Hi Tilda Zimmermann,
By default, Active Directory allows authenticated users to query certain directory information, which is why even basic accounts can enumerate objects. To mitigate this, you’ll want to adjust permissions on the directory so that only privileged accounts can perform broad queries. One common approach is to restrict anonymous and low-privilege LDAP binds by disabling “anonymous binds” and tightening ACLs on directory objects. This ensures that standard users can still authenticate but cannot perform unrestricted enumeration.
Additionally, you can configure Group Policy to limit LDAP information exposure, and enforce LDAPS (LDAP over SSL/TLS) to ensure traffic is encrypted and controlled. Another best practice is to deploy tiered administrative models, where sensitive directory attributes are shielded from standard accounts. Monitoring and alerting on unusual LDAP query volumes can also help detect and block rogue enumeration attempts.
For unmanaged endpoints, network segmentation and conditional access policies are key. If a device isn’t domain-joined or compliant, it should be restricted from querying directory services altogether. Combining these controls with auditing will give you both prevention and visibility.
I hope this explanation helps clarify the architectural options. If this answer is helpful, please don’t forget to hit “Accept Answer”.
Jason.