AD Tripwires Testing
This guide covers testing Active Directory-specific tripwires including domain user scraping detection, Kerberoasting, and AS-REP roasting. AD tripwire testing generates real events in your customer environment and requires careful coordination.
Pre-Testing Requirements
Before testing AD Tripwires, ensure:
- AD Tripwires domain policy is properly deployed
- Decoy accounts are created and configured
- Event Collector is running on Domain Controllers
- Security team is notified of testing activities
- Test user accounts are available (separate from production accounts)
Using the Test Tripwire Button
The recommended way to test your AD Tripwires is through the NodeZero portal interface:
- Navigate to Tripwire Details: Go to the specific AD tripwire you want to test in the NodeZero portal
- Click Test Tripwire: At the bottom of the tripwire details page, click the
Test Tripwire
button - Wait for AD Agent Processing: The system sends a message to the AD Agent to perform the test
- Allow Processing Time: Due to event collection intervals and processing delays, expect up to 20-30 minutes before receiving notifications
- Check Portal for Updates: Detection may appear in the portal before alerts are delivered, so check the portal periodically
- Monitor for Alerts: Check for alerts through all configured channels after the delay period
Screenshot placeholder - Test Tripwire button on AD Tripwire details page
End-to-End Testing with Customer Environment Impact
AD Tripwires testing is end-to-end testing that generates actual activity and log events in your customer environment. Unlike general tripwire testing which only tests Horizon3 infrastructure, AD Tripwire testing:
- Generates real AD events on your Domain Controllers
- Creates actual log entries in Windows Security Event logs
- Triggers real authentication attempts against decoy accounts
- May activate security monitoring systems in your environment
Coordinate with your IT and security teams before testing, as this will create genuine activity that may be detected by other security tools.
Processing and Display Delays
AD Tripwires testing involves multiple processing stages that can affect timing:
- Detection Processing: The actual detection may occur within 10 minutes
- Portal Updates: It may take additional time for the detection to populate and display in the user portal
- Alert Delivery: Email and webhook notifications may arrive separately from portal updates
Plan for up to 20-30 minutes for the complete testing cycle, including portal display updates.
This built-in testing feature:
- Performs end-to-end testing of the complete AD Tripwires detection pipeline
- Generates actual AD events and log entries in your customer environment
- Automatically creates realistic attack scenarios through the AD Agent
- Validates the complete detection pipeline including event collection and processing
- Tests alert delivery through all configured integration points
Manual Testing Methods
Advanced testing scenarios are available for detailed validation of specific AD attack techniques when the UI testing is not sufficient for your requirements.
Event Collection Testing
Verify Event Collector Functionality
-
Check Scheduled Task
# Verify Event Collector scheduled task is running Get-ScheduledTask -TaskName "IoA Collector" | Get-ScheduledTaskInfo
-
Monitor Event Forwarding
# Check recent security events Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4768,4769,4771; StartTime=(Get-Date).AddHours(-1)}
-
Validate Network Connectivity
# Test connectivity to Horizon3.ai collection endpoints Test-NetConnection -ComputerName tripwires.horizon3.ai -Port 443
Alert Delivery Testing
For detailed alert delivery testing procedures including webhook and email testing, see the General Tripwires Testing Guide.
Note that AD Tripwires alerts may take 20-30 minutes to be delivered due to the event processing pipeline, so allow adequate time when testing alert delivery mechanisms.
Timing Considerations
AD Tripwires testing requires patience due to the distributed nature of Active Directory and multiple processing stages:
- Event Collection Intervals: Domain Controllers may batch events before forwarding
- AD Agent Processing: The AD Agent processes events in scheduled intervals
- Detection Processing: Backend systems analyze events and generate detections
- Portal Updates: Detections must be processed and displayed in the user interface
- Alert Processing: Final alert generation and delivery to external systems
Expected Timeline:
- 0-5 minutes: Test action is initiated via AD Agent
- 5-15 minutes: Events are generated and collected on Domain Controllers
- 10-20 minutes: Events are processed and tripwire activity is detected
- 15-25 minutes: Alerts appear in the NodeZero portal and are delivered to configured endpoints
Monitoring Strategy
While detection may happen faster, plan for the full 20-30 minute window. Check the portal periodically rather than waiting only for external alerts.
AD-Specific Safety Measures
In addition to general safety measures, AD Tripwires testing requires:
- Coordinate with IT and Security Teams: AD testing generates real events that may trigger other security monitoring systems
- Notify SOC/Security Teams: Inform security operations centers about planned testing to avoid false alarm responses
- Monitor Domain Controller Resources: Watch for performance impact on Domain Controllers during testing
- Plan for Real Events: Remember that AD testing creates actual log entries that will appear in security logs