Get Started with BloodHound
- Introduction to BloodHound
- Quickstart
- BloodHound and Security Boundaries
Install a Data Collector
- Overview
- Install SharpHound
- Install AzureHound
Collect Data
- Overview
- BloodHound Enterprise Collection
- Overview
- SharpHound Enterprise Data Collection and Permissions
- Data reconciliation and retention
- Ad-hoc BHE Data Collection with SharpHound CE
- Run an On Demand Scan
- Create a BloodHound Enterprise collector client
- Create a data collection schedule
- Why perform privileged collection in SharpHound
- SharpHound Enterprise Cross-Trust Collection
- SharpHound Collection FAQ
- BloodHound CE Collection
Analyze Attack Path Data
- Overview
- The BloodHound GUI
Manage BloodHound
- Overview
- Bloodhound Enterprise Compliance Framework
- Authentication and Authorization
- Securing BloodHound and collectors
API & Integrations
- Overview
- BloodHound API
- BloodHound Integrations
Resources
- Resources
- Nodes
- Edges
- Glossary
- Community and Support
- Release Notes
SharpHound Collection FAQ
The following are common questions about the data collection capabilities provided by the SharpHound Enterprise service.
Collection time can vary from minutes to hours depending on the size of the environment (but other complicating factors can contribute to longer durations).
Example full scan and upload durations with privileged collection:
- 15,000 users + groups, 4,000 computers, and AD CS: 45 minutes
-
500,000 computers , and AD DS: 3 hours
SharpHound automatically selects the best Domain Controller based on information returned from Active Directory.
If you see an error in run.log that looks something like this:
2022-08-05T09:18:13.6406652-04:00|WARNING|[CommonLib LDAPUtils]LDAP Exception in Loop: 52. (null). The LDAP server returned an unknown error..
You may reference this link to understand the meaning of the exception code by number: https://ldap.com/ldap-result-code-reference-core-ldapv3-result-codes
SharpHound Enterprise installs as a signed Windows service. For this reason, antivirus products tend not to alert on the service.
Notable exceptions include:
- Behavioral analytics tools: Any security tool that performs behavioral identification of scanners will flag SharpHound Enterprise as a scanner during local privileged collection. Typically these cannot block activity but will generate alerts to the SOC.
- Cisco Umbrella: As each customer is deployed utilizing their own domain, Umbrella commonly flags the domain as new and will quarantine it until excluded by an administrator.