5 critical vulnerabilities and how real-time monitoring strengthens Active Directory security

Author Sangavi Senthil Cybersecurity Specialist, ManageEngine  

On this page

 
  • Excessive privileges and over-provisioned accounts in AD
  • Unused, stale, orphaned AD accounts
  • Misconfigured group policies and insecure defaults
  • Weak or exposed authentication mechanism
  • Insecure delegation and ACL misconfiguration
 

Did you know that every day, there are 95 million attacks on Active Directory? As the backbone of enterprise identity and access management, AD is a prime target for threat actors seeking to gain privileged access and move laterally across networks.

This webpage explores the five most exploited AD vulnerabilities and how to detect, respond to, and harden your defenses using purpose-built security tools. Here are the various vulnerabilities:

1. Excessive privileges and over-provisioned accounts in AD

In many enterprise environments, users are granted more permissions than necessary for their job functions, often due to:

  • Role changes without corresponding privilege revocation.
  • Poorly managed group policies or nested group structures.
  • Temporary elevation of privileges that are never rolled back.

These over-privileged accounts, especially when they have domain admin or elevated rights, are highly attractive to attackers because these often enable them to:

  • Move laterally across systems.
  • Execute malicious administrative tasks.
  • Access sensitive data without being noticed.

Here is how the vulnerability occurs:

  1. Initial user provisioning: Users are added to multiple groups to “make things easier,” often including ones with elevated access.
  2. Role drift: As users change departments or roles, their previous privileges are not revoked.
  3. Service account mismanagement: Service accounts are created with domain-level privileges and reused across systems.
  4. Privilege inheritance: Through nested group memberships, users inherit admin rights indirectly.
  5. Lack of visibility: IT admins lack visibility into who has what permissions, especially in large domains.

These attacks can be carried out with the vulnerability mentioned above:

  • Privilege escalation: Attackers elevate rights using tools like net localgroup or PowerView.
  • Kerberoasting: Over-privileged service accounts with weak passwords are exploited to extract hashes.
  • Pass-the-hash and Pass-the-ticket: Harvested hashes or tickets from over-privileged sessions are reused.
  • Lateral movement: Compromised users are exploited to access sensitive systems across the network.

Here are the ways that a SIEM solution helps prevent these attacks:

Features How it helps in prevention?
Real-time alerting on privilege changes
  • Monitors AD events like:
    • Event ID 4728 (user added to privileged group)
    • Event ID 4729 (user removed)
    • Event ID 4670 (permission changes on objects)
  • Triggers alerts when users are added to groups like "Domain Admins," and "Enterprise Admins."
UEBA
  • Detects unusual privilege usage (for example, a sales user suddenly accessing DCs or sensitive shares).
  • Baselines normal behavior and flags spikes in access, time, device, or action.
Reports on privileged account activity
  • Out-of-the-box reports on:
    • Privileged logons
    • Failed logons by admin accounts
    • High-risk user activity trends
  • Enables historical audits for compliance.
Correlation rules for attack detection
  • Correlates events like group membership changes + access to critical files.
  • Detects multi-step attacks like privilege escalation followed by lateral movement.
Custom workflows and automated responses
  • Set up actions like disabling accounts or triggering ITSM tickets when privilege anomalies are detected.

Here are the ways that an IAM solution helps prevent these attacks:

Features How it helps in prevention?
RBAC for AD
  • Assigns users access based on predefined roles (for example, HR, Finance, IT).
  • Ensures users only have the exact level of access they need.
Automated deprovisioning and role cleanup
  • Automatically removes users from groups or disables accounts during offboarding or role changes.
  • Prevents privilege accumulation over time.
Privileged group membership reviews
  • Scheduled reviews and alerts for:
    • Members of domain admins, schema admins, etc.
    • Nested group membership evaluations.
  • Enables compliance audits and privilege pruning.
Just-in-time access controls
  • Grant temporary elevated privileges for a set period.
  • Auto-revoke access after task completion, reducing standing privileges.
Self service access workflows with approval
  • Allows users to request access to certain groups or shares.
  • Admins can approve and deny requests based on policies.
  • Maintains a complete audit trail of approvals.

2. Unused, stale, orphaned AD accounts

In most organizations, as employees leave or shift roles, their AD user accounts might be:

  • Unused: Created but never logged into.
  • Stale: Not used for months or years.
  • Orphaned: Still active even after employee offboarding due to HR-IT sync gaps or mismanaged life cycle policies.

These accounts often retain group memberships, access to systems, mailboxes, and VPN, effectively making them backdoors that attackers can exploit without triggering alerts tied to active users.

Here is how the vulnerability occurs:

  1. Account creation: User accounts are created for employees, contractors, or service integrations.
  2. Lack of usage monitoring: These accounts aren’t tracked for activity, especially if they’re temporary or unused.
  3. Role or employment changes: Employees change roles, leave, or are terminated, but their accounts remain enabled.
  4. Privilege retention: These accounts still belong to privileged groups (Domain admins, Remote desktop users, etc.).
  5. Lack of cleanup policies: No automated or manual review process to flag or remove dormant accounts.

Here are attacks that can be carried out with the vulnerability mentioned above:

  • Account hijacking: Attackers take control of a dormant but valid account to avoid detection.
  • Credential stuffing: Using breached credentials to log into stale accounts that haven’t had passwords reset in years.
  • Lateral movement: Using old accounts that retain admin access or permissions to pivot inside the network.
  • Persistence establishment: The attacker creates a rogue account, disables it, and re-enables it later to maintain access.

Here are the ways that a SIEM solution helps prevent these attacks:

Features How it helps in prevention?
Audit inactive account detection and reporting
  • Built-in reports identify user accounts:
    • Not logged in for X days.
    • Never used since creation.
  • Filters can be applied based on:
    • Organizational unit (OU), department, privilege level, or last logon timestamp.
Real-time alerts for suspicious use of dormant accounts
  • Set alerts for:
    • Logon activity from inactive or disabled accounts.
    • Privileged operations initiated by rarely used accounts.
  • Example: Alerts about an account that hasn’t logged in for 90 days suddenly initiating a remote session or executing PowerShell commands.
UEBA
  • Detects sudden behavior changes:
    • An inactive user suddenly downloads large files or accesses unusual servers.
  • Flags anomalies based on time, location, volume of activity, and device patterns.
Correlation based detection
  • Connects multiple weak signals:
    • Previously unused account is re-enabled → logs in → modifies AD objects.
  • Helps detect chained attacks using old accounts for privilege escalation or group policy objects (GPO) modification.
Forensics and compliance reports
  • AD logon and object modification trails are stored for deep investigation.
  • Useful for proving compliance in audits (for example, SOX, HIPAA, the GDPR) that mandate account hygiene.

Here are the ways that am IAM solution helps prevent these attacks:

Features How it helps in prevention?
Automated inactive account cleanup
  • Automatically:
    • Identify accounts inactive for a defined duration.
    • Disable, move, or delete the inactive accounts on a schedule.
  • Supports rule-based actions like:
    • Send alerts.
    • Move to quarantine OU.
    • Strip group memberships.
Account life cycle automation
  • Integrates with HR systems to:
    • Auto-create, update, or disable user accounts based on status (for example, resigned, retired).
  • Prevents orphan accounts from lingering post-departure.
Password and access governance
  • Helps enforce strict password hygiene for dormant or service accounts.
  • Identifies accounts with:
    • Never-expiring passwords.
    • Passwords not changed in more than 180 days.
Self service workflows with approval
  • Prevents shadow account creation or retention:
    • New account requests or access changes require multi-level approval.
  • Auditable trail of all provisioning/deprovisioning actions.
Privileged group review and access certification
  • Periodically prompts admins to review:
    • Who belongs to critical groups.
    • Whether any account in those groups has been inactive.
  • Automates access certification and removal for stale users.

3. Misconfigured group policies and insecure defaults

GPOs in Active Directory control everything from password policies and RDP access to firewall settings and script execution. When these policies are misconfigured or left at insecure defaults (for example, unrestricted software installations), they create wide attack surfaces that can be silently abused.

Common insecure defaults or misconfigurations include:

  • Overly permissive security settings (for example, No User Account Control (UAC), and Allow remote desktop)
  • Scripts with admin privileges deployed via GPO
  • GPOs linked to wrong OUs, affecting unintended user groups
  • Lack of audit settings that could detect suspicious changes

Here is how the vulnerability occurs:

  1. Initial setup: GPOs are configured once and often not revisited.
  2. Delegation without review: Junior admins might be given GPO modification rights without tight controls.
  3. Shadow GPOs: Attackers or rogue insiders might create GPOs with minimal settings that serve as a backdoor.
  4. Privilege escalation via GPO: Malicious actors can link GPOs to inject startup scripts, deploy malware, or elevate local privileges.

Here are the attacks that can be carried out with the vulnerability mentioned above:

  • GPO abuse for malware deployment: Attackers push malicious scripts or registry edits via GPO to multiple machines.
  • Credential theft via script injection: Attackers inject scripts that capture credentials or set up keyloggers on login.
  • Privilege escalation: Attackers modify GPOs to disable UAC, enable RDP, or grant local admin rights.
  • Persistence mechanism: Attackers add tasks or services that run on startup via GPO, maintaining long-term access.
  • GPO slide loading: Attackers create benign-looking GPOs linked to OUs with no logging and auditing enabled.

Here are the ways that a SIEM solution helps prevent these attacks:

Features How it helps in prevention?
Real-time GPO change monitoring
  • Detects:
    • Creation, deletion, or modification of any GPO.
    • Linking and unlinking of GPOs to OUs.
    • Changes to specific GPO settings (password policies, script paths, registry settings).
Event correlation for GPO abuse
  • Connects:
    • GPO changes → followed by sudden spike in process execution or service installation.
    • Example: A new GPO is created and within minutes PowerShell is executed across endpoints. This will raise an alert.
Alerting on GPO misuse patterns
  • Alert profiles can detect:
    • Policy changes outside business hours.
    • High-privilege users modifying GPOs unexpectedly.
    • GPOs enabling unsigned scripts, disabling firewalls, or altering audit policies.
UEBA for GPO modification
  • Uses baseline behavior to flag anomalies:
    • Example: A junior IT support staff member, who typically only resets passwords and unlocks user accounts, suddenly modifies GPOs related to USB access and firewall rules during off-hours. This deviation from their usual activity triggers an alert, as it indicates potential account compromise or privilege abuse.
Compliance and audit trials
  • Maintains tamper-proof logs of all GPO-related events:
    • Who made the change.
    • What was changed (before and after comparison).
    • When and from where the change was made.

Here are the ways that an IAM solution helps prevent these attacks:

Features How it helps in prevention?
Granular GPO delegation control
  • Avoid “full control” delegation:
    • Assign GPO-specific rights (read-only, edit-specific settings) to users/OUs.
  • This prevents unauthorized or accidental GPO changes by limiting the administrative scope.
GPO change approval workflows
  • Enables multi-level approval for:
    • New GPO creation.
    • Changes to security-relevant GPO settings (for example, RDP, password policy).
  • Changes are not live until approved, reducing human error or malicious edits.
Built-in GPO baseline checking
  • Compare current GPO settings against:
    • Best practices (for example, CIS benchmarks).
    • Organization’s internal baseline.
  • Flags policies that violate minimum security standards.
GPO security auditing
  • Generates detailed reports on:
    • GPOs with insecure settings (for example, “Run startup script as SYSTEM”).
    • GPOs not linked to any OU (dead GPOs that might go unnoticed).
    • GPOs with overlapping or conflicting settings.
Privilege review for GPO access
  • Periodically audits who can:
    • Edit or delete GPOs.
    • Link GPOs to OUs.
  • Helps prevent abuse by temporary admins or compromised accounts.

4. Weak or exposed authentication mechanism

This vulnerability arises when organizations rely on outdated, misconfigured, or easily exploitable authentication methods. In AD environments, this typically includes:

  • Use of NTLM instead of Kerberos
  • Lack of MFA
  • Password policies that allow weak or reused credentials
  • Service accounts with hard-coded credentials
  • Plaintext credentials in scripts or GPOs
  • Legacy protocols like LDAP without TLS

Such weaknesses give bad actors opportunities to inflict brute-force attacks, replay or extract credentials, or move laterally using stolen tokens.

Here is how the vulnerability occurs:

  1. Credential discovery: Attackers use techniques like Kerberoasting, LSASS memory dumps, or look for cleartext credentials in scripts, GPOs, or shares.
  2. Brute-force and Spray attacks: Attackers automate login attempts using password dictionaries or previously breached credentials.
  3. NTLM relay and Pass-the-hash: Exploiting legacy protocols, attackers relay credentials between systems or replay hashes to gain access.
  4. Privilege escalation: Once authenticated, attackers move laterally or escalate privileges using compromised tokens.
  5. Persistence setup: Adversaries might create new accounts, schedule tasks, or inject backdoors after gaining privileged access.

Here are the attacks that can be carried out with the vulnerability mentioned above:

  • Kerberoasting: Extracting and cracking service account tickets to retrieve plaintext passwords.
  • Brute-force and password spray: Guessing passwords against multiple users until one works.
  • Pass-the-hash and NTLM relay: Reusing password hashes to authenticate without needing the actual password.
  • Golden ticket attack: Forging Kerberos tickets to impersonate users, including domain admins.
  • Credential dumping: Stealing stored credentials from memory using tools like Mimikatz.

Here are the ways that a SIEM solution helps prevent these attacks:

Features How it helps in prevention?
Brute-force and spray detection
  • Monitors failed login attempts over short timeframes and across user accounts.
  • Alerts on:
    • Multiple failures from a single source.
    • Login attempts on disabled and expired accounts.
  • Example: Detects password spraying against user bases using common passwords like "1234".
NTLM usage and downgrade attack monitoring
  • Tracks usage of NTLM instead of Kerberos for authentication.
  • Flags:
    • NTLM traffic where Kerberos is expected.
    • Repeated NTLM auth to high-value targets.
  • Example: Alerts if attackers are relaying NTLM hashes using tools like Responder.
Credential theft behavior detection
  • Monitors suspicious logon patterns:
    • Logons from multiple machines using the same token/hash.
    • Unusual logon hours or geolocations.
  • Correlates:
    • LSASS access + file write = potential credential dump.
  • Use case: Early alerting on attempts to steal or reuse credentials.
UEBA-powered anomaly detection
  • Uses behavioral baselining to detect:
    • Users logging in from atypical machines.
    • Admin accounts used outside approved hours or locations.
  • UEBA risk scoring: Assigns risk scores to authentication anomalies for prioritized investigation.
Comprehensive authentication audit logs
  • Centralized logging of:
    • Successful and failed logins.
    • Logon types (interactive, remote, service).
    • Authentication protocols used.
  • Compliance-ready reports for SOX, HIPAA, the PCI DSS, etc.

Here are the ways that an IAM solution helps prevent these attacks:

Features How it helps in prevention?
Enforcing strong password policies
  • Centralized control over:
    • Minimum length, complexity, and history.
    • Blocklisting of common/breached passwords (for example, “P@ssw0rd”).
  • Fine-grained password policies (FGPP) by OU or group.
MFA for high-risk accounts and applications
  • Enforces MFA for:
    • VPN, OWA, RDP, and Windows logins.
    • Privileged or service accounts.
  • Supports TOTP, SMS, Email OTP, and Push notifications.
Service account governance
  • Discovers and audits all service accounts.
  • Flags:
    • Accounts with non-expiring passwords.
    • Accounts with high privileges.
  • Enforces automated rotation of service account credentials.
Conditional access and context-aware policies
  • Allows restriction of access based on:
    • IP address or geolocation.
    • Device type or OS version.
  • Example: Block authentication requests from unmanaged or suspicious endpoints.
Audit and review authentication rights
  • Generates reports on:
    • Who can log in where and how.
    • Service account permissions.
    • Admin rights tied to authentication mechanisms.
  • Enforces least privilege and detects rights creep over time.

5. Insecure delegation and ACL misconfiguration

Delegation in AD allows a service or an account to act on behalf of a user, typically to access resources. There are three types of delegation:

  • Unconstrained delegation: Full impersonation to any service on behalf of a user, which is very risky.
  • Constrained delegation: Limited to specific services.
  • Resource-based constrained delegation (RBCD): Delegation controlled by the resource, not the domain admin.

Access control list (ACL) misconfigurations occur when overly permissive permissions are applied to AD objects (users, groups, OUs), allowing unauthorized users to read/write sensitive attributes or escalate privileges.

Here is how the vulnerability occurs:

  • Reconnaissance:
    • Attackers enumerate accounts with unconstrained delegation or custom ACL permissions.
    • Identify misconfigured GenericWrite, WriteDACL, or WriteOwner rights on high-value objects.
  • Compromise and abuse:
    • Use tools like PowerView, BloodHound, or ADExplorer to map vulnerable paths.
    • Exploit ACLs to escalate privileges by modifying group membership, GPOs, or permissions.
  • Persistence and lateral movement:
    • Abuse delegation or modified ACLs to impersonate privileged users.
    • Create backdoor accounts with inherited privileges or set malicious permissions.

The following are the attacks that can be carried out with the vulnerability mentioned above:

  • Unconstrained delegation abuse: Attackers gain access to a system with unconstrained delegation and impersonate domain users.
  • Resource-based constrained delegation abuse: Compromise a machine and manipulate RBCD to impersonate domain admins.
  • DCSync attack via ACL abuse: Grant Replicating Directory Changes permission to an account to extract password hashes from the domain controller.
  • Object takeover via GenericWrite: Modify attributes like member, logonScript, or msDS-AllowedToActOnBehalfOfOtherIdentity.

Here are the ways that a SIEM solution helps prevent these attacks:

Features How it helps in prevention?
Audit delegation configuration changes
  • Tracks when:
    • A user is assigned unconstrained or constrained delegation.
    • msDS-AllowedToActOnBehalfOfOtherIdentity attribute is changed (RBCD abuse).
  • Example: Detects suspicious configuration of service accounts for lateral movement.
Detects ACL modification
  • Alerts on changes to ACLs of:
    • User objects
    • OUs
    • GPOs and domain controllers
  • Flags: Unauthorized updates to Access Control Entries (ACEs).
Correlates ACL changes with admin activity
  • Correlates:
    • ACL modifications + user privilege escalation
    • Delegation changes + service account activity
  • Helps detect attack chains indicating privilege escalation.
UEBA-based risk scoring for anomalies
  • Detects abnormal:
    • Delegation usage by non-service accounts
    • Elevated privileges without justification
  • Risk scores are assigned based on behavioral baselines.
Historical forensic and reporting
  • Maintains a trail of:
    • When delegation or ACL changes occurred
    • Who made them and from which machine
  • Example: Investigation of post-breach lateral movement paths.

Here are the ways that an IAM solution helps prevent these attacks:

Features How it helps in prevention?
Granular delegation control
  • Allows role-based access delegation using templates.
  • Prevents unconstrained delegation by enforcing best practices during delegation.
  • Provides audit logs on delegated admin actions.
Access rights management and review
  • Automates the discovery of:
    • Users with GenericAll, GenericWrite, or WriteOwner permissions on critical AD objects.
  • Allows scheduled access reviews and revocation of excessive rights.
Cleanup of orphaned or legacy delegations
  • Identifies:
    • Stale delegations on decommissioned accounts.
    • Old service accounts with dangerous delegation rights.
  • Supports bulk revocation and remediation.
Permission change auditing and alerts
  • Tracks:
    • Who changed object permissions and when.
    • Delegation-related attribute modifications (msDS-AllowedToAct...).
  • Alerts on unauthorized or risky permission changes in real time.
Visualize and fix ACL/permission paths
  • Built-in permission analysis tools highlight:
    • Inherited permissions
    • Overly broad ACL entries
  • Helps correct privilege escalation paths and reduces attack surface.

Related solutions

ManageEngine Log360 is a unified SIEM solution with UEBA, DLP, CASB, and dark web monitoring capabilities. Detect compromised credentials, reduce breach impact, and lower compliance risk exposure with Log360.

Sign up for a personalized demo  

ManageEngine AD360 is a unified IAM solution that provides SSO, adaptive MFA, UBA-driven analytics, and RBAC. Manage employees' digital identities and implement Zero Trust and the principles of least privilege with AD360.

Sign up for a personalized demo  

This content has been reviewed and approved by Ram Vaidyanathan, IT security and technology consultant at ManageEngine.