Finding Risks in Active Directory using SecID Technology Risks Finder

SecID Technology Risks Finder is built to enhance the security of key technologies like Microsoft Active Directory, VMware, Hyper-V, Azure, and Microsoft 365 tenants. It includes powerful query modules such as "Who Can", "Can a Single User", and "View". You can also create and run custom queries against your target environment. The output is a detailed report highlighting security issues and gaps. Once these gaps are identified, you can take corrective action to strengthen and secure your technology infrastructure. 

For Active Directory, Technology Risks Finder offers below types of queries:

Who Can? Who can create, delete and modify and other operations.

Can a Single User? Can a single user take an action defined in the query operation.

View: Lets you view permissions and delegation defined. There are 40+ views supported for Active Directory.

Technology Risks Finder Encompass
Three Essential Queries

Who Can?

"Who Can?" is a security query that identifies which users or groups have the ability to perform specific actions in Active Directory.
It analyzes ACLs on AD objects to find permissions like ResetPassword, WriteProperty, or GenericAll. This helps uncover misconfigurations that could lead to privilege escalation or lateral movement.

image

Can a Single User

"Can a Single User?" is a targeted query that checks what actions a specific user can perform in Active Directory. It evaluates the user’s effective permissions across OUs, objects, and attributes. This includes rights like GenericAll, ResetPassword, CreateChild, or WriteProperty.It traces both direct rights and those gained through group membership or inherited permissions.

image

Views

"View" queries are designed to provide visibility into the current configuration and security posture of Active Directory.
They show detailed information about objects like users, groups, OUs, GPOs, and their attributes. Unlike "Who Can" or "Can a Single User", these queries focus on what exists, not who can do what.

image
  • Who Can?
  • Can a Single User?
  • Views
Image

Who Can Queries

"Who Can?" is a type of query or analysis that answers the question:

"Who can perform a specific action on a specific object in Active Directory?"

It focuses on identifying users or groups who have abusable or sensitive permissions, whether directly or indirectly assigned.

Query Meaning Risk if Abused
Who can reset passwords for Domain Admins? Finds users who can reset passwords of privileged accounts. Full domain compromise.
Who can replicate directory secrets? Finds accounts with rights to replicate sensitive directory data (like Replicating Directory Changes). Credential dumping (e.g. DCSync attack).
Who can modify Group Policy Objects (GPOs)? Identifies users who can edit GPOs applied to key OUs. Privilege escalation via startup scripts or policy injection.
Who can create user accounts in a sensitive OU? Reveals users with CreateChild rights. Creation of rogue users or backdoors.
Who can link GPOs to OUs? Determines who can attach policies to OUs. Unintended policies applied, leading to misconfigurations.
Who can modify servicePrincipalName (SPN)? Checks for users who can write the SPN attribute. Enables Kerberoasting attacks.

Shape Image
Shape Image
Image

Can a Single User?

"Can a Single User" is a type of query or analysis designed to answer the question:

"Can a specific user perform sensitive or potentially abusable actions in Active Directory?"

This analysis simulates the permissions of a single user (directly or through group membership, delegated rights, or inherited permissions) to identify whether that account poses a risk within the environment.

Query Meaning Risk if Abused
Can user reset Domain Admin passwords? Checks if the specified user can reset passwords of high-privilege accounts. Full domain compromise.
Can user replicate directory secrets? Determines if the user can perform DCSync-like actions to extract password hashes. Credential theft and lateral movement.
Can user modify GPOs? Verifies if the user can edit Group Policy Objects affecting privileged systems or users. Privilege escalation or code execution.
Can user create accounts in sensitive OUs? Evaluates whether the user can create objects in critical organizational units. Creation of persistent access (backdoors).
Can user modify SPNs? Checks if the user can change servicePrincipalName attributes. Enables Kerberoasting for hash extraction.
Can user delete or disable accounts? Identifies whether the user can remove or deactivate key identities. Disruption of services or denial of access.
Can user escalate privileges? Assesses if the user can indirectly gain higher privileges through object control. Undetected privilege escalation path.

Shape Image
Shape Image

Create your Own Security Query

SecID allows you to build custom Risk Finder Templates using your own queries. For example, you can include checks for who can create, delete, or modify specific object types, along with other permission-based queries.

Finding Risks in Active Directory

Add All or Top Queries

SecID enables you to add high-priority security queries, allowing you to efficiently run targeted checks against your Active Directory environment. This helps in quickly identifying security risks such as excessive privileges, misconfigured permissions, dormant accounts, and potential compliance violations. By surfacing these issues proactively, SecID supports continuous security monitoring and helps strengthen your overall identity and access management posture.

Technology Risks Finder - Adding Top Queries

Quickly Execute a Query to find Risks

quickly execute the query to find risks

SecID Technology Risks Finder executing single query

Exclude Your Trusted Principals

Trusted principals are user or group accounts that are considered reliable and may be granted specific permissions within Active Directory.

For example, you have defined a list of Trusted Principals and if SecID Technology Risks Finder identifies any users or groups that pose a potential risk due to their permissions in Active Directory and are NOT part of the Trusted Principals, you may want to review them. Trusted principals such as Domain Admins, Enterprise Admins, or any custom groups you consider safe should be excluded from the results to ensure the Risks Finder report remains focused and relevant.

We have defined a list of Trusted Principals to ensure they are excluded from the Risks Finder report. These default accounts are assigned standard permissions during Active Directory installation and can be safely added to the exclusion list.

Managing Trusted Principals in Risks Finder
Image

NOTABLE FEATURES

  • Generate Custom Report
  • Create custom queries
  • Exclude Trusted Principals/Accounts
Download

List of Who Can Queries supported by Risks Finder for Active Directory

Risk Finder FAQs

Here’s the list of frequently asked questions we have put together for SecID Technology Risks Finder. In case you still have any questions or require support on our products please feel free to connect with us using the contact us form or by sending an email to [email protected].

Image

What Client’s Say About Us

Translate »
Index