Browse Docs
ONLINE DOCUMENTATION
|
||||||||||||
User Group Membership SynchronizationIn this document
Automatic user group synchronization is one of the most powerful features in DefensX. This article explains how DefensX synchronizes user group memberships, which methods are used in different environments, and how to control or protect group memberships when needed. Our goal is to make group synchronization automatic, reliable, and maintenance-free, without requiring additional directory sync software. OverviewIn most enterprise environments, user groups are the foundation of access control and policy management. DefensX follows the same model. However, synchronizing user group memberships is not trivial. Many solutions require:
DefensX takes a different approach. Key Principles
This approach minimizes data collection, reduces complexity, and avoids unnecessary directory dependencies. Limiting Synced Groups (Group Filters)By default, users may belong to hundreds of groups, but most DefensX policies and reports only require a subset of them. For this reason, DefensX allows you to define Group Filters under: Settings → Azure AD & Active Directory Group Filters control which directory groups are visible and synchronized into DefensX. Why Group Filters Matter
Supported Group Synchronization ScenariosDefensX uses different synchronization methods depending on the device and identity type:
Active Directory Group SynchronizationDefensX does not communicate directly with Active Directory. It does not open LDAP or LDAP-TLS connections, does not store directory credentials, and does not require any firewall changes. DefensX also does not need to know which server is acting as the domain controller or what its IP address is. All Active Directory interaction is handled indirectly by using regular Windows functions. Primary Group Retrieval Flow When a user logs in to a Windows computer that is joined to an Active Directory domain:
At this stage:
DefensX never re-authenticates the user, never performs directory queries, and never communicates with Active Directory servers on its own. It simply consumes the group information already resolved by Windows for the active user session. Fallback When Active Directory Is Unreachable Active Directory connectivity may be temporarily unavailable due to network issues, offline usage, or missing VPN connectivity. In these situations, the Windows API calls used by DefensX may fail to retrieve live directory data. When this occurs, DefensX automatically switches to a fallback mechanism:
Cached group information may not include very recent directory changes, but it provides a consistent and valid representation of the user’s last known Active Directory state. Periodic Refresh and State Recovery Every 30 minutes, the DefensX tray application repeats the same synchronization workflow:
This design ensures that:
Azure AD (Entra ID) Group SynchronizationFor Azure AD (Entra ID) device-joined Windows computers (not workplace-joined), Windows does not expose user group memberships through local security APIs. Because of this limitation, the Active Directory method described earlier cannot be used. In this scenario, DefensX retrieves user group memberships directly from Azure AD using Microsoft Graph API. Requirements Azure AD group synchronization requires the DefensX Azure AD Connector application
( This configuration is completed under: Settings → Azure AD & Active Directory, you can also read the details in Configuring the AzureAD Integration article. How It Works When a user logs in to a Windows computer that is device-joined to Azure AD:
All directory communication occurs server-side using the granted Azure AD application permissions. Hybrid Join EnvironmentsIn hybrid environments, users and groups are typically synchronized from on-premises Active Directory to Azure AD. Devices may be:
By default, DefensX behaves as follows:
Common Challenges in Hybrid Setups Hybrid environments often introduce additional complexity:
A common request in these environments is to always use Azure AD groups, regardless of the device join state. Prefer Azure AD for Group Memberships To address this, DefensX provides the option: This setting is available under: Settings → Azure AD & Active Directory It can be safely enabled once the DefensX Azure AD Connector application has been granted permissions. How It Works When Enabled When this option is enabled:
This ensures:
macOS with Platform SSOPlatform SSO for macOS (via Intune) allows users to sign in using Azure AD identities at the OS level. When Platform SSO is enabled:
This is the recommended configuration for automatic group synchronization on macOS. Group Sync ProtectionBy default, DefensX enforces a single source of truth:
This prevents situations like:
When Manual Memberships Are Required For special cases, DefensX provides Group Sync Protection feature. To enable this feature for a group:
Behavior of Protected Groups
This option is recommended when manual control must always override directory synchronization. Deployment-Level ControlEach computer in DefensX belongs to a Deployment. By default, deployments have Sync User’s Group Memberships From Active Directory or Azure AD enabled. This means:
Disabling Group Sync Per Deployment If you want to disable group synchronization for specific deployments entirely:
This allows different deployments to use different synchronization behaviors. |
||||||||||||