You're among CyopScape's first visitors — share your feedback and help us improve.


CyopScape | Cybersecurity Insights Detection Engineering
← Back to Insights
Detection Engineering 8 min read

Detecting Lateral Movement in Active Directory: An SOC Analyst's Field Guide

Attackers rarely go straight to their target — and that progression leaves traces

When an attacker compromises an enterprise network, they rarely land exactly where they want to be. They get a foothold — a phished employee's workstation, an exposed service, a misconfigured application — and then work their way toward the things that actually matter: servers with sensitive data, backup systems, domain controllers, finance platforms.

That process of moving from system to system inside a network is called lateral movement. And in most enterprise environments, it runs through Active Directory.

What Is Active Directory and Why Do Attackers Target It?

Active Directory (AD) is the system that most Windows-based organizations use to manage who can access what. When you log into your work laptop, unlock a shared drive, or connect to an internal application, AD is checking your credentials and deciding whether to let you in. It is the central authentication backbone of the network.

That makes it extremely valuable to attackers. If you understand how AD works — and how to abuse its authentication mechanisms — you can move between systems using credentials and tickets that look completely legitimate. No obvious malware, no suspicious-looking files. Just valid-looking authentication events that blend into the noise of normal business activity.

This is what makes lateral movement through AD so difficult to catch: attackers are not breaking the system. They are using it — just in ways the legitimate user never intended.

The Three Things Analysts Should Understand

1. Attackers use real credentials, not just malware

A common misconception is that detecting an intrusion means detecting malware. In many modern intrusions, the most dangerous phase involves no malware at all. Once an attacker extracts a password hash from a compromised machine's memory, they can use that hash to authenticate as the victim user — without ever knowing the actual password.

This technique is called Pass-the-Hash. The attacker is not guessing or cracking the password — they are presenting a stolen key that Windows accepts as valid. From the system's perspective, it looks like a normal login.

A similar technique, Pass-the-Ticket, does the same thing with Kerberos authentication tickets. Think of a Kerberos ticket like a concert wristband — it proves you already cleared the entrance check, so you can move freely inside without showing ID again. If an attacker steals that wristband, they can use it to access systems as you.

2. Behavior and context matter more than individual events

A single login event from a user's account tells you almost nothing on its own. Context is what makes events meaningful.

A user logging into their workstation is normal. That same user's account suddenly authenticating to five different servers they have never accessed — at 2am, from a different machine — is not. Neither individual fact is alarming by itself. Together, they tell a story.

This is why lateral movement detection depends on establishing baselines. Analysts need to understand what normal looks like for users, accounts, and systems before they can reliably identify what is abnormal. Without that context, the noise of a large enterprise environment makes meaningful signals very hard to separate from routine activity.

3. The trail exists — if you have the right logs

Lateral movement leaves evidence. Authentication events, remote connections, process activity — it all gets recorded somewhere. The catch is that Windows does not log everything by default, and many organizations have not configured their systems to capture the events that matter most.

For example, detecting Pass-the-Hash reliably requires logs that show how a user authenticated — specifically, whether they used NTLM (the older authentication protocol more vulnerable to this attack) versus Kerberos. That detail is available in Windows event logs, but only if the right audit policies are enabled and those logs are being forwarded to a central SIEM.

This is one of the most common gaps in SOC detection capability. The data exists — but it was never collected.

What to Actually Watch For

Rather than a checklist of event IDs, here are the behavioral patterns that should prompt an analyst to investigate further:

What Good Detection Looks Like

Effective lateral movement detection is not about catching every technique the moment it happens. It is about having enough visibility that when an attacker progresses through an environment, they leave a trail that analysts can follow.

That requires three things working together:

Defensive Takeaways

Understand authentication before trying to detect abuse of it

If you are newer to SOC work, invest time in understanding how NTLM and Kerberos authentication actually work. You cannot reliably detect Pass-the-Hash or Pass-the-Ticket if you do not know what normal authentication looks like in the logs.

Ask "is this normal for this account?" before closing an alert

Lateral movement blends in. Before dismissing an authentication event as benign, check whether the account, source system, target system, and time of day are all consistent with that user's typical behavior.

Push for better logging in your environment

If your SOC cannot answer basic questions about authentication patterns — which protocol was used, from which source, to which target — the logging configuration needs attention. Detection engineering and log architecture are closely linked.

Lateral movement rarely happens once

When you find a suspicious authentication event, look for the pattern around it — not just the single event. Attackers move methodically. One anomalous login is often the middle of a sequence, not the beginning.

Final Thoughts

Lateral movement through Active Directory is not exotic. It is one of the most consistent and well-documented patterns in enterprise intrusions, used by everyone from opportunistic threat actors to sophisticated nation-state groups. The techniques are not secret — they are documented, studied, and regularly observed in the wild.

What separates organizations that catch it from those that do not is usually not detection sophistication — it is foundational visibility. The right logs, the right baselines, and analysts who know what questions to ask when something looks slightly off.

For junior analysts and students, the most valuable thing you can do is understand the underlying concepts before reaching for tools or rule libraries. Know how authentication works. Know what a normal login looks like. Then the abnormal ones become much easier to spot.

← Back to Insights