Pentiq
Network Infrastructure

Active Directory & Password Review

Most internal breaches don't end in a server compromise - they end in a domain compromise. Pentiq's Active Directory & Password Review audits the on-premises and hybrid identity estate that real attackers target: forest design, delegation, ACLs, kerberoastable accounts, and the password hygiene that decides how fast the chain moves. Available as a standalone engagement or paired with an internal infrastructure test.

What we test

Audit the identity layer most internal breaches escalate through.

Forest and domain design, OU hierarchy, Group Policy Objects, delegation and ACL relationships, kerberoastable and AS-REP-roastable accounts, and offline credential strength. Configuration is benchmarked against Microsoft Security Baselines and CIS, with controlled privilege-escalation simulations evidencing real-world risk.

Why it matters

The pressure this service answers.

Active Directory is the single most-targeted identity layer in enterprise IT. A weak ACL, an over-delegated service account, or a stale password policy can collapse a healthy network into domain dominance in hours. Most clients haven't audited it cohesively in years.

Testing activities

Manual, reproducible, peer-reviewed.

Every engagement is scoped through a formal Rules of Engagement, delivered by an in-house Pentiq consultant, peer-reviewed by a senior tester, and risk-rated using CVSS 4.0 where applicable.

  • Pre-engagement scoping of domains, trusts, and dictionary sources
  • Enumeration of schema, OU hierarchy, and Group Policy Objects using PowerView and BloodHound
  • Offline cracking of NTLM/Kerberos hashes; Kerberoast and AS-REP roast tests
  • Controlled privilege-escalation simulations (ACL abuse, delegation, SID-history)
  • Baseline review of password, lock-out, and smart-card policies
  • Hybrid-identity coverage where Entra ID/Azure AD federation is in scope
  • Post-assessment debrief covering remediation and CVSS-mapped reporting

Methodologies & frameworks

The standards behind every report.

Every report aligns to the methodologies and frameworks your assessors, customers, and insurers already recognise, so findings are defensible, reproducible, and easy to validate.

  • CREST Infrastructure methodology
  • Microsoft Security Baselines
  • CIS Microsoft Windows Benchmarks
  • MITRE ATT&CK (Privilege Escalation and Credential Access)
  • NIST SP 800-53 IA and AC families

Outcomes

What you walk away with.

  • Quantifies credential risk and password strength across the estate
  • Identifies domain-trust and delegation weaknesses before they're exploited
  • Accelerates zero-trust and identity-modernisation programmes
  • Prioritised remediation tasks with measurable improvement KPIs
  • Available standalone or alongside an internal infrastructure engagement

Get started

Talk to Pentiq about active directory & password review.

Most enquiries get a same working day response from a Pentiq consultant. We'll scope honestly and tell you when an alternative service is the right answer.