Semperis, an identity security and resilience company, has expanded the capabilities of its widely used free security assessment tool, Purple Knight. As of April 21, 2026, the tool now provides full support for Microsoft Government Community Cloud High (GCC High) environments. This is a significant development for U.S. federal agencies, Department of Defense (DoD) organizations, and Defense Industrial Base (DIB) contractors who operate within this stringent, high-compliance cloud. These organizations can now use Purple Knight to scan their Entra ID (formerly Azure AD) tenants for security gaps and misconfigurations, complementing the tool's existing capabilities for scanning on-premises Active Directory (AD).
Purple Knight is a free community tool designed to help organizations identify vulnerabilities in their hybrid identity infrastructure. It runs a comprehensive set of tests against both on-premises AD and Entra ID, checking for security indicators of exposure and compromise. The tool is recommended by the Five Eyes intelligence alliance (including the NSA and CISA) as part of its guidance on hardening AD environments.
The challenge for organizations in GCC High was that while they could use Purple Knight for their on-premises AD, they had no way to perform the same assessment on their cloud-based Entra ID tenant due to the specialized nature and APIs of the GCC High environment. This created a significant visibility gap.
This update closes that gap, allowing security teams to:
The extension of Purple Knight to GCC High provides immense value to the U.S. public sector and defense industry. Identity infrastructure (AD and Entra ID) is a primary target for sophisticated threat actors seeking to compromise government networks. By providing a free, easy-to-use tool to identify weaknesses, Semperis is helping these critical organizations harden their defenses.
Security teams within these agencies can now proactively identify and remediate issues such as:
This proactive approach is far more effective than waiting for a breach to occur. For organizations that require continuous monitoring beyond Purple Knight's point-in-time assessment, Semperis also offers its commercial Directory Services Protector (DSP) platform.
Using Purple Knight enhances an organization's detection and response capabilities by shifting security left. It's a proactive hunting and hardening tool.
Purple Knight itself is a mitigation tool. The primary recommendation is for all organizations, especially those in GCC High, to download and run the tool.
Purple Knight helps organizations implement this mitigation by identifying and providing guidance on fixing misconfigurations in AD and Entra ID.
The tool identifies overly privileged accounts and other issues that this mitigation aims to address.
Purple Knight scans for weak password policies and accounts with non-expiring passwords.
The release of Purple Knight for GCC High directly enables and automates a critical aspect of Domain Account Monitoring for federal and defense organizations. Security teams should immediately integrate this tool into their quarterly or monthly security review cycle. By running Purple Knight against their on-premises Active Directory and now their Entra ID tenant in GCC High, they can proactively hunt for dangerous misconfigurations before an attacker does. The tool automates the detection of issues like dormant accounts, service principals with excessive privileges, weak password policies, and accounts vulnerable to Kerberoasting. The tactical recommendation is to schedule these scans, ingest the results into a ticketing or risk management system, assign owners for remediation, and track progress. This creates a continuous cycle of proactive hardening for the organization's most critical asset: its identity infrastructure.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats