Active Directory Monitoring
Last updated: April 6, 2026
Active Directory Monitoring provides visibility into identity configuration, directory posture, and exposure risk within directory services. Cyrisma supports monitoring for both on-premises Active Directory and Microsoft Entra ID (Azure AD) to help organizations identify insecure configurations, risky identity conditions, and indicators of potential abuse.
This article explains what Active Directory Monitoring does, how each monitoring model works, what data is evaluated, and how to use the results effectively.
Video Guide: Configuration of AD Monitor Settings (On-Premise and Entra ID)
What Active Directory Monitoring Does
Active Directory Monitoring evaluates directory-level configuration and identity posture to identify conditions that increase the risk of:
Credential abuse
Privilege escalation
Lateral movement
Identity-based attacks
Compliance and audit gaps
The monitoring focuses on directory configuration and exposure, not endpoint vulnerabilities, authentication logs, or attack simulation.
Supported Monitoring Models
Cyrisma supports two Active Directory monitoring models:
On-Premises Active Directory Monitoring
Microsoft Entra ID (Azure AD) Monitoring
Each model evaluates identity posture using a different execution approach.
On-Premises Active Directory Monitoring
Execution Model
Execution: Agent-based monitoring
Agent requirement: Required
Agent placement: Installed on a Domain Controller
Credential usage: None for local evaluation
The agent evaluates Active Directory locally on the Domain Controller, providing direct visibility into directory configuration and structure.
What Is Evaluated
On-premises Active Directory Monitoring evaluates directory configuration and metadata, including:
User objects and account attributes
Computer objects and status indicators
Group structure and membership
Privileged group exposure
Password and account policy configuration
Trust relationships and delegation settings
Indicators of insecure or risky directory configuration
Directory object changes over time, which can highlight recent modifications that may introduce risk
The monitoring does not attempt authentication testing or exploit simulation.
Accuracy Considerations
Installing the agent directly on a Domain Controller provides the most accurate and complete results
Running AD monitoring from non-DC systems is not supported
Results reflect directory state at the time of monitoring execution
Microsoft Entra ID (Azure AD) Monitoring
Execution Model
Execution: Cloud-based evaluation via Microsoft integration
Agent requirement: Optional
Credential usage: Managed through Microsoft cloud APIs
Entra ID Monitoring evaluates identity posture using tenant-level configuration and metadata.
What Is Evaluated
Entra ID Monitoring evaluates identity and directory posture indicators, including:
Tenant configuration settings
User and administrator role assignments
Identity protection and access policy configuration
Indicators of weak or risky identity posture
The evaluation focuses on configuration state, not authentication events or endpoint activity.
Data Evaluated
Active Directory Monitoring evaluates directory configuration and metadata, including:
Users, computers, and groups
Privilege assignments and role exposure
Policy and configuration values
Indicators of directory changes and configuration drift
No endpoint file data, network traffic, or live authentication activity is collected.
Monitoring Frequency
Monitoring runs on a scheduled basis
Results represent directory state at the time of execution
Regular monitoring helps detect configuration drift and emerging identity risk
Common Limitations
On-premises monitoring requires an agent on a Domain Controller
Results are configuration-based and do not represent active attacks
Permissions and directory architecture can influence visibility
Hybrid environments may require both AD and Entra ID monitoring for full coverage
Best Practices
Install the monitoring agent directly on a Domain Controller for on-premises AD
Monitor both on-prem AD and Entra ID in hybrid environments
Review privileged group membership regularly
Pay close attention to recent directory changes
Address high-risk identity findings promptly