Lateral movement protection checklist
To protect against lateral movement in AD, cybersecurity solutions must possess three essential capabilities.
Capability | Description | Implications |
---|---|---|
Inline enforcement | At runtime, determine if an authentication is legitimate or not. Preemptively stop suspicious authentications or ask for a second opinion | Prevent an authentication from completion effectively stopping lateral movement. |
Accurate detection | Continuously monitor and benchmark baseline activity to analyze anomalous behavior that could be indicative of an attack | Monitoring user authentications and access attempts enables teams to understand what’s normal and what isn’t |
Real-time response | Act on malicious detection with immediate termination of unauthorized activity | Blocking malicious attempts in real-time enforces containment and eradication of threats |
Full visibility and coverage | Apply detection and response on all instances within the environment | Gaining a full picture of all identities within AD surfaces all authentications and protocols in effect |
Neither Active Directory nor traditional on-prem security solutions can fully satisfy all four capabilities. In the following pages, we’ll explain the shortcomings and why an identity-first approach to preventing lateral movement is the only strategy to achieve security.

Preventing Lateral Movement in Active Directory
Neither Active Directory nor traditional on-prem security solutions can fully satisfy all four capabilities. In the following pages, we’ll explain the shortcomings and why an identity-first approach to preventing lateral movement is the only strategy to achieve security.
Capability | Description | Implications |
---|---|---|
Inline enforcement | At runtime, determine if an authentication is legitimate or not. Preemptively stop suspicious authentications or ask for a second opinion | Prevent an authentication from completion effectively stopping lateral movement. |
Accurate detection | Continuously monitor and benchmark baseline activity to analyze anomalous behavior that could be indicative of an attack | Monitoring user authentications and access attempts enables teams to understand what’s normal and what isn’t |
Real-time response | Act on malicious detection with immediate termination of unauthorized activity | Blocking malicious attempts in real-time enforces containment and eradication of threats |
Full visibility and coverage | Apply detection and response on all instances within the environment | Gaining a full picture of all identities within AD surfaces all authentications and protocols in effect |
To protect against lateral movement in AD, cybersecurity solutions must possess three essential capabilities.
Lateral movement protection checklist
Preventing Lateral Movement in Active Directory
