A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for Active Directory Security Best Practices: 10 Optimal Methods
Cybersecurity 101/Identity Security/Active Directory Security Best Practices

Active Directory Security Best Practices: 10 Optimal Methods

Your Active Cloud Directory is unmanaged, vulnerable, and exposed to threat actors. Here are ten tips you can use to protect your infrastructure from today’s common attacks. Don’t miss and stay up-to-date.

CS-101_Identity.svg
Table of Contents

Related Articles

  • Adaptive Multi-Factor Authentication: A Complete Guide
  • Identity Provider (IDP) Security: What It Is & Why It Matters
  • What is Password Security? Importance and Tips
  • What is Identity Security?
Author: SentinelOne
Updated: July 22, 2025

Active Directory (AD) is a high-value target for attackers, who frequently attempt to compromise it to escalate their privileges and expand their access. Unfortunately, its operational necessity means that AD must be easily accessible to users throughout the enterprise—making it notoriously difficult to secure. Microsoft has stated that more than 95 million AD accounts come under attack every day, underscoring the seriousness of the problem.

While protecting AD is a challenge, it is far from impossible—it just requires the right tools and tactics. Below are ten tips that enterprises can use to more effectively secure AD against some of today’s most common attack tactics.

1. Prevent and Detect Enumeration of Privileged, Delegated Admin, Service, and Network Sessions

Once an adversary has penetrated perimeter defenses and established a foothold within the network, they will conduct reconnaissance to identify potentially valuable assets—and how they can get to them. One of the best ways they do this is to target AD since they can disguise those as normal business activities with little chance of detection.

The ability to detect and prevent enumerations of privileges, delegated admins, and service accounts can alert defenders to the presence of an adversary early in the attack cycle. Deploying deceptive domain accounts and credentials on endpoints can also trip up attackers and allow defenders to redirect them to decoys for engagement.

2. Identify and Remediate Privileged Account Exposures

Users often store credentials on their workstations. Sometimes they do this accidentally, while other times willingly—usually for convenience. Attackers know this and will target those stored credentials to gain access to the network environment. The right set of credentials can go a long way, and intruders will always look to escalate their privileges and access further.

Enterprises can avoid giving attackers an easy way into the network by identifying privileged account exposures, remediating misconfigurations, and removing saved credentials, shared folders, and other vulnerabilities.

3. Protect and Detect “Golden Ticket” and “Silver Ticket” Attacks

Pass-the-Ticket (PTT) attacks are among the most powerful techniques adversaries use to move laterally throughout the network and escalate their privileges. Kerberos’s stateless design strategy makes it easy to abuse, which means attackers can easily forge tickets within the system. “Golden Ticket” and “Silver Ticket” are two of the most severe types of PTT attacks that adversaries use to achieve domain compromise and domain persistence.

Addressing this requires the ability to detect vulnerable Kerberos Ticket Granting Ticket (TGT) and computer service accounts, identifying and alerting on misconfigurations that could potentially lead to PTT attacks. Additionally, a solution like Singularity Identity can prevent the use of forged tickets at the endpoints.

4. Protect Against Kerberoasting, DCSync, and DCShadow Attacks

A “Kerberoasting” attack is an easy way for adversaries to gain privileged access, while DCSync and DCShadow attacks maintain domain persistence within an enterprise.

Defenders need the ability to perform a continuous assessment of AD that provides real-time analysis of AD attacks while alerting on the misconfigurations that lead to those attacks. Furthermore, a solution capable of leveraging endpoint presence to prevent bad actors from discovering accounts to target can inhibit their ability to carry out these incursions.

5. Prevent Credential Harvesting From Domain Shares

Adversaries commonly target plaintext or reversible passwords stored in scripts or group policy files stored in domain shares like Sysvol or Netlogon.

A solution like Singularity Identity Posture Management can help detect these passwords, allowing defenders to remediate the exposures before attackers can target them. Mechanisms like those in the Singularity Identity solution can also deploy deceptive Sysvol group policy objects in the production AD, helping to further disrupt the attacker by misdirecting them away from production assets.

Singularity™ Identity

Detect and respond to attacks in real-time with holistic solutions for Active Directory and Entra ID.

Get a Demo

6. Identify Accounts With Hidden Privileged SID

Using the Windows Security Identifier (SID) injection technique, adversaries can take advantage of the SID “history” attribute, allowing them to move laterally within the AD environment and further escalate their privileges.

Preventing this requires detecting accounts set with well-known privileged SID values in the SID history attribute and reports.

7. Detect Dangerous Access Rights Delegation on Critical Objects

Delegation is an AD feature that allows a user or computer account to impersonate another account. For example, when a user calls a web application hosted on a web server, the application can mimic the user’s credentials to access resources hosted on a different server. Any domain computer with unconstrained delegation enabled can impersonate user credentials to any other service on the domain. Unfortunately, attackers can exploit this feature to gain access to different areas of the network.

Continuous monitoring of AD vulnerabilities and delegation exposures can help defenders identify and remediate these vulnerabilities before adversaries can exploit them.

8. Identify Privileged Accounts With Delegation Enabled

Speaking of delegation, privileged accounts configured with unconstrained delegation can lead directly to Kerberoasting and Silver Ticket attacks. Enterprises need the ability to detect and report on privileged accounts with delegation enabled.

A comprehensive list of privileged users, delegated admins, and service accounts can help defenders take stock of potential vulnerabilities. In this instance, delegation is not automatically bad. It is often necessary for an operational reason, but defenders can use a tool like Singularity Identity to prevent attackers from discovering those accounts.

9. Identify Unprivileged Users in AdminSDHolder ACL

Active Directory Domain Services (AD DSs) use the AdminSDHolder object and the Security Descriptor propagator (SDProp) process to secure privileged users and groups. The AdminSDHolder object has a unique Access Control List (ACL), which controls the permissions of security principals that are members of built-in privileged AD groups. To enable lateral movement, attackers can add accounts to the AdminSDHolder, granting them the same privileged access as other protected accounts.

Organizations can prevent this activity with a tool like Singularity Identity Posture Management to detect and alert on the presence of unusual accounts within the AdminSDHolder ACL.

10. Identify Recent Changes to Default Domain Policy or Default Domain Controllers Policy

Within AD, organizations use group policies to manage several operational configurations by defining security settings specific to the environment. These often configure administrative groups and include startup and shutdown scripts. Administrators configure them to set organization-defined security requirements at each level, install software, and set file and registry permissions. Unfortunately, attackers can change these policies to achieve domain persistence within the network.

Monitoring changes to default group policies can help defenders quickly spot these attackers, mitigating security risks and helping to prevent privileged access to AD.

Reduce Identity Risk Across Your Organization

Detect and respond to attacks in real-time with holistic solutions for Active Directory and Entra ID.

Get a Demo

Putting the Right Tools in Place

Understanding the most common tactics adversaries use to target AD can help enterprises defend it. When developing tools like Singularity Identity Posture Management and Singularity Identity, we considered many attack vectors and identified how best to detect and derail them.

With these tools in place, today’s enterprises can effectively identify vulnerabilities, detect malicious activity early, and remediate security incidents before intruders can escalate their privileges and turn a small-scale attack into a major breach. Protecting AD is a challenge, but it is not an insurmountable one, thanks to today’s AD protection tools.

Active Directory Security Best Practices FAQs

Active Directory security is the set of measures and practices you can use to protect your Microsoft Active Directory environment from cyber threats. It controls who can access what resources in your network by managing user accounts, computers, and permissions from one central place. Basically, it’s the gatekeeper that verifies users are who they say they are and decides what they can do once they get in.

This includes authentication, authorization, access controls, and monitoring to keep unauthorized users from messing with your systems and data.

Active Directory security is critical because if attackers get into your AD, they essentially hold the keys to your entire kingdom. Your AD controls access to all systems, applications, and sensitive data across your network. A compromised AD can lead to massive data breaches, system corruption, and even complete network shutdowns.

There are now 25 billion Azure AD attacks yearly, and if you fail to secure this central hub, threat actors can escalate privileges, move laterally through your network, and deploy ransomware or steal credentials. The damage can paralyze your business operations and result in substantial financial losses.

You should maintain minimal privileged users and use groups to assign access instead of individual permissions. Apply strong password policies with modern requirements and enforce multi-factor authentication on all admin accounts. Turn off unnecessary services like Print Spooler, disable SMBv1, and restrict NTLM where possible. Conduct regular security assessments to find dormant accounts and remove them before they become attack vectors.

Monitor your AD continuously for suspicious activities, especially around privileged group changes and failed login attempts. Keep domain controllers physically secure and maintain proper backup and recovery plans.

MFA makes your AD much more secure by adding extra verification steps beyond just passwords. Even if attackers steal your credentials through phishing or brute-force attacks, they can’t get in without the second factor like a mobile app or hardware token. MFA blocks over 99.9% of automated attacks and reduces breach risk by 98.56% even when credentials are leaked.

You can use various methods like Microsoft Authenticator, FIDO2 keys, biometrics, and platforms like SentinelOne to make it harder for threat actors to compromise accounts. MFA also provides better audit trails for forensic analysis if something goes wrong.

Your AD security checklist should start with auditing current security status and identifying outdated accounts that need removal. It will review and strengthen password policies, then implement account lockout policies to stop brute-force attempts. Another item is to deploy multi-factor authentication for all privileged accounts and establish secure access control policies based on least privilege. Set up regular patch management, run vulnerability assessments, and conduct AD audits to spot configuration issues.

Enable proper logging and monitoring for critical events, especially around domain admin group changes and failed authentications. Document your security policies, train staff on best practices, and test your AD recovery processes regularly.

You need to monitor specific event IDs in your security logs, particularly failed logins (4625), account lockouts (4740), and privilege escalation attempts (4672). Watch for unauthorized changes to privileged groups like domain admins and enterprise admins, as these often signal security breaches. Set up real-time alerts for unusual login patterns, such as multiple failed attempts from single IP addresses or logins outside normal work hours.

Monitor Group Policy changes, password resets on admin accounts, and any modifications to domain controller settings. SentinelOne can help you track these activities, and assist with automated detection and alerting

Discover More About Identity Security

What is Multi-Factor Authentication (MFA)?Identity Security

What is Multi-Factor Authentication (MFA)?

Understand what multifactor authentication is and how it works for businesses. Improve your cyber security strategy by incorporating the top MFA best practices today.

Read More
What is the Principle of Least Privilege (PoLP)?Identity Security

What is the Principle of Least Privilege (PoLP)?

The Principle of Least Privilege (PoLP) minimizes security risks. Discover how to apply PoLP to enhance your organization’s security posture.

Read More
What Is RBAC (Role Based Access Control)?Identity Security

What Is RBAC (Role Based Access Control)?

Role-Based Access Control (RBAC) enhances security by limiting access. Learn how to implement RBAC effectively in your organization.

Read More
What is Identity Access Management (IAM)?Identity Security

What is Identity Access Management (IAM)?

Identity Access Management (IAM) governs user access. Explore how IAM solutions can enhance security and compliance in your organization.

Read More
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2025 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use