Visualize every relationship and connection in AD and Azure, making it easy to identify new and existing attack paths.
Measure the impact of any point in an attack path and identify optimal locations to block the largest number of pathways.
Identify all critical Tier Zero assets and through integration with On Demand Audit automatically monitor them for any suspicious activity indicating they’ve been compromised.
Get practical remediation guidance, with clear instructions, without having to make drastic changes to AD.
Leverage On Demand Audit’s detailed user activity history to inspect attack path edges prior to removing access to the path – ensuring there are no unexpected consequences to the remediation.
Establish a continuous baseline of AD and Azure, to monitor and measure the reduced risk as attack paths are removed.
Azure uses different technologies to manage identities and access, but is vulnerable to the same types of identity attack paths as AD.
SpecterOps BloodHound Enterprise requires installation of the SharpHound Enterprise on-premises agent, a critical element in your deployment that collects and uploads data about your environment to your BloodHound Enterprise instance for processing and analysis. SharpHound Enterprise is generally deployed on a single, domain-joined Windows system per domain, and runs as a domain user account.
The AzureHound Enterprise service collects and uploads data about your Azure environment to your BloodHound Enterprise instance for processing and analysis. AzureHound Enterprise is generally deployed on a single Windows system per Azure tenant, and may run on the same system as your SharpHound Enterprise service account.
SharpHound (on-premises Active Directory collection)
AzureHound (Azure collection)
Active Directory enumeration represents the most basic information required for BloodHound Enterprise. Additionally, SharpHound Enterprise enumerates local groups and sessions on all domain-joined Microsoft systems for ideal visibility.
Collection Type
Service Account Permissions
Service Network Access
Active Directory
Domain user account with rights to read Deleted Objects.
LDAP on 389/TCP to at least one domain controller
Local Groups and User Sessions (Privileged)
Local admin on workstations and servers
SMB on 445/TCPto all domain-joined systems
Azure
Directory Reader on Azure AD Tenant, Reader on all Azure Subscriptions, AppRoleAssignment.ReadWrite.All and RoleManagement.Read.All on Microsoft Graph
TLS on 443/TCP to your tenant
Learn what the succession plan for future Active Directory admins should look like ahead of the retirement boom of more experienced admins.
Learn what man-in-the-middle attacks are, the most common attack techniques and key strategies for increasing your defenses against them.
Learn about attack paths, including the most common ones targeting Active Directory, and discover measures to protect your organization.
Learn the most common Active Directory attacks, how they unfold and what steps organizations can take to mitigate their risk.
Learn what can be done to increase your organization’s security posture and how tier 0 assets like Active Directory come into play.
Secure your Active Directory against potential risks with these 8 best practices and ensure robust security measures for your system.