Active Directory (AD) is a proprietary directory service developed by Microsoft® to manage authentication and authorization of users and machines on a Windows domain network. Active Directory (AD) was first released in 2000 and runs on Windows Server.
Since 2000, it has become the umbrella brand for a broad assortment of directory-based identity services from Microsoft. The main component of Active Directory (AD) is Active Directory Domain Services (AD DS), which verifies access when a user logs in to a system or tries to connect to one over the network, as well as assigns and enforces security policies. A server running Active Directory Domain Services (AD DS) is a Domain Controller. Other Active Directory (AD) services include Lightweight Directory Services (AD LDS), Federation Services (AD FS), Rights Management Services (AD RMS), and Certificate Services (AD CS).
In December 2016, Microsoft released Azure AD Connect to join an on-premises Active Directory system with Azure Active Directory (Azure AD) to enable single sign-on (SSO) for Microsoft’s cloud services, such as Microsoft Office 365.
Data is stored in Active Directory (AD) as objects and organized by name and attributes. A group of objects that share the same Active Directory (AD) database is called a domain. One or more domains with a common schema and configuration constitute what is known as a tree. The top tier of Active Directory’s (AD) logical structure is a forest, which is made up of a group of trees. A forest constitutes Active Directory’s (AD) security boundary.
For attackers, Active Directory (AD) is the keeper of the crown jewels. When threat actors compromise a network, they typically try to elevate their privileges so they can move to more critical systems, access sensitive data, and gain a broader foothold in the environment to maintain persistence. As a result, attacking Active Directory (AD) and obtaining administrator-level access is one of attackers’ chief goals. This is typically done by using tools such as BloodHound, which is an open-source application used for analyzing the security of Active Directory domains and revealing the potential for escalating access entitlements. Once the cyber-attackers have uncovered hidden or complex attack paths that can potentially compromise the security of the network, they then use tools such as Mimikatz to steal the necessary credentials.
The targeting of Active Directory (AD) by attackers makes privileged access management (PAM) a vital part of enterprise security. Privileged access management (PAM) tools fall into three categories: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), and secrets management software. Ideally, these capabilities should be fully integrated into an underlying platform to avoid the silos that come from point solutions. With privileged access management (PAM), organizations can use session monitoring, granular access controls, and password vaulting to provide an extra layer of protection for privileged accounts. These protections should be part of a layered approach to security that also involves continuous monitoring of Active Directory (AD) for suspicious activity.
Other directory services on the market that provide similar functionality to Active Directory, and attract the same attention of cyber adversaries, include IBM Red Hat Directory Server, Apache Directory, and OpenLDAP.