Bitdefender’s 45‑day Internal Attack Surface Assessment shows how everyday admin utilities become the biggest risk in Windows‑heavy enterprises and offers a practical, low‑effort path to shrink that surface.
Why the Real Threat Lives Inside Your Toolbox
Most security teams still think of “malware” as the primary danger. In practice, the most common foothold comes from trusted binaries that administrators run every day – PowerShell, WMIC, netsh, certutil, MSBuild, and dozens of others. Bitdefender’s analysis of 700,000 high‑severity incidents found legitimate‑tool abuse in 84 % of cases. When an attacker already has a foothold, those binaries become the fastest way to move laterally, exfiltrate data, or install persistence.
“Living‑off‑the‑land binaries are the silent highways in most breaches. If you can block or tightly control them, you cut the attacker’s mileage dramatically,” – Dr. Elena Karpova, Principal Threat Analyst, Bitdefender Labs.
The Over‑Entitlement Problem
A fresh Windows 11 image ships with 133 unique LoLBin (Living‑off‑the‑Land binaries) spread across 987 instances. Bitdefender telemetry shows PowerShell running silently on 73 % of endpoints, often invoked by third‑party software rather than a user. This isn’t a flaw you can patch; it’s an entitlement issue – users and machines have more privileges than they truly need.
Gartner now predicts that pre‑emptive cybersecurity will represent 50 % of IT security spend by 2030, up from less than 5 % in 2024. The shift is driven by the fact that most intrusions involve no malware at all; adversaries simply use the tools already present on the network and move in minutes. Detect‑and‑respond cycles are too slow – you must remove the moves before the attacker can make them.

How the 45‑Day Internal Attack Surface Assessment Works
Bitdefender’s GravityZone PHASR (Proactive Hardening and Attack Surface Reduction) powers a low‑effort, four‑step engagement designed for organizations with 250+ employees. The process runs alongside any existing endpoint stack.
- Kickoff & Behavioral Learning – PHASR builds a baseline profile for every machine‑user pair. The learning phase typically lasts 30 days, capturing which binaries are executed, how often, and under what contexts.
- Attack Surface Dashboard Review – Teams receive an exposure score (0‑100) and a prioritized list of findings across five categories:
- Living‑off‑the‑land binaries
- Remote administration tools
- Tampering tools
- Cryptominers
- Piracy tools Each item is mapped to the specific users and devices it affects.
- Optional Reduction Sprint – Controls can be applied manually or via PHASR Autopilot, which enforces policies automatically. A built‑in one‑click approval workflow lets users request temporary access when legitimate work requires it.
- Reduction Review – A final session quantifies the shrinkage, highlights any shadow‑IT binaries that surfaced, and provides a roadmap for ongoing hardening.
Real‑World Results
Early‑access customers reported 30 %+ surface reduction within the first month. One organization locked down LoLBins and remote tools, achieving nearly 70 % reduction without adding investigation overhead or disrupting end‑users.
What This Means for Different Stakeholders
| Role | Benefit |
|---|---|
| CISO | A board‑ready exposure number that moves week over week, tied to the exact behaviors attackers would exploit. |
| SOC / IT Admin | Up to 50 % fewer alerts to investigate because entire classes of suspicious‑but‑legitimate activity are eliminated. |
| Business Decision‑Maker | Continuous, documented surface reduction – the evidence regulators, auditors, and cyber‑insurers increasingly demand. |
Practical Steps to Get Started
- Identify the Scope – Verify you have at least 250 Windows‑based endpoints. PHASR works on mixed environments, but the biggest gains are seen where PowerShell and other LoLBins are pervasive.
- Engage Bitdefender – Request the complimentary Internal Attack Surface Assessment via the official landing page.
- Prepare a Minimal Data Set – Provide a list of privileged accounts and any existing endpoint protection tools. PHASR integrates with most major EDR platforms.
- Review the Dashboard – After the learning phase, focus first on binaries that appear on high‑privilege accounts or on servers that host critical workloads.
- Implement Controls – Use Autopilot to enforce “deny‑by‑default” for LoLBins that are not required, then enable the one‑click request workflow for occasional legitimate use.
- Measure and Iterate – Track the exposure score weekly. Re‑run the learning phase after major software deployments to capture any new binaries that enter the environment.
Bottom Line
The biggest risk in most enterprises isn’t a zero‑day exploit hidden in the wild; it’s the trusted utilities already on every endpoint. By dedicating just 45 days to watch how those tools are used, you gain a concrete, prioritized map of the attack surface you can shrink immediately. The result is fewer alerts, faster response times, and a defensible metric you can show to the board, auditors, and insurers.
“If you can’t see the road you’re traveling on, you’ll never know when an attacker pulls a shortcut,” – Karpova.
Ready to see the real attack surface in your environment? Start the assessment today and turn abstract risk into actionable hardening.

Comments
Please log in or register to join the discussion