Thursday, March 6, 2025
Homecyber securityInvokeADCheck - New Powershell Module for Active Directory Assessment

InvokeADCheck – New Powershell Module for Active Directory Assessment

Published on

SIEM as a Service

Follow Us on Google News

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to streamline Active Directory (AD) assessments.

Created by Niels Hofland and colleague Justin, this tool aims to address the challenges faced by IT administrators and security professionals in efficiently evaluating AD environments.

Streamlining AD Assessment Process

InvokeADCheck offers a comprehensive solution for conducting various checks to identify potential security misconfigurations, weaknesses, and deviations from best practices in Active Directory setups.

The module allows users to perform single checks, multiple checks, or execute all available checks simultaneously through the PowerShell CLI.

Key features of InvokeADCheck include:

  1. Flexible execution options
  2. Detailed results with actionable insights
  3. Multiple output formats, including CLI display and file exports
  4. Integration with the ImportExcel PowerShell module for enhanced data analysis

The tool highlights unsafe or default settings in red, making it easy for administrators to identify areas of concern quickly.

According to Orange Cyberdefense Report, users can export results to various file types, including Excel spreadsheets, for further analysis and reporting.

InvokeADCheck
View detailed user account health check results in the exported Excel file.

Development and Functionality

InvokeADCheck was developed using the ModuleBuild scaffolding framework, which helped organize existing scripts into individual private functions.

The module comprises numerous private functions handling tasks such as importing dependencies, formatting output, and performing specific AD checks.

A public function, ‘Invoke-ADCheck’, manages command-line argument parsing, prerequisite checks, and execution of selected AD checks.

The module supports multiple output types, allowing users to choose the most suitable format for their needs.

While primarily designed for smaller AD domains within a single forest, InvokeADCheck provides a streamlined solution for basic assessments.

However, users should note that it may not cover every scenario in more complex setups.

The development team acknowledges the inspiration drawn from Sean Metcalf’s Invoke-TrimarcADChecks and has carefully credited code sources in the NOTES section of each private module.

As an open-source project, InvokeADCheck is available on GitHub, inviting contributions from the cybersecurity community.

While still a work in progress, the tool offers promising capabilities for enhancing Active Directory security assessments in various environments.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns

Trend Micro's Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit...

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious...

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive...