This document discusses detecting Golden Ticket attacks in Active Directory networks. It begins with background on Active Directory and Kerberos authentication. It then explains how Golden Ticket attacks work by forging Ticket Granting Tickets with arbitrary privileges. The document proposes a method to detect these attacks by monitoring for anomalies in the typical Kerberos message exchange sequence between clients and domain controllers. Specifically, it looks for Ticket Granting Service requests that are not preceded by Authentication Service requests, as forged tickets bypass the initial authentication step. This sequence analysis signature alone is not enough, so the document also considers ways the attack could still evade detection and need further context to accurately identify Golden Ticket activity on the network.