WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Cyber Resilience – CISA’s New Tool Helps Discover Mischief and Misconfigurations in Microsoft Environments
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Cyber Resilience – CISA’s New Tool Helps Discover Mischief and Misconfigurations in Microsoft Environments

Author: Jennifer Walker

Created: Tuesday, March 28, 2023 - 18:03

Categories: Cybersecurity, Security Preparedness

On Thursday, CISA and Sandia National Laboratories released a new tool – Untitled Goose – to help network defenders detect potentially malicious activity in Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) environments. Among other features, Untitled Goose allows for the querying and exporting of AAD, M365, and Azure configurations for investigations.

With Active Directory (AD) arguably being the leading authentication and authorization platform, it has become a major and extremely successful attack vector for adversaries. Abusing AD misconfigurations allows adversaries to hide in plain sight and remain undetected. Once attackers have gained initial access to a system, many will quickly target AD to escalate privileges to Domain Administrator and use that elevated privilege to enumerate the network, locate valuable assets, steal data, deploy ransomware, and establish persistence. As common misconfigurations typically make this stage of an attack trivial, it is practical to periodically poke around for potentially problematic AD policies. Untitled Goose looks like a great way to proactively search AD and other Microsoft environments for mischief and misconfigs that could be damaging your defense. Members are encouraged to have system administrators consider the benefits of this tool in hunting for and investigating suspicious activity in your environment. Access more at CISA.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar