Tenable Identity Exposure 2025 Release Notes
These release notes are listed in reverse chronological order.
Tenable Identity Exposure 3.102 (2025-09-04)

-
Exposure Center — The Exposure Center offers a simpler, more unified experience by merging the Exposure Overview and Exposure Instances pages into a single view. The updated page introduces quick-filtering options, allowing you to apply filters faster and focus on the most relevant data.

Bug Fixes |
---|
The Exclusion side panel now displays correctly and no longer appears under the header. |
Tenable Identity Exposure updated the content on the Identities and Accounts pages for environments where Tenable Cloud is disabled. |
The texts on Identity 360 Details page now align more consistently. |
The Identity Data Provider icons onIdentity 360 Details pages now consistently display tooltips that show the IDP name. |
A standalone icon now displays the full, untruncated message explaining why users don’t have access to Exposure Signals. |
Tenable Identity Exposure resolved an issue that prevented Identity AES scores from updating. |
The Indicator of Attack Kerberoasting now successfully accommodates delays in Windows Event Log ingestion. |
The Indicator of Attack Brute Force now only displays the latest IP/Hostname source in the attack vector attributes. |
Identity tenant names are now visible at the account level. |
Tenable Identity Exposure 3.101 (2025-08-26)

-
Security profiles — A new security profile switch is available in the header bar, showing which Tenable security profile is active.
-
Indicators of Exposure
-
Application of Weak Password Policies — Improved vulnerability details and recommendations.
-
ADCS Dangerous Misconfigurations — Updated the description to show the ESC reference for each reason.
-
-
Insights — Added visibility into the new Insights feature when Tenable Cloud is not enabled.
-
RabbitMQ — Improved resilience by implementing automatic recovery for dropped connections, ensuring continuous message processing and preventing service interruptions.
Tenable Identity Exposure 3.100.1 (2025-08-18)

Bug Fixes |
---|
Tenable Identity Exposure now reports correctly the asset count shown on the Tenable license usage page. |
Tenable Identity Exposure 3.100 (2025-08-11)

Bug Fixes |
---|
The (Group) "Members" side panel on the Identity 360 Asset Detail pages now includes "See Details" links, enabling direct navigation to each group member's detail page. |
In Identity 360 Asset Detail pages: the page navigation within the Entitlements, Roles, and Access tabs now works reliably after changing the number of items displayed per page. |
Identification of Property Sets and Validated Rights Active Directory objects has been improved to enhance the accuracy of permission analysis. |
Tenable Identity Exposure now ensures consistent detection of the "Tenable.ad" Group Policy Object (GPO) during Indicators of Attack (IoA) deployment, even in complex Active Directory environments. This enhances the reliability of the IoA installation process. |
Tenable Identity Exposure 3.99 (2025-07-23)

-
Identity 360 — Removed the "Is Licensed" and "License Expires At" properties from the Identity 360 views to improve clarity, as they were not relevant to Tenable Identity Exposure.

Bug Fixes |
---|
Tenable Identity Exposure now displays author names in Exposure Instance exclusions that contain non-Latin or accented characters. |
The Tenable Identity Exposure Data Collector now successfully recovers from network disruptions involving the messaging broker. |
The Indicator of Exposure Managed Service Accounts Dangerous Misconfigurations now whitelists correctly trustees belonging to a group. |
The Indicator of Exposure Logon Restrictions for Privileged Users reason template is now enhanced to state explicitly that all IRSNB rights must be denied for privileged user accounts. |
Tenable Identity Exposure 3.98 (2025-07-09)

-
Exposure Center Exclusions — This feature lets you allowlist specific asset groups to prevent known, low-risk configurations from appearing in weakness reports. This helps reduce noise, and ensure the security findings remain relevant and actionable.
-
SMB File Sharing — A new optional file-sharing mode is now available in the Indicator of Attack (IoA) module for collecting Windows event log files. It leverages a dedicated SMB share that Tenable Identity Exposure secures within your infrastructure.

Bug Fixes |
---|
The Exposure Overview search now supports only relevant Tenable Identity Exposure asset classes. |
An updated AI model in Tenable Identity Exposure delivers improved processing accuracy and quality. |
The Tenable Identity Exposure Data Collector can now reliably recover from network disruptions affecting the messaging broker. |
Tenable Identity Exposure now correctly displays Asian scripts (Japanese, Chinese, Korean) in Insights reports. |
Tenable Identity Exposure now successfully recovers from network disruptions and resumes IoA processing. |
The IoA Password Guessing now correctly displays vector attributes, even when some hostnames are unknown. |
Tenable Identity Exposure fixed an issue where the msds-behavior-version LDAP attribute was not properly decoded for Windows Server 2025. |
Tenable Identity Exposure fixed a rare memory leak in the Data Collector. |
Tenable Identity Exposure 3.97.1 (2025-06-30)

Bug Fixes |
---|
Tenable Identity Exposure now successfully recovers from network disruptions to resume the processing of Indicators of Attack. |
Tenable Identity Exposure addressed message procession issues impacting high load platforms since the 3.97.0 release. |
Tenable Identity Exposure 3.97 (2025-06-26)

New Entra ID Indicator of Exposure
The administrator consent workflow in Entra ID now enables non-administrator users to request application permissions through a structured approval process. If the workflow is not configured, users who try to access applications may encounter errors without a way to request consent.

-
The IOE Recent Use of the Default Administrator Account now makes it clear that it is not meant for real-time detection of the administrator account usage.
-
The IOE Dormant Accounts no longer mentions the pwdLastSet AD attribute because it does not rely on it.
-
The IoE First party Service Principal with Credentials now ignores the legitimate AADPasswordProtectionProxy credentials.

Bug Fixes |
---|
Tenable Identity Exposure improved the IOA event log ingestion speed, lowering event loss probability, thus decreasing the number of false positives and false negatives. |
The Indicator of Attack BruteForce now displays the source IP Address in the correct format. |
Tenable Identity Exposure 3.96 (2025-06-11)

Entra ID Indicators of Exposure
-
Password Expiration Enforced — This IoE detects domains that enforce password expiration, which can undermine security by prompting users to change passwords frequently, often leading to weak, predictable, or reused passwords that reduce overall account protection.
-
Managed Devices Not Required for MFA Registration — This IoE detects tenants that do not have a Conditional Access Policy enabled to require managed devices for MFA registration. Requiring managed devices for MFA registration adds an extra layer of security, making it harder for attackers to register a rogue MFA method—even if they have stolen credentials—unless they also possess a managed device.

Tenable Identity Exposure version 3.96 contains the following bug fixes:
Bug Fixes |
---|
In Identity 360, the tags filtering no longer appears for standalone users. |
The Secure Relay now connects only to the Domain Controller (DC) specified in the interface and ignores any redirects from the contacted DC. |
Tenable Identity Exposure 3.95 (2025-06-02)

Active Directory (AD) Indicators of Exposure
-
BadSuccessor Dangerous dMSA Permissions — This IoE detects BadSuccessor, a privilege escalation vulnerability in Active Directory introduced with Windows Server 2025 dMSAs. This vulnerability allows attackers to abuse dMSA inheritance to gain high-privilege access, potentially compromising the entire domain. Exploitation requires a Windows Server 2025 domain controller.

-
Tenable Identity Exposure renamed the Settings menus to better reflect their purpose. Additionally, Tenable Identity Exposure now makes the Identity Providers menu, used to configure Entra ID tenants when enabled, more easily accessible via the gear icon.

Tenable Identity Exposure version 3.95 contains the following bug fixes:
Bug Fixes |
---|
Tenable Identity Exposure added a safeguard to avoid duplicate "Tenable Identity Exposure - autogenerated" entities on the Tenable Cloud. |
The long directory path now appears correctly in the Relay MSI window. |
Tenable Identity Exposure now supports custom naming for the Indicator of Attack (IoA) GPO. Customers who previously used a custom IoA GPO name should reinstall the IoA using the latest IoA script. |
Tenable Identity Exposure 3.94 (2025-05-26)

Entra ID Indicators of Exposure (IoE)
-
Users Allowed to Join Devices — This IoE detects tenant settings that allow users to join devices to Microsoft Entra. This setting allows all users to join unrestricted devices to the Entra tenant which opens the door for threat actors to plant rogue devices into the organization's identity system and give them a foothold for further compromise.
-
Managed Devices Not Required for Authentication — This IoE requires managed devices to prevent unauthorized access and potential breaches. Security best practices recommend using Conditional Access Policies to block authentication to Entra ID from unmanaged devices.
-
Authentication Methods Migration Not Complete — This IoE flags tenants that did not complete the migration to the new "Authentication methods" policy. Migrating to the "Authentication methods" policy streamlines and modernizes authentication management in Microsoft Entra ID. This transition simplifies administration, enhances security, and enables support for the latest authentication methods.
-
Dangerous Application Permissions Affecting Data — Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). This IoE detects permissions that can pose a threat to users' data that these services store.
-
Risky Users Without Enforcement — This IoE blocks risky users to prevent unauthorized access and potential breaches. Security best practices recommend using Conditional Access Policies to stop vulnerable accounts from authenticating to Entra ID.
Active Directory (AD) Indicators of Exposure
-
Sensitive Exchange Permissions — This IoE manages permissions related to Exchange groups and resources within the domain. It now shows exclusively all permissions either originating from or targeting Exchange to enhance readability in other IoEs.
-
Exchange Group Members — This IoE tracks members of sensitive Exchange groups.

-
Exclusion of 'Directory Synchronization Accounts' from Conditional Access policies—whether created manually or deployed via remediation scripts—to prevent disruptions to Entra Connect and Entra Cloud Sync.
-
Improved Identity ACR (Asset Critical Rating) to better account for organizational hierarchy and associated risk.
-
New interface for SMTP alerting form.

Tenable Identity Exposure version 3.94 contains the following bug fixes:
Bug Fixes |
---|
The Indicator of Attack Password Guessing now reports "Data not available" when it cannot obtain the source IP from the "Workstation" value. |
Tenable Identity Exposure now correctly positions the Export popover so that the Export button remains visible, even at the browser's default zoom level. |
Tenable Identity Exposure now correctly saves global search queries from Identity 360 and Exposure Overview to the query history, even when the history is initially empty. |
You can now bookmark global search queries from Identity 360 or Exposure Overview even when the bookmarks list is initially empty. |
The domain connectivity test and Privileged Analysis health checks now properly handle specific objectSID encoding. |
The Indicator of Attack NTDS Extraction now properly correlates the source username. |
Tenable Identity Exposure addressed performance issues in Exposure Instances that occasionally prevented the page to load. |
The Security Engine Node service 'Cygni' now starts successfully even when there is no internet connection while the OpenTelemetry feature is enabled. |
May 8, 2025

Tenable is thrilled to announce some significant enhancements to your cloud product Workspace! We've redesigned the workspace to provide you with better visibility and access to Tenable products:
-
Improved Product Overview — You can now easily see both the products you've purchased and a range of other products available for exploration.
-
Detailed Product Information — Access More Details to demo the product, giving you in-depth knowledge about each product.
-
Product Utilization — We’ve added a utilization feature that shows the percentage of how much you’re using the subscribed products. It allows you to quickly direct you to the License Information page.
-
Trial Status Visibility — If you are currently evaluating a product or have done so within the past year, you will now see the status of the trial (In Trial or Trial Expired) directly in your workspace.
These changes are designed to help you get the most out of your Tenable solutions and discover new ways to enhance your security posture. To learn more, access the Workspace page via any Tenable cloud application.
Tenable Identity Exposure 3.92.3 (2025-04-28)
Tenable has identified and addressed a critical vulnerability (CVE-2025-32433) affecting the SSH implementation in Erlang/OTP, where a flaw in the handling of SSH protocol messages allows a malicious actor to gain unauthorized access and execute arbitrary code without valid credentials.
Tenable Identity Exposure 3.92 (2025-04-17)

Tenable Identity Exposure version 3.92 contains the following bug fixes:
Bug Fixes |
---|
The Relay now resubscribes to SMB events when it receives the Win32 error "The account is not authorized to log on from this station." |
Tenable Identity Exposure improved the accuracy of license user count reporting by addressing an issue that occasionally and temporarily inflated the numbers. |
The IoA script now refreshes IoA GPO computer settings only during installation, eliminating the need for user interaction. |
The Dynamic RPC port reason has fully migrated to the Domain Data Collection Health Check. |
Improvements to the IoA correlation rules now provide more accurate attack vectors for the Petit Potam IoA. |
Tenable Identity Exposure 3.91.1 (2025-04-08)

Tenable Identity Exposure version 3.91.1 contains the following bug fix:
Bug Fixes |
---|
The Health Check reason "Working Connection to the Dynamic RPC Port" has relocated to the Privileged Analysis Health Check. |
Tenable Identity Exposure 3.91 (2025-04-02)

-
Non-Essential Group — This new Indicator of Exposure (IoE) reports empty groups and groups with only one member.
Note: The Non-Essential Group IoE was initially released as two separate IoEs — Empty AD Group and Single Member AD Group — alongside the Exposure Center on February 5, 2025. These two IoEs later relocated to the Indicator of Exposure view, aligning them with other AD-related IoEs. The new Non-Essential Group IoE consolidates these previous IoEs into a single entity.

-
Removal of the /Default suffix from the Exposure Instance names, as Tenable Identity Exposure considers that all weaknesses are from a single instance.
-
The Identity 360 and Exposure Overview pages now redirect to the Exposure Instances page when drilling down on the related weaknesses.

Tenable Identity Exposure version 3.91 contains the following bug fixes:
Bug Fixes |
---|
The NTDS Extraction Indicator of Attack (IoA) now correctly resolves the source attack vector attribute Username. |
Removal of the constraint that prevented the unselecting of all domains in the IoA configuration, eliminating Health Check errors caused by missing GPOs. |
The reason "GPO parameter password is missing" from the Application of Weak Password Policies on Users Indicator of Exposure (IoE) no longer reports a false positive deviance on the domain's Policies folder. |
Tenable Identity Exposure 3.90 (2025-03-19)

-
Unsupported or Outdated Exchange Servers — This new Indicator of Exposure (IoE) detects outdated Exchange servers that Microsoft no longer supports as well as those missing the latest Cumulative Updates. To maintain a secure and fully supported Exchange environment, promptly address obsolete or unpatched servers. Failure to do so increases the risk of exploitation, exposing your organization to data breaches and ransomware attacks.

-
The ADCS Dangerous Misconfigurations IoE now reports the ESC9 vulnerability, flagging certificate templates with the unsecured CT_FLAG_NO_SECURITY_EXTENSION as deviant.
-
The Exposure Overview and Exposure Instances pages now display the names of the Identity Data Providers tenants (AD domain, Entra ID tenant, etc.) where it detected security findings.

Tenable Identity Exposure version 3.90 contains the following bug fixes:
Bug Fixes |
---|
Deleted/Disabled Computer/Users no longer generate deviances if you did not explicitly set the "Keep Deleted" or "Keep Disabled" options to true in your security profiles. |
The Exposure Overview filter on the "Sources" property no longer suggests irrelevant values. |
After deleting an object identified as deviant in the Logon Restrictions for Privileged Users IoE, the associated deviance closes correctly. |
Tenable Identity Exposure improved input search isolation between the Domains and Honey Account pages. |
Tenable Identity Exposure now collects Active Directory and Entra ID contacts. It no longer identifies groups with only contacts as members to be empty. Additionally, AD and Entra ID contact data appears under Tenable Inventory as resources. |
Tenable Identity Exposure addressed the missing data timeframe setting in the report configuration. |
Tenable Identity Exposure added more contextual information related to LDAP login issues. |
Tenable Identity Exposure 3.89 (2025-03-10)

-
Identity 360
-
Improved loading times for various Identity 360 pages, especially when viewing an asset's Access & Entitlement tabs.
-
Tenable Identity Exposure now gathers Active Directory Entitlements faster, making data available earlier after product setup in the Identity 360 page under the Entitlement tab for the asset's details. Tenable Identity Exposure focuses only on entitlements that impact the security context of our customers.
-
-
Indicators of Exposure (IoE)
-
Mapped Certificates on Accounts — This IoE previously reported privileged users with only two types of mappings: X509IssuerSubject and X509SubjectOnly. It has now expanded its original scope to include additional mappings — X509RFC822, X509IssuerSerialNumber, X509SKI, and X509SHA1PublicKey.
-
Mapped Certificates on Accounts — Tenable Identity Exposure improved this IoE to report weak explicit certificate mappings, addressing the AD CS ESC14 Abuse Technique.
-
Single Member AD / Entra Group — The IoE now shows the group member in the "Why it matters" description.
-
First-Party Service Principal With Credentials — The IoE now shows the details for the identified credentials in the "Why it matters" description.
-
Single Member AD / Entra Group and Empty Group — These IoEs now only count direct members for more accurate and meaningful results.
-
Security Profile Customization — Improved description for the options "Permitted object owner (by group membership)" for applicable IoEs.
-
-
Health checks
-
Permissions to Collect the AD Domain Data — Now hides the "Granted Permissions to Collect Privileged Data" details when Privileged Analysis is deactivated in the user interface. Make sure your Relay is up to date for this feature to work.
-
Domain Reachability — Now gives a more precise reason why the domain is unreachable.
-

Tenable Identity Exposure version 3.89 contains the following bug fixes:
Bug Fixes |
---|
By default, Tenable Identity Exposure now sorts the weakness names on the Exposure Instances page by ascending order. |
The Exposure Overview no longer displays non identity-related weaknesses. |
Tenable Identity Exposure improved the readability of pagination details on the Identities & Exposure Overviews. |
Tenable Identity Exposure improved the detection and reconciliation of Active Directory Groups for Tenable One users. |
In the Identities Overview, it is now possible to see full names when expanding the values of the "Identity Tenant Names" property. |
Tenable Identity Exposure now correctly handles event number 4624 in the latest version of Windows. |
When an attacker machine leaves a domain, the Indicator of Attack DCSync can now raise alerts in basic mode. |
Tenable Identity Exposure now correctly handles ignoring and unignoring all deviant objects selected through an expression. |
Tenable Identity Exposure now ensures the proper removal of the Envoy service during the uninstallation of the Secure Relay, even when it's installed with Directory Listener. |
Tenable Identity Exposure now properly applies selected reason filtering when selecting deviant objects (when applicable). |
Tenable now digitally signs the script to configure Indicators of Attack, preventing external security tools from flagging it as a potential risk due to a missing signature. |
Tenable Identity Exposure 3.88 (2025-02-20)

-
Indicator of Exposure (AD) — Exchange Dangerous Misconfigurations to list misconfigurations that impact Exchange resources or its underlying Active Directory schema objects.

Tenable Identity Exposure version 3.88 contains the following bug fixes:
Bug Fixes |
---|
The Indicator of Attack (IoA) listener now efficiently releases memory, correcting an issue introduced in version 3.86. This only affects customers who installed IoAs in versions 3.86 or 3.87. These customers must reinstall IoAs in version 3.88. |
In the Exposure Center, impacted assets with a "Resolved" status no longer lead to a blank page without data. |
Some weakness-related texts displayed in the Exposure Instances are now better structured, improving clarity and readability. |
The weakness-related text in Exposure Instances now displays bullet points without unnecessary line breaks, improving readability and consistency. |
Redirections from Identity 360 to Tenable One no longer result in blank pages. |
Tooltips on Identities Overview grid values no longer appear as duplicates for properties with custom tooltips. |
The Identity Details pages can now generate the AI asset summary again. |
Selected rows for export in Identity 360 and Exposure Overview now remain selected after the export is completed. |
Uninstalling the Secure Relay no longer removes the shared Tools folder with Ceti (Directory Listener). When both are installed on the same machine, the Tools folder now remains intact, preserving the nssm binary. |
When you add columns in the Exposure Overview, you can now select these for data export. |
In the Exposure Instance details page, the Asset Class column is now truncated when necessary, with a tooltip displaying the full value. |
The Exposure Center remediation scripts now have a prefix with the localized weakness name. |
More text elements in the Exposure Center user interface now support localization. |
The hyperlinks displayed in the Exposure Instances pages targeting the Microsoft documentation now reference the localized version of the documentation. |
The CSV exports of "Impacted Assets" in Exposure Instances now display localized column header names. |
Tenable Identity Exposure improved websockets security. |
Hyperlink text descriptions in Exposure Instances now wrap to the next line when they exceed the available space. |
The "Domain Controller Activity" health check now detects inactive Domain Controllers within a 15-minute window based on Indicator of Attack event log activity. While it still waits for this duration before reporting failures, it now reports successful cases and reactivated Domain Controllers much faster. Additionally, a bug fix ensures the health check uses up-to-date data. |
Tenable Identity Exposure enhanced application resilience with proper handling of RabbitMQ channel errors during message publishing. |
The deviances tab displays correctly when clicking on events in the Trail Flow. |
Identity 360 CSV exports now handle data containing double quotes correctly. |
Tenable Identity Exposure 3.87 (2025-02-06)

-
Exposure Center — Removal of references to Vulnerability Priority Rating (VPR) from the Exposure Overview because Tenable Identity Exposure does not populate these scores for identity-related Indicators of Exposure.

Tenable Identity Exposure version 3.87 contains the following bug fixes:
Bug Fixes |
---|
In Identity 360, the weakness source "TENABLE_IDENTITY_EXPOSURE" is no longer duplicated. |
The Golden Ticket Indicator of Attack now raises an alert when the attacker uses a forged TGT ticket in basic mode. |
Tenable Identity Exposure addressed the CVE-2022-24434 security vulnerability that affects certain software components, potentially allowing attackers to exploit weaknesses such as privilege escalation, remote code execution, or denial of service. |
Tenable Identity Exposure resolved an issue where triggering a group policy update could cause the Tenable Event Logs listener to stall while awaiting interactive user input. |
Tenable Identity Exposure (2025-02-05)

-
Exposure Center —Exposure Center is a Tenable Identity Exposure feature that enhances your organization's identity security posture. It identifies weaknesses and misconfigurations across your identity risk surface, covering both the underlying identity systems, such as Entra ID, and the identities within those systems.
This feature's user experience revolves around three interconnected concepts: Exposure Overview, Exposure Instances, and Findings. Tenable Research supports these concepts with a new security engine and specifically developed Indicators of Exposure (IoEs) to drive their functionality.
For more information, refer to Exposure Center in the Tenable Identity Exposure User Guide.
-
New Entra ID Indicators of Exposure
Name Description Ability of Standard Accounts to Register Applications By default, any Entra user can register applications within the tenant. While this feature is convenient and not an immediate security vulnerability, it does carry certain risks. Therefore, following best practices, Tenable recommends disabling this capability. Application Allowing Multi-Tenant Authentication Entra applications, which allow multi-tenant authentication, may give unauthorized access to malicious users if this configuration was not enabled with full awareness and without implementing adequate authorization checks within the application code. Conditional Access Policy Disables Continuous Access Evaluation Continuous Access Evaluation is an Entra ID security feature that enables swift reactions to security policy changes or user status updates. For this reason, do not disable it. Dangerous Application Permissions Affecting the Tenant Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant. Dangerous Delegated Permissions Affecting the Tenant Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant. Disabled Account Assigned to a Privileged Role Having a sane account management process requires monitoring assignments to privileged roles. Dormant Device Dormant devices pose security risks such as outdated configurations and unpatched vulnerabilities. Without regular monitoring and updates, these stale devices become potential targets for exploitation, compromising tenant integrity and data confidentiality. Dormant Non-Privileged User Dormant non-privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface. Dormant Privileged User Dormant privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface. Dynamic Group with Exploitable Rule Attackers can exploit dynamic groups in Microsoft Entra ID by manipulating self-modifiable attributes, allowing them to add themselves as group members. This manipulation enables privilege escalation and unauthorized access to sensitive resources tied to the groups. Empty Entra Group Empty groups can lead to confusion, compromise security, and result in unused resources. It is generally advisable to establish a clear purpose for groups and ensure they contain relevant members. Entra Security Defaults Not Enabled Entra ID Security Defaults offer pre-configured, Microsoft-recommended settings to enhance tenant protection. Federated Domain List Malicious federated domain configuration is a common threat, used by attackers as an authentication backdoor to the Entra ID tenant. Verifying existing and newly added federated domains is crucial to ensure their configurations are trustworthy and legitimate. This Indicator of Exposure provides a comprehensive list of federated domains and their relevant attributes to help you to make informed decisions about their security status. Federation Signing Certificates Mismatch Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding a malicious token-signing certificate, leading to persistence and privilege escalation. First-Party Service Principal with Credentials First-party service principals have powerful permissions but are often overlooked due to their high volume, lack of visibility, and Microsoft ownership. Attackers can exploit this by adding credentials to these principals, allowing them to stealthily leverage their privileges for privilege escalation and persistence. Guest Account with Privileged Role Guest accounts are external identities that can pose a security risk when they have privileged roles assigned to them. This grants substantial privileges within the tenant to individuals outside your organization. Guest Accounts with Equal Access to Normal Accounts It is not advisable to configure Entra ID to consider guests as regular users, as it may enable malicious guests to conduct comprehensive reconnaissance on the tenant's resources. High Number of Administrators A high number of administrators increases the attack surface and poses security risks due to their elevated privileges. This also indicates a failure to uphold the principle of least privilege. Known Federated Domain Backdoor Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding their malicious federated domain, leading to persistence and privilege escalation. Legacy Authentication Not Blocked Legacy authentication methods do not support Multi-Factor Authentication (MFA), enabling attackers to continue performing brute-force, credential stuffing, and password-spraying attacks. Missing Multi-Factor Authentication for Non-Privileged Accounts MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, even for non-privileged accounts. Accounts without an MFA method registered cannot benefit from it. Missing Multi-Factor Authentication for Privileged Accounts MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, even for non-privileged accounts. Accounts without an MFA method registered cannot benefit from it. Multi-Factor Authentication Not Required for a Privileged Role MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, particularly for privileged accounts with assigned privileged roles. Multi-Factor Authentication Not Required for Risky Sign-Ins MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you require MFA for risky sign-ins, for example when the authentication request may not come from the legitimate identity owner. Never Used Device Avoid pre-created, never-used device accounts, as they indicate poor security hygiene and may pose potential security risks. Never Used Non-Privileged User Never used non-privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their default passwords make them prime targets for attackers. Never Used Privileged User Never used privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their default passwords make them prime targets for attackers. Password Protection Not Enabled for On-Premises Environments Microsoft Entra Password Protection is a security feature that prevents users from setting easily guessable passwords to enhance overall password security in an organization. Privileged Account Naming Convention A naming convention for privileged users in Entra ID is crucial for security, standardization, audit compliance, as well as facilitates administration. Privileged Entra Account Synchronized with Active Directory (Hybrid) Hybrid accounts, i.e. synchronized from Active Directory, with privileged roles in Entra ID pose a security risk because they allow attackers who compromise AD to pivot to Entra ID. Privileged accounts in Entra ID must be cloud-only accounts. Privileged Entra Account With Access to Microsoft 365 Services Maintain separate Entra accounts for administrative tasks: a standard account for daily use and a dedicated privileged account for administrative activities. This approach minimizes the attack surface of the privileged account, enhancing security. Public Microsoft 365 Group Microsoft 365 groups stored in Entra ID are either public or private. Public groups pose a security risk because any user within the tenant can join them and gain access to their data (Teams chats/files, emails, etc.) Show Additional Context in Microsoft Authenticator Notifications For improved visibility, enable Microsoft Authenticator notifications to display additional context, such as the application name and geolocation. This helps users identify and deny potentially malicious MFA or passwordless authentication requests, effectively mitigating the risk of MFA fatigue attacks. Single Member Entra Group Creating a group with only one member is not advisable, as it introduces unnecessary redundancy and complexity. This practice adds extra layers of management, which can undermine the efficiency that groups are designed to provide in terms of streamlined access control and administration. Suspicious Directory Synchronization Accounts Role Assignment "Directory Synchronization Accounts" is a privileged Entra role hidden within the Azure and Entra ID portals, usually designated for Microsoft Entra Connect (formerly Azure AD Connect) service accounts. However, malevolent actors may exploit this role for covert attacks. Temporary Access Pass Feature Enabled The Temporary Access Pass (TAP) feature is a temporary authentication method that uses a time-limited or limited-use passcode. While it is a legitimate feature, it is safer to disable it to reduce the attack surface if your organization does not require it. Unrestricted Guest Accounts By default, Entra ID limits guest users' access to reduce their visibility within the tenant. You can further enhance security and privacy by tightening these restrictions. Unrestricted User Consent for Applications Entra ID allows users to autonomously consent to external applications' access to organization's data, which attackers may exploit in "illicit consent grant" attacks. Prevent this by restricting access to verified publishers or requiring administrator approval. Unusual Federation Signing Certificate Validity Period An unusually high validity period for a federation signing certificate is suspicious, as it could indicate that an attacker obtained elevated privileges in Entra ID and created a backdoor through the federation trust mechanism. Unverified Domain Confirm ownership of all custom domains in Entra ID. Keep unverified domains only temporarily - either verify or remove them to maintain a clean domain list and facilitate efficient reviews.
Tenable Identity Exposure 3.86 (2025-01-23)

-
Indicator of Exposure — A new IoE, Hybrid Entra ID Information, provides insights into Microsoft Entra ID data replicated to on-premises Active Directory, enabling organizations to identify potential security risks and address policy misalignments.

-
Indicators of Exposure
-
Managed Service Accounts Dangerous Misconfigurations — Improvement in this IoE to include support for groups, enabling streamlined control of access to a gMSA.
-
Ensure SDProp Consistency — Improved recommendations.
-
Shadow Credentials — Improved recommendations for remediation of Return of Coppersmith’s Attack (ROCA). Introduction of a new option to remove potential false positives related to hybrid environments with Entra ID when the "device writeback" feature is disabled. This has an impact on the "Orphan Key Credential" reason in this IoE.
-
Two new options to enhance control over object ownership and permissions by group membership:
-
Permitted Object Owner (by Group Membership): Allows security principals to be designated as object owners through their group membership.
-
Permitted Trustees List (by Group Membership): Enables the assignment of special permissions to security principals based on their group membership.
-
-
Indicator of Attack — The Golden Ticket IoA has improved attack vector text.
-
Trust Attributes and Types in Directory Services
-
The trustType attribute now supports the TTAAD (TRUST_TYPE_AAD) value.
-
The trustAttributes attribute now supports the TDAV (TRUST_ATTRIBUTE_DISABLE_AUTH_TARGET_VALIDATION) value.
-
-
Export function — Users can choose the separator (comma or semicolon) when performing a CSV export, enabling flexibility to suit various use cases. The browser remembers the last used separator for future exports.

Tenable Identity Exposure version 3.86 contains the following bug fixes:
Bug Fixes |
---|
The web interface can now handle special characters reported in health checks. |
The Dangerous Kerberos Delegation IoE now includes all incriminating attributes relative to orphaned SPN. |
Tier0 nodes in the asset view are now consistently available. |
Tenable Identity Exposure now prevents unauthenticated calls with internal services from being saved in activity logs, ensuring clearer and more accurate log records. |
The health check for the Data Collector/Relay versions is now considered healthy (green) if the Relay and data collector versions match in both the major and minor updates, or if they only differ by one in the minor version. This gives some flexibility for automatic updates or when the software update is slightly ahead of the platform during rollouts. |
Tenable Identity Exposure no longer prevents crawling from succeeding if the sensitive data collection isn't properly configured. |
Tenable Identity Exposure improved the Windows event log parsing speed, preventing the product from accumulating lag. You must redeploy Indicators of Attack to benefit from this change. |
Tenable Identity Exposure (2025-01-10)

-
Identity 360 —A new identity-centric feature in Tenable Identity Exposure provides a rich and exhaustive inventory of every identity across the organization's identity risk surface.
This feature unifies identities across Active Directory and Entra ID and enables them to be ranked by their risk, so you can rank identities across your organization from most risky to least risky.
In addition, Identity 360 enables users to gain a deep understanding of each identity through various contextual lenses such as accounts, weaknesses, and devices associated with a given identity to gain a full perspective of that identity.
For more information, refer to Identity 360 in the Tenable Identity Exposure User Guide.
Tenable Identity Exposure 3.85 (2025-01-08)

-
Health Check — A new domain health check enhances confidence in your Indicator of Attack deployment by identifying and addressing known errors on a per-domain basis.
For more information, refer to Health Checks in the Tenable Identity Exposure User Guide.

Tenable Identity Exposure version 3.85 contains the following bug fixes:
Bug Fixes |
---|
Tenable Identity Exposure now retrieves the previous pwdLastSet attribute to calculate the interval between two password resets in attacks alerted by the Suspicious DC Password Change IoA. |
Tenable Identity Exposure fixed the 'Lockout Threshold' and 'Lockout Duration' options in the IoE Application of Weak Password Policies on Users, allowing you to allowlist deviances when their values are equal to 0. |
The IoA OS Credentials Dumping now correctly resolves the source IP, source hostname, and target IP when the attack is triggered by NT AUTHORITY\SYSTEM. |
Tenable Identity Exposure addressed a Credential Disclosure vulnerability to prevent administrators from extracting stored SMTP account credentials. |