BloodHound Version Feature Comparison Get started mapping Attack Paths in Active Directory and Azure today for free with open-source BloodHound Community. Understand the features in BloodHound Enterprise built for defenders and Identity teams to continuously monitor, prioritize and eliminate Attack Paths.

logo-BHCE_70a2f6
BloodHound Legacy

Where it all started: Six Degrees of Domain Admin

logo-BloodHound-CE@2x
BloodHound CE

Map Active Directory and Azure Attack Paths

bloodhound-2
BloodHound Enterprise

Continuously Monitor, Prioritize, and Eliminate Attack Paths in Active Directory

Compare Features

Category
BloodHound Legacy
BloodHound CE
BloodHound Enterprise
Data collection

Active Directory (AD)

Domain-joined Windows systems

EntraID (AzureAD)

Azure Resource Manager 
(AzureRM)

Microsoft Graph API

Current data statistics

User Rights Assignments (URA)

URA provides improved accuracy in attack paths at the Windows system level

Active Directory Certificate Services

Historical data quality and trends

Data Collector Management

Scheduled data collection

Signed Data Collection Service

data ingestion

Ingest data via UI

Ingest data via API

Data reconciliation

Automatically update changes identified during data collection such as removal of group membership, role assignment, etc.
data Analysis

Map Attack Paths between objects

Cypher search support

Entity (“node”) context panels

Attack Path (“edge”) context panels

Save your own custom queries

Export displayed graph

Pre-built Cypher queries

AD Only

Automatically classify Tier Zero assets

Default nodes only

Hybrid Attack Paths

Identify Tier Zero Attack Paths

Attack Path Exposure Measurement

Attack Path remediation guidance

Risk trend analysis and reporting

Architecture and Security

Multi-user support with RBAC

2FA support

SAMLv2.0 support

Three-tier application with REST APIs

Fully-managed SaaS application

Support

Access to BloodHound
 Slack Community

24/7/365 Enterprise Support

Assigned Technical Account Manager

Learn how BloodHound Enterprise can streamline mitigation efforts, eliminate millions of Attack Paths, and improve your security posture

  • This field is for validation purposes and should be left unchanged.