service accounts as the object owners of domain controller computer accounts. This misconfiguration can bridge the gap between the rest of the environment and a domain controller, as these normal users or lower-privilege service accounts are not given the same protections and care as more sensitive domain admin user accounts.
  3. Domain Users group and other large groups having control of other objects – All-inclusive security principals with any kind of special privilege. For example, it’s common to see the “Domain Users” group granted local admin rights on one or more systems. This configuration effectively offers adversaries a jumping-off point for an Attack Path that can potentially lead all the way to the compromise of a Domain Admin user.

So, why are these three common misconfigurations such a problem, and what attacks do they open organizations up to? To start, the most impactful contributing factor to the emergence of these misconfigurations is a lack of visibility provided by native and third-party tooling. These misconfigurations aren’t easy to identify or understand using Microsoft’s own tooling, and even third-party tooling that can spot these misconfigurations are not capable of calculating their impact. As a result, admins typically never see these configurations within any security context, much less with any empirical risk rating.

These common misconfigurations almost always chain together to form complete Attack Paths – connecting every user and computer in the environment to the organization’s most critical assets, domain admins and domain controllers. In other words, an attacker landing in almost any AD domain can find and chain these misconfigurations together to fully compromise every system and identity within an enterprise.

The good news is that an individual Attack Path can be fixed. This can typically be accomplished through the removal of privileges that users do not need. That said, the effectiveness of closing specific Attack Paths is limited – for example in a large AD environment, an adversary can usually negotiate an alternative route to the same objective. Think of it like a road trip from New York City to Washington D.C. If a section of highway or a specific bridge is shut down, you can simply take a detour and get to your destination via other avenues.

For organizations to reduce their overall risk exposure to AD Attack Paths, they need to look at their high-value Tier Zero assets and work backwards from the adversary’s point of view. Doing so enables the discovery of Attack Paths that are most likely to be targeted as well as the identification of “choke points” that many of those Attack Paths are passing through. Shutting down these high-priority choke points can sever hundreds or thousands of Attack Paths at once. The trick is to close off the Attack Paths that present the most risk rather than eliminating them entirely. Two great open source tools that can help include BloodHound and PingCastle.

Andy Robbins, technical architect at SpecterOps, is a co-creator of BloodHound, the free and open source Active Directory attack path mapping and analysis tool. Andy has spoken at several conferences including Black Hat USA, Black Hat Europe, and DEF CON and has a background in professional red teaming and penetration testing.

 

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Active Directory, Cybersecurity, Microsoft

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.