Glossary
Terminology of the FSProtect
Selected Scan / Current Scan
FSProtect enumerates the Active Directory environment though periodic or on-demand scans. FSProtect web interface shows only the data of the currently selected scan. This selection can be done through the combo box in the left navbar. So before analyzing the results, make sure the select correct scan.
Risk / Risk Score
FSProtect calculates risk scores for scans and objects based on different metrics and categories. These scores state the risk on the objects or scans according to the context.
Object / Entity
The term Object or Entity refers to objects in the Active Directory environment. FSProtect enumerates and analyzes objects/entities below.
Forest
Domain
Computer
User
Group
Group Policy Object
Organizational Unit
Managed Service Account
Group Managed Service Account
Local User
Local Group
Certificate Authority
Certificate Template
Certificate Authority Certificate
Tier0
What “Tier 0” Means
Tier 0 objects hold the keys to your entire Active Directory (AD) forest. Anyone who can control a Tier 0 object can ultimately control every other object.
For that reason, Tier 0 assets must be managed only from equally protected Tier 0 workstations by the most-trusted admins.
Which Objects Are Always Tier 0
Group Policy Object (GPO)
Default Domain Policy
Organizational Unit (OU)
Domain Controllers
Container
Users and AdminSDHolder
Built-in or Privileged Groups
• Dns Admins • Domain Admins • Domain Controllers • Cert Publishers • Cloneable Domain Controllers • Key Admins • Enterprise Key Admins • Schema Admins • Enterprise Admins • Built-in Administrators • Account Operators • Server Operators • Print Operators • Backup Operators • Distributed COM Users • Cryptographic Operators • Enterprise Domain Controllers • Performance Log Users • Incoming Forest Trust Builders
Built-in Users
• Administrator • krbtgt
How Everything Else Gets Its Tier
Groups
• Group is on the “Tier 0 groups” list. • Group is member of (directly or through nesting) to any Tier 0 group.
Computers & Servers
• Computer is a Domain Controller. • Computer hosts an Active Directory Certificate Authority (CA). • Computer is member of (directly or through nesting) to any Tier 0 group. • Computer is added to a Tier 0 group that lives in another trusted domain.
Users
• User is on the “Tier 0 users” list. • User is member of (directly or through nesting) to any Tier 0 group. • User is added to a Tier 0 group that lives in another trusted domain.
Local Users
• Local User is local administrator on a Tier 0 computer.
Service Accounts(MSA, gMSA, dMSA)
• Service Account is member of (directly or through nesting) to any Tier 0 group. • Service Account is added to a Tier 0 group that lives in another trusted domain.
Certificate Templates
The template is published in Active Directory Certificate Services.
Organisational Units (OUs)
OU copies the highest-privilege tier of anything stored inside it. If any child object is Tier 0, the OU becomes Tier 0.
Containers
Same rule as OUs: the container takes the highest tier of its contents.
Group Policy Objects (GPOs)
• GPO linked directly to the domain root. • GPO linked to any OU or container that is Tier 0.
Logon / Startup Scripts
A script takes the highest tier of every GPO that assigns it. If one GPO is Tier 0, the script is Tier 0.
Relation
The term Relation refers to the connections between Active Directory objects. FSProtect enumerates and analyzes various relation. You can see details of these relations with the page below.
Admin
Objects that have direct privilege on the entire Active Directory environment or that can lead to total Active Directory compromise. FSProtect marks the following objects as Admin.
Direct or nested members of
Administrators
Domain Admins
Enterprise Admins
Domain Controller Servers
KRBTGT
Certificate Authorities
Privileged
Objects that have direct privilege on some Active Directory objects or that can lead to compromise of Admin objects. FSProtect marks the following objects as Privileged.
All Admin objects
Direct or nested members of
Account Operators
Backup Operators
Cert Publishers
Cryptographic Operators
DnsAdmins
Enterprise Key Admins
Enterprise Read-only Domain Controllers
Group Policy Creator Owners
Incoming Forest Trust Builders
Key Admins
Network Configuration Operators
Print Operators
Read-only Domain Controllers
Remote Desktop Users
Replicator
Schema Admins
Unprivileged
All other objects that are not privileged or admin.
Everyone-Like
Groups that contain all/general objects in Active Directory. FSProtect marks the following objects as Everyone-Like.
Everyone
World
Anonymous
Authenticated Users
Users
Guests
Domain Guests
Domain Users
Domain Computers
Local Admin
Objects that have direct or nested membership on local Administrators group in at least one computer.
Service Account
Users with the ServicePrincipalNames attribute set.
Explicit Local Admin
Objects that have direct membership on local Administrators group.
Group Delegated Local Admin
Objects that have nested membership on local Administrators group.
Risky
Objects with a risk score greater than 50.
Online
Computers that accessed to port 445 during the network scan.
Stealth Admin
Unprivileged or privileged objects that can compromise admin objects through attack paths.
Issue
Vulnerabilities, misconfigurations, dangerous privileges, and relations that can pose risks to Active Directory.
Tag
Labels attached to issues to categorize, group, and make it easy to understand.
Impact / FSProtect Impact Name
The special tag attached to issues to identify the effects of issues on Active Directory.
Severity
Risk levels of the issues. Severity can be Info, Low, Medium, High and Critical.
Ease of Mitigation
Indicates the level of effort to mitigate/remediate the issues. Ease of Mitigation can be Easy, Medium, or High.
Ease of Detection
Indicates the level of effort to detect exploitation of the issues. Ease of Detection can be Easy, Medium, or High.
Ease of Deception
Indicates the level of effort of implementing deceptive countermeasures based on issues. Ease of Detection can be Easy, Medium, or High.
Exploitation Privilege
Refers to the level of permission or access an attacker needs to exploit a specific vulnerability, such as administrator rights or access to a specific user account.
Exploitation Certainty
Indicates the likelihood or confidence that a specific vulnerability can be successfully exploited, based on technical feasibility and environmental factors.
Path / Attack Path
FSProtect identifies relationships that allow an object to compromise/control another. The combination of one or more relationships creates the attack path.
Dangerous Path
Combination of relations that leads to compromising of objects by lower privileged objects.
Last updated
Was this helpful?