Purpose
This guide explains how to integrate the Microsoft Active Directory (AD) integration with AirMDR to query directory information such as users, groups, and organizational units using the LDAP protocol. This integration is typically used for:- User enrichment during investigations
- Identity validation during incident response
- Mapping AD users to security events
- Group membership lookups
Pre-requisites
Before setting up the Microsoft Active Directory integration in AirMDR, ensure the following requirements are met:Active Directory Environment
- A Microsoft Active Directory Domain Services (AD DS) environment must be available.
- At least one Domain Controller (DC) must be reachable from the AirMDR environment.
- LDAP services must be enabled on the Domain Controller.
- If LDAPS (port 636) is used:
- The Domain Controller must have a valid TLS certificate
- The certificate must be issued by a trusted certificate authority
-
TLS must be enabled on the LDAP service
LDAPS is recommended to ensure encrypted communication between AirMDR and Active Directory.
Authentication Method
AirMDR authenticates to Active Directory using a service account and LDAP bind using username and passwordRequired Parameters
| Parameter | Description |
|---|---|
| LDAP Server | Domain Controller hostname or IP |
| Port | LDAP or LDAPS port |
| Username | Service account used for LDAP bind |
| Password | Password of the service account |
| Base DN | Directory search base |
Recommended Permissions
The service account should have read-only directory access. Typical privileges include:- Read user objects
- Read group objects
- Read organizational units
- Read attributes (email, samAccountName, etc.)
Supported Versions
The AirMDR Active Directory integration supports:- Microsoft Active Directory Domain Services (AD DS)
- Windows Server 2012 / 2016 / 2019 / 2022
- LDAP / LDAPS directory services
-
On-premises Active Directory deployments
Azure AD (Entra ID) is not supported through LDAP. Use the Microsoft Graph integration instead.
Generate Microsoft Active Directory (AD) LDAP server details, Service account credentials and Base Distinguished Name (DN)
Identify the LDAP Server (Domain Controller)
- Log in to the Domain Controller.
- Open Server Manager.
- Navigate to Tools → Active Directory Users and Computers
-
In the left navigation panel, identify your Domain Controller hostname.
Example: dc01.company.local
Determine the LDAP Port
Active Directory supports two LDAP ports:
To verify:
| Protocol | Port |
|---|---|
| LDAP | 389 |
| LDAPS (Secure LDAP) | 636 |
- Open Command Prompt on the domain controller.
-
Run:
Example:This returns the active domain controller and confirms LDAP services.AirMDR recommends LDAPS (port 636) for encrypted connections.
Create a Service Account
A dedicated service account should be created for the integration.
- Navigate to open Server Manager → Tools → Active Directory Users and Computers.
-
Click on “Create a new user in the current container”.

-
Enter the required Field Values.
or
Field Value (Example) First Name AirMDRLast Name ServiceUser Logon Name airmdr-service - Navigate to the desired Organizational Unit (OU).
- Right-click the OU.
- Click Next.
-
Configure password settings:
- Set a secure password
- Uncheck User must change password at next logon
- Enable Password never expires (recommended for service accounts)
-
Click Finish.
The service account will be used as the LDAP bind user.
Retrieve the Service Account Username
The LDAP bind username can be expressed in either format:User Principal Name (UPN): airmdr-service@company.localorDomain format: COMPANY\airmdr-service
Either format is accepted by most LDAP clients.
Determine the Base Distinguished Name (Base DN)
The Base DN defines where LDAP searches begin in the directory tree.To obtain it:
- Navigate to open Server Manager → Tools → Active Directory Users and Computers.
- Right-click the domain root.
- Select Properties
- Go to the Attribute Editor tab.
-
Locate the attribute: distinguishedName
Example value: DC=company,DC=local
| Field | Values (Example) |
|---|---|
| LDAP Server | dc01.company.local |
| Port | 636 |
| Username | airmdr-service@company.local |
| Password | ******** |
| Base DN | DC=company,DC=local |
Data Flow & Security
Data Retrieved
The integration typically queries:- User objects
- Group memberships
- Email addresses
- Security identifiers (SID)
- Organizational unit membership
Encryption
| Layer | Method |
|---|---|
| In Transit | TLS (LDAPS) |
| At Rest | Encrypted credential storage in AirMDR |
Network Ports
| Port | Protocol |
|---|---|
| 389 | LDAP |
| 636 | LDAPS (recommended) |
Skills Provided by this Integration
| Skill ID | Purpose |
|---|---|
| Disable Active Directory (Onprem) User | Disables the specified user account in Active Directory (Onprem) by setting the ACCOUNTDISABLE flag on userAccountControl |
Configure Active Directory in AirMDR Integrations Dashboard
- Navigate to AirMDR, provide the credentials and click Login.
- Navigate to the AirMDR Integrations Dashboard in the left navigation pane and select Integrations.
- Use the search option, enter the keyword “Active Directory”, select the Connections tab, and click + Add New Connection.
- Enter an unique name to the Instance (e.g.,
your org name-Active Directory) and brief Description to easily identify the user connection by AirMDR. - Enter the generated LDAP Server details, Service Account Credentials, and base Distinguished Name (DN) in the Authentication Details field params, and click Save.
Error Handling
| Error | Cause | Resolution |
|---|---|---|
| LDAP bind failed | Incorrect credentials | Verify username/password |
| Cannot connect to server | Network/firewall issue | Confirm LDAP port access |
| Invalid Base DN | Incorrect directory path | Verify distinguishedName |
| TLS handshake error | LDAPS certificate issue | Validate DC certificates |
Support & Maintenance
- 📧 Contact AirMDR Support through your designated support channel.
- 🔁 Rotate credentials regularly in Microsoft Active Directory (AD).
- 🔄 If a domain controller changes:
- Update the LDAP Server hostname in the integration configuration.

