ITDR
Viewing the Top Vulnerable Active Directory Users and Computers
You can view a list of the top 10 Active Directory (AD) users and computers that have the highest risks in the AD domain on the Identity Posture dashboard. Having visibility of these 10 riskiest identities in your AD domain helps you to prioritize what to focus on first. You can view issue details, such as risk type, severity level, critical group membership, etc. You can drill down to a specific user or computer to further investigate and swiftly remediate the issue.
To view the top vulnerable AD users and computers:
- Go to ITDR > Dashboard > Identity Posture.
- On the Identity Posture dashboard:
- Select an AD domain from the Result for drop-down menu.
Select a timestamp from the scanned on drop-down menu.
The scan result for the AD domain appears.
Click Top 10 Users & Computers.
The Users and Computers page appears. The issues are listed under the tabs (All, Users, and Computers)
Select a tab to view the following information:
- Identity: The AD object identity (user or computer). Click an AD user or computer to view the details.
- Type: AD object type (User or Computer).
- Type of Risk: The type of vulnerability risk (e.g., Vulnerable to AS-REP roasting, Privileged account delegation, Stale passwords, etc.). Click the number to view all the risk types.
- Critical Group Membership: The group membership of the critical AD group. ADs are primarily categorized into security and distribution groups. These groups have four different scopes, including universal, global, domain local, and local. Scope helps determine the areas in the AD domain where a group's permissions can be enforced successfully. To learn more, refer to the Microsoft documentation.
- Identity Classification: The AD user account type, such as privileged or service. A privileged AD user account has powerful permissions that allow the user to perform nearly any action in the AD. A service AD user account is created to run a particular service or application on the Microsoft Windows operating system and has the minimum permissions that are required to run the services. To learn more, refer to the Microsoft documentation for Privileged and Service accounts.
- Severity: The severity level of the vulnerability issue (e.g., Critical, High, Medium, or Low).
Click Download Computer to download all AD computer issue details in the Excel format. Click Copy Table to copy specific columns on the table.
You can double-click an AD user or computer to view additional details, such as posture risk score, failed posture checks, associated Okta user account details, Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) access snapshots, assigned roles, etc.