1. Introduction
Active Directory (AD) is the backbone of identity and access management in most Windows-based environments. It acts as the central directory service organizations rely on to manage users, computers, and permissions in a secure, structured way.
Nearly every application and tool connects to AD — whether for authentication, directory browsing, or single sign-on (SSO). This makes AD incredibly powerful, but also a prime target: it holds sensitive information such as usernames and passwords, network structure details, and access rights and permissions.
Because AD is the "keyring" of the organization, attackers who gain access to it can potentially unlock critical systems and data. That's why integrating Active Directory with the Cye Exposure Management Platform is so valuable: it surfaces weaknesses in AD configuration and usage, tying them directly to business risk.
2. Prerequisites
Make sure you have:
Access to the Cye platform.
Administrator permissions in the Cye platform.
An Active Directory environment.
You'll also need a machine for the on-prem connector that has access to AD (but is not a domain controller), has Docker Engine installed, and provides a read-only AD account for the connector user.
Required IP Addresses
Allow traffic from the Cye platform's servers in your firewall or network configuration:
General IPs:
Europe →
18.198.79.197America →
52.1.10.176,35.171.70.87
IPs for Azure and AWS Scans:
Europe →
18.158.77.90America →
34.206.252.13
How the Integration Works
The Cye platform connects to AD through an on-premises connector, which collects vulnerability data from AD every 24 hours and acts as a secure mediator — the Cye platform never accesses AD directly.
Group Management and Integrations
Integrations are created only at the subsidiary level. Findings from an integration appear only in that subsidiary's dashboards and reports. Parent companies cannot create integrations — they can only view aggregated results.
3. Configuring on the Active Directory Side
Open the Integration Settings
In the Cye platform, navigate to Integrations → Data Integrations.
Find the Active Directory card and click Add.
Enter Your Active Directory Details
Fill in the required fields (marked with a red asterisk): LDAP Username, LDAP Password, and Domain Name. Optional fields include Domain controller FQDN, Domain controller IP, LDAP port, and Use LDAP over SSL.
Click Validate to confirm the details.
Click Save to continue.
Download the Configuration File
Click Download to get the configuration file.
This file enables the Cye platform to install the connector locally.
Installing the On-Prem Connector
Install the connector on a machine that has access to AD — do not install on a domain controller.
Component | Requirement |
CPU | 64-bit kernel, 4 CPU / 8 vCPU |
Memory | 4 GB minimum |
Operating System | 64-bit Ubuntu, Debian, or CentOS |
Networking | Outbound TCP/443 to AWS API Gateway |
Firewall (AD only) | MSRPC 135, SMB 445, LDAP 389, LDAPS 636 |
4. Configuring in the Cye platform
Copy and run each command line shown in the platform in your terminal. Once complete, you'll see a green "Running" message confirming success.
Note: The script is available for download for one hour only.
5. Viewing Results
Findings collected from Active Directory appear on the Cye platform's Findings page, updated every 24 hours. To filter: go to Findings, open the filter panel, and select Source → Active Directory.
Note: Active Directory findings do not support Auto-Fix. Remediation statuses must be updated manually.
6. Types of Fetched Entities
The Cye platform identifies findings related to AD configuration and usage issues, each linked to NIST subcategories. Examples include: high-risk maintenance procedures, insufficient security update policies, use of outdated technologies, excessive permissions, insufficient Kerberos hardening, and unused domain accounts.
7. Deleting the Integration
In the Cye platform, click Delete Integration and confirm.
To uninstall the connector from your machine:
./home/$USER/cye/integrations/cye-integration-agent.sh --uninstall
To edit the integration, click Edit Integration, make your changes, click Save, and download a new script.
Wrap-up
With the Active Directory integration in place, the Cye platform surfaces AD risks directly in your findings and maturity assessment — giving you clearer visibility and focused steps toward stronger cyber resilience.
