Containing a domain compromise: How predictive shielding shut down lateral movement

Source: Microsoft Security Blog

Author: Microsoft Defender Security Research Team

URL: https://www.microsoft.com/en-us/security/blog/2026/04/17/domain-compromise-predictive-shielding-shut-down-lateral-movement/

ONE SENTENCE SUMMARY:

Microsoft Defender predictive shielding preemptively contains likely-exposed privileged identities, disrupting credential-based Active Directory attacks and limiting lateral movement before abuse.

MAIN POINTS:

  1. Domain-admin compromise enables ACL changes, ticket minting, secret replication, and GPO abuse.
  2. Speed of credential reuse often outpaces responders’ ability to scope and remediate.
  3. Identity infrastructure cannot be simply shut down without major business disruption.
  4. Predictive shielding acts on credential exposure signals, not just observed malicious use.
  5. Defender evaluates which privileged identities were likely exposed on compromised devices.
  6. Just-in-time restrictions block sign-ins and pivots, reducing lateral movement paths.
  7. Attack began via IIS file-upload vulnerability and web shell deployment.
  8. BadPotato-style token impersonation escalated privileges to NT AUTHORITY\SYSTEM.
  9. NTDS snapshot/packaging enabled offline directory credential materialization at scale.
  10. Mid-campaign activation contained high-tier admins pre-abuse, exhausting attacker momentum.

TAKEAWAYS:

  1. Host-scoped containment early can prevent escalation into identity infrastructure.
  2. Exposure-based controls close the “speed gap” between theft and credential replay.
  3. Protecting domain controllers and privileged identities is decisive after credential materialization.
  4. Automated session revocation plus sign-in blocking forces adversaries into weaker pivot paths.
  5. Persistent attacker tradecraft shifts signal effective containment, requiring continual tracking of blast radius.