Academy

Module 9 Β· Hybrid AD β€” On-Prem Meets Cloud πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
5 min read

Most enterprise AD environments in 2026 are hybrid β€” on-premises AD synced with Microsoft Entra ID (formerly Azure AD) via Entra Connect. This gives users single-identity access to both M365 and on-prem resources. It also creates cross-cloud compromise paths that didn’t exist in pure on-prem AD. This module covers why hybrid AD attack surface is larger than the sum of its parts.

Why hybrid AD is risky

Two directory services, one identity. Entra Connect (formerly Azure AD Connect) synchronizes users, groups, passwords (hashed), and sometimes device objects. The sync creates trust relationships between on-prem and cloud that didn’t exist before.

Key paths:

  • On-prem compromise β†’ Entra Connect server β†’ cloud identity compromise
  • Cloud admin compromise β†’ Azure AD Sync Service β†’ on-prem AD write
  • Password Hash Sync (PHS) puts on-prem NT hashes in the cloud
  • Pass-Through Authentication (PTA) agents extend cloud auth to on-prem
  • Seamless SSO uses a hardcoded AD computer account β€” attack vector

The Entra Connect server β€” crown jewel

The server running Entra Connect has, by default:

πŸ” Advanced Module Β· Pro Tier

Continue reading with Pro tier (β‚Ή4,999/year)

You've read 25% of this module. Unlock the remaining deep-dive, quiz, and every other Advanced/Expert module.

136+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
9 more sections locked below