Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Active Directory Vulnerability Assessment with Purple Knight: Domain Controller Owner Is Not an Administrator

Active Directory Vulnerability Assessment with Purple Knight: Domain Controller Owner Is Not an Administrator

Posted on 16/04/202616/04/2026 Link State By Link State No Comments on Active Directory Vulnerability Assessment with Purple Knight: Domain Controller Owner Is Not an Administrator
2026 04 16 16 08 12 Downloads File Explorer

The Hidden Backdoor: Auditing Domain Controller Ownership with Purple Knight. In today’s threat landscape, Active Directory (AD) remains one of the most critical and most targeted components of enterprise infrastructure. In this guide, we shall discuss “Active Directory Vulnerability Assessment with Purple Knight: Domain Controller Owner Is Not an Administrator”. Please see Set Special File Permissions with SUID or GUID and Sticky Bit, and how to run Apps as an administrator on Windows.

As the backbone of identity and access management in Windows environments. A compromised AD environment can mean full organizational takeover in a matter of minutes. Yet despite its central role, many organizations still overlook subtle but dangerous misconfigurations that quietly undermine their security posture.

Also see, How to Install all Editions of Microsoft SQL Server 2025, how to troubleshoot Active Directory Replication issues, and how to fix unable to contact Server: This may be the server does not exist.

Purple Knight

This is where tools like Purple Knight become indispensable. Developed by Semperis, Purple Knight is a free Active Directory security assessment tool. It is designed to surface indicators of exposure (IoEs) and indicators of compromise (IoCs) that traditional security scanners often miss. By running targeted queries against AD objects, permissions, and relationships. Purple Knight provides defenders with actionable intelligence grounded in the real-world tactics used by threat actors.

Among the many findings Purple Knight can surface, one stands out for its insidious nature and its potential for privilege escalation. The Domain Controller (DC) object being owned by a non-Administrator principal.

At first glance, this may appear to be a benign misconfiguration . Perhaps the result of an automated provisioning process, a legacy script, or an overlooked delegation. In practice, however, it represents a hidden attack path that a skilled adversary can exploit to gain persistent. Stealthy control over the most sensitive machines in the domain.

In this article, we will walk through what this finding means. Why it matters, how Purple Knight detects it, and most importantly how to remediate it before it becomes a liability. Whether you are a security engineer performing a routine AD audit or a blue teamer looking to harden your environment against advanced persistent threats, understanding object ownership in Active Directory is not optional. It is foundational.

001 Dc Attach Path

Please see AGMP extended support ends April 2026: Find alternative solution, Steps to customize Windows PE boot images, and Tape Backup Troubleshooting in Veeam: Real Cases.

Request and Procedure: Domain Controller owner is not an Administrator

During the Active Directory assessment. It was identified that 8 Domain Controllers have an object “owner” that does not belong to the standard Tier-0 groups (Domain Admins, Enterprise Admins, or Administrators).

In certain instances, the Domain Controllers report even indicates “Could not read owner,“. Which is a significant anomaly in its own right.

Why this is a risk?

The owner of an AD object has inherent rights that bypass standard security settings:

  • Permission Modification: An owner can always modify the object’s ACLs (Access Control Lists). Even if the current ACLs do not explicitly grant them permission.
  • Privilege Escalation: They can grant themselves additional privileges at any time.
  • Domain Compromise: This creates potential escalation paths that could lead to the compromise of the entire domain.

If a Domain Controller has an invalid owner, an attacker could obtain elevated privileges without being a member of administrative groups, directly compromising Tier-0 assets. This specific condition is explicitly flagged as critical by ANSSI in the document “Dangerous ACLs expose domain controller objects.”

01 PurpleKnight Report01
02 PurpleKnight Repor02

Required Action for the AD Team

We kindly request that you verify and correct the ownership of the listed Domain Controllers, reverting them to their default administrative values.

Affected Domain Controllers

AzureADKerberos
XXX-XXX-ADDC-01
XXX-XXX-ADDC-02
XXX-XXX-ADDC-03
XXX-XXX-ADDC-04
XXX-XXX-ADDC-05
XXX-XXX-ADDC-06
XXX-XXX-ADDC-07
XXX-XXX-ADDC-08

Verify the current owner of each DC

Run the following PowerShell command on a privileged (Tier 0) workstation:

Get-ADComputer YOUR-DC-NAME -Properties * | Select Name, DistinguishedName, Owner
Get-ADComputer XXX-XXX-ADDC-02 -Properties * | Select Name, DistinguishedName, Owner
Get-ADComputer XXX-XXX-ADDC-03 -Properties * | Select Name, DistinguishedName, Owner
Get-ADComputer XXX-XXX-ADDC-04 -Properties * | Select Name, DistinguishedName, Owner
Get-ADComputer XXX-XXX-ADDC-05 -Properties * | Select Name, DistinguishedName, Owner
Get-ADComputer XXX-XXX-ADDC-06 -Properties * | Select Name, DistinguishedName, Owner
Get-ADComputer XXX-XXX-ADDC-07 -Properties * | Select Name, DistinguishedName, Owner
Get-ADComputer XXX-XXX-ADDC-08 -Properties * | Select Name, DistinguishedName, Owner

03 Get DC Powershell

If the Owner is not one of the following:

  • Domain Admins
  • Enterprise Admins
  • Administrators (Built-in)
  • NT AUTHORITY\SYSTEM
  • Check

“This PowerShell script is a security auditing tool focused on Domain Controllers (DCs). In short, it is used to identify the Owner of the computer objects that represent your Active Directory servers.

Why is this command important? In a secure Active Directory environment, the owner of the Domain Controllers should typically be the Domain Admins or Enterprise Admins group.

If the owner turns out to be a specific user or an unauthorized group, that individual would have the inherent right to modify permissions on the Domain Controller itself, representing a serious security risk (privilege escalation).”

$DCs = @(
“XXX-XXX-ADDC-01”,
“XXX-XXX-ADDC-02”,
“XXX-XXX-ADDC-01”,
“XXX-XXX-ADDC-02”,
“XXX-XXX-ADDC-01”,
“XXX-XXX-ADDC-02”,
“XXX-XXX-ADDC-01”,
“XXX-XXX-ADDC-02”
)

foreach ($dc in $DCs) {
$obj = Get-ADComputer -Identity $dc
$acl = Get-ACL -Path (“AD:\” + $obj.DistinguishedName)
[PSCustomObject]@{
Computer = $dc
Owner = $acl.Owner
}
}

I have extracted the owner of the Domain Controller computer objects via PowerShell. And they are assigned to the ‘Domain Admins’ group.

03 Get DC Owner List

Please see [World Backup Day] V13 Upgrade Failure: Veeam Configuration Backup Saved the Day, and Fix unable to contact Server: This may be the server does not exist.

Verifying ownership using the GUI (Example):

Right-click on the Domain Controller computer object > Properties > Security > Advanced

04 GUI Perimssion DC

Owner → “Could not read owner”
Ignored → False

This could mean that Purple Knight was unable to read the AD object’s ACL (specifically the nTSecurityDescriptor field).

Performing this read operation requires specific privileges that are not granted to all user accounts.

Technical Note for your report:

In an Active Directory context, if a tool like Purple Knight or PingCastle returns “Could not read owner,”. It usually suggests that the account used to run the scan lacks the Read Permissions (READ_CONTROL) right on those specific Tier-0 objects. Or that the objects have explicitly restricted permissions that block standard domain users from viewing the security descriptor.

05 Could Not Reader Owner

I hope you found this guide on “Active Directory Vulnerability Assessment with Purple Knight: Domain Controller Owner Is Not an Administrator” very useful. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory security assessment Purple Knight, Active Directory vulnerability assessment with Purple Knight domain controller owner is not an administrator, AD vulnerability domain controller owner problem, domain controller permissions misconfiguration AD, fix domain controller owner not administrator issue, how to fix domain controller owner not admin, Microsoft Windows, Purple Knight AD vulnerability scan findings, Purple Knight findings remediation guide, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2025

Post navigation

Previous Post: AGMP extended support ends April 2026: Find alternative solution

Related Posts

  • Temp Files
    Recover Temp Files using Disk Drill etc on Windows 10 and 11 Windows
  • images 3 4
    Fix an appropriate resource file could not be found for the file for BitLocker Management Windows Server
  • Set Microsoft Defender AV to Passive mode on a Windows Server
    Set Microsoft Defender AV to Passive mode on a Windows Server Security | Vulnerability Scans and Assessment
  • Screenshot 2021 03 16 at 21.14.05
    Unable to locate the account: Fix call to DsGetDcNameWithAccount failed with return value 0x0000054B Windows Server
  • Screenshot 2021 10 07 at 00.00.32
    How to fix this computer is a domain controller: The snap-in cannot be used on a domain controller Windows Server
  • Setup FSx File System 1
    Create and mount FSx File System: Join EC2 instance to AWS Managed AD AWS/Azure/OpenShift

More Related Articles

Temp Files Recover Temp Files using Disk Drill etc on Windows 10 and 11 Windows
images 3 4 Fix an appropriate resource file could not be found for the file for BitLocker Management Windows Server
Set Microsoft Defender AV to Passive mode on a Windows Server Set Microsoft Defender AV to Passive mode on a Windows Server Security | Vulnerability Scans and Assessment
Screenshot 2021 03 16 at 21.14.05 Unable to locate the account: Fix call to DsGetDcNameWithAccount failed with return value 0x0000054B Windows Server
Screenshot 2021 10 07 at 00.00.32 How to fix this computer is a domain controller: The snap-in cannot be used on a domain controller Windows Server
Setup FSx File System 1 Create and mount FSx File System: Join EC2 instance to AWS Managed AD AWS/Azure/OpenShift

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • KIOSK AssignedAccess
    Windows Single or Multi App Kiosks Windows
  • Object first ootbi
    How to update Object First OOTBI Cluster Storage
  • update Docker desktop
    How to manually update Docker desktop Containers
  • Turn bluetooth on and off
    Unable to Turn Bluetooth On or Off on Mac Mac
  • How to pause updates and why
    How to Pause Windows Update via Windows Settings Windows
  • dtjdhn
    The action cannot be completed because the folder or file is open in another program: Determine where a file is open in Windows Windows
  • image 29
    How to force your website to redirect from HTTP to HTTPS using a web.config file Network | Monitoring
  • PowerShell Exec
    Determine the execution policy configured on Windows PC Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,811 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.