Authentication Vulnerabilities | Lateral Movement Techniques | Tenant Compromise Methods Recent techniques for lateral movement within Active Directory have emerged that circumvent authentication measures and enable data exfiltration.