Version 8.0 Released

This release closes a major security gap in Active Directory by stopping attacker abuse of Active Directory Certificate Services (AD CS) to obtain unauthorized, high-privilege certificates. A single forged certificate can let an attacker authenticate as any user, including domain admins while bypassing most identity-monitoring controls. Threat Prevention 8.0 adds real-time monitoring and blocking of malicious certificate enrollments, preventing attackers from establishing long-term persistence. Combined with the new process-hardening capabilities, this release strengthens your ability to detect and stop modern identity attacks.

Want the full details? Click the link below!

What’s New

Active Directory Certificate Services Monitoring and Blocking

Threat Prevention 8.0 introduces monitoring and real-time blocking for Active Directory Certificate Services (AD CS), closing a major gap that attackers have increasingly exploited to issue unauthorized high-privilege certificates.

Certificate Enrollments: See full request details including template, subject, SAN, key size, and more, while intercepting the CA process before issuance to detect and block anomalous requests in real-time.

Template and CA Configurations: Monitor and track configuration changes to template ACLs, flags, CA flags, enrollment agent settings, and issuance requirements to detect privilege escalation attempts before they succeed.

Certificate Issuance: Gain end-to-end tracking from request to logon, detecting certificate-based logons by unauthorized accounts or weak mappings across your entire environment.

ESC1–ESC7 Attack Prevention

Now includes detection and blocking of all major AD CS exploitation paths:

  • ESC1 – Enrollee-Supplied Subject/SAN: Detect and optionally block certificate requests using templates with arbitrary subject/SAN fields that differ from the requester.

  • ESC2 – Any-Purpose/No EKU Template: Identify and block certificate templates with Any Purpose or missing EKUs and detect when low-privilege users can supply SANs or enroll for others.

  • ESC3 – Enrollment Agent Misuse: Detect and block unauthorized on-behalf-of enrollments to prevent impersonation attempts.

  • ESC4 – Template ACL Tampering: Monitor and block changes to template permissions and settings that introduce misconfigurations like ESC1 or ESC2.

  • ESC5 – CA/Template ACL Abuse: Monitor and prevent CA or template ACL changes that create PKI takeover paths.

  • ESC7 – CA Operational Misconfiguration: Monitor the CA security descriptor and detect when permissions like ManageCA or ManageCertificates are granted inappropriately.

By intercepting malicious enrollments before issuance, organizations can stop certificate-based persistence before an attacker establishes it.

Join the Webinar

See how these AD CS protections work in practice in an upcoming webinar focused on real-world exploitation and defense.

Join us 2026-01-27T18:00:00Z!

Register for the webinar

LSASS Guardian – New Flags

Threat Prevention 8.0 strengthens LSASS protection by adding new handle-permission controls that block attacker attempts to suspend, terminate, or clone the LSASS process — techniques used to bypass security tooling or extract credentials.

Process Guardian

Applies process-hardening controls, previously available only for LSASS, to any process you choose. By denying suspension, termination, and cloning rights to unauthorized actors, it blocks the techniques attackers use to disable agents or dump memory, preserving the runtime integrity of critical services even under active attack.

Missing hooks alert (Microsoft KBs)

Threat Prevention now alerts administrators when Microsoft updates or environmental conditions prevent the agent from hooking LSASS, certsrv.exe, or other monitored processes. This eliminates silent monitoring gaps after patch cycles.

Global Event Filter – “No Change” Events

Capture attribute rewrites that would normally be filtered out due to unchanged values, enabling investigation of repeated writes, replication anomalies, and change patterns that blend into benign traffic.

New and Updated Policy Templates

Threat Prevention 8.0 introduces several new templates to simplify deployment of AD CS protections and process-hardening controls.

AD CS Templates

Seven new templates support monitoring and blocking across major AD CS abuse paths:

  • Block ESC1–3 Template Enrollments
  • Block Extracting CA Private Key
  • Block Template Modifications (ESC4)
  • Detect ESC1–3 Template Enrollments
  • Detect Modification of NTAuthCertificates Object
  • Detect Template Modifications (ESC4)
  • Detect Security Descriptor Change on Certificate Authority Object (ESC7)

Process Guardian Templates for Netwrix Threat Prevention agent protection

  • Agent Hardening – Monitor
  • Agent Hardening – Protect
    • Includes optional protection for the file activity service
      • Note: Do not block PROCESS_SUSPEND_RESUME for SBTService.exe, which relies on this permission internally

LSASS Guardian Templates

  • LSASS Guardian – Monitor
  • LSASS Guardian – Protect

Enterprise Password Enforcer (EPE) HIBP Optimization

Reduce the storage footprint of Have I Been Pwned (HIBP) compromised-password data by more than 50% by consolidating 64k files into a single Bloom-filter-based structure.
Store over 2 billion NTLM hashes in roughly 8 GB instead of 20 GB, making it easier to deploy compromised-password checks directly on domain controllers without adding significant disk overhead.

UI Rebranding

The product UI has been updated to align with the latest Netwrix branding, ensuring a consistent visual identity across the Netwrix product suite.

Bug Fixes and Miscellaneous Updates

Build Fixed issue
7.5.0.267 403256: AD events were filtered when attributes were accessed but not changed; new Event Filtering Configuration option added
408453: High CPU utilization due to slow DirRead-based objectClass resolution; resolution moved to the agent
410279: LSASS crash on Windows Server 2025 with LSA Protection during agent stop; multi-signature approach implemented with a dedicated Server 2025 signature
410528: Exchange SE SU4 was not supported; Exchange signatures extended to support SU4
411172: Installers checked for .NET Framework 4.7.0; NTP console and agent installers now require .NET Framework 4.7.2
7.5.0.256 407684: Get-SIAgent and other PowerShell commands not working
408756: NTP agent caused server reboot
408841: Exchange SE support added to 7.5
7.5.0.252 407212: SUVP 25-11 support
406920: Replication conflict events had NotMapped properties in NTM
406450: Permission Changed events sent with incorrect attributes to NTM
7.5.0.247 405820: Exchange 25-10 updates support
406602: Expired code signing certificate
406427: Update Agent Installer error message [PERN]
7.5.0.245 405959: Incorrect ADMonitor version number reported
7.5.0.244 400587: Upgrade BouncyCastle
405320: Added utcTimeLogged index to NvEvent table
7.5.0.242 400587: Upgrade BouncyCastle
402819: Preserve localPwnedDB key during agent upgrade
403356: SUVP 25-10 support
7.5.0.236 401764: AD replication issues after September patch and DLL update
401934: AD replication shared memory IPC overflow alerts
7.5.0.234 391153: SBTService repeatedly stopped on multiple DCs
398094: Missing Start, End, Auth, and Renew dates in rejected TGS tickets
398101: Host information missing in dcsync events
398537: Expand Groups setting not saved
398797: Exchange 25-08 updates support
400007: SUVP 25-09 support
7.5.0.227 397188: SUVP 25-08 support
398055: DSM post-upgrade showed incorrect oldest database date
7.5.0.224 394634: File system permission change events sent formatted value instead of SDDL
395156: Exchange 25-07 .NET updates support
396765: No events sent to NAM after enabling TLS for AMQP output
7.5.0.218 393085: Windows Server 2025 – LSASS crash during agent startup with EPE enabled
7.5.0.216 393162: SUVP 25-07 support
394105: NTP–NAM CheckControlChannelConnection not implemented error
391515: TGT events not sent during golden ticket attack
7.5.0.212 391328: EX Mailbox Non-Owner Logons filter did not produce expected results
7.5.0.205 389319: Exchange 2025-05 updates support (Microsoft Patch Tuesday)
389320: SUVP 25-06 support
7.5.0.201 342078: SI policy exclusions for NTDS.dit not honored
383698: SI computer permission change
383913: Updated LDAP filters for service account discovery
384413: EPE test results showed DCs failing password qualification
388933: Group membership change events had incorrect sub-operation
389099: Password enforcement policy issues
389104: Password enforcement incorrectly blocked accounts
389698: Incorrect archive database size displayed
389699: Archive DB maintenance configuration not saved
7.5.0.188 381912: TGS events for custom SPN with RC4_hmac not sent
381900: Agent service could not stop and LSASS consumed CPU
384877: Exchange 2025-04 updates support
386437: Investigation node exception when switching to Archive DB
384868: SUVP 25-05 support

Plan your upgrade

Netwrix Threat Prevention 7.4 will reach its end of support life on July 8 2026. To learn more, please read the Netwrix End-of-Support Policy.

Need help with this update?

There are many different ways to get help with our products!

Situation Action
If you feel the product is broken and not working as intended… Contact Support
If you have a question you’d like to ask other experts… Create a discussion in the community: Threat Prevention > Discussions & Questions
If you have a feature request… Let our product team know directly: Threat Prevention > Ideas
If you have something cool to show… Show everyone what you built: Threat Prevention > Show & Tell

What are your thoughts?

We are always happy to hear from our users on what you like, and what you hope to see in the future. Please, share your thoughts below!

1 Like

I may have missed it in the information provided, but I’m assuming that 8.0 is backwards compatible with 7.5 and 7.4? Just wanted to confirm. Thanks

Yes, that’s correct. Version 8.0 is backward compatible with 7.5 and 7.4. Thanks for checking!

I wanted to mention that I received an email about the new addition of the AD CS Protection, however, when I clicked on the link for the webinar registration, I’m getting message that it’s not available. Could you provide the latest link for that?

Thanks for flagging this, I just tested the registration link and it’s loading on my end, so this might be browser-related. Could you try an incognito window or different browser? Here’s the registration link.
If that still doesn’t work, let me know and I can get you registered directly.

1 Like

Thank you! Got myself registered! I think that the issue was with the link in the email I received from the community? Here’s a couple of examples.

1 Like

Got it, we’ll check on those email links. Thank you!

1 Like