<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Indicators of Exposure</title>
        <link>https://www.tenable.com/indicators/feeds?type=ioe</link>
        <description>Get the latest Indicators of Exposure updates</description>
        <lastBuildDate>Mon, 13 Apr 2026 15:07:05 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Indicators</generator>
        <image>
            <title>Indicators of Exposure</title>
            <url>https://www.tenable.com/themes/custom/tenable/img/favicons/apple-touch-icon.png</url>
            <link>https://www.tenable.com/indicators/feeds?type=ioe</link>
        </image>
        <copyright>Copyright 2026 Tenable, Inc. All rights reserved.</copyright>
        <atom:link href="https://www.tenable.com/indicators/feeds?type=ioe" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[Dynamic Objects Misconfiguration and Usage]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DYNAMIC-OBJECTS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DYNAMIC-OBJECTS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Dynamic Objects Misconfiguration and Usage</p>

      <h3>Description</h3>
      <p>Detects dynamic objects and insecure configuration related to them.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DYNAMIC-OBJECTS">https://www.tenable.com/indicators/ioe/ad/C-DYNAMIC-OBJECTS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[BadSuccessor Dangerous dMSA Permissions]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-BAD-SUCCESSOR</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-BAD-SUCCESSOR</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>BadSuccessor Dangerous dMSA Permissions</p>

      <h3>Description</h3>
      <p>BadSuccessor is an Active Directory privilege escalation flaw in Windows Server 2025 that exploits dMSAs, allowing attackers to manipulate account links and potentially compromise the domain.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-BAD-SUCCESSOR">https://www.tenable.com/indicators/ioe/ad/C-BAD-SUCCESSOR</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Non-Essential Group]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-UNNECESSARY-GROUP</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-UNNECESSARY-GROUP</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Non-Essential Group</p>

      <h3>Description</h3>
      <p>Verifies that no group is empty or contains only a single member.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-UNNECESSARY-GROUP">https://www.tenable.com/indicators/ioe/ad/C-UNNECESSARY-GROUP</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sensitive Exchange Permissions]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-PERMISSIONS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-PERMISSIONS</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Sensitive Exchange Permissions</p>

      <h3>Description</h3>
      <p>Identify potentially unsafe permissions that impact Exchange resources or are assigned to Exchange groups.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-PERMISSIONS">https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-PERMISSIONS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unsupported or Outdated Exchange Servers]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-VERSION</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-VERSION</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Unsupported or Outdated Exchange Servers</p>

      <h3>Description</h3>
      <p>Detects outdated Exchange servers that Microsoft no longer supports as well as those missing the latest Cumulative Updates.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-VERSION">https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-VERSION</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exchange Dangerous Misconfigurations]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-MISCONFIG</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-MISCONFIG</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Exchange Dangerous Misconfigurations</p>

      <h3>Description</h3>
      <p>Lists misconfigurations that impact Exchange resources or its underlying Active Directory schema objects.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-MISCONFIG">https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-MISCONFIG</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Hybrid Entra ID Information]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-AAD-INFORMATIVE</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-AAD-INFORMATIVE</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Hybrid Entra ID Information</p>

      <h3>Description</h3>
      <p>Collects information such as hybrid users and computers from the on-premises Active Directory environment about resources synchronized with Microsoft Entra ID.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-AAD-INFORMATIVE">https://www.tenable.com/indicators/ioe/ad/C-AAD-INFORMATIVE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exchange Group Members]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-MEMBERS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-MEMBERS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Exchange Group Members</p>

      <h3>Description</h3>
      <p>Unusual accounts in sensitive Exchange groups</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-MEMBERS">https://www.tenable.com/indicators/ioe/ad/C-EXCHANGE-MEMBERS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Service Accounts Misconfigurations]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-SERVICE-ACCOUNT</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-SERVICE-ACCOUNT</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Service Accounts Misconfigurations</p>

      <h3>Description</h3>
      <p>Shows potential misconfigurations of domain service accounts.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-SERVICE-ACCOUNT">https://www.tenable.com/indicators/ioe/ad/C-SERVICE-ACCOUNT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Conflicting Security Principals]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-CONFLICTED-OBJECTS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-CONFLICTED-OBJECTS</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Conflicting Security Principals</p>

      <h3>Description</h3>
      <p>Checks that there are no duplicated (conflicting) users, computers, or groups.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-CONFLICTED-OBJECTS">https://www.tenable.com/indicators/ioe/ad/C-CONFLICTED-OBJECTS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Shadow Credentials]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-SHADOW-CREDENTIALS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-SHADOW-CREDENTIALS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Shadow Credentials</p>

      <h3>Description</h3>
      <p>Detects Shadow Credentials backdoors and misconfigurations in the "Windows Hello for Business" feature and its associated key credentials.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-SHADOW-CREDENTIALS">https://www.tenable.com/indicators/ioe/ad/C-SHADOW-CREDENTIALS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Enabled Guest Account]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-GUEST-ACCOUNT</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-GUEST-ACCOUNT</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Enabled Guest Account</p>

      <h3>Description</h3>
      <p>Checks that the built-in guest account is disabled.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-GUEST-ACCOUNT">https://www.tenable.com/indicators/ioe/ad/C-GUEST-ACCOUNT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Managed Service Accounts Dangerous Misconfigurations]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-MSA-COMPLIANCE</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-MSA-COMPLIANCE</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Managed Service Accounts Dangerous Misconfigurations</p>

      <h3>Description</h3>
      <p>Ensures Managed Service Accounts (MSAs) are deployed and well configured.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-MSA-COMPLIANCE">https://www.tenable.com/indicators/ioe/ad/C-MSA-COMPLIANCE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Privileged AD User Accounts Synchronized to Microsoft Entra ID]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-AAD-PRIV-SYNC</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-AAD-PRIV-SYNC</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Privileged AD User Accounts Synchronized to Microsoft Entra ID</p>

      <h3>Description</h3>
      <p>Checks that privileged Active Directory user accounts are not synchronized to Microsoft Entra ID.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-AAD-PRIV-SYNC">https://www.tenable.com/indicators/ioe/ad/C-AAD-PRIV-SYNC</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Privileged Authentication Silo Configuration]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-AUTH-SILO</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-AUTH-SILO</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Privileged Authentication Silo Configuration</p>

      <h3>Description</h3>
      <p>A step-by-step guide on the configuration of an authentication silo for privileged (Tier-0) accounts.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-AUTH-SILO">https://www.tenable.com/indicators/ioe/ad/C-AUTH-SILO</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unsecure Dynamic DNS Zone Updates Allowed]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DYNAMIC-UPDATES</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DYNAMIC-UPDATES</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Unsecure Dynamic DNS Zone Updates Allowed</p>

      <h3>Description</h3>
      <p>Checks that the DNS server configuration disallows unsecure dynamic DNS zone updates.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DYNAMIC-UPDATES">https://www.tenable.com/indicators/ioe/ad/C-DYNAMIC-UPDATES</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WSUS Dangerous Misconfigurations]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-WSUS-HARDENING</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-WSUS-HARDENING</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>WSUS Dangerous Misconfigurations</p>

      <h3>Description</h3>
      <p>Lists the misconfigured parameters related to Windows Server Update Services (WSUS).</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-WSUS-HARDENING">https://www.tenable.com/indicators/ioe/ad/C-WSUS-HARDENING</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Property Sets Integrity]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PROP-SET-SANITY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PROP-SET-SANITY</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Property Sets Integrity</p>

      <h3>Description</h3>
      <p>Checks for the integrity of property sets and validates permissions</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PROP-SET-SANITY">https://www.tenable.com/indicators/ioe/ad/C-PROP-SET-SANITY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous SYSVOL Replication Configuration]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DFS-MISCONFIG</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DFS-MISCONFIG</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Dangerous SYSVOL Replication Configuration</p>

      <h3>Description</h3>
      <p>Checks that the "Distributed File System Replication" (DFS-R) mechanism replaced the "File Replication Service" (FRS).</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DFS-MISCONFIG">https://www.tenable.com/indicators/ioe/ad/C-DFS-MISCONFIG</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Detection of Password Weaknesses]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-HASHES-ANALYSIS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-HASHES-ANALYSIS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Detection of Password Weaknesses</p>

      <h3>Description</h3>
      <p>Verifies for weaknesses in passwords that may heighten the vulnerability of Active Directory accounts.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-HASHES-ANALYSIS">https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-HASHES-ANALYSIS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Insufficient Hardening Against Ransomware]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-RANSOMWARE-HARDENING</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-RANSOMWARE-HARDENING</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Insufficient Hardening Against Ransomware</p>

      <h3>Description</h3>
      <p>Ensures that the domain implemented hardening measures to protect against ransomware.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-RANSOMWARE-HARDENING">https://www.tenable.com/indicators/ioe/ad/C-RANSOMWARE-HARDENING</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ADCS Dangerous Misconfigurations]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PKI-DANG-ACCESS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PKI-DANG-ACCESS</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>ADCS Dangerous Misconfigurations</p>

      <h3>Description</h3>
      <p>List dangerous permissions and misconfigured parameters related to the Active Directory Certificate Services (AD CS) Public Key Infrastructure (PKI).</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PKI-DANG-ACCESS">https://www.tenable.com/indicators/ioe/ad/C-PKI-DANG-ACCESS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GPO Execution Sanity]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-GPO-EXEC-SANITY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-GPO-EXEC-SANITY</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>GPO Execution Sanity</p>

      <h3>Description</h3>
      <p>Verifies that the Group Policy Objects (GPOs) applied to domain computers are sane.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-GPO-EXEC-SANITY">https://www.tenable.com/indicators/ioe/ad/C-GPO-EXEC-SANITY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Logon Restrictions for Privileged Users]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-ADMIN-RESTRICT-AUTH</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-ADMIN-RESTRICT-AUTH</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Logon Restrictions for Privileged Users</p>

      <h3>Description</h3>
      <p>Checks for privileged users who can connect to less privileged machines leading to a risk of credential theft.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-ADMIN-RESTRICT-AUTH">https://www.tenable.com/indicators/ioe/ad/C-ADMIN-RESTRICT-AUTH</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unsecured Configuration of Netlogon Protocol]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-NETLOGON-SECURITY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-NETLOGON-SECURITY</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Unsecured Configuration of Netlogon Protocol</p>

      <h3>Description</h3>
      <p>CVE-2020-1472 ("Zerologon") affects Netlogon protocol and allows elevation of privilege</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-NETLOGON-SECURITY">https://www.tenable.com/indicators/ioe/ad/C-NETLOGON-SECURITY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Vulnerable Credential Roaming Related Attributes]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-CREDENTIAL-ROAMING</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-CREDENTIAL-ROAMING</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Vulnerable Credential Roaming Related Attributes</p>

      <h3>Description</h3>
      <p>Credential roaming attributes are vulnerable, making the related user protected secrets readable by an attacker.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-CREDENTIAL-ROAMING">https://www.tenable.com/indicators/ioe/ad/C-CREDENTIAL-ROAMING</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Potential Clear-Text Password]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-CLEARTEXT-PASSWORD</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-CLEARTEXT-PASSWORD</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Potential Clear-Text Password</p>

      <h3>Description</h3>
      <p>Checks for objects containing potential clear-text passwords in attributes readable by domain users.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-CLEARTEXT-PASSWORD">https://www.tenable.com/indicators/ioe/ad/C-CLEARTEXT-PASSWORD</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous Sensitive Privileges]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DANGEROUS-SENSITIVE-PRIVILEGES</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DANGEROUS-SENSITIVE-PRIVILEGES</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Dangerous Sensitive Privileges</p>

      <h3>Description</h3>
      <p>Identifies misconfigured sensitive privilege rights that decrease the security of a directory infrastructure.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DANGEROUS-SENSITIVE-PRIVILEGES">https://www.tenable.com/indicators/ioe/ad/C-DANGEROUS-SENSITIVE-PRIVILEGES</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mapped Certificates on Accounts]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-SENSITIVE-CERTIFICATES-ON-USER</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-SENSITIVE-CERTIFICATES-ON-USER</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Mapped Certificates on Accounts</p>

      <h3>Description</h3>
      <p>Ensures there is no weak certificate mapping assigned to objects.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-SENSITIVE-CERTIFICATES-ON-USER">https://www.tenable.com/indicators/ioe/ad/C-SENSITIVE-CERTIFICATES-ON-USER</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Without Computer-Hardening GPOs]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-GPO-HARDENING</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-GPO-HARDENING</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Domain Without Computer-Hardening GPOs</p>

      <h3>Description</h3>
      <p>Checks hardening GPOs have been deployed on the domain.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-GPO-HARDENING">https://www.tenable.com/indicators/ioe/ad/C-GPO-HARDENING</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Protected Users Group Not Used]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PROTECTED-USERS-GROUP-UNUSED</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PROTECTED-USERS-GROUP-UNUSED</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Protected Users Group Not Used</p>

      <h3>Description</h3>
      <p>Verifies for privileged users who are not members of the Protected Users group.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PROTECTED-USERS-GROUP-UNUSED">https://www.tenable.com/indicators/ioe/ad/C-PROTECTED-USERS-GROUP-UNUSED</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Account with Possible Empty Password]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-NOT-REQUIRED</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-NOT-REQUIRED</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Account with Possible Empty Password</p>

      <h3>Description</h3>
      <p>Identifies user accounts that allow empty passwords.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-NOT-REQUIRED">https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-NOT-REQUIRED</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Users Allowed to Join Computers to the Domain]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-USERS-CAN-JOIN-COMPUTERS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-USERS-CAN-JOIN-COMPUTERS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Users Allowed to Join Computers to the Domain</p>

      <h3>Description</h3>
      <p>Verify that regular users cannot join external computers to the domain.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-USERS-CAN-JOIN-COMPUTERS">https://www.tenable.com/indicators/ioe/ad/C-USERS-CAN-JOIN-COMPUTERS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Last Change of the Microsoft Entra Seamless SSO Account Password]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-AAD-SSO-PASSWORD</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-AAD-SSO-PASSWORD</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Last Change of the Microsoft Entra Seamless SSO Account Password</p>

      <h3>Description</h3>
      <p>Ensures regular changes to the Microsoft Entra Seamless SSO account password.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-AAD-SSO-PASSWORD">https://www.tenable.com/indicators/ioe/ad/C-AAD-SSO-PASSWORD</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous Rights in the AD Schema]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-ABNORMAL-ENTRIES-IN-SCHEMA</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-ABNORMAL-ENTRIES-IN-SCHEMA</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Dangerous Rights in the AD Schema</p>

      <h3>Description</h3>
      <p>Lists schema entries considered anomalous that could potentially offer a means of persistence.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-ABNORMAL-ENTRIES-IN-SCHEMA">https://www.tenable.com/indicators/ioe/ad/C-ABNORMAL-ENTRIES-IN-SCHEMA</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[User Account Using Old Password]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-USER-PASSWORD</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-USER-PASSWORD</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>User Account Using Old Password</p>

      <h3>Description</h3>
      <p>Checks for regular updates of all active account passwords in Active Directory to reduce credential theft risk.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-USER-PASSWORD">https://www.tenable.com/indicators/ioe/ad/C-USER-PASSWORD</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Verify Permissions Related to Microsoft Entra Connect Accounts]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-AAD-CONNECT</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-AAD-CONNECT</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Verify Permissions Related to Microsoft Entra Connect Accounts</p>

      <h3>Description</h3>
      <p>Ensure the permissions set on Microsoft Entra Connect accounts are sane</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-AAD-CONNECT">https://www.tenable.com/indicators/ioe/ad/C-AAD-CONNECT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Controllers Managed by Illegitimate Users]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DC-ACCESS-CONSISTENCY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DC-ACCESS-CONSISTENCY</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Domain Controllers Managed by Illegitimate Users</p>

      <h3>Description</h3>
      <p>Some domain controllers can be managed by non-administrative users due to dangerous access rights.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DC-ACCESS-CONSISTENCY">https://www.tenable.com/indicators/ioe/ad/C-DC-ACCESS-CONSISTENCY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Application of Weak Password Policies on Users]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-POLICY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-POLICY</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Application of Weak Password Policies on Users</p>

      <h3>Description</h3>
      <p>Some password policies applied on specific user accounts are not strong enough and can lead to credentials theft.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-POLICY">https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-POLICY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Verify Sensitive GPO Objects and Files Permissions]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-GPO-SD-CONSISTENCY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-GPO-SD-CONSISTENCY</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Verify Sensitive GPO Objects and Files Permissions</p>

      <h3>Description</h3>
      <p>Ensures that the permissions assigned to GPO objects and files linked to sensitive containers, such as the domain controllers or OU, are appropriate and secure.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-GPO-SD-CONSISTENCY">https://www.tenable.com/indicators/ioe/ad/C-GPO-SD-CONSISTENCY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain with Unsafe Backward-Compatibility Configuration]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DSHEURISTICS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DSHEURISTICS</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Domain with Unsafe Backward-Compatibility Configuration</p>

      <h3>Description</h3>
      <p>The dsHeuristics attribute can modify AD behavior, but some fields are security-sensitive and pose a security risk.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DSHEURISTICS">https://www.tenable.com/indicators/ioe/ad/C-DSHEURISTICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domains with an Outdated Functional Level]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DOMAIN-FUNCTIONAL-LEVEL</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DOMAIN-FUNCTIONAL-LEVEL</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Domains with an Outdated Functional Level</p>

      <h3>Description</h3>
      <p>Checks for the correct functional level of a domain or forest which determines the availability of advanced features and security options.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DOMAIN-FUNCTIONAL-LEVEL">https://www.tenable.com/indicators/ioe/ad/C-DOMAIN-FUNCTIONAL-LEVEL</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Local Administrative Account Management]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-LAPS-UNSECURE-CONFIG</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-LAPS-UNSECURE-CONFIG</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Local Administrative Account Management</p>

      <h3>Description</h3>
      <p>Ensures the secure and central management of local administrative accounts using LAPS.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-LAPS-UNSECURE-CONFIG">https://www.tenable.com/indicators/ioe/ad/C-LAPS-UNSECURE-CONFIG</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kerberos Configuration on User Account]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-KERBEROS-CONFIG-ACCOUNT</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-KERBEROS-CONFIG-ACCOUNT</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Kerberos Configuration on User Account</p>

      <h3>Description</h3>
      <p>Detects accounts that use weak Kerberos configuration.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-KERBEROS-CONFIG-ACCOUNT">https://www.tenable.com/indicators/ioe/ad/C-KERBEROS-CONFIG-ACCOUNT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Root Objects Permissions Allowing DCSync-Like Attacks]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-ROOTOBJECTS-SD-CONSISTENCY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-ROOTOBJECTS-SD-CONSISTENCY</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Root Objects Permissions Allowing DCSync-Like Attacks</p>

      <h3>Description</h3>
      <p>Checks for unsafe permissions on root objects that may enable unauthorized users to steal authentication credentials.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-ROOTOBJECTS-SD-CONSISTENCY">https://www.tenable.com/indicators/ioe/ad/C-ROOTOBJECTS-SD-CONSISTENCY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Accounts Using a Pre-Windows 2000 Compatible Access Control]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PRE-WIN2000-ACCESS-MEMBERS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PRE-WIN2000-ACCESS-MEMBERS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Accounts Using a Pre-Windows 2000 Compatible Access Control</p>

      <h3>Description</h3>
      <p>Checks for account members of the Pre-Windows 2000 Compatible Access group which can bypass security measures.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PRE-WIN2000-ACCESS-MEMBERS">https://www.tenable.com/indicators/ioe/ad/C-PRE-WIN2000-ACCESS-MEMBERS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Disabled Accounts in Privileged Groups]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DISABLED-ACCOUNTS-PRIV-GROUPS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DISABLED-ACCOUNTS-PRIV-GROUPS</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Disabled Accounts in Privileged Groups</p>

      <h3>Description</h3>
      <p>Accounts that are not used anymore should not stay in privileged groups.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DISABLED-ACCOUNTS-PRIV-GROUPS">https://www.tenable.com/indicators/ioe/ad/C-DISABLED-ACCOUNTS-PRIV-GROUPS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Computers Running an Obsolete OS]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-OBSOLETE-SYSTEMS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-OBSOLETE-SYSTEMS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Computers Running an Obsolete OS</p>

      <h3>Description</h3>
      <p>Identifies obsolete systems that Microsoft no longer support and which increase the infrastructure vulnerability.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-OBSOLETE-SYSTEMS">https://www.tenable.com/indicators/ioe/ad/C-OBSOLETE-SYSTEMS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Accounts With a Dangerous SID History Attribute]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-ACCOUNTS-DANG-SID-HISTORY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-ACCOUNTS-DANG-SID-HISTORY</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Accounts With a Dangerous SID History Attribute</p>

      <h3>Description</h3>
      <p>Checks user or computer accounts using a privileged SID in SID history attribute.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-ACCOUNTS-DANG-SID-HISTORY">https://www.tenable.com/indicators/ioe/ad/C-ACCOUNTS-DANG-SID-HISTORY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Use of Weak Cryptography Algorithms in Active Directory PKI]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PKI-WEAK-CRYPTO</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PKI-WEAK-CRYPTO</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Use of Weak Cryptography Algorithms in Active Directory PKI</p>

      <h3>Description</h3>
      <p>Identifies weak cryptographic algorithms used in root certificates deployed on an internal Active Directory PKI.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PKI-WEAK-CRYPTO">https://www.tenable.com/indicators/ioe/ad/C-PKI-WEAK-CRYPTO</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Recent Use of the Default Administrator Account]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-ADM-ACC-USAGE</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-ADM-ACC-USAGE</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Recent Use of the Default Administrator Account</p>

      <h3>Description</h3>
      <p>Checks for recent uses of the built-in administrator account.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-ADM-ACC-USAGE">https://www.tenable.com/indicators/ioe/ad/C-ADM-ACC-USAGE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[User Primary Group]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DANG-PRIMGROUPID</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DANG-PRIMGROUPID</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>User Primary Group</p>

      <h3>Description</h3>
      <p>Verify users' Primary Group has not been changed</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DANG-PRIMGROUPID">https://www.tenable.com/indicators/ioe/ad/C-DANG-PRIMGROUPID</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous Kerberos Delegation]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-UNCONST-DELEG</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-UNCONST-DELEG</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Dangerous Kerberos Delegation</p>

      <h3>Description</h3>
      <p>Checks for unauthorized Kerberos delegation, and ensures protection for privileged users against it.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-UNCONST-DELEG">https://www.tenable.com/indicators/ioe/ad/C-UNCONST-DELEG</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Reversible Passwords]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-USERS-REVER-PWDS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-USERS-REVER-PWDS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Reversible Passwords</p>

      <h3>Description</h3>
      <p>Verifies that the option to store passwords in a reversible format does not get enabled.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-USERS-REVER-PWDS">https://www.tenable.com/indicators/ioe/ad/C-USERS-REVER-PWDS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Reversible Passwords in GPO]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-REVER-PWD-GPO</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-REVER-PWD-GPO</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Reversible Passwords in GPO</p>

      <h3>Description</h3>
      <p>Checks that GPO preferences do not allow passwords in a reversible format.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-REVER-PWD-GPO">https://www.tenable.com/indicators/ioe/ad/C-REVER-PWD-GPO</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ensure SDProp Consistency]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-SDPROP-CONSISTENCY</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-SDPROP-CONSISTENCY</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Ensure SDProp Consistency</p>

      <h3>Description</h3>
      <p>Control that the AdminSDHolder object is in a clean state.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-SDPROP-CONSISTENCY">https://www.tenable.com/indicators/ioe/ad/C-SDPROP-CONSISTENCY</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Last Password Change on KRBTGT account]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-KRBTGT-PASSWORD</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-KRBTGT-PASSWORD</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Last Password Change on KRBTGT account</p>

      <h3>Description</h3>
      <p>Checks for KRBTGT accounts that have not changed their passwords for more than the recommended interval.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-KRBTGT-PASSWORD">https://www.tenable.com/indicators/ioe/ad/C-KRBTGT-PASSWORD</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Native Administrative Group Members]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-NATIVE-ADM-GROUP-MEMBERS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-NATIVE-ADM-GROUP-MEMBERS</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Native Administrative Group Members</p>

      <h3>Description</h3>
      <p>Abnormal accounts in the native administrative groups of Active Directory</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-NATIVE-ADM-GROUP-MEMBERS">https://www.tenable.com/indicators/ioe/ad/C-NATIVE-ADM-GROUP-MEMBERS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Privileged Accounts Running Kerberos Services]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PRIV-ACCOUNTS-SPN</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PRIV-ACCOUNTS-SPN</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Privileged Accounts Running Kerberos Services</p>

      <h3>Description</h3>
      <p>Detects highly privileged accounts with the Service Principal Name (SPN) attribute which affects their security.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PRIV-ACCOUNTS-SPN">https://www.tenable.com/indicators/ioe/ad/C-PRIV-ACCOUNTS-SPN</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AdminCount Attribute Set on Standard Users]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-ADMINCOUNT-ACCOUNT-PROPS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-ADMINCOUNT-ACCOUNT-PROPS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>AdminCount Attribute Set on Standard Users</p>

      <h3>Description</h3>
      <p>Checks for the adminCount attribute on decommissioned accounts leading to permission issues that are difficult to manage.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-ADMINCOUNT-ACCOUNT-PROPS">https://www.tenable.com/indicators/ioe/ad/C-ADMINCOUNT-ACCOUNT-PROPS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dormant Accounts]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-SLEEPING-ACCOUNTS</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-SLEEPING-ACCOUNTS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Dormant Accounts</p>

      <h3>Description</h3>
      <p>Detects unused dormant accounts that can lead to security risks.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-SLEEPING-ACCOUNTS">https://www.tenable.com/indicators/ioe/ad/C-SLEEPING-ACCOUNTS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous Trust Relationships]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-DANGEROUS-TRUST-RELATIONSHIP</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-DANGEROUS-TRUST-RELATIONSHIP</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Dangerous Trust Relationships</p>

      <h3>Description</h3>
      <p>Identifies misconfigured trust relationship attributes that decrease the security of a directory infrastructure.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-DANGEROUS-TRUST-RELATIONSHIP">https://www.tenable.com/indicators/ioe/ad/C-DANGEROUS-TRUST-RELATIONSHIP</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Accounts With Never Expiring Passwords]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-DONT-EXPIRE</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-DONT-EXPIRE</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Accounts With Never Expiring Passwords</p>

      <h3>Description</h3>
      <p>Checks for accounts with the DONT_EXPIRE_PASSWORD property flag in the userAccountControl attribute that allows indefinite use of the same password, bypassing password renewal policies.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-DONT-EXPIRE">https://www.tenable.com/indicators/ioe/ad/C-PASSWORD-DONT-EXPIRE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unlinked, Disabled or Orphan GPO]]></title>
            <link>https://www.tenable.com/indicators/ioe/ad/C-GPOLICY-DISABLED-UNLINKED</link>
            <guid>https://www.tenable.com/indicators/ioe/ad/C-GPOLICY-DISABLED-UNLINKED</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Unlinked, Disabled or Orphan GPO</p>

      <h3>Description</h3>
      <p>Unused or disabled GPOs slow directory performance and RSoP computation, and can lead to security policy confusion. Reactivating them by mistake can weaken existing policies.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/ad/C-GPOLICY-DISABLED-UNLINKED">https://www.tenable.com/indicators/ioe/ad/C-GPOLICY-DISABLED-UNLINKED</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous Application Permissions Affecting Data]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DANGEROUS-APPLICATION-PERMISSIONS-AFFECTING-DATA</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DANGEROUS-APPLICATION-PERMISSIONS-AFFECTING-DATA</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Dangerous Application Permissions Affecting Data</p>

      <h3>Description</h3>
      <p>Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a threat to users' data that these services store.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DANGEROUS-APPLICATION-PERMISSIONS-AFFECTING-DATA">https://www.tenable.com/indicators/ioe/entra/DANGEROUS-APPLICATION-PERMISSIONS-AFFECTING-DATA</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dynamic Group Featuring an Exploitable Rule]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DYNAMIC-GROUP-FEATURING-AN-EXPLOITABLE-RULE</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DYNAMIC-GROUP-FEATURING-AN-EXPLOITABLE-RULE</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Dynamic Group Featuring an Exploitable Rule</p>

      <h3>Description</h3>
      <p>Attackers can exploit dynamic groups in Microsoft Entra ID by manipulating self-modifiable attributes, allowing them to add themselves as group members. This manipulation enables privilege escalation and unauthorized access to sensitive resources tied to the groups.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DYNAMIC-GROUP-FEATURING-AN-EXPLOITABLE-RULE">https://www.tenable.com/indicators/ioe/entra/DYNAMIC-GROUP-FEATURING-AN-EXPLOITABLE-RULE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Empty Group]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/EMPTY-GROUP-MEID</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/EMPTY-GROUP-MEID</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Empty Group</p>

      <h3>Description</h3>
      <p>Empty groups can lead to confusion, compromise security, and result in unused resources. It is generally advisable to establish a clear purpose for groups and ensure they contain relevant members.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/EMPTY-GROUP-MEID">https://www.tenable.com/indicators/ioe/entra/EMPTY-GROUP-MEID</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Federated Domains List]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/FEDERATED-DOMAINS-LIST</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/FEDERATED-DOMAINS-LIST</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Federated Domains List</p>

      <h3>Description</h3>
      <p>Malicious federated domain configuration is a common threat, used by attackers as an authentication backdoor to the Entra ID tenant. Verifying existing and newly added federated domains is crucial to ensure their configurations are trustworthy and legitimate. This Indicator of Exposure provides a comprehensive list of federated domains and their relevant attributes to help you to make informed decisions about their security status.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/FEDERATED-DOMAINS-LIST">https://www.tenable.com/indicators/ioe/entra/FEDERATED-DOMAINS-LIST</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Known Federated Domain Backdoor]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/KNOWN-FEDERATED-DOMAIN-BACKDOOR</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/KNOWN-FEDERATED-DOMAIN-BACKDOOR</guid>
            <description><![CDATA[
      <p>Critical Severity</p>

      <h3>Name</h3>
      <p>Known Federated Domain Backdoor</p>

      <h3>Description</h3>
      <p>Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding their malicious federated domain, leading to persistence and privilege escalation.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/KNOWN-FEDERATED-DOMAIN-BACKDOOR">https://www.tenable.com/indicators/ioe/entra/KNOWN-FEDERATED-DOMAIN-BACKDOOR</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Password Expiration Enforced]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/PASSWORD-EXPIRATION-ENFORCED</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/PASSWORD-EXPIRATION-ENFORCED</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Password Expiration Enforced</p>

      <h3>Description</h3>
      <p>Enforcing password expiration in Microsoft Entra ID domains can undermine security by prompting users to change passwords frequently, often leading to weak, predictable, or reused passwords that reduce overall account protection.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/PASSWORD-EXPIRATION-ENFORCED">https://www.tenable.com/indicators/ioe/entra/PASSWORD-EXPIRATION-ENFORCED</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Privileged Account Naming Convention]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ACCOUNT-NAMING-CONVENTION</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ACCOUNT-NAMING-CONVENTION</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Privileged Account Naming Convention</p>

      <h3>Description</h3>
      <p>A naming convention for privileged users in Entra ID is crucial for security, standardization, audit compliance, and facilitates administration.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ACCOUNT-NAMING-CONVENTION">https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ACCOUNT-NAMING-CONVENTION</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Privileged Entra Account Synchronized With AD (Hybrid)]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ENTRA-ACCOUNT-SYNCHRONIZED-WITH-AD-HYBRID</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ENTRA-ACCOUNT-SYNCHRONIZED-WITH-AD-HYBRID</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Privileged Entra Account Synchronized With AD (Hybrid)</p>

      <h3>Description</h3>
      <p>Hybrid accounts, i.e. synchronized from Active Directory, with privileged roles in Entra ID pose a security risk because they allow attackers who compromise AD to pivot to Entra ID. Privileged accounts in Entra ID must be cloud-only accounts.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ENTRA-ACCOUNT-SYNCHRONIZED-WITH-AD-HYBRID">https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ENTRA-ACCOUNT-SYNCHRONIZED-WITH-AD-HYBRID</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unrestricted User Consent for Applications]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/UNRESTRICTED-USER-CONSENT-FOR-APPLICATIONS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/UNRESTRICTED-USER-CONSENT-FOR-APPLICATIONS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Unrestricted User Consent for Applications</p>

      <h3>Description</h3>
      <p>Entra ID allows users to autonomously consent to external applications' access to organization's data, which attackers may exploit in "illicit consent grant" attacks. Prevent this by restricting access to verified publishers or requiring administrator approval.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/UNRESTRICTED-USER-CONSENT-FOR-APPLICATIONS">https://www.tenable.com/indicators/ioe/entra/UNRESTRICTED-USER-CONSENT-FOR-APPLICATIONS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unverified Domain]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/UNVERIFIED-DOMAIN</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/UNVERIFIED-DOMAIN</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Unverified Domain</p>

      <h3>Description</h3>
      <p>You must confirm ownership of all custom domains in Entra ID. Keep unverified domains only temporarily - you should either verify or remove them to maintain a clean domain list and facilitate efficient reviews.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/UNVERIFIED-DOMAIN">https://www.tenable.com/indicators/ioe/entra/UNVERIFIED-DOMAIN</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous Delegated Permissions Affecting Data]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DANGEROUS-DELEGATED-PERMISSIONS-AFFECTING-DATA</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DANGEROUS-DELEGATED-PERMISSIONS-AFFECTING-DATA</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Dangerous Delegated Permissions Affecting Data</p>

      <h3>Description</h3>
      <p>Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on behalf of users (called "delegated permissions"). Certain permissions can pose a threat to users' data that these services store.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DANGEROUS-DELEGATED-PERMISSIONS-AFFECTING-DATA">https://www.tenable.com/indicators/ioe/entra/DANGEROUS-DELEGATED-PERMISSIONS-AFFECTING-DATA</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Entra Security Defaults Not Enabled]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/ENTRA-SECURITY-DEFAULTS-NOT-ENABLED</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/ENTRA-SECURITY-DEFAULTS-NOT-ENABLED</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Entra Security Defaults Not Enabled</p>

      <h3>Description</h3>
      <p>Entra ID Security Defaults offer pre-configured, Microsoft-recommended settings to enhance tenant protection.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/ENTRA-SECURITY-DEFAULTS-NOT-ENABLED">https://www.tenable.com/indicators/ioe/entra/ENTRA-SECURITY-DEFAULTS-NOT-ENABLED</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Guest Accounts With Equal Access to Normal Accounts]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/GUEST-ACCOUNTS-WITH-EQUAL-ACCESS-TO-NORMAL-ACCOUNTS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/GUEST-ACCOUNTS-WITH-EQUAL-ACCESS-TO-NORMAL-ACCOUNTS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Guest Accounts With Equal Access to Normal Accounts</p>

      <h3>Description</h3>
      <p>It is not advisable to configure Entra ID to consider guests as regular users, as it may enable malicious guests to conduct comprehensive reconnaissance on the tenant's resources.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/GUEST-ACCOUNTS-WITH-EQUAL-ACCESS-TO-NORMAL-ACCOUNTS">https://www.tenable.com/indicators/ioe/entra/GUEST-ACCOUNTS-WITH-EQUAL-ACCESS-TO-NORMAL-ACCOUNTS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Managed Devices Not Required for MFA Registration]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/MANAGED-DEVICES-NOT-REQUIRED-FOR-MFA-REGISTRATION</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/MANAGED-DEVICES-NOT-REQUIRED-FOR-MFA-REGISTRATION</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Managed Devices Not Required for MFA Registration</p>

      <h3>Description</h3>
      <p>Requiring managed devices for MFA registration makes it harder for attackers to register their rogue MFA, in case of stolen credentials, if they do not also have access to a managed device.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/MANAGED-DEVICES-NOT-REQUIRED-FOR-MFA-REGISTRATION">https://www.tenable.com/indicators/ioe/entra/MANAGED-DEVICES-NOT-REQUIRED-FOR-MFA-REGISTRATION</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MFA Not Required for Risky Sign-Ins]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/MFA-NOT-REQUIRED-FOR-RISKY-SIGN-INS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/MFA-NOT-REQUIRED-FOR-RISKY-SIGN-INS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>MFA Not Required for Risky Sign-Ins</p>

      <h3>Description</h3>
      <p>MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you require MFA for risky sign-ins, for example when the authentication request may not come from the legitimate identity owner.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/MFA-NOT-REQUIRED-FOR-RISKY-SIGN-INS">https://www.tenable.com/indicators/ioe/entra/MFA-NOT-REQUIRED-FOR-RISKY-SIGN-INS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing MFA for Non-Privileged Account]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/MISSING-MFA-FOR-NON-PRIVILEGED-ACCOUNT</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/MISSING-MFA-FOR-NON-PRIVILEGED-ACCOUNT</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Missing MFA for Non-Privileged Account</p>

      <h3>Description</h3>
      <p>MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, even for non-privileged accounts. Accounts without an MFA method registered cannot benefit from it.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/MISSING-MFA-FOR-NON-PRIVILEGED-ACCOUNT">https://www.tenable.com/indicators/ioe/entra/MISSING-MFA-FOR-NON-PRIVILEGED-ACCOUNT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Never Used Privileged User]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/NEVER-USED-PRIVILEGED-USER</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/NEVER-USED-PRIVILEGED-USER</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Never Used Privileged User</p>

      <h3>Description</h3>
      <p>Never used privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their potential default passwords make them prime targets for attackers.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/NEVER-USED-PRIVILEGED-USER">https://www.tenable.com/indicators/ioe/entra/NEVER-USED-PRIVILEGED-USER</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Privileged Entra Account With Access to M365 Services]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ENTRA-ACCOUNT-WITH-ACCESS-TO-M365-SERVICES</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ENTRA-ACCOUNT-WITH-ACCESS-TO-M365-SERVICES</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Privileged Entra Account With Access to M365 Services</p>

      <h3>Description</h3>
      <p>You should have separate Entra accounts for administrative tasks: one standard account for daily use and another privileged account limited specifically to administration activities. This approach reduces the attack surface of the privileged account.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ENTRA-ACCOUNT-WITH-ACCESS-TO-M365-SERVICES">https://www.tenable.com/indicators/ioe/entra/PRIVILEGED-ENTRA-ACCOUNT-WITH-ACCESS-TO-M365-SERVICES</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Risky Users Without Enforcement]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/RISKY-USERS-WITHOUT-ENFORCEMENT</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/RISKY-USERS-WITHOUT-ENFORCEMENT</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Risky Users Without Enforcement</p>

      <h3>Description</h3>
      <p>Block risky users to prevent unauthorized access and potential breaches. Security best practices recommend using Conditional Access Policies to stop vulnerable accounts from authenticating to Entra ID.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/RISKY-USERS-WITHOUT-ENFORCEMENT">https://www.tenable.com/indicators/ioe/entra/RISKY-USERS-WITHOUT-ENFORCEMENT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unrestricted Guest Accounts]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/UNRESTRICTED-GUEST-ACCOUNTS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/UNRESTRICTED-GUEST-ACCOUNTS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Unrestricted Guest Accounts</p>

      <h3>Description</h3>
      <p>By default, while guest users in Entra ID have limited access to reduce their visibility within the tenant, it is also possible to enhance security and privacy by further tightening these restrictions.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/UNRESTRICTED-GUEST-ACCOUNTS">https://www.tenable.com/indicators/ioe/entra/UNRESTRICTED-GUEST-ACCOUNTS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unusual Federation Signing Certificate Validity Period]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/UNUSUAL-FEDERATION-SIGNING-CERTIFICATE-VALIDITY-PERIOD</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/UNUSUAL-FEDERATION-SIGNING-CERTIFICATE-VALIDITY-PERIOD</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Unusual Federation Signing Certificate Validity Period</p>

      <h3>Description</h3>
      <p>An unusually high validity period for a federation signing certificate is suspicious, as it could indicate that an attacker obtained elevated privileges in Entra ID and created a backdoor through the federation trust mechanism.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/UNUSUAL-FEDERATION-SIGNING-CERTIFICATE-VALIDITY-PERIOD">https://www.tenable.com/indicators/ioe/entra/UNUSUAL-FEDERATION-SIGNING-CERTIFICATE-VALIDITY-PERIOD</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ability of Standard Accounts to Register Applications]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/ABILITY-OF-STANDARD-ACCOUNTS-TO-REGISTER-APPLICATIONS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/ABILITY-OF-STANDARD-ACCOUNTS-TO-REGISTER-APPLICATIONS</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Ability of Standard Accounts to Register Applications</p>

      <h3>Description</h3>
      <p>By default, any Entra user can register applications within the tenant. While this feature is convenient and not an immediate security vulnerability, it does carry certain risks. Therefore, following best practices, Tenable recommends disabling this capability.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/ABILITY-OF-STANDARD-ACCOUNTS-TO-REGISTER-APPLICATIONS">https://www.tenable.com/indicators/ioe/entra/ABILITY-OF-STANDARD-ACCOUNTS-TO-REGISTER-APPLICATIONS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Application Allowing Multi-Tenant Authentication]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/APPLICATION-ALLOWING-MULTI-TENANT-AUTHENTICATION</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/APPLICATION-ALLOWING-MULTI-TENANT-AUTHENTICATION</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Application Allowing Multi-Tenant Authentication</p>

      <h3>Description</h3>
      <p>Entra applications, which allow multi-tenant authentication, may give unauthorized access to malicious users if this configuration was not enabled with full awareness and without implementing adequate authorization checks within the application code.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/APPLICATION-ALLOWING-MULTI-TENANT-AUTHENTICATION">https://www.tenable.com/indicators/ioe/entra/APPLICATION-ALLOWING-MULTI-TENANT-AUTHENTICATION</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Conditional Access Policy Disables Continuous Access Evaluation]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/CONDITIONAL-ACCESS-POLICY-DISABLES-CONTINUOUS-ACCESS-EVALUATION</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/CONDITIONAL-ACCESS-POLICY-DISABLES-CONTINUOUS-ACCESS-EVALUATION</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Conditional Access Policy Disables Continuous Access Evaluation</p>

      <h3>Description</h3>
      <p>Continuous Access Evaluation is an Entra ID security feature that enables swift reactions to security policy changes or user status updates. For this reason, do not disable it.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/CONDITIONAL-ACCESS-POLICY-DISABLES-CONTINUOUS-ACCESS-EVALUATION">https://www.tenable.com/indicators/ioe/entra/CONDITIONAL-ACCESS-POLICY-DISABLES-CONTINUOUS-ACCESS-EVALUATION</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Password Protection Not Enabled for on-Premises Environments]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/PASSWORD-PROTECTION-NOT-ENABLED-FOR-ON-PREMISES-ENVIRONMENTS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/PASSWORD-PROTECTION-NOT-ENABLED-FOR-ON-PREMISES-ENVIRONMENTS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Password Protection Not Enabled for on-Premises Environments</p>

      <h3>Description</h3>
      <p>Microsoft Entra Password Protection is a security feature that prevents users from setting easily guessable passwords to enhance overall password security in an organization.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/PASSWORD-PROTECTION-NOT-ENABLED-FOR-ON-PREMISES-ENVIRONMENTS">https://www.tenable.com/indicators/ioe/entra/PASSWORD-PROTECTION-NOT-ENABLED-FOR-ON-PREMISES-ENVIRONMENTS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Public M365 Group]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/PUBLIC-M365-GROUP</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/PUBLIC-M365-GROUP</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Public M365 Group</p>

      <h3>Description</h3>
      <p>Microsoft 365 groups stored in Entra ID are either public or private. Public groups pose a security risk because any user within the tenant can join them and gain access to their data (Teams chats/files, emails...).</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/PUBLIC-M365-GROUP">https://www.tenable.com/indicators/ioe/entra/PUBLIC-M365-GROUP</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Show Additional Context in Microsoft Authenticator Notifications]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/SHOW-ADDITIONAL-CONTEXT-IN-MICROSOFT-AUTHENTICATOR-NOTIFICATIONS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/SHOW-ADDITIONAL-CONTEXT-IN-MICROSOFT-AUTHENTICATOR-NOTIFICATIONS</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Show Additional Context in Microsoft Authenticator Notifications</p>

      <h3>Description</h3>
      <p>For improved visibility, enable Microsoft Authenticator notifications to display additional context, such as the application name and geolocation. This helps users identify and deny potentially malicious MFA or passwordless authentication requests, effectively mitigating the risk of MFA fatigue attacks.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/SHOW-ADDITIONAL-CONTEXT-IN-MICROSOFT-AUTHENTICATOR-NOTIFICATIONS">https://www.tenable.com/indicators/ioe/entra/SHOW-ADDITIONAL-CONTEXT-IN-MICROSOFT-AUTHENTICATOR-NOTIFICATIONS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Suspicious AD Synchronization Role Assignment]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/SUSPICIOUS-DIRECTORY-SYNCHRONIZATION-ACCOUNTS-ROLE-ASSIGNMENT</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/SUSPICIOUS-DIRECTORY-SYNCHRONIZATION-ACCOUNTS-ROLE-ASSIGNMENT</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Suspicious AD Synchronization Role Assignment</p>

      <h3>Description</h3>
      <p>Microsoft designed two hidden built-in Entra ID roles for Active Directory synchronization, intended exclusively for Entra Connect or Cloud Sync service accounts. These roles carry implicit privileged permissions, which malicious actors could exploit to launch covert attacks.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/SUSPICIOUS-DIRECTORY-SYNCHRONIZATION-ACCOUNTS-ROLE-ASSIGNMENT">https://www.tenable.com/indicators/ioe/entra/SUSPICIOUS-DIRECTORY-SYNCHRONIZATION-ACCOUNTS-ROLE-ASSIGNMENT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dormant Device]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DORMANT-DEVICE</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DORMANT-DEVICE</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Dormant Device</p>

      <h3>Description</h3>
      <p>Dormant devices pose security risks such as outdated configurations and unpatched vulnerabilities. Without regular monitoring and updates, these stale devices become potential targets for exploitation, compromising tenant integrity and data confidentiality.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DORMANT-DEVICE">https://www.tenable.com/indicators/ioe/entra/DORMANT-DEVICE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Federation Signing Certificates Mismatch]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/FEDERATION-SIGNING-CERTIFICATES-MISMATCH</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/FEDERATION-SIGNING-CERTIFICATES-MISMATCH</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Federation Signing Certificates Mismatch</p>

      <h3>Description</h3>
      <p>Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding a malicious token-signing certificate, leading to persistence and privilege escalation.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/FEDERATION-SIGNING-CERTIFICATES-MISMATCH">https://www.tenable.com/indicators/ioe/entra/FEDERATION-SIGNING-CERTIFICATES-MISMATCH</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[First-Party Service Principal With Credentials]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/FIRST-PARTY-SERVICE-PRINCIPAL-WITH-CREDENTIALS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/FIRST-PARTY-SERVICE-PRINCIPAL-WITH-CREDENTIALS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>First-Party Service Principal With Credentials</p>

      <h3>Description</h3>
      <p>First-Party Service Principals have powerful permissions while being overlooked because they are hidden, owned by Microsoft and numerous. Attackers add credentials to them to stealthily benefit from their privileges for privilege escalation and persistence.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/FIRST-PARTY-SERVICE-PRINCIPAL-WITH-CREDENTIALS">https://www.tenable.com/indicators/ioe/entra/FIRST-PARTY-SERVICE-PRINCIPAL-WITH-CREDENTIALS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Legacy Authentication Not Blocked]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/LEGACY-AUTHENTICATION-NOT-BLOCKED</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/LEGACY-AUTHENTICATION-NOT-BLOCKED</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Legacy Authentication Not Blocked</p>

      <h3>Description</h3>
      <p>Legacy authentication methods do not support Multi-Factor Authentication (MFA), enabling attackers to continue performing brute-force, credential stuffing, and password-spraying attacks.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/LEGACY-AUTHENTICATION-NOT-BLOCKED">https://www.tenable.com/indicators/ioe/entra/LEGACY-AUTHENTICATION-NOT-BLOCKED</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Managed Devices Not Required for Authentication]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/MANAGED-DEVICES-NOT-REQUIRED-FOR-AUTHENTICATION</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/MANAGED-DEVICES-NOT-REQUIRED-FOR-AUTHENTICATION</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Managed Devices Not Required for Authentication</p>

      <h3>Description</h3>
      <p>Require managed devices to prevent unauthorized access and potential breaches. Security best practices recommend using Conditional Access Policies to block authentication to Entra ID from unmanaged devices.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/MANAGED-DEVICES-NOT-REQUIRED-FOR-AUTHENTICATION">https://www.tenable.com/indicators/ioe/entra/MANAGED-DEVICES-NOT-REQUIRED-FOR-AUTHENTICATION</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Never Used Device]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/NEVER-USED-DEVICE</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/NEVER-USED-DEVICE</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Never Used Device</p>

      <h3>Description</h3>
      <p>You should avoid pre-created never used device accounts as they reflect poor hygiene practices and can potentially pose security risks.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/NEVER-USED-DEVICE">https://www.tenable.com/indicators/ioe/entra/NEVER-USED-DEVICE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Single Member Group]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/SINGLE-MEMBER-GROUP-MEID</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/SINGLE-MEMBER-GROUP-MEID</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Single Member Group</p>

      <h3>Description</h3>
      <p>It is not advisable to create a group with only one member because it introduces redundancy and complexity. This practice unnecessarily complicates management by adding layers and diminishes the intended efficiency of using groups for streamlined access control and administration.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/SINGLE-MEMBER-GROUP-MEID">https://www.tenable.com/indicators/ioe/entra/SINGLE-MEMBER-GROUP-MEID</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Temporary Access Pass Feature Enabled]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/TEMPORARY-ACCESS-PASS-FEATURE-ENABLED</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/TEMPORARY-ACCESS-PASS-FEATURE-ENABLED</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Temporary Access Pass Feature Enabled</p>

      <h3>Description</h3>
      <p>The Temporary Access Pass (TAP) feature is a temporary authentication method that uses a time-limited or limited-use passcode. While it is a legitimate feature, it is safer to disable it to reduce the attack surface if your organization does not require it.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/TEMPORARY-ACCESS-PASS-FEATURE-ENABLED">https://www.tenable.com/indicators/ioe/entra/TEMPORARY-ACCESS-PASS-FEATURE-ENABLED</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MFA Not Required for a Privileged Role]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/MFA-NOT-REQUIRED-FOR-A-PRIVILEGED-ROLE</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/MFA-NOT-REQUIRED-FOR-A-PRIVILEGED-ROLE</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>MFA Not Required for a Privileged Role</p>

      <h3>Description</h3>
      <p>MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, particularly for privileged accounts with assigned privileged roles.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/MFA-NOT-REQUIRED-FOR-A-PRIVILEGED-ROLE">https://www.tenable.com/indicators/ioe/entra/MFA-NOT-REQUIRED-FOR-A-PRIVILEGED-ROLE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Admin Consent Workflow for Applications Not Configured]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/ADMIN-CONSENT-WORKFLOW-FOR-APPLICATIONS-NOT-CONFIGURED</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/ADMIN-CONSENT-WORKFLOW-FOR-APPLICATIONS-NOT-CONFIGURED</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Admin Consent Workflow for Applications Not Configured</p>

      <h3>Description</h3>
      <p>The admin consent workflow in Entra ID enables non-administrator users to request application permissions through a structured approval process. If the workflow isn't configured, users who try to access applications may encounter errors without a way to request consent.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/ADMIN-CONSENT-WORKFLOW-FOR-APPLICATIONS-NOT-CONFIGURED">https://www.tenable.com/indicators/ioe/entra/ADMIN-CONSENT-WORKFLOW-FOR-APPLICATIONS-NOT-CONFIGURED</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Authentication Methods Migration Not Complete]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/AUTHENTICATION-METHODS-MIGRATION-NOT-COMPLETE</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/AUTHENTICATION-METHODS-MIGRATION-NOT-COMPLETE</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Authentication Methods Migration Not Complete</p>

      <h3>Description</h3>
      <p>Migrating to the "Authentication methods" policy streamlines and modernizes authentication management in Microsoft Entra ID. This transition simplifies administration, enhances security, and enables support for the latest authentication methods. To avoid disruptions caused by the deprecation of legacy policies, complete your migration by September 2025.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/AUTHENTICATION-METHODS-MIGRATION-NOT-COMPLETE">https://www.tenable.com/indicators/ioe/entra/AUTHENTICATION-METHODS-MIGRATION-NOT-COMPLETE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous Application Permissions Affecting the Tenant]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DANGEROUS-APPLICATION-PERMISSIONS-AFFECTING-THE-TENANT</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DANGEROUS-APPLICATION-PERMISSIONS-AFFECTING-THE-TENANT</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Dangerous Application Permissions Affecting the Tenant</p>

      <h3>Description</h3>
      <p>Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DANGEROUS-APPLICATION-PERMISSIONS-AFFECTING-THE-TENANT">https://www.tenable.com/indicators/ioe/entra/DANGEROUS-APPLICATION-PERMISSIONS-AFFECTING-THE-TENANT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dangerous Delegated Permissions Affecting the Tenant]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DANGEROUS-DELEGATED-PERMISSIONS-AFFECTING-THE-TENANT</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DANGEROUS-DELEGATED-PERMISSIONS-AFFECTING-THE-TENANT</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Dangerous Delegated Permissions Affecting the Tenant</p>

      <h3>Description</h3>
      <p>Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on behalf of users (called "delegated permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DANGEROUS-DELEGATED-PERMISSIONS-AFFECTING-THE-TENANT">https://www.tenable.com/indicators/ioe/entra/DANGEROUS-DELEGATED-PERMISSIONS-AFFECTING-THE-TENANT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Disabled Account Assigned to Privileged Role]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DISABLED-ACCOUNT-ASSIGNED-TO-PRIVILEGED-ROLE</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DISABLED-ACCOUNT-ASSIGNED-TO-PRIVILEGED-ROLE</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Disabled Account Assigned to Privileged Role</p>

      <h3>Description</h3>
      <p>Having a sane account management process requires monitoring assignments to privileged roles.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DISABLED-ACCOUNT-ASSIGNED-TO-PRIVILEGED-ROLE">https://www.tenable.com/indicators/ioe/entra/DISABLED-ACCOUNT-ASSIGNED-TO-PRIVILEGED-ROLE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dormant Non-Privileged User]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DORMANT-NON-PRIVILEGED-USER</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DORMANT-NON-PRIVILEGED-USER</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Dormant Non-Privileged User</p>

      <h3>Description</h3>
      <p>Dormant non-privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DORMANT-NON-PRIVILEGED-USER">https://www.tenable.com/indicators/ioe/entra/DORMANT-NON-PRIVILEGED-USER</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dormant Privileged User]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/DORMANT-PRIVILEGED-USER</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/DORMANT-PRIVILEGED-USER</guid>
            <description><![CDATA[
      <p>Medium Severity</p>

      <h3>Name</h3>
      <p>Dormant Privileged User</p>

      <h3>Description</h3>
      <p>Dormant privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/DORMANT-PRIVILEGED-USER">https://www.tenable.com/indicators/ioe/entra/DORMANT-PRIVILEGED-USER</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Guest Account With a Privileged Role]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/GUEST-ACCOUNT-WITH-A-PRIVILEGED-ROLE</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/GUEST-ACCOUNT-WITH-A-PRIVILEGED-ROLE</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Guest Account With a Privileged Role</p>

      <h3>Description</h3>
      <p>Guest accounts are external identities that can pose a security risk when they have privileged roles assigned to them. This grants substantial privileges within the tenant to individuals outside your organization.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/GUEST-ACCOUNT-WITH-A-PRIVILEGED-ROLE">https://www.tenable.com/indicators/ioe/entra/GUEST-ACCOUNT-WITH-A-PRIVILEGED-ROLE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing MFA for Privileged Account]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/MISSING-MFA-FOR-PRIVILEGED-ACCOUNT</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/MISSING-MFA-FOR-PRIVILEGED-ACCOUNT</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>Missing MFA for Privileged Account</p>

      <h3>Description</h3>
      <p>MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, especially with privileged accounts. Accounts without an MFA method registered cannot benefit from it.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/MISSING-MFA-FOR-PRIVILEGED-ACCOUNT">https://www.tenable.com/indicators/ioe/entra/MISSING-MFA-FOR-PRIVILEGED-ACCOUNT</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Never Used Non-Privileged User]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/NEVER-USED-NON-PRIVILEGED-USER</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/NEVER-USED-NON-PRIVILEGED-USER</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Never Used Non-Privileged User</p>

      <h3>Description</h3>
      <p>Never used non-privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their potential default passwords make them prime targets for attackers.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/NEVER-USED-NON-PRIVILEGED-USER">https://www.tenable.com/indicators/ioe/entra/NEVER-USED-NON-PRIVILEGED-USER</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Users Allowed to Join Devices]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/USERS-ALLOWED-TO-JOIN-DEVICES</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/USERS-ALLOWED-TO-JOIN-DEVICES</guid>
            <description><![CDATA[
      <p>Low Severity</p>

      <h3>Name</h3>
      <p>Users Allowed to Join Devices</p>

      <h3>Description</h3>
      <p>Allowing all users to join unrestricted devices to the Entra tenant opens the door for threat actors to plant rogue devices into the organization's identity system and give them a foothold for further compromise.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/USERS-ALLOWED-TO-JOIN-DEVICES">https://www.tenable.com/indicators/ioe/entra/USERS-ALLOWED-TO-JOIN-DEVICES</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[High Number of Administrators]]></title>
            <link>https://www.tenable.com/indicators/ioe/entra/HIGH-NUMBER-OF-ADMINISTRATORS</link>
            <guid>https://www.tenable.com/indicators/ioe/entra/HIGH-NUMBER-OF-ADMINISTRATORS</guid>
            <description><![CDATA[
      <p>High Severity</p>

      <h3>Name</h3>
      <p>High Number of Administrators</p>

      <h3>Description</h3>
      <p>Administrators have elevated privileges and can pose security risks when there is a high number of them since it increases the attack surface. This is also the sign that the least-privileged principle is not respected.</p>


      <p>Read more at  <a href="https://www.tenable.com/indicators/ioe/entra/HIGH-NUMBER-OF-ADMINISTRATORS">https://www.tenable.com/indicators/ioe/entra/HIGH-NUMBER-OF-ADMINISTRATORS</a></p>
    ]]></description>
        </item>
    </channel>
</rss>