Why Active Directory is the No. 1 target for cyberattacks
Active Directory (AD) is the heart of the information system for the vast majority of companies using a Microsoft environment. It manages authentication, access rights, security policies, and network resources for all users and machines. Compromising AD is like obtaining the keys to the entire kingdom.
The figures speak for themselves: according to the Semperis 2024 report, Active Directory is the target of 9 out of 10 ransomware attacks. The Verizon DBIR 2025 confirms that compromised credentials remain the number one initial access vector (22% of breaches) and that 88% of attacks against web applications use stolen credentials. However, in most companies, these credentials are managed by Active Directory.
Sources: Semperis 2024 Ransomware Risk Report — Verizon DBIR 2025
Learn more about our IT infrastructure security services →
The 5 most exploited Active Directory vulnerabilities
1. Too many domain administrator accounts
A poorly managed AD accumulates accounts with high privileges. Each Domain Admin account is a prime target for attackers. Best practice: limit Domain Admins to the bare minimum (2-3 accounts), use accounts dedicated to administration (no web browsing), and implement the Microsoft tiering model (Tier 0/1/2).
Case study — Law firm, 65 employees
During an audit, we discovered 14 Domain Admin accounts at a Parisian law firm. The IT manager had assigned these rights over the years to "help out" partners or external service providers. Three of these accounts belonged to a former maintenance provider who had not been involved for 18 months. After remediation, the firm switched to two dedicated DA accounts, with named accounts for day-to-day administration.
2. KRBTGT account password never changed
The KRBTGT account is used to encrypt Kerberos tickets. If an attacker obtains its hash, they can forge a Golden Ticket and gain invisible and persistent access to any resource in the domain. This password must be changed twice consecutively (to invalidate the history) at least once a year, and immediately after any incident.
3. Absence of LAPS (Local Administrator Password Solution)
Without LAPS, the local administrator password is identical on all workstations in the domain. A single compromised workstation gives admin access to the entire network (instant lateral movement). Microsoft LAPS generates a unique password for each machine, stored in AD and automatically rotated.
4. Insufficient or non-existent security GPOs
Group policies (GPOs) are the primary lever for hardening the AD environment: password policy, account lockout, administrator login restrictions, advanced auditing. Without security GPOs, AD operates with its default settings, which are designed for compatibility, not security.
Case study — HR consulting firm, 75 employees
GPO audit: password policy of 6 characters with no complexity, no lockout after failed logins, no restrictions on administrator logins. In practice, a brute force attack on any account could be carried out in a matter of minutes. The remediation took two days, with no service interruption.
Discover our approach to protecting workstations and mobile devices, the essential complement to Active Directory hardening. →
5. Insufficient logging
Without advanced auditing of AD events (logins, group modifications, policy changes), attacks go unnoticed. According to IBM (Cost of a Data Breach 2025), the average lifecycle of a breach is 241 days, the lowest in nine years, but still far too long. AD logging allows suspicious behavior (DCSync, DCShadow, pass-the-hash) to be detected before it causes irreversible damage.
Source: IBM Cost of a Data Breach Report 2025
The 10 priority Active Directory hardening measures
- Limit Domain Admin accounts to the bare minimum and dedicate accounts to administration.
- Implement the Microsoft tiering model (Tier 0/1/2 separation).
- Change the KRBTGT password twice consecutively at least once a year.
- Deploy LAPS across the entire fleet.
- Configure password GPOs in accordance with ANSSI recommendations (minimum 12 characters, no expiration but detection of compromised passwords).
- Enable advanced auditing of AD events (4624, 4625, 4672, 4728, 4732, 4756).
- Disable obsolete protocols (NTLM v1, unsigned LDAP, SMBv1).
- Restrict Kerberos delegation (no unconstrained delegation).
- Secure domain controllers physically and logically.
- Implement a regularly tested AD backup and restore plan.
IT Systems field estimate: For an SME with 50 to 150 workstations, implementing the priority measures (points 1 to 6) takes 2 to 3 weeks of work, without interrupting production. The initial AD audit takes 3 to 5 days. The return on investment is immediate: these first six measures neutralize more than 80% of the most common AD attack vectors.
The link between AD hardening and workstation hardening
Active Directory security and workstation hardening are inseparable. Active Directory deploys hardening GPOs on workstations, and conversely, a compromised workstation can serve as an entry point into AD. The approach must be comprehensive: harden AD to protect the core of the IT system, and harden workstations to protect the endpoints. This is the approach that IT Systèmes deploys in its infrastructure security services.
Find out how we harden and protect our customers' workstations and mobile devices →
FAQ - Active Directory Security
Why is Active Directory the number one target for cyberattacks?
Active Directory manages authentication, access rights, and security policies for all users and machines in a Microsoft environment. Compromising AD gives access to the entire IT system. According to Semperis 2024, Active Directory is targeted in 9 out of 10 ransomware attacks.
How can I secure Active Directory?
Priority measures: limit Domain Admin accounts to the bare minimum (2-3), deploy LAPS for unique passwords per machine, change the KRBTGT password twice a year, enable advanced auditing of AD events, disable obsolete protocols (NTLMv1, SMBv1), and implement the Microsoft Tier 0/1/2 tiering model.
What is LAPS and why deploy it?
LAPS (Local Administrator Password Solution) is a free Microsoft solution that generates a unique local administrator password for each machine, stores it in AD, and automatically renews it. Without LAPS, the same local admin password is used across the entire network: a single compromised workstation gives access to all the others.
What is a Golden Ticket attack on Active Directory?
A Golden Ticket is a fake Kerberos ticket forged from the KRBTGT account hash. It gives the attacker unlimited and invisible access to all resources in the domain. To protect against this, the KRBTGT password must be changed twice consecutively at least once a year, and immediately after any incident.
How long does it take to secure an Active Directory?
An initial AD audit takes 3 to 5 days. The deployment of priority hardening measures (LAPS, tiering, security GPOs, advanced auditing) takes 2 to 6 weeks, depending on the size of the fleet. It is an investment that drastically reduces the attack surface without the need to purchase additional software.



