Directory Insights in 10 Minutes

Guardian of the Directory

Real-world Active Directory and Entra ID security insights. No fluff. No filler. Just fast, tactical episodes built for overworked IT admins who need answers now. Every other week, we break down misconfigurations, attack paths, recovery gaps, and hybrid identity threats — all in 10 minutes or less. Whether you're chasing down a DCSync abuse, cleaning up toxic permissions, or trying to stay ahead of attackers, this series gives you actionable steps you can implement today. 🎧 New episodes drop bi-weekly 💡 Built for IT pros who just get it done 🎙 Powered by Guardians of the Directory

Episodes

  1. 08/04/2025

    Scattered Spider, ESX Admins, and the Built-In Backdoor to Root

    In this episode, Craig Birch breaks down how Scattered Spider, also known as Octo Tempest, is exploiting a built-in trust relationship between Active Directory and VMware ESXi to escalate privileges and deploy ransomware — all without triggering traditional security tools. Learn how the ESX Admins group becomes an unintentional backdoor to root access on every ESXi host in your environment, and why this attack path — warned about in CVE-2024-37085 — is being actively exploited in the wild. You’ll also get a quick PowerShell walkthrough to detect the ESX Admins group and hear how Cayosoft Guardian can proactively detect and block this behavior before it causes damage. Who is Scattered Spider and what makes their attacks unique How Active Directory and VMware vSphere integration can expose your hypervisors The role of the ESX Admins AD group in privilege escalation Live PowerShell examples to detect group presence and abuse How Cayosoft Guardian detects and stops unauthorized privilege paths CVE-2024-37085 and its relevance to real-world breaches Check if the ESX Admins group exists: List group members: Search for changes to group membership: Real-time detection of suspicious AD group membership changes Custom Change Roles to block group creation like ESX Admins 200+ identity misconfigurations covered across AD, Entra ID, Microsoft 365, and Intune Rollback and audit features for fast response and recovery “If you’ve got domain-joined ESXi hosts and an ESX Admins group in AD — you’ve got a direct path to root. And attackers like Scattered Spider know it.” Until next time stay guarded, stay informed, and be the guardian of your directory.

    4 min
  2. 07/21/2025

    Exposing the DNS Danger: Unsecure Dynamic Updates in Active Directory

    Welcome to Directory Insights in 10 Minutes, a bite-sized cybersecurity briefing from Guardians of the Directory. I’m your host, Craig Birch—Principal Security Engineer and Identity Security Enthusiast. In this episode, we dive into a critical misconfiguration that still lurks in many AD environments: DNS zones allowing unsecure dynamic updates. 🔍 Here’s what we cover: What dynamic updates are and how they work in AD-integrated DNS The three update modes—Secure Only, Nonsecure and Secure, and None Why nonsecure dynamic updates are a serious attack surface Real-world DNS attack tactics using spoofed records and tools like Responder A simple PowerShell script to detect vulnerable DNS zones How to fix your zones using DNS Manager And why Cayosoft Guardian is your best defense against configuration drift 🛡️ In Active Directory, trust starts with DNS—make sure that trust isn’t anonymous. PowerShell Detection Script: Learn more about Cayosoft Guardian: https://www.cayosoft.com/guardian If you found this episode helpful, don’t forget to: Subscribe on YouTube, Spotify, or your favorite podcast platform Drop a comment with your AD security questions—we may feature it in a future episode! Share with your IT team or security peers 🔗 LinkedIn🌐 Focus on Identity 🧰 Resources Mentioned:powershellCopyEditGet-DnsServerZone | Where-Object { $_.DynamicUpdate -ne "Secure" }🔔 Subscribe & Follow:📢 Connect with Craig Birch:

    4 min
  3. 05/15/2025

    Admin Accounts with SPNs — Hidden Risk Behind Kerberoasting

    🎙️ In this episode, Craig Birch breaks down one of Active Directory’s most overlooked threats: Kerberoasting via privileged accounts with Service Principal Names (SPNs).You’ll learn how attackers exploit this common misconfiguration to extract service tickets and crack credentials offline — and how to identify and fix these accounts without breaking critical apps. • What SPNs are — and why they matter for security• How attackers Kerberoast high-value accounts• Why ADUC won’t give you full visibility• PowerShell + LDAP filters for fast SPN discovery• How SDProp flags privileged accounts• Why auto-remediation can backfire• Safer alternatives: gMSAs, strong passwords, role reviews 🔍 What You’ll Learn:• What SPNs are — and why they matter for security• How attackers Kerberoast high-value accounts• Why ADUC won’t give you full visibility• PowerShell + LDAP filters for fast SPN discovery• How SDProp flags privileged accounts• Why auto-remediation can backfire• Safer alternatives: gMSAs, strong passwords, role reviews 🛠️ PowerShell Spotlight:Get-ADUser -LDAPFilter "(&(admincount=1)(servicePrincipalName=*))" ` -Properties servicePrincipalName | Select-Object Name, servicePrincipalName ✅ Use this to find privileged accounts with SPNs — the ones most at risk of Kerberoasting. Script it — don’t rely on ADUC Never auto-remove SPNs without reviewing impact Talk to app owners before making changes Harden service accounts or move to gMSAs Monitor SDProp-marked accounts to shrink attack surface 💬 Found this helpful? Like, share, or comment. Got a topic for a future 10-minute breakdown? Drop it below — we’re listening. 📌 Powered by Guardians of the Directory

    5 min
  4. 05/15/2025

    Kerberos Pre-Auth: Hidden AD Risk

    🎙️ In this episode, Craig Birch exposes one of the most overlooked Active Directory misconfigurations: the “Do not require Kerberos pre-authentication” setting.Attackers love it — it enables AS-REP Roasting, silent user enumeration, and offline password cracking — and it often flies under the radar of SIEMs and detection tools. • What Kerberos pre-auth actually does• How disabling it creates an AS-REP Roasting risk• Why this setting leads to silent user enumeration• How attackers extract TGTs for cracking with Hashcat/John• PowerShell steps to detect and remediate it safely 🔍 What You’ll Learn: • What Kerberos pre-auth actually does• How disabling it creates an AS-REP Roasting risk• Why this setting leads to silent user enumeration• How attackers extract TGTs for cracking with Hashcat/John Ripper• PowerShell steps to detect and remediate it safely 🛠️ PowerShell Spotlight:# Import the AD module Import-Module ActiveDirectory # Find accounts vulnerable to AS-REP Roasting $users = Get-ADUser -Filter {DoesNotRequirePreAuth -eq $true} -Properties DoesNotRequirePreAuth # Output affected accounts $users | Select-Object Name, SamAccountName, UserPrincipalName # Optional: Remediation (confirmation step) Read-Host -Prompt "Press Enter to remediate these accounts" foreach ($user in $users) { Set-ADAccountControl -Identity $user -DoesNotRequirePreAuth $false } ✅ Use this to detect and fix accounts vulnerable to offline ticket cracking.✅ Quick Takeaways: AS-REP Roasting bypasses standard authentication failure logging Pre-auth disabled = easy ticket extraction and brute-force attempts This setting is often set by legacy apps or weak GPOs Always confirm account function before remediation Add detection logic to your SIEM or use scheduled PowerShell audits 💬 Found this helpful? Like, share, or comment. Got a topic for a future 10-minute breakdown? Drop it below — we’re listening. 📌 Powered by Guardians of the Directory

    7 min
  5. 05/15/2025

    Remediating DES Encryption in Active Directory

    🎙️ In this episode of Directory Insights in 10 Minutes, powered by Guardians of the Directory, Craig Birch walks you through detecting and remediating a legacy misconfiguration that still haunts many AD environments: accounts limited to DES-only Kerberos encryption. DES is weak, deprecated, and easily cracked — yet it's still lurking in environments where older configurations or forgotten accounts persist. 🔍 What You’ll Learn:• Why DES-only encryption is dangerous in modern AD environments• How attackers exploit this weakness in Kerberos ticket exchanges• PowerShell techniques to find accounts with DES enabled• How to upgrade users to AES encryption using Set-ADUser• GUI vs. script-based remediation — what’s faster and safer🛠️ PowerShell Spotlight:# Find users with DES-only encryption enabled Get-ADUser -Filter {UserAccountControl -band 0x200000} -Properties UserAccountControl | Select-Object Name, SamAccountName # Remediate: Remove DES-only flag and enable AES Set-ADUser username -KerberosEncryptionType AES128,AES256 ✅ This helps ensure your accounts are no longer relying on crackable encryption standards. ✅ Quick Takeaways: DES is deprecated and no longer secure Many legacy accounts still silently rely on DES Use PowerShell or GUI to detect and remediate fast Always test before changing encryption settings on service accounts Enforce stronger Kerberos encryption org-wide via GPO 💬 Found this helpful? Like, comment, or share. Got a topic for a future 10-minute breakdown? Drop it below — we’re listening. 📌 Powered by Guardians of the Directory

    4 min
  6. 05/15/2025

    Reversible Password Encryption – A Hidden Risk

    🎙️ In this episode, Craig Birch dives into a critical but often overlooked AD misconfiguration: accounts that allow password storage with reversible encryption.This setting can bypass your domain password policies and expose credentials to plaintext extraction by tools like Mimikatz or DCSync. 🔍 What You’ll Learn: • Why reversible password encryption is still found in AD environments• How it allows attackers to dump plaintext passwords• How to find accounts with this setting using PowerShell• Steps to remediate and eliminate this risky configuration• Why this setting defeats complexity, length, and hashing protections 🛠️ PowerShell Spotlight:# Find users with reversible encryption enabled Get-ADUser -Filter {AllowReversiblePasswordEncryption -eq $true} ` -Properties AllowReversiblePasswordEncryption | Select-Object Name, SamAccountName # Optional: Remediate the setting Set-ADUser username -AllowReversiblePasswordEncryption $false ✅ Use this to eliminate one of the most easily exploitable password risks in AD. ✅ Quick Takeaways: Reversible encryption = plaintext storage risk Bypasses password complexity and policy protections Vulnerable to Mimikatz, DCSync, and backup extraction Use PowerShell to quickly find and fix weak accounts Audit user provisioning workflows to prevent reintroduction 💬 Like what you heard? Give us a thumbs-up, comment, or drop a topic you’d like covered in 10 minutes or less. 📌 Powered by Guardians of the Directory

    5 min
  7. 05/15/2025

    Password Not Required - The Hidden Risk

    🎙️ In this episode, Craig Birch exposes one of the most dangerous and overlooked misconfigurations in Active Directory: the PasswordNotRequired attribute. Most AD admins assume password policies apply to all accounts — but this hidden flag allows accounts to exist with blank passwords, silently bypassing domain-wide protections. Attackers know it. Many admins don’t. 🔍 What You’ll Learn:• What the PasswordNotRequired attribute really does• How it overrides password length, complexity, and history policies• Which accounts are most at risk (including service and trust accounts)• Why this setting leads to instant compromise with no brute-force required• How to identify and fix vulnerable accounts with PowerShell🛠️ PowerShell Spotlight:# Detect accounts with PasswordNotRequired flag set Get-ADUser -Filter * -Properties userAccountControl | Where-Object { ($_.userAccountControl -band 0x0020) } | Select-Object Name, SamAccountName # Optional: Clear the flag (example) Set-ADUser username -PasswordNotRequired $false ✅ Use this to find and lock down accounts silently skipping your password policy. ✅ Quick Takeaways: This setting bypasses all domain password policy enforcement Common on legacy accounts, service accounts, or through bad provisioning Easy path to account compromise and privilege escalation Most AD auditing tools don’t flag it — but attackers know it’s there Fix it fast using PowerShell and GPO cleanup 💬 Found this helpful? Like, share, or comment. Want a specific AD risk explained in 10 minutes or less? Drop your request below — we’re listening. 📌 Powered by Guardians of the Directory

    6 min
  8. 05/15/2025

    Protecting Admin Accounts from Kerberos Delegation Attacks

    Directory Insights in 10 Minutes – Episode 1 Welcome to the very first episode of Directory Insights in 10 Minutes, brought to you by Guardians of the Directory.This series cuts through the noise — no fluff, no filler — just real-world, actionable insights for securing Active Directory and Entra ID. In this kickoff episode, Craig Birch reveals the #1 most overlooked AD misconfiguration — one that ships insecure by default, is present in nearly every environment, and continues to provide attackers with a clear path to domain dominance. 🔍 What You’ll Learn: • Why the built-in Administrator account (RID 500) is vulnerable out of the box• How attackers abuse Kerberos delegation to impersonate high-privilege accounts• Why Microsoft’s guidance is buried in 2,000+ pages of documentation• The one checkbox that shuts down this attack path instantly• Why putting accounts in the Protected Users group isn’t enough 🛠️ Quick Fix:1️⃣ Open the RID 500 account properties2️⃣ Under the Account tab, check:    ✅ “Account is sensitive and cannot be delegated”3️⃣ Apply this setting to all privileged accounts4️⃣ Include this check in your AD hardening baseline✅ Quick Takeaways: The built-in Administrator account is a default privilege escalation path Kerberos delegation + RID 500 = full impersonation A single setting can eliminate this risk — but most admins miss it Make this part of your secure provisioning process for every admin account 💬 Join the Conversation:Have you seen this in your AD environment? Drop us a comment. Let’s talk about closing one of the oldest open doors in AD. 📌 Powered by Guardians of the Directory

    4 min

About

Real-world Active Directory and Entra ID security insights. No fluff. No filler. Just fast, tactical episodes built for overworked IT admins who need answers now. Every other week, we break down misconfigurations, attack paths, recovery gaps, and hybrid identity threats — all in 10 minutes or less. Whether you're chasing down a DCSync abuse, cleaning up toxic permissions, or trying to stay ahead of attackers, this series gives you actionable steps you can implement today. 🎧 New episodes drop bi-weekly 💡 Built for IT pros who just get it done 🎙 Powered by Guardians of the Directory