ACTIVE DIRECTORY BACKDOORS: Myth or Reality BTA: an open source framework to analyse AD Workshop
|
|
|
- Hilda Allison
- 9 years ago
- Views:
Transcription
1 ACTIVE DIRECTORY BACKDOORS: Myth or Reality BTA: an open source framework to analyse AD Workshop Joffrey Czarny, Xavier Mehrenberger Airbus Group Innovations Univershell
2 Summary 1 Intro Context Some backdoors Needs 2 BTA Introduction Backdoors Hunting 3 BTA in practice 4 Feedback Univershell
3 Summary 1 Intro Context Some backdoors Needs 2 BTA Introduction Backdoors Hunting 3 BTA in practice 4 Feedback Univershell
4 Context Active Directory Manage authentication and authorization for users and computers Security policies Baseline = Corner stone for Microsoft information system = Target of choice for intruder = Pain to secure... Auditors, Incident handlers, Admins need to audit Active Directory Find bad practices (admins are sometimes lazy?) Hunting (Searching for a needle in a haystack!) Incident response (what has changed in timeframe?) Univershell
5 Two case study Now, let s start hunting. I ll show you two backdoors, and we ll try to find them. Backdoor 1 - Domain Admins members Administrator: "It seems someone can manipulate Domain Admins group and users!" Backdoor 2 - AdminSDHolder Administrator: "I removed some permissions but they came back!" Univershell
6 Backdoor 1 description - Domain Admins members Who is (or could become) Domain admin? Can I justify membership for every one of them? Who has permission on this group? Who can add members? Who manage members? Who has permission on these members? Who can reset their passwords? Can I know when a member has been removed? Let s try to find it using Microsoft-provided tools : AD explorer Univershell
7 AD explorer
8 Members of Domain Admins
9 User properties
10
11
12 Backdoor 1 (Domain Admins members) hunting using AD Explorer: results Problems Several clicks to obtain this information with AD explorer or MS GUI tools Ok, it kind of works, but it s way too complicated. Moreover not all information is obtained. Let s try using powershell! Univershell
13 PowerShell request for AD
14 Backdoor 1 - hunting using PowerShell Problems Powershell Cmdlets required, run on the host or via network, sometimes complex PS requests Univershell
15 Backdoor 2 description: AdminSDHolder AdminSDHolder Some users / groups can be "protected" (admincount=1 attribute) AdminSDHolder is a Master Security Descriptor (list of permissions) Every 60 minutes, LSASS applies these permissions to protected users Checks: Which groups/users are protected? ACL template has been changed? Let s try to find it using Microsoft-provided tools: AD explorer & Powershell Univershell
16 AdminSDHolder
17 Backdoor 2 (AdminSDHolder) hunting using PowerShell Univershell
18 Backdoor 2 (AdminSDHolder) hunting using AD Explorer Problems AdminSDHolder ACEs have been changed: Raven account has been added Univershell
19 How can I proceed? Currently Manual checks using a GUI is inefficient Powershell requires one-shot commands for each control; little re-use Online tools need admins credential over network connection Wishlist for a perfect tool Do multiple checks on several objects Easy way to identify bad practices Help to clean up regularly Find anomalies or backdoors So, we decided to develop a tool that will help us and find backdoors in AD. Univershell
20 BTA: an open source framework to analyze Active Directory State of the project No Logo! No Press release! No fees for use! But Functional and tested in real life :) Could help you to improve your AD security! = Why? Univershell
21 Summary 1 Intro Context Some backdoors Needs 2 BTA Introduction Backdoors Hunting 3 BTA in practice 4 Feedback Univershell
22 BTA BTA Airbus {Group {CERT Innovations} DS CyberSecurity} Open Source (GPLv2) BTA can help solve the following issues: Quick access, without filtering, to all Active Directory data Works offline Set of controls points ( exploratory tool) Determinism Periodic review of AD (reproductibility) Modularity Univershell
23 Global view of BTA operation BTA architecture, global view extraction btaimport AD ntds.dit DB Report miners btaimport NTDS.dit Mongo + postprocessing btamanage Manage imported NTDS bases btaminer Call miners btadiff Diff between two states of imported AD Univershell
24 Import Overview of MongoDB data: a field of datatable { "cn" : "ACS-Enable-ACS-Service", "ldapdisplayname" : "acsenableacsservice", "name" : "ACS-Enable-ACS-Service", "admindescription" : "ACS-Enable-ACS-Service", "admindisplayname" : "ACS-Enable-ACS-Service", "isvisibleinab" : 42, "objectclass" : [ , ], "schemaidguid" : "7f d1-a9c5-0000f80367c1", "objectguid" : "925af73d-e447-40c b5a8603fb49f", "time_col" : ISODate(" T18:37:08Z"), "distinguishedname" : 23, "systemflags" : 16, "attributeid" : , "ntsecuritydescriptor" : 7, "cnt_col" : 1, "RDNtyp_col" : 3, "attributesyntax" : , "issinglevalued" : 1, "showinadvancedviewonly" : 1, "instancetype" : 4, "DNT_col" : 23, "omsyntax" : 1, "OBJ_col" : 1, "usncreated" : 15, "recycle_time_col" : NumberLong(" "), "whencreated" : ISODate(" T18:37:08Z"), "replpropertymetadata" : BinData(0,"AQAAAAAAAAATAAAAAAAAAAAAAAABAAAAC+mLCAMAAAAvmvLtKEtaQqTKmYSWdi8vDwAAAAAAAAAPAAAAAAAAAAM... "whenchanged" : ISODate(" T18:37:08Z"), "PDNT_col" : 1811, "objectcategory" : 14, "Ancestors_col" : BinData(0,"AgAAAPsGAAD8BgAA/QYAABMHAAAXAAAA"), "NCDNT_col" : 1811, "usnchanged" : 15 } Univershell
25 Backdoor 1: Domain Admins ListGroup miner $ btaminer -t ReST -C ::mabase ListGroup --match "Domain Admins" Name Deletion Flags Recursive +======================================+====================================+===============+ xavier normalaccount, dontexpirepassword srv-grp-admin svc-mcafee :10:11 normalaccount, accountdisable svc-oracle normalaccount, dontexpirepassword Sqladmin :45:04 normalaccount, dontexpirepassword svc-security normalaccount, accountdisable Results: in 10s All accounts are listed recursively Deletion information is provided by link_table with a retention of 180 days Sqladmin has been removed at a supicious time! Easier than with MS tools Univershell
26 Backdoor 1: Domain Admins ListGroup miner $ btaminer -C::snktest -t ReST ListGroup --match "Admins du domaine" Analysis by miner [ListGroup] ============================= List of groups matching [Admins du domaine] Group Admins du domaine sid = S guid = 8bff35e5-87ff-4d9f-b adf32cdd9 dn =.intra.secu.labz.users.admins du domaine +====================+==========+===============+===========+ snorky normalaccount Administrateur normalaccount User snorky (S ) Trustee Member ACE Type Object type +===================+=========+=====================+=======================+ Admins du domaine snorky AccessAllowedObject (none) [...] Everyone snorky AccessAllowedObject User-Change-Password Jean Dupond snorky AccessAllowedObject (none) = Self snorky AccessAllowedObject User-Change-Password Self snorky AccessAllowedObject Private-Information Admins du domaine snorky AccessAllowed (none) Administrateurs snorky AccessAllowed (none) System snorky AccessAllowed (none) Everyone snorky SystemAudit (none) Everyone snorky SystemAuditObject GP-Link Everyone snorky SystemAuditObject GP-Options
27 Backdoor 2: AdminSDHolder List objects protected by AdminSDHolder $ btaminer -C::snktest SDProp --list Analysis by miner: [SDProp] =========================== cn type SID +==============================+=======+===============================================+ Account Operators Group S Administrators Group S Backup Operators Group S Domain Admins Group S Domain Controllers Group S Print Operators Group S Read-only Domain Controllers Group S Replicator Group S Server Operators Group S Administrator User S da5id User S Hiro Protagonist User S krbtgt User S raven User S <== snorky User S
28 Backdoor 2: AdminSDHolder Check ACEs linked to AdminSDHolder $ btaminer -C ::snktest SDProp --checkace Analysis by miner: [SDProp] =========================== cn type SID +====================================+=====================+===================================+ Administrators AccessAllowed ALL Authenticated Users AccessAllowed ALL Cert Publishers AccessAllowedObject X509-Cert Domain Admins AccessAllowed ALL Enterprise Admins AccessAllowed ALL Everyone AccessAllowedObject User-Change-Password Everyone SystemAudit ALL Everyone SystemAuditObject Organizational-Unit Everyone SystemAuditObject Organizational-Unit Pre-Windows 2000 Compatible Access AccessAllowed ALL raven AccessAllowedObject Group <== Self AccessAllowedObject User-Change-Password Self AccessAllowedObject Private-Information System AccessAllowed ALL Terminal Server License Servers AccessAllowedObject Terminal-Server Terminal Server License Servers AccessAllowedObject Terminal-Server-License-Server Windows Authorization Access Group AccessAllowedObject Token-Groups-Global-And-Universal
29 Summary 1 Intro Context Some backdoors Needs 2 BTA Introduction Backdoors Hunting 3 BTA in practice 4 Feedback Univershell
30 The main stages NTDS.dit file domain controller extraction Via ntdsutil under 2008 infrastructure Via vssadmin under 2003 infrastructure Import of NTDS.dit file btaimport is responsible for importing the data into mongodb database Preprocessing of basic data and adding new collections Queries execution in base and correlation of results btaminer allows querying the data in base Check results with an Active Directory administrator Univershell
31 Miners List of miners $ btaminer -h usage: btaminer [-h] [-C CNX] [-B mongo,ldap] [ force-consistency] [ live-output] [-t csvzip,excel,rest] [-o FILENAME] [-e ENCODING] [ ignore-version-mismatch] [ module MODULE]... positional arguments: [...] [...] Audit_UAC Audit_Schema Domains DNGrep DNTree ListACE CanCreate Miners Run all analyses on User Account Control Run all analyses on schemas Display Informations about domains DN grepper DN Tree List ACE matching criteria This miner list all user who possess the right to create or delete objects Univershell
32 Report Example: Excel output btaminer -C ::mabase -t excel -o my_report.xlsx Audit_Full Univershell
33 Some control points btaminer Check extended rights btaminer -C ::snktest ListACE type d-11d0-a768-00aa006e0529 List accounts which never logged on Active Directory btaminer -C ::snktest passwords never-logged List accounts which have not authenticated on AD since 6 months btaminer -C ::snktest passwords last-logon 182 Number of unsuccessful login attempts per account btaminer -C ::snktest passwords bad-password-count List accounts which have a specific UserAccountControl flag btaminer -C ::snktest CheckUAC check passwdcantchange Univershell
34 SIDhistory control points Exploiting the SIDHistory attribute Modify SIDHistory attribute in order to elevate its privileges. Control the Forest from a domain via Enterprise Admin SID. Check SIDHistory attribute $ btaminer -C::snktest SIDHistory --list RESA, Micheline S GAUCI, Sandro S VIGNON, Georgette S ABOUHALI, Mouad S BIONDI, Philippe S Sqladmin S <=== RIGO, Raphael S
35 Control extended rights ListACE miner Objectives List users which have specific extended rights: User-Force-Change-Password (type d-11d0-a768-00aa006e0529) Self-Membership (type bf9679c0-0de6-11d0-a285-00aa003049e2)... btaminer ListACE $ btaminer -C::snktest -t ReST ListACE \ --type d-11d0-a768-00aa006e0529 Analysis by miner [ListACE] =========================== Trustee Subjects Object type +=============+================+============================+ jean dupond Administrateur User-Force-Change-Password Univershell
36 Miners miner: passwords $ btaminer -t ReST -C ::mabase passwords --never-logged Analysis by miner: [passwords] ============================== // // name \\ \\ useraccountcontrol +===================//=============+======================//===============+======================+ guest \\ GUEST of labz (s-1-5-\\ accountdisable:true intru // intru (s // accountdisable:false krbtgt \\ KRBTGT of labz (s-1-5\\ accountdisable:true SystemMailbox{1f05//7} SystemMailbox{1f05a92//121) accountdisable:true SystemMailbox{e0dc\\9} SystemMailbox{e0dc1c2\\122) accountdisable:true DiscoverySearchMai//E09334BB852} DiscoverySearchMailbo// ) accountdisable:true Federated .4c1\\42 Federated .4c1f4d\\125) accountdisable:true auditor // auditor (s // accountdisable:false \\ \\ Univershell
37 Check collected informations Exchange with Active Directory teams Active Directory system is lively daily changes Review elements with AD administrators could explain some bad practices Univershell
38 Differential between two instances of AD Differential with btadiff Allows to compare AD at two points in time = Allows to monitor an objet in time = Allows to check suspicious changes $ btadiff --CA ::clean --CB ::backdoor1 --ignore-defaults =============== Starting diffing sd_table AB, 101: [] *sd_refcount[ 14 => 15 ] AB, 108: [] *sd_refcount[ 39 => 41 ] A, 229: [] A, 372: [] AB, 423: [] *sd_refcount[ 3 => 2 ] B, 424: [] B, 425: [] B, 428: [] Table [sd_table]: 160 records checked, 2 disappeared, 3 appeared, 3 changed Univershell ===============
39 Differential between two instances of AD datatable =============== Starting diffing datatable AB, 3586: [DC001] *logoncount[ 116 => 117 ], *lastlogon[ datetime.datetime(20 => datetime.datetime(20 ] AB, 3639: [RID Set] *ridnextrid[ 1153 => 1154 ] AB, 8784: [A:[gc]/B:[gc DEL:346bf ac15-79ec4b42b270]] -showinadvancedviewonly, -objectcategory, +lastknownparent, +isrecycled, +isdeleted, *name["u gc "=>"u gc\\ndel:346bf199-8"], *dc["u gc "=>"u gc\\ndel:346bf199-8"] AB, 8785: [A:[DomainDnsZones]/B:[DomainDnsZones DEL:58b2962b-708c-4c93-99ff-0b7e163131f9]] -showinadvancedviewonly, -objectcategory, +lastknownparent, +isrecycled, +isdeleted, *name["u DomainDnsZones "=>"u DomainDnsZones\\nDE"], *dc["u DomainDnsZones "=>"u DomainDnsZones\\nDE"] AB, 8786: [A:[ForestDnsZones]/B:[ForestDnsZones DEL:87f7d8a2-4d05-48d ab ]] -showinadvancedviewonly, -objectcategory, +lastknownparent, +isrecycled, +isdeleted, *name["u ForestDnsZones "=>"u ForestDnsZones\\nDE"], *dc["u ForestDnsZones "=>"u ForestDnsZones\\nDE"] B, 8789: [snorky insomnihack] B, 8790: [gc] B, 8791: [DomainDnsZones] B, 8792: [ForestDnsZones] Table [datatable]: 7636 records checked, 0 disappeared, 4 appeared, 5 changed ===============
40 Summary 1 Intro Context Some backdoors Needs 2 BTA Introduction Backdoors Hunting 3 BTA in practice 4 Feedback Univershell
41 Hardware requirements Computer for analysis it could be run on a good laptop Xeon 3GHz 4 cores 12GB RAM SSD drive Import performance 8 GB NTDS base ( Objects / ACEs) Imported in MongoDB: 26 GB 8h30 Analysis performance Generally negligible time analysis Univershell
42 Problems encountered in real life NTDS.dit import Bad extraction of NTDS.dit file Extraction methodology provided not followed by administrators Consistency of objects Objects always referenced in an ACE but not anymore present in AD Migrating a French language environment to English Univershell
43 Audit results Feedback from the field After receiving the NTDS.dit file, the auditor is autonomous - little interaction is required Once the NTDS.dit file has been provided Organizations work in different ways; the auditor has to adapt to each AD s peculiarities Unable to prejudge the rightness/legitimacy of assigned rights in AD = it is important to check information with administrators Univershell
44 Audit results Common results between different audits Often bad practices Too many generic admin accounts Many accounts whose password never expires... Lack of homogeneity on creation templates, e.g.: user... Active accounts that have never been used Univershell
45 Conclusion BTA Provides in time constrained deterministic results Helps to cleanup AD bad practices Allow a recurring audit reproducibility comparing results of 2 audits Next developments LDAP acces Unit tests on miners Improved differential analysis Univershell
46 Thanks for your attention Questions???? Don t forget it is open source Greetings Joachim Metz for the awesome Libesedb Of course Philippe Biondi for lots of things Xavier & Raphael for their reviews My Wife and my kids :) Univershell
ACTIVE DIRECTORY BACKDOORS: Myth or Reality BTA: an open source framework to analyse AD
ACTIVE DIRECTORY BACKDOORS: Myth or Reality BTA: an open source framework to analyse AD Philippe Biondi, Joffrey Czarny Airbus Group Innovations BlackHat Arsenal 2015-08-06 Summary 1 Intro Context Some
Microsoft Virtual Labs. Active Directory New User Interface
Microsoft Virtual Labs Active Directory New User Interface 2 Active Directory New User Interface Table of Contents Active Directory New User Interface... 3 Exercise 1 User Management and Saved Queries...4
How to Audit the 5 Most Important Active Directory Changes
How to Audit the 5 Most Important Active Directory Changes www.netwrix.com Toll-free: 888.638.9749 Table of Contents Introduction #1 Group Membership Changes #2 Group Policy Changes #3 AD Permission Changes
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Published: June 02, 2011 Language(s): English Audience(s): IT Professionals Level: 200
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store Mike Middleton Justin Prosco Mandiant, A FireEye Company Mike Middleton Principal Consultant Joined
CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR
CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use
6425C - Windows Server 2008 R2 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425C Course Length: 5 Days Course Overview This five-day course provides in-depth training on implementing,
Delegate Resolver. Delegate Resolver? How it works. Priasoft
Delegate Resolver Priasoft Delegate Resolver? What is the Delegate Resolver? Priasoft provides a utility that can restore folder delegates in a user's mailbox and can restore Sendon-Behalf-Of rights. Outlook
How To Understand The History Of Anntds.Dntd.Dt.Dotnetdt Database On A Pc Or Macbook (Windows) With A Password Key (For A Macbook) And Password History (For Annt
Active Directory Offline Hash Dump and Forensic Analysis Csaba Barta [email protected] July 2011 Disclaimer The views, opinions and thoughts in this document are the views, opinions and thoughts of
Active Directory Objectives
Exam Objectives Active Directory Objectives Exam 70 640: TS: Windows Server 2008 Active Directory, Configuring This certification exam measures your ability to manage Windows Server 2008 Active Directory
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials
Configuring and Troubleshooting Windows 2008 Active Directory Domain Services
About this Course Configuring and Troubleshooting Windows This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting Active Directory Domain
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Active Directory About this Course This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting (AD DS) in and R2 environments. It covers core
Dell Recovery Manager for Active Directory 8.6. Deployment Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
www.etidaho.com (208) 327-0768 Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 5 Days About this Course This five-day instructor-led course provides in-depth
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Outline Module 1: Introducing Active Directory Domain Services This module provides
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course Code: M6425 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Overview This five-day instructor-led course
Outline SSC6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory
Outline SSC6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory About this Course This two day instructor led course is an extract from the official five day 6425 course from Microsoft.
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Domain Services Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 02 June 2011 200 Windows
Active Directory Restoration
Active Directory Restoration This document outlines the steps required to recover an Active Directory Infrastructure, running on Windows 2003 R2 Server Standard. The scope of this document covers the scenario
FastPass Password Manager Version 3.5.1
FastPass Password Manager Version 3.5.1 Document Title Delegating permissions in Active Directory Document Classification Confidential Document Revision B Document Status Final Document Date August 21,
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Course Outline Module 1: Introducing Active Directory Domain Services This module provides an overview of Active Directory
6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Code: Duration: Notes: 6425C 5 days This course syllabus should be used to determine whether
NTDS.DIT Forensics. Csaba Barta [email protected] http://www.csababarta.com. December 2011
NTDS.DIT Forensics Csaba Barta [email protected] http://www.csababarta.com December 2011 For the current version of this document visit www.csababarta.com Disclaimer The views, opinions and thoughts
How the Active Directory Installation Wizard Works
How the Active Directory Installation Wizard Works - Directory Services: Windows Serv... Page 1 of 18 How the Active Directory Installation Wizard Works In this section Active Directory Installation Wizard
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Five Days, Instructor-Led About this course This five-day instructor-led course provides in-depth training
Understanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
Microsoft. Jump Start. M11: Implementing Active Directory Domain Services
Microsoft Jump Start M11: Implementing Active Directory Domain Services Rick Claus Technical Evangelist Microsoft Ed Liberman Technical Trainer Train Signal Jump Start Target Agenda Day One Day 1 Day 2
How to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Step by Step Guide to Deploy Microsoft LAPS
Step by Step Guide to Deploy Microsoft LAPS In this document I will show you step by step method to deploy Microsoft LAPS. The Local Administrator Password Solution (LAPS) provides management of local
EPM Performance Suite Profitability Administration & Security Guide
BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects
QAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training
QAD Enterprise Applications Training Guide Demand Management 6.1 Technical Training 70-3248-6.1 QAD Enterprise Applications February 2012 This document contains proprietary information that is protected
70-640 R4: Configuring Windows Server 2008 Active Directory
70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity
Table of Contents Introduction... 2 Azure ADSync Requirements/Prerequisites:... 2 Software Requirements... 2 Hardware Requirements...
Table of Contents Introduction... 2 Azure ADSync Requirements/Prerequisites:... 2 Software Requirements... 2 Hardware Requirements... 2 Service Accounts for Azure AD Sync Tool... 3 On Premises Service
Course 6425C: Five days
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Five
NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0
NetIQ Advanced Authentication Framework Maintenance Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Purposes of Maintenance 3 Difficulties of Maintenance
Table of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...
Table of Contents WELCOME TO ADAUDIT PLUS... 3 Release Notes... 4 Contact ZOHO Corp.... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... 8 System Requirements... 9 Installing ADAudit Plus... 10 Working
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines
Module 4. Managing Groups. Contents: Lesson 1: Overview of Groups 4-3. Lesson 2: Administer Groups 4-24. Lab A: Administer Groups 4-36
Managing Groups 4-1 Module 4 Managing Groups Contents: Lesson 1: Overview of Groups 4-3 Lesson 2: Administer Groups 4-24 Lab A: Administer Groups 4-36 Lesson 3: Best Practices for Group Management 4-41
Security Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
Setup and configuration for Intelicode. SQL Server Express
Setup and configuration for Intelicode SQL Server Express Due to overwhelming demand and the increased load on support, we are providing a complete SQL Server installation walkthrough document. SQL Server
Windows Logging Configuration: Audit Policy Configuration
Windows Logging Configuration: Audit Policy Configuration Windows Auditing Windows audit policy requires computer level and in some cases object level configuration. At the computer level, Windows has
Designing a Windows Server 2008 Active Directory Infrastructure and Services
Designing a Windows Server 2008 Active Directory Infrastructure and Services Course No. 6436 5 Days Instructor-led, Hands-on Introduction At the end of this five-day course, students will learn how to
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Windows Server 2003 Logon Scripts Paul Flynn
Creating logon scripts You can use logon scripts to assign tasks that will be performed when a user logs on to a particular computer. The scripts can carry out operating system commands, set system environment
Central Security Server
Central Security Server Installation and Administration Guide Release 12.3 Please direct questions about {Compuware Product} or comments on this document to: Customer Support https://community.compuwareapm.com/community/display/support
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Active Directory Disaster Recovery Workshop. Lab Manual Revision 1.7
Active Directory Disaster Recovery Workshop Lab Manual Revision 1.7 Table of Contents LAB 1: Introduction to the Lab Environment... 1 Goals... 1 Introduction... 1 Exercise 1: Inspect the Lab Environment...
Active Directory Friday: All Articles. Jaap Brasser
Active Directory Friday: All Articles Jaap Brasser Content Creating Active Directory groups using PowerShell... 3 Determine the forest functional level... 5 Find empty Organizational Unit... 6 Use the
Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles
Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To
How To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D
1 of 8 2/6/2012 8:52 AM Home OpenFire XMPP (Jabber) Server OpenFire Active Directory LDAP integration Sat, 01/05/2010-09:49 uvigii Contents 1. Scenario 2. A brief introduction to LDAP protocol 3. Configure
Dell Recovery Manager for Active Directory 8.6.0
Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Table of Contents SQL Server Option
Table of Contents SQL Server Option STEP 1 Install BPMS 1 STEP 2a New Customers with SQL Server Database 2 STEP 2b Restore SQL DB Upsized by BPMS Support 6 STEP 2c - Run the "Check Dates" Utility 7 STEP
Modular Messaging. Release 3.0 / 3.1. Diminished Permissions for Exchange.
Modular Messaging Release 3.0 / 3.1 Diminished Permissions for Exchange. Issue 1 March 2007 2006-2007 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Active Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425B Course Length: 5 Days Course Overview This five-day course provides to teach Active Directory Technology
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Enterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: [email protected] Online Support: [email protected] 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services About this Course This five-day instructor-led course provides to teach Active Directory Technology Specialists
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin
Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin Purpose of document The purpose of this document is to assist users in reset their USD passwords
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
Installation Guide: Migrating Report~Pro v18
Introduction... 2 Overview... 2 System Requirements... 3 Hardware Requirements... 3 Software Requirements... 3 Assumptions... 4 Notes... 4 Installation Package Download... 5 Package Contents... 5 Pre-Installation
JiJi Active Directory Reports 4.0 1. JiJi Active Directory Reports User Manual
JiJi Active Directory Reports 4.0 1 JiJi Active Directory Reports User Manual JiJi Active Directory Reports 4.0 2 Table of Contents 1.Introduction...7 2.Benefits of Active Directory Reports...7 3.Features...7
What s New Guide. Active Administrator 6.0
What s New Guide Active Administrator 6.0 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
ITCertMaster. http://www.itcertmaster.com. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!
ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com IT Certification Guaranteed, The Easy Way! Exam : 070-640 Title : Windows Server 2008 Active Directory. Configuring
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Client User's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 NetIQ Advanced Authentication Framework Overview
Installing, Configuring, and Managing a Microsoft Active Directory
Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing
Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
About Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell
Pass-the-Hash II: Admin s Revenge Skip Duckwall & Chris Campbell Do you know who I am? Skip Co-presented PTH talk last year at BH, Derbycon http://passing-the-hash.blogspot.com @passingthehash on twitter
70-412: Configuring Advanced Windows Server 2012 Services
70-412: Configuring Advanced Windows Server 2012 Services Course Overview This course provides students with the knowledge and skills to utilize Network Services, High Availability, Hyper-V and High Availability,
Requirements & Install. Module 2 Single Engine Installation
Requirements & Install Module 2 Single Engine Installation Requirements Requirement Minimum Optimum Processor Intel Core 2 @ 2GHz Dual Processor Xeon 3.0 GHz Memory 2 GB RAM 8 GB RAM Disk Space 2 GB 5GB
Active Directory Forest Recovery
Active Directory Forest Recovery Contents 1. Introduction 2. Active Directory Components 3. Possible Active Directory Disasters 4. Recovery of User, Group and Organization Unit a. Authoritative Restore
Windows.NET Beta 3 Active Directory New Features
Windows.NET Beta 3 Active Directory New Features Wolfgang Werner Compaq Decus Bonn 2002 Agenda Install Replica from Media Domain Controller Rename Domain Rename Universal Group Membership Caching Linked
Windows Server 2012 / Windows 8 Audit Fundamentals
Windows Server 2012 / Windows 8 Audit Fundamentals Jacksonville ISACA Chapter May 17, Speaker Introduction: Timothy P. McAliley 13+ years in IT Currently work for Microsoft Premier Field Engineer SQL Server,
Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide
Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey
Troubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
Administrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
Dell InTrust 11.0 Best Practices Report Pack
Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File
Virto Password Reset Web Part for SharePoint. Release 3.1.0. Installation and User Guide
Virto Password Reset Web Part for SharePoint Release 3.1.0 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 3 OPERATING SYSTEM... 3 SERVER... 3 BROWSER... 4 INSTALLATION...
