Attack Path Analysis with Qualys ETM Identity
Qualys ETM Identity Attack Path Analysis helps by showing a visual map of how vulnerabilities, misconfigurations, and relationships between assets can be used. This allows security teams to focus on fixing the most important issues based on actual risk, rather than just looking at CVSS scores.
An attack path is a sequence of steps an attacker can exploit to move from a low-privilege account to a high-value target within an AD environment. The ETM Identity visualizes these paths to help administrators understand Misconfiguration and plan remediation.
Initiate Attack Path Analysis
For visualizing the Attack Path, follow the given steps:
- Go to ETM Identity> Attack Path Analysis tab.
- Use the dropdown to select the AD domain you want to analyze.
Example: corp.spm.com - (Optional) Enter Starting Object.
Enter a starting object if you want to analyze a specific user or an asset. If not provided, ETM Identity automatically considers all possible starting points.
Example: Terry comb (a low-privilege user) - Select the target object you want to secure or investigate.
Example: Finance System (a high-value system)To choose the root domain, select the domain name from the Target drop-down menu.
- To generate the visualization, click Find Attack Paths.

Understanding the Attack Path Graph
The resulting graph shows possible paths between the starting and target objects. For demonstration purposes, we have included a screenshot of the Attack Path Legend too.

Path (Color Indicated)
- Red: Suspicious attack path (potential security risk)
- Grey: Non-suspicious or safe path
Various Symbols
- User-defined objects
These are custom objects configured by the administrator
- System-defined objects
These are default AD objects.
- Target object
These are highlighted destinations.
- Suspicious paths
These are marked in red with a warning icon.
- Warnings
Indicate risky permissions or misconfigurations.
Graph Options
Graph options include functionalities for zooming in and out, as well as a full-screen view for enhanced data visualization.
- Zoom In / Zoom Out
Allows users to magnify or reduce the view of the graph for detailed or broader analysis.
- Full-Screen View
Expands the graph to utilize the entire screen, providing an unobstructed view for better focus on the data.
Use Case
The following scenario demonstrates how a low-privilege user account (Terry Comb) in the domain corp.spm.com can be exploited to gain access to a high-value target (Finance System) due to misconfigurations in access permissions.
Attack Path Overview
Let us take an example to view the Attack Path, where we select
- Domain: corp.spm.com
- Starting Object: Terry Comb (low-privilege user)
- Target Object: Finance System (high-value target)

Observation of Attack Path
- The Terry Comb user is part of the SharePoint Access Group.
- Misconfiguration
This group has write DACL permissions over the finance.sp1 computer.
Attack Path Analysis
- If an attacker compromises the Terry Comb account, they can control the access list of the Finance-SPOI computer.
- The Finance-SPOI computer also has permissions to modify the Finance-SPOI-GPO.
- By modifying this GPO, an attacker can affect all systems under the FinanceOU, including the Finance System Group.
Impact
A compromised low-privilege account (Terry Comb) could be leveraged to gain control over high-value finance systems.
This path is therefore marked suspicious in red.
Taking Remediation Actions
If a suspicious attack path is detected, you can view recommended remediation steps directly from the graph:
- Click the suspicious object (for example, Terry Comb in the above case)

- Check the Remediation Recommendations panel on the right.

- Suggested actions may include:
- Removing excessive permissions
- Reviewing group memberships
- Securing GPO configurations
- Deactivating unused accounts
- Additionally, GID object details are displayed to help troubleshoot potential misconfigurations.
Filtering Suspicious Paths
In environments with complex graphs, you can toggle between viewing all attack paths or only suspicious paths:
- Show All Paths: Displays every possible route between objects
- Show Suspicious Paths Only: Highlights only risky routes for quicker analysis.
