Skip to content

Conversation

@jakehildreth
Copy link
Owner

  1. Added three (3) new detections: ESC7, ESC9, ESC16
  2. Added Risk Ratings for each new detection:
  • ESC7 (CA Administrator): if a principal granted CA Administrator rights is expected, set risk to 0 and highlight that this is a Tier 0/control plane principal.
  • ESC7 (Certificate Manager): if a principal granted Certificate Manager rights is expected, set risk to 0.
  • ESC9: larger groups/admin groups create highest risk. If ESC6 also exists, risk is very high.
  • ESC16: if ESC6 also exists, risk is Critical.
  1. Improved Risk Ratings for existing detections:
  • ESC4: if the principal granted rights on a template is an administrator, set risk to 0.
  • ESC6: if ESC9 or ESC16 exists in the forest, raise the risk.

jakehildreth and others added 17 commits May 17, 2025 06:59
…hecking for CAHostDistinguishedName before retrieving AD objects.
Added ESC16 detections 🕵️
Enhance error handling in Get-CAHostObject and Find-ESC7  scripts
1. All "remediation updaters" now highlight the question being asked.
2. Complete rewrite of ESC7 to bring inline with all other principal-based issues.
3. Improved risk scoring for ESC1, ESC6, ESC7, ESC9, and ESC16
4. ESC4 and ESC7 now properly mark risk when principal is an admin/manager.
Add ESC9 and Improve Risk Ratings
@jakehildreth jakehildreth merged commit e43023a into main May 26, 2025
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants