Loading
September 10 2025

The brutal truth about recovering Active Directory

Understand the real challenges around securing and recovering AD that can put your business at risk.

Database error

As the identity backbone for over 90% of organizations, Active Directory (AD) is the gateway to your most critical systems and data. When cybercriminals attack, they can escalate privileges and gain unrestricted access to systems and data for ransomware or exfiltration. Even worse, if they take AD down most organizations are left unable to function—making it one of the most disruptive attack vectors today. In fact, Cohesity’s Cyber Event Response Team (CERT) saw AD compromise in over 90% of incidents over the last 9 months, consistent with findings from Mandiant researchers.

AD under siege  

Among the most devastating (and popular) targets for ransomware campaigns is AD. Why? Because a successful breach enables long-term, stealthy access to your organization. From there, the attackers can lie in wait, and strike on their timeline. 

Identity system compromises often go undetected for weeks, or even months. When AD is breached, adversaries often avoid immediate detection, choosing instead to maintain stealthy access and exfiltrate sensitive data. By the time they're discovered, attackers may have made sweeping unauthorized and malicious changes, making it difficult to know what “clean” even looks like. These attacks may ultimately lead to a ransomware incident, crippling business operations and leaving backdoors for future attacks.

AD underpins access and authentication for virtually every service and application across the enterprise. If AD becomes unavailable, business operations can come to a standstill. AD’s interconnected nature makes it a prime, and uniquely dangerous, target: 

  • As a directory service, it gives attackers the map to move laterally and escalate privileges. 
  • As the core authentication and authorization service, it represents a single point of failure. If attackers take down AD, they can take down an entire enterprise. 
  • As a Group Policy controller, it allows threat actors to push malware and maintain persistence at scale.
  • Once inside, attackers can access mission-critical systems, exposing sensitive data like customer records. 

It gets worse. When a compromise occurs, the recovery process for AD is complex and challenging. Here’s why: AD recovery is not like restoring a file or even a database. It’s complicated, with many manual steps. One wrong move during restoration can destabilize your entire environment, or leave an attacker with a way back in. 

Why secure AD recovery is so difficult

It’s not enough to just restore your systems after a cyberattack—you must perform forensics and remediate the root cause of the attack. You need secure recovery. Here’s why most organizations struggle with AD recovery: 

  • Manual recovery is error-prone and often requires additional time to correct missteps, extending the timeline even further. In fact, Microsoft details 29 steps to bringing AD back online after a compromise. 
  • Many organizations have not conducted AD recovery drills, nor do they perform cyber response drills. (It’s easy to understand why drills don’t get done—it’s a complex, lengthy process.) As a result, the organization is at risk of unanticipated delays including: provisioning hardware (virtual or physical), conducting metadata cleanup, ensuring the recovered forest is malware-free, and resolving any breakdowns in the decision-making process during recovery.
  • AD backups have a short shelf life. An enterprise-scale AD forest generates thousands, or tens of thousands, of changes daily across many Domain Controllers. 
  • Conventional backups of AD will likely contain malware in the event of an attack, prolonging recovery.
  • Determining the cause of a breach often requires an extensive review of Active Directory and security policies to identify accounts or configurations that may have been modified or added.

It’s easy to see why many organizations fail to meet the RTO for AD, and why attackers continue to concentrate on exploiting this workload.

AD Diagram

Figure 1: Restoring AD manually is complex, time-consuming, and error-prone.

Secure AD recovery is central to identity resilience

When AD is down, much of your business is likely to be impacted. Without a validated identity resilience strategy, organizations lose precious days (or weeks) in the aftermath of an attack, with every minute of downtime leading to lost revenue, lost customer trust, and mounting risk. According to a recent study of 1,500 global organizations, despite 90% of respondents having implemented an Identity Threat Detection and Response (ITDR) strategy, a much smaller percentage include AD recovery procedures in their disaster recovery plan or maintain dedicated, AD-specific backup systems—both key parts of effective ITDR. That’s a gap that attackers will be more than happy to exploit. Your strategy needs to ensure AD backups are always recoverable, and you need a thoughtful response and recovery plan that accounts for the unique properties of AD.

Are you ready to secure and recover AD?

Understanding the difficulties around securing AD is one thing. The complexity and high stakes involved in AD recovery often discourage organizations from conducting regular cyber response and recovery tests. As a result, recovery plans go unvalidated, leaving businesses vulnerable when they need resilience the most. 

How do you know if you’re ready? Here are a few critical questions to ask yourself:

  • What business-critical systems depend on AD? What’s the cost of their downtime? 
  • How long would AD recovery take, considering unknown changes made during a breach? 
  • How quickly can you identify what the attackers changed in AD? How far back will you need to investigate and how long will that take?
  • Will recovery break other systems? Think about misaligned user and computer passwords, missing accounts, DNS records, or group memberships. 
  • Can you guarantee recovery into a clean, secure state? Restoring from an infected or altered backup can reintroduce the same vulnerabilities. 
  • Could you recover AD without internet access?
  • What sensitive assets are accessible through AD? If your identity system is compromised, so is everything it connects to. 

If you’re unsure about any of the above, it may be time to update your strategy.

The bottom line: It’s time to refresh your identity resilience

AD is a high-value, high-risk target. When it’s compromised, recovery is painful and complex. Most organizations aren’t ready. 

What’s needed is a combination of prevention and proven, automated, and secure recovery capabilities. Without them, the best defenses are inadequate, and the cost of unplanned downtime will climb. 

Cohesity and Semperis have invested in integrations to quickly and securely recover your Active Directory infrastructure. Together, we enable organizations to proactively detect threats to AD, discover and close attack paths, and rapidly restore AD to a clean state. Explore the integration between Cohesity and Semperis or get a free security assessment of your AD vulnerabilities so your team can start to plan for a cyber resilience strategy that recovers AD faster, safer, and with confidence.

Written By