Eliminating Attack Paths in Active

Directory: A closer look at preventing

privilege escalations

Active Directory is a 22-year-old technology that is subject to frequent changes and has now saddled CIOs with decades of technical debt. It has many moving parts that attackers can exploit and sophisticated AD attacks rely on multiple attack paths. In many cases, attackers look to take advantage of unpatched vulnerabilities and misconfigurations in AD to elevate their privileges and gain wide-reaching access to critical enterprise assets.


Download this white paper to learn:


  • Why Active Directory forms a crucial part of attack paths
  • How unpatched vulnerabilities aid privilege escalation up to the level of domain admin
  • How attackers can move from entry to AD compromise using CVE-2022-26923

Get your copy now!


    I would like to receive marketing communications from Tenable regarding its products and services.

    By submitting this form, you agree to have your contact information, including email and phone, processed by Tenable for the purpose of following up on your professional interests. Tenable will only process your personal data as described in their Privacy Policy. You may opt-out of receiving their emails at any time by following the opt-out instructions included in the footer of the emails delivered to you or by visiting Tenable's Subscription Center.