Securing. Active. Directory. Your. Five Key Lessons to. Chapters. Sponsored by: 1. Perform a Self-Audit
|
|
|
- Anne Parrish
- 10 years ago
- Views:
Transcription
1 Five Key Lessons to Securing Your Active Directory Chapters Roberta Bragg MCSE, CISSP, Author, Columnist, Speaker, Consultant 1. Perform a Self-Audit 2. Know and Use Security Tools and Techniques 3. Monitor Active Directory Operations 4. Leverage People and Processes 5. Active Directory Security Maintenance Sponsored by:
2
3 CONTENTS INTRODUCTION...5 WHO SHOULD READ THIS BOOK...6 CHAPTER 1: PERFORM A SELF-AUDIT...7 FIRST, LOOK IN THE MIRROR...8 YOU CAN CHANGE THINGS, SHOULD YOU?...10 PERFORM THE AUDIT...12 STEP 1: DOCUMENT YOUR INFRASTRUCTURE STEP 2: CHECK PHYSICAL SECURITY FOR DOMAIN CONTROLLERS STEP 3: CHECK ACTIVE DIRECTORY HEALTH Check Connectivity Evaluate DNS Operation Evaluate DNS Security Evaluate Time Services Operation Evaluate AD Replication Evaluate FRS Replication STEP 4: EVALUATE AD INFRASTRUCTURE DESIGN Examine Security Boundaries STEP 5: EXAMINE NETWORK INFRASTRUCTURE DESIGN AND DEFENSE Review Network Design Review Intrusion Detection and Response STEP 6: EXAMINE ADMINISTRATIVE ROLES AND STRUCTURES Review Default Administrative Groups Evaluate Delegated Permissions on AD Objects Evaluate Group Policy Administration Secure Administrative Workstations Secure Administrative Access Evaluate the Security of Administrative Communications between Workstations and DCs Evaluate Administrative Practices Evaluate Management of Administrative Tools STEP 7: EXAMINE GROUP POLICY DETAILS Check GPO Files and AD Records Evaluate Policy Application STEP 8: REVIEW TECHNICAL CONTROLS Evaluate the Domain Security Policy Evaluate the DC Security Policy Review Audit Policy...35 Review User Rights on DCs Evaluate Security Options Evaluate Services Evaluate Event Log Settings Evaluate EFS STEP 9: EVALUATE FILE AND REGISTRY PERMISSIONS ON DCS STEP 10: REVIEW PROTECTION FOR AD COMMUNICATIONS STEP 11: REVIEW MAINTENANCE PROCEDURES Review Logging Configuration and Management Review Change Management Procedures Review Security Patch Processing Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 3
4 STEP 12: REVIEW NON-TECHNICAL CONTROLS...45 Review Security Policy...45 Evaluate User Security Awareness...46 Evaluate Policy and Procedure for DC Administration...46 Review Business Continuity/Disaster Recovery Plans...47 SUMMARY SELF-AUDIT CHECKLIST ABOUT QUEST WINDOWS MANAGEMENT ABOUT QUEST SOFTWARE, INC Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
5 INTRODUCTION Active Directory (AD) is the backbone of a Windows Server 2003 or Windows 2000 Server domain infrastructure, providing a channel for security implementation and maintenance in the forest. Secure AD and you have advanced the protection of all forest elements. Ignoring AD security can put your entire infrastructure at risk. Securing AD, however, is not a trivial task. Many Windows security subsystems are integrated with it, and many of them can be used to secure it. The account database, Kerberos authentication protocol, password policy, definition of user rights and system controls, assignment of object permissions all are contained in or managed with AD. You must also consider the distribution of its elements and the nature of the people who interact with it. AD is not some entity that can be localized on a single machine but spans multiple computers and networks. It presents a broad attack surface and many threats must be evaluated. There are literally hundreds of steps that should be at least considered when designing, implementing, and maintaining AD security. This e-book can help you with that task. It consists of five lessons: Chapter 1: Perform a Self-audit A checklist to assist in determining current Active Directory security status. Chapter 2: Know and Use Security Tools and Techniques How tos with an emphasis on securing Active Directory. Chapter 3: Monitor Active Directory Operations How to monitor and improve Active Directory health. Chapter 4: Leverage People and Processes Training, awareness, security policy, accountability, physical security, and business continuity. Chapter 5: Active Directory Security Maintenance Auditing and monitoring, policy and process reviews. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 5
6 WHO SHOULD READ THIS BOOK The book should be used both as a checklist and tutorial. Lesson one, the checklist, is perhaps the hardest lesson. It is especially difficult since the other chapters will not be immediately available to you. Despite being the most difficult, it also provides an overview of the extensive work that must be done and the breadth and depth of knowledge needed to secure AD. To immediately benefit from this lesson, you should be an experienced AD administrator or experienced IT auditor with training in AD. If your Windows administration experience does not include responsibility for AD or if your IT auditor background does not include work in this area, you will either need to obtain help elsewhere or use the information in the other lessons to provide training. A year of experience in AD administration should be sufficient. Note that it is years of experience specifically with AD that s important here. Desktop and server administration experience, while important, will not provide the background needed to understand and answer the questions posed. If you are a security manager, programmer or student, this e-book can help you understand why and how AD must be secured. Use this chapter as a checklist of what else you need to know; use it as a discussion point with your peers and experienced AD administrators. Regardless of your level of experience, you will find information in upcoming lessons to aid you in securing AD. Because this is an e-book, future content is fluid. The first chapter is available now, but future lessons are still in the writing and production stage. If you have AD in your environment, you may have questions about securing it, comments about official hardening guides or a unique perspective on AD security. Here s your opportunity to shape future lessons by letting me know how I can help them meet your needs, and by sharing stories and opinions from your experiences. Write me at [email protected]. 6 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
7 CHAPTER 1: PERFORM A SELF-AUDIT Like many complex undertakings, the process of securing AD must be approached as a series of repetitive tasks steps that can be taken to continually improve the basic security posture and respond to changes in threats, knowledge, infrastructure and requirements. The first step in implementing AD security is an assessment of where you are today. This lesson provides the steps for that critique. Be aware that many of the steps and many questions needing answers require a background in AD, along with experience administering a Windows environment. I may also suggest the use of tools you are unfamiliar with or practices that you have no experience with. This information will be included in future lessons and references. It is also true that many items in this audit should be part of regular maintenance strategies or taken into consideration when designing an AD infrastructure. This document can help plan maintenance or review a proposed AD design. Keep in mind, though, that its purpose is to provide a checklist; it is not a primer on AD design, troubleshooting or maintenance. To use the checklist to make a complete assessment you may need to do more background work or obtain the advice and assistance of knowledgeable AD folks. If you are an IT auditor, you might use this checklist to prepare work papers and require others to provide answers to the technical questions posed. It is not meant, however, to be the only resource for properly auditing AD. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 7
8 FIRST, LOOK IN THE MIRROR When I was first writing about auditing Windows systems, the word audit meant, for many IT pros, a tax audit, or that rare and mysterious IT audit as performed by people in Oh, the horror of it suits. Now the word audit has come to mean any inspection of IT security by anyone. Penetration tests performed by IT admins or security consultants are now called audits. Walkthroughs of system configurations and the use of the Security Configuration and Analysis Tool to analyze security settings against a baseline template is called an audit. Auditing, some say, means turning on some switches in the Local Security Policy of the domain controller and collecting massive log files. I have even been told that we are not able to perform an IT audit because we are not CPAs and, therefore, not auditors. So what is an AD self-audit? It s not intrusive or disruptive like an actual attack, and it s not formal and independent like one done by IT auditors on your internal audit staff or financial auditors. An AD self-audit is an in-depth review done by the people who maintain or secure Active Directory. Its purposes are many: Ensure that activities and procedures conform to norms and criteria. (I.e., are you doing what information security experts believe is acceptable practice?) Apply a systematic, disciplined approach to evaluate current security measures. (Make sure everything is checked, and checked in a way to give the desired results.) Assess the adequacy of system controls. (Do the controls work? It s one thing to have a password policy; it s another to have one that actually enforces practices that result in passwords that are difficult if not impossible to crack, provides defense-in-depth, and uses a system that ensures even crackable passwords have little value due to their limited life.) Ensure compliance with established security policies and procedures. (Are rules being followed?) Recommend necessary changes in controls, policies, and procedures to meet security objectives. (A successful review finds something that can be corrected or done better.) 8 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
9 A self-audit is not a substitute for an independent audit by individuals with solid IT auditing credentials and solid AD technical credentials. It cannot pass as an audit of system controls as required by law for some organizations or as an audit that will fulfill some internal requirement. However, it will help you to determine the current status of your organization s AD security and decide on the steps needed to make it more secure. If you have not yet deployed AD, these self-audit steps can aid your planning people in how to include proper AD security processes from the beginning. Using this guide during development and doing a self-audit before going live will kick off your AD operation on much better security footing. Note A self-audit is not a troubleshooting exercise. But it may turn up problems, making it impossible to complete the audit. It is also impractical to perform all the steps covered on all domain controllers (DCs). Formal IT audits typically select relevant examples to audit, and you should, too. For example, it may be impractical to check connectivity for all DCs, but you can test representative DCs in different sites and domains, including DCs across the firewall from the current location and DCs in trust relationships. Several of the steps require more knowledge of DNS, Windows and AD than can be included here. Some of these things will be detailed in future lessons. Some will require previous knowledge, while others may necessitate hitting the books. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 9
10 YOU CAN CHANGE THINGS, SHOULD YOU? In a formal audit, an independent individual or team of individuals, possibly from outside your company, conduct the audit. Throughout the audit, they remain outsiders. They do not make changes to your systems or even directly access data. There are several necessary reasons for this detachment. It is felt that only an independent, removed review can provide the required objectivity. After all, an insider might seek to hide or distort the information, intentionally or not. Part of the review looks for any evidence of fraud. If insiders are used, they may be the perpetrators or blinded by their relationships with the people whose systems they are auditing, and therefore gloss over any evidence of a crime. Outsiders do not have administrative-level privileges on information systems and cannot change the environment they are auditing. There should be no chance that an auditor might be responsible for system configuration or data changes. The auditors ask questions and diligently research their information from reports and documents provided by the IT staff upon request. The auditor reports variances to and situations that do not meet, the current security policy, and recommends changes, but makes none personally. When conducting a self-audit, you are not an outsider looking in. You may have the access required to change things, and you are not looking to uncover fraud. Instead you want to check that everything is working, configured and deployed as specified in the organization s security policy, and that you haven t missed any opportunities to improve security. Before starting a self-audit, determine what the response will be to items that need fixing or changing. On the one hand it may seem foolish to not change something needing attention; on the other, the audit might never be completed if you stop to fix every problem or address every area of non-compliance. I suggest performing the audit and delegating changes and recommendations. For example, if you discover a problem with DNS, note it and turn it over to the people in charge of DNS. If, while checking the health of Group Policy, you discover a policy that is not being applied, turn it over to the person in charge of that GPO. 10 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
11 However, if you are the one responsible in these areas you must determine if the problem requires immediate attention. If the DNS issue you discover is preventing all Group Policy processing, then stop auditing and start fixing. If a specific GPO is not being applied and that GPO is the domain GPO, stop auditing and find the problem. If your settings are out of compliance and you know that compliance causes no operational problems, you may want to correct them. If the issues are less important for example, you don t know what a malfunctioning GPO does, I d continue the audit and make a list of things to do. If your network and AD operations are well-run to begin with, you re probably not going to turn up horrendous operational problems during the audit. The audit is not meant to discover or troubleshoot operational issues, but instead to identify whether security is being done as it should and where it might be improved. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 11
12 PERFORM THE AUDIT To perform the audit, complete the following steps. Answer the questions as best you can. You may find it more convenient to change the order of the steps. Begin by making sure you have a copy of your organization s security policy, and spend time up front documenting your AD infrastructure. Many questions may require this knowledge, and many may be based on standard best practices. You may want to add your security policy requirements for analysis or for comparison with this information. It is possible that your organization s policy and implementation provide better AD security in your environment, or that items considered best practices here cannot be implemented in your environment. Remember, an audit should end with recommendations for change, but change should be evaluated and approved. Step 1: Document Your Infrastructure In order to evaluate AD security, you have to know where DCs and clients are. This information will help you understand where you need to check connectivity and other infrastructure tasks. It will also help you complete your list of steps, in this section as well as others. After all, if you do not need to replicate AD over firewalls, it is not necessary to review the firewall configuration. Likewise, if there are trust relationships between domains in your forest and domains in another, you may want to schedule a meeting with the administrators of the other forest to determine their security postures and the impact on your ability to secure AD in your environment. You will not be able to check every aspect of every DC, site, or client. Traditionally, an auditor looks at representative examples and does not test every unique component. Although you may want to know everything about your network, it is better to go down the checklist on some systems than give up due to deadlines and be halfway down the list. 12 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
13 The documentation required for a self-audit should be part of your network documentation, and easy to obtain. If it is not, consider making that a point of change. This basic information about your AD infrastructure is critical; not just for a self-audit, but for maintaining your AD environment. You should have, at a minimum, the following information: The number and location of sites. Indicate number of users and IT staff at each site The number and names of all domains The location of all DCs by domain The Organizational Unit (OU) structure for each domain External trusts with domains in other forests Forest trusts Trust relationships with NT 4.0 domains Trust relationships with Kerberos realms Step 2: Check Physical Security for Domain Controllers Questions to answer relative to your environment: Are DCs at headquarters and divisions kept in a secured data center? Data centers provide protection from physical harm and limit access to systems. DCs can be further controlled by providing locked racks. Are DCs kept on protected network segments? DCs should be isolated from open areas of networks, yet quickly accessible to clients. Are cable closets protected? Connection points to the Internet or other networks should be kept behind locked doors, as should routers, switches, and other devices that define your network infrastructure. Keep cable closets locked, and do not allow network devices to share space in telephone cable rooms. The organization s network should not be accessible to telephone company employees. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 13
14 Are DCs at remote locations physically secured? Branch offices and other small locations do not need a data center, but any DCs placed there need to be physically secured. Steps that should be taken: They should be in a locked room or cabinet in an area free from dangers such as heat, fire, water and chemicals Smartcard, token and/or biometric authentication for logon should be required Remove floppy, CD-ROM or other removable drives Disable USB and serial ports Put hardware locks on cables and drives Place additional locks on the computer system unit Install alarms that warn of computer movement Are DCs protected from power failures? UPSs can prevent failures due to power fluctuations. Physically secure them. Is access to DCs restricted? A limited number of people should have access to the DC. Only those authorized to maintain hardware and those administrators approved as domain administrators should be allowed physical access to DCs. If your policy is to remotely administer servers, then the list of those approved for physical access should be smaller. Does a specific process for physical access and console access exist? Standard procedures can prevent attacks because everyone is alert to abnormal behavior. Standard procedures should also specify who, and exactly how, DCs are managed, ensuring the greatest security. 14 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
15 Step 3: Check Active Directory Health Check Connectivity AD is more than a static set of security configurations; it is in constant flux. Information changed at one DC replicates to all others; security settings are transferred to intended clients. Given the changing nature of this information, AD health can be quickly affected by many factors. For example, misconfiguring DNS can result in clients not being able to find DCs and replication partners unable to find each other. Weakening permissions on AD objects or providing untrustworthy people administrative rights makes AD vulnerable to misconfiguration, accidental destruction and attack. If AD is sick, your network-wide security subsystem is sick. Start your self-audit by determining AD s health. A good place to start your examination is with network functionality, including connectivity, communications and especially DNS. Many AD or Group Policy problems are rooted in DNS errors. Next, look at DC replication and file replication along with Group Policy operation. There are many tools and many processes that need to be done to fulfill these tasks. If you know how these tools work and how to check common configuration settings, proceed with the audit. If you are an IT auditor, you should ask authorized administrators to provide the answers to these questions. Information on how to check configuration settings and use the tools described will be provided in Chapters 2 and 3. DCs must connect to replication partners to update account information and changes to security settings. Clients, including computers used to administer DCs, must also have connectivity to apply security changes. If security changes can t replicate, security can t be enforced. Netdiag can test DC/DNS connectivity, and DNSLint can test connectivity between replication partners. Does connectivity exist between clients and DCs? Use netdiag to test client-to-dc/dns connectivity. Does connectivity exist between replication partners? Use DNSLint to determine if SRV records for replication are present. If SRV records are absent, DCs may not be able to find their replication partners. Don t forget to check connectivity between replication partners across firewalls. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 15
16 Is connectivity available for domains in trust relationships? Use nltest to test trust relationships. Are directory service and file replication event logs scanned for errors? Evaluate DNS Operation Windows event logs should be periodically scanned for connectivity errors. DNS is used by clients to find DCs and by DCs to find replication partners. Problems with DC operations can spell big problems with security and often indicate DNS problems. Conversely, problems discovered with DNS may eventually cause problems with DCs, AD replication, and client connectivity. Evaluate DNS Security Are DNS configuration and response issues periodically checked? DNSLint can be used to detect problems with DNS. DNSLint is described in a Microsoft Knowledge Base (KB) article, which also provides a download link. DNSLint will expose DNS configuration issues and whether or not DNS servers are responding. If DNS issues are present, they may affect both AD s operation and network security. Use Portqry to detect DNS availability. NSLookup can be used to test DNS functioning. (Note that NSLookup works by doing a zone transfer. You should be restricting zone transfers, so this will only work if done from a DNS server with zone transfer rights to the DNS server you are testing.) Given AD s dependence on DNS, it s easy to see why you should be concerned with DNS security. Are zone transfers restricted to approved secondary DNS servers? Check zone transfers through manual inspection of DNS configuration. Use NSLookup to test it. (Many of NSLookup s features will not work without zone transfer. If used from a machine not approved for zone transfers, NSLookup should fail.) Is the DNS cache secured against cache pollution? By default, the DNS server is secured against cache pollution, which happens when incorrect addresses are added to the DNS server cache. The server may then redirect clients to the wrong computers. 16 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
17 Is DNS integrated with AD? Integrating DNS with AD secures changes to IP addresses. DNS information is replicated with AD and encrypted by default. Mutual authentication of DCs is always used, securing transfers of zone information. Are secure dynamic updates configured? Secure dynamic updates, available with AD-integrated DNS, can protect DNS from rogue computers attempting to change IP address information in the DNS zone. Are external and internal DNS services separated? Internal DNS information should not be available to the outside world. A separate DNS implementation can provide records for Internet-facing systems such as Web and messaging servers. Are requests for zone delegation carefully reviewed? A zone delegation should never be approved until you can ensure the DNS server will be properly hardened and maintained. Are backups of zone information kept? Backups of zone information can restore DNS in the event of data loss. Evaluate Time Services Operation All systems should keep the same time. There are two major reasons for this. First, if time is out of synch that is, if the time on an AD client differs from the Key Distribution Center (KDC) by more than the time recorded in the Kerberos security policy any client request for authentication will be rejected, even if the credentials are okay. Second, the time stamp in the logs needs to be correct. It is important to have a correct time on logs to assist in troubleshooting and forensic research. Should you need to present evidence of an intrusion, you must be able to provide proof of accurate time stamps. Is the root domain of the forest PDC Emulator configured to synchronize time with an external time server? The PDC Emulator is used as the source for time synch within the domain. If it is not properly configured, time will not be accurate throughout the domain. Is time synchronization periodically checked? If a client time is off by a large amount, automatic time synchronization cannot work. This may be a problem when new systems are added to the domain or when computer batteries are failing. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 17
18 Evaluate AD Replication If AD replication is not working correctly, Group Policy information will not be transferred between DCs. Are replication links working? Evaluate FRS Replication Use Replmon to examine replication and set up notification. This tool can help you determine if replication links are working and report on replication latency. The report will tell you if attempts to connect have been successful and provide statistics on any errors that have occurred. Replication latency is the time it takes to replicate changes. This is important because changes made to GPOs are not immediately available, since the information must be replicated. Group Policy data is stored partially in AD and partially in the SYSVOL folder. The file replication service (FRS) replicates the template files critical for the success of GPOs. Is FRS replication occurring normally? GPOtool can be used to test replication, as can sonar.exe and ultrasound.exe. Look for backlogs and other error conditions. Is there adequate space for FRS replication? Check the space available to the SYSVOL share. Are FRS event logs reviewed? FRS logs record replication failures and may provide a reason such as DNS lookup failures. 18 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
19 Step 4: Evaluate AD Infrastructure Design The details of your AD infrastructure can point to areas where additional security measures should be applied. Examine Security Boundaries Is isolation or autonomy required? Autonomy is the ability to delegate administration of some part of your user and computer populations without giving up the ability to take over management should it become necessary. Autonomy does not guarantee isolation, nor prevent the possibility that a rogue administrator might compromise a domain for which he has no authority. An Active Directory domain can provide autonomy. Within the forest, you can assign different administrators the ability to administer different domains. As long as they play by the rules, their authority within their domains is sacrosanct. However, domain administrators are not the only ones who can administer their domains. A special class of forest-wide administrators those with membership in the Enterprise Admins group has the ability to administer every domain in the forest. In addition, because domains in the forest are tightly integrated, all domain administrators have rights and permissions within AD they might abuse to grant themselves privileges within other domains. Domains are not isolated from each other and are not security boundaries. Isolation is the ability to prevent this type of crossadministration. The forest provides isolation, so an administrator in forest A cannot administer forest B unless explicitly granted privileges in that forest. The security boundary is the forest, not the domain. Isolation is only provided through separate forests. Of course, in either case, your organization may be vulnerable to attacks, but isolation provides a security boundary. Situations that might require isolation include: Financial institutions Military and government operations International organizations spanning multiple countries Extranets Demilitarized zones (DMZs) Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 19
20 Are extranet domains in separate forests? Extranets are created to provide spaces to share resources with partners and should be isolated from your organization s AD. Are external trusts appropriate? The reasons for external trusts should be evaluated and their setup reviewed. External trusts are often established to provide access for users in a domain in one forest to domain resources in another. Your review should question whether this is still necessary; whether it is legitimate; whether it meets your security policy; whether the risk is acceptable; and if the trust is correctly configured. Lesson 5 provides more information. Is SID filtering used by a trusting domain in an external trust? Security Identifier (SID) spoofing (a difficult process) might be used to gain unauthorized access within a trusting domain by users in the trusted domain. SID filtering can be used to block this. If isolation is required, is it enforced? When isolation is required, a separate forest is also required. Is autonomy provided if needed? The AD domain provides autonomy. Different domains within the forest can be run by different administrators. OUs can provide some autonomy within the domain structure, since administrative ability can be delegated for OUs. Is access for partner networks secured? If partner access is provided, it should be secured by creating an extranet and placing it in a separate forest. A trust relationship can be established between a domain(s) in the extranet forest and a domain(s) in the internal forest. 20 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
21 Step 5: Examine Network Infrastructure Design and Defense AD does not function in isolation. Though the forest provides a security boundary, all its components sit on networks and use network infrastructure for communication. A properly-protected network increases AD security. A full review of network infrastructure security is beyond the scope of a self-audit, but some major issues should be reviewed. Review Network Design Is the current network infrastructure documented, including remote locations? Without a current record, you cannot properly evaluate controls. Is the network segmented into areas of trust? Areas of trust include untrusted networks such as the Internet; partner networks; wireless networks; and trusted networks such as the organization s LAN and remote locations. Even the organization s trusted networks should be segmented into areas of trustworthiness. Are gateway controls in place between network segments? Gateway controls include port filtering routers, firewalls, intrusion detection systems, anti-virus gateways, and so on. Are the right gateway controls in place in the right places? Start by considering the strength of controls between trusted and untrusted network segments. For example, modern, fullyloaded firewalls belong at this juncture, while a port-filtering router may be sufficient between trusted areas of the network. Are firewalls configured correctly for DC traffic? DC traffic, by default, requires the use of numerous ports. This is not good for AD security. There are alternatives, such as using IPSec or VPNs for DC communications over firewalls, or restricting the RPC ports used so as to reduce the number of ports open by necessity. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 21
22 Review Intrusion Detection and Response AD security is not complete without a way to detect intrusions and respond to them. Are intrusion detection systems (IDS) used? IDSs monitor networks and hosts. They include commercial and open-source tools as well as in-house log monitoring programs. Is training and dedicated staff supplied to tune and manage these systems? Without proper configuration and knowledgeable operation, IDS is worthless. Are intrusion detection and response teams present? Once an attack is detected, what happens next? Without a formal, organized approach, it becomes increasingly impossible to respond to, and recover from, attacks. Step 6: Examine Administrative Roles and Structures Reviewing the administrative structure of the forest and domain is important because it can strengthen or weaken your ability to secure AD. Just as it is not necessary to provide every user administrative rights on his desktop computer or in the domain, it is not necessary to make all IT administrators all-powerful in the forest or even in the domain. Review Default Administrative Groups Membership in default administrative groups should be reviewed. How many administrators are assigned to each default administrative group? Default administrative groups include Schema Admins, Enterprise Admins, Domain Admins in the forest root domain, and Domain Admins in other domains within the forest. Are there too many administrators? This is often not an easy question to answer. In a large environment, many administrators at each level are required to share the load. In a small environment, a few can handle the job. 22 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
23 Many organizations today report averages such as one support person per 100 or 150 users, but these numbers cannot be used as the only number in judging whether or not your organization has enough, or too many, administrators. First, the numbers may not include administrators who do not directly support users or maintain equipment. Second, it makes no distinction between support personnel who may have limited administrative privileges and those who are members of default administrative groups. You may have to develop historical information for your organization, and create your own numbers. Meanwhile, you should start reviewing administrative group membership by recording how many users have these privileges. It s obvious that 1,000 administrators are not needed to manage 1,000 desktop systems, and there s a problem if every one of your employees holds domain administration privileges. Is the Schema Admins group empty? Membership in Schema Admins is necessary in order to modify the AD schema. Schema modifications should not be undertaken lightly, and the schema should be protected from inadvertent modification. Leaving the Schema Admins group empty will prevent inadvertent changes, and can be used as a reminder to carefully consider and plan schema changes. If changes are planned, a trusted administrator can be added to the Schema Admins group for the duration of that part of the project. His account should then be removed. Is membership in Enterprise Admins restricted? Enterprise Admins have administrative authority throughout the forest. They have control over every domain, every member server and workstation, and every bit of data stored on them. They can bring your information systems, and hence your business, to utter ruin. Obviously, then, membership in this group should be restricted. Evaluate additional administrative roles? Default administrative groups are defined in the AD domain. In a large environment, the roles each group represents are not sufficient. Roles may be created by using custom groups and assigning them the necessary user rights and/or by using the Delegation of Control wizard. And example role might be OU administrator, a group given permission to create and manage user and computer accounts in a specific OU. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 23
24 Are administrative roles separated into service administration and data administration roles? Service administration roles manage infrastructure such as DNS, DCs and forest configuration such as creating domains and trusts. Service administrators also manage administrative users. Data administrative roles manage servers, desktops, groups, and non-administrative users. Separating these duties provides a more secure environment for AD, limiting those who might be able to weaken security measures and modify structures needed for AD to function. Are service administrator roles created in the forest root domain? Service administration is forest-level. A unique OU should be established in the forest root domain and service administration groups created there. Data administrators will not be able to manage these accounts because data administrators have no rights in the forest root domain. Are data administrator roles created in appropriate domain OUs? Data administrators manage domain-level data and therefore only need administrative rights in the domain or OU. Evaluate Delegated Permissions on AD Objects AD object permissions can be used to delegate administrative rights. Are AD permissions documented? The permissions granted on AD objects provide users with access and control beyond their user role. This information should be documented and reviewed. The command-line tool dsrevoke.exe can be used to document the AD object permissions granted to a specific user or group throughout a domain. Is the Delegation of Control wizard used to granularize administration? The ability to provide users just the administrative authority they need and no more is desirable. Help desk operators can be given the ability to reset all user passwords or just some users, without permission to reset administrators passwords or full administrative rights. 24 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
25 Are AD permissions granted to groups instead of users? Permissions should be granted to groups for ease of administration. New users can be given rights by adding them to a group. Accounts of users who leave the company or change roles within the company can be removed from the groups and will see their privileges change. Is the use of the Delegation of Control wizard restricted? The powerful Delegation of Control wizard can give users and groups permission on AD objects. These permissions can provide administrative authority to non-administrative users. It s a great tool to provide just the administrative ability required, without giving users rights and permissions they don t need. However, there are thousands of objects and each one has multiple permissions. It would not be hard to give the wrong user access beyond what s needed or to so granularize administration that you lose control. It is not wise to allow just any domain administrator the right to use the wizard. It is also not a good idea to delegate the right to change the administrative structure of a domain. Are AD object permissions correct for your organization s administrative model, and do they meet acceptable security standards? Document the delegation of AD object permissions and review them for correctness. They should meet the objectives of compliance with your security policy, the principals of separation of duties, and avoid giving excessive privileges. Chapter 2 will provide more information on evaluating and using AD permissions. Are legacy AD permissions revoked? When you uncover permissions no longer relevant, they should be removed; dsrevoke.exe is a good tool for that. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 25
26 Evaluate Group Policy Administration Those that can administer Group Policy can change security via AD. Is membership in the Group Policy Creator Owners group limited? Group Policy changes can harden or weaken AD security. The nuances of Group Policy and AD must be thoroughly understood. The role should be restricted to a subset of administrators. Limit membership in the Group Policy Creator Owners group to service administrators designated as administrators of security policy. Are data administrators prevented from having Full Control over their OUs? Full Control implies the ability to administer GPOs linked to the OU and any OUs in its hierarchy. This right should be restricted to a subset of data administrators. Secure Administrative Workstations Administrative workstations are used to administer all aspects of the AD environment. Leaving them unprotected weakens your ability to secure AD. Are administrative workstations physically secured? Physical security for workstations can include: BIOS password Requirements for entering a syskey password, a password that must be entered before Windows will boot Smartcard, token and/or biometric authentication for logon Removal of floppy, CD-ROM or other removable drives Disabling USB, serial ports Hardware locks on cables and drives Physical locks to prevent theft of the workstation Alarms that warn of computer movement 26 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
27 Secure Administrative Access In addition to securing administrative workstations, consider securing communications and other administrative access options. Are Terminal Services logons restricted to administrators who must use local tools? Restrict Terminal Services logons using the Terminal Services logon rights. Do not add user or group accounts to the Remote Desktop. Are extremely sensitive administration tasks restricted to local administration only? Some administrative tasks should only be done from the console. For example, administering the root Certification Authority (CA) should be done at the CA console. (Best practices state that the root CA should not be on the network at all.) Are administrative logons protected by long passwords or smart cards? The domain password policy reflects the needs of the entire community of domain accounts. There is, however, no reason administrative accounts cannot use longer, more complex passwords. There is no native technical control that can enforce this, but it can be audited using third-party tools. Are administrative logons restricted via logon rights? Restrict access to administrative workstations by reducing the number of accounts that can logon locally and preventing remote logons through user rights. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 27
28 Evaluate the Security of Administrative Communications between Workstations and DCs Communications should be secured to prevent attempts at remote administration of DCs from unauthorized workstations and to protect the communications themselves. Are IPSec policies used to protect administrative communications? IPSec policies should be used on communications between administrative workstations, DCs, and servers to require mutual authentication and encryption as well as integrity. If remote administration is required across the WAN or Internet, is a VPN used? Protect communication over other networks by using a Virtual Private Network (VPN). Are administrative stations on a dedicated administrative network? Putting administrative workstations on a network separate from your primary network makes stations harder to compromise. Servers are connected to both networks, while administrative workstations should be on their own. While this arrangement may not work for every network, it can add a layer of protection for more sensitive environments. Is out-of-band administration secured? If out-of-band administration is provided, it must be secured. Many out-of-band communications hardware such as modems, service processors, and terminal concentrators offer little security. On the positive side, though, they do provide administration outside of normal TCP/IP communications and therefore are not subject to TCP/IP attacks. Physically secure the hardware provided and ensure that features such as logons are used. Evaluate Administrative Practices Administrators can weaken security or attack systems by misusing their privileges. Are background checks performed on administrative personnel? Administrators have the kind of access that, if used unwisely or malignantly, can destroy an organization. Background checks should be performed on all administrators. 28 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
29 Are administrators activities monitored and audited? Even the most trusted individual should be monitored when his duties involve activities that can put your organization at significant risk. Are PDAs and smart phones used as administration tools? PDAs and smart phones present unique security challenges and should not be used for DC or AD administration. Do administrators receive appropriate security training? Administrators need constant training to keep their skills updated. Be sure that security training fits the administrator s required tasks. Is the role of change approval separated from change implementation? Management determines the information security policy and administrators implement it. Changes to information systems, including those that affect security, should also be approved by management before being implemented by administrators. Are DCs taken offline when troubleshooting is necessary? If there is a possibility that the DC has been compromised, administrators should not troubleshoot the system online. They might launch code that would enable attacks on other network systems. In fact, attack programs may need the administrative rights to proceed. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 29
30 Evaluate Management of Administrative Tools Administrative tools are provided to secure and manage Windows domains. If tools are secured, there is less risk of their use in attacks. Are special administrative tools and utilities secured? Many useful administrative tools are provided as support tools, in resource kits or as third-party products. These tools should not remain on the DC. Where possible, they should be used remotely. Leaving tools on DCs might enable an attacker access to information or processes that could further compromise systems. Are Windows administrative console tools restricted? Many of these tools run in the Microsoft Management Console (MMC). Group Policy can be used to restrict the tools specific administrative groups can use. Is the MMC restricted to User Mode where appropriate? User Mode can prevent changes to the console. This is appropriate for data administrators with limited roles. Consoles can be designed that include only the tools he requires. Step 7: Examine Group Policy Details Group Policy settings secure DCs and AD. Accurate information and proper implementation contributes to their success. Are GPOs documented and backed up? Document the GPOs for each domain. If this documentation is available, verify that the information is up to date and complete. The Group Policy Management Console (GPMC) can document the existence, location, and content of domain GPOs. In addition to providing a visual display of GPOs, it can test the application of a GPO on a specific computer or specific users; scripts can be used to obtain documentation. You should: List all domain GPOs List disabled GPOs Determine that all GPOs are backed up by running the report List GPOs at a backup location. 30 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
31 Why are GPOs disabled? If a GPO is disabled it is not being used. Determine the reason for its disabled status. Legitimate, but temporary, reasons for disabling a GPO are: Disabling while changes are made Disabling due to a GPO problem However, the GPO should be enabled after changes are made or problems fixed. If problems cannot be corrected, the GPO should be deleted, not left. Do not enable disabled GPOs; instead, determine the reason for the disabling and ask for action. Why are GPOs not linked? It is possible to create an unlinked GPO or unlink a GPO. Unlinked GPOs are not applied. Determine the reason the GPO is not linked and ask for action. Is security filtering used correctly? GPOs are not, strictly speaking, applied to security groups. GPOs are linked to a site, domain or OU and applied to users and computers whose accounts lie within that AD object. The exception is when security group filtering is applied to a GP, to prevent a GPO from being applied to members of a group. By default, security group filtering is not used to prevent application to existing accounts. You can document the results of any security filtering by running the GPMC report List GPO s by Security Group. Determine if GPOs are being applied to the correct security groups and that each security group is getting properly applied GPOs. Is every GPO applied to some security group? If a GPO is not applied to a security group, then why does it exist? The GPMC report List GPOs without security filtering provides a list of any GPOs not applied. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 31
32 Check GPO Files and AD Records GPOs exist in part as records in AD and as files in the SYSVOL share. Both must be present. Test for inconsistencies. Are there any orphaned GPOs? If the files are present but there is no information in AD, the GPO is said to be orphaned. You must determine if the files represent a valid GPO and have a situation needing correction, or if the files are remnants of an invalid GPO. Use the GPMC report List GPOs orphaned in SYSVOL. Are GPO files missing or corrupt? Use GPOtool to check for missing and corrupt files in the SYSVOL share and its subfolders on DCs. Are there any GPO inconsistencies between the file system and AD? GPOtool can be used to check consistency of GPOs between the file system and AD in Windows 2000 Server and Windows Server 2003 domains. It compares version numbers between SYSVOL and AD and looks for other indicators. Are there file access problems? Use GPMC to look for file access problems, which may be found when running the GPMC Group Policy results report. Look for file access problems recorded in DCs application logs. The EventCombMT application ( can be used to search multiple DC application logs for events related to file access problems. Are the correct file versions present? If the correct file versions are not loaded on the client, GPO processing may suffer. Use the System File Check (SFC) utility to check for missing client files and determine whether the right file versions are present. The following files are located in the %windir%\system32 folder: Appmgmts.dll Dskquota.dll Fdeploy.dll Gptext.dll Scecli.dll Userenv.dll 32 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
33 Evaluate Policy Application Are DCs tested to see if GPOs are applied? If GPOs are not applied, security modifications to computers and users are not applied. Several tools can be used to determine if policies have been applied: GPMC GPResult. This Win2K Resource Kit tool must be run while logged on to the client computer. It will report a list of the policy settings applied at that computer for that computer and for the currently logged on user. The Windows Server 2003 version provides more information, similar to those provided by Resultant Set of Policy (RSoP). Are GPOs monitored during security changes to determine if they are being applied? The resource kit tool GPOMonitor can be installed on clients, and produces a log showing the time of policy application. When security changes are made, GPOMonitor logs should be checked to determine if the changes were applied. Step 8: Review Technical Controls Technical controls are implemented using object permissions, authentication, Group Policy and registry settings. The use of many of these technical controls is coming in Chapter 2. Evaluate the Domain Security Policy The domain security policy contains the configuration settings for the password, account lockout, and Kerberos policies for the domain. They should be examined for compliance with the organization s security policy and for comparison with industry best practices. They are important in securing AD because they control authentication in the domain. If these controls are weak, they can easily be subverted. In a properly secured AD environment, technical controls are based on accounts and group membership and the rights and permissions granted to those groups. If it is easy to compromise accounts, all other protections are irrelevant. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 33
34 Is a standard DC security template/gpo used for all domains in the forest? Consistency in AD security can be obtained by creating a standard DC GPO and using it in each domain. A standard security template should be designed and used as the basis for the standard GPO to provide a method for auditing the existent security policy against that approved and set in the template. Are changes to domain security policy made in the default domain security GPO? Policy settings, like changes to password policy, account lockout, and Kerberos policy, if made in other GPOs linked elsewhere, will have no impact on these settings for domain accounts. Does the password policy reflect your security policy? The password policy should reflect your security policy if at all possible. (If, for example, your security policy requires that passwords have numbers in the middle of the password, the domain policy will not technically support this.) Is the password policy strong? Keeping the password policy strong helps defend against password cracking attacks. If passwords for administrators that can configure security or administer AD are cracked, AD can be compromised. Recommendations for a strong password policy include: Require passwords to include upper and lower case letters, numbers, and special characters. For more sensitive accounts, unicode characters that do not represent printable characters can be used. Require at least an eight-character password and require administrators to use a longer password. Enforce password history. This prevents immediate and frequent reuse of previously used passwords. A recommended history setting is 24. Require passwords to be changed periodically. Every 30 days is a reasonable interval. Is the Account Lockout policy set appropriately for the domain? Account Lockout policies lock out accounts after a set number of attempts. In a high-risk environment, the policy could be used as a Denial of Service attack, by rapidly attempting a dictionary or brute force attack against multiple accounts. In this environment an account lockout policy may not be a good solution. In other environments it will be. 34 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
35 Is the Kerberos policy kept at the defaults? The Kerberos policy is set at installation time to protect authentication. The setting Enforce user logon restrictions ensures that the user logon rights are evaluated when remote connections are attempted, and that the right to access the computer over the network is also evaluated. This setting is enabled by default and should be left enabled. Evaluate the DC Security Policy Review Audit Policy The DC GPO sets the Audit Policy, Security Options, and User Rights for the domain. Settings here are critically important in securing AD. Some of the security options are addressed in steps relevant to them. The policy also establishes settings for auditing, services and other policy operation specific to DCs. It is important to set audit policy in order to log information necessary for intrusion detection or troubleshooting. Are audit policies set? Audit policy should be established, including auditing directory service access. Is auditing on AD objects enabled and configured? Auditing for success should be enabled for Directory Service access. This allows logging of successful access to directory objects whose Security Access Control Lists (SACLS) are configured. Important objects to audit include the schema directory partition, the configuration partition and the domain directory partition. The document Best Practices for Securing Active Directory Installations and Day-to-Day Operations, ( v/technologies/activedirectory/maintain/bpguide/default.mspx), provides the SACL settings for these objects. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 35
36 Review User Rights on DCs User rights determine what users can do on a system. It is critical that local access and domain user rights are restricted on the DC. Are user rights minimized? User rights control what users can do on a system. The user rights section of Group Policy has the added responsibility of defining the user s rights in the domain. Are log on locally rights reserved for Administrators, Backup Operators and Server Operators? Account Operators and ordinary users should have no need to log on locally. Is the Shut Down the System right restricted to Domain Admins and Server Operators or a subgroup of Domain Admins? It is not necessary for Account Operators, Print Operators, or other user groups to shut down DCs. Are different groups assigned the Backup Files and Directory and the Restore File and Directory rights? Separating these rights can help protect the system from a malicious or inadvertent restore of older backups over the current system. An individual charged with backing up the DC cannot accidentally or intentionally restore older files. The Backup Operators group normally has both privileges, but the rights can easily be separated by creating two groups, each with only one privilege. Is backup and restore restricted to a subset of administrators? By default, the Backup Operators and the Administrators groups have the backup and restore rights. It is not necessary that all administrators have this right. A custom group can be created for this purpose and a small set of administrators added to the custom group. The Administrator group should then be removed from this right. Are non-essential accounts denied access to DCs from the network? Add the Guest account and any non-operating system service accounts used to run local services to the Deny Access to this Computer from the Network right. This can prevent network attacks using these accounts. 36 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
37 Is the right to debug systems restricted? Known attacks use the right to debug systems, and by default all administrators have this right. Remove the Administrators group and replace with a custom group that may need this right for troubleshooting or some patch installation. Is the Guest account disabled? The guest account should be disabled on all DCs. Are users prevented from installing printer drivers? Users should not be installing any type of driver on DCs. Is the right Load and Unload Device Drivers restricted to administrators? The Print Operators group typically has this right, which should be removed. Are printers not installed on DCs? Is the right Allow Server Operators to Schedule Tasks disabled? Task scheduling should only be done by administrators. Is the right to Take Ownership granted only at the forest or local server level? Evaluate Security Options Administrators have this right by default, but it can be granted to any user or group. The right to take ownership in the domain implies the right to take ownership of any object, including any directory partition in the AD. This grants its holder rights at the forest level probably not something that was intended. If granted to a local group on a server or workstation, the right implies only the right to take ownership of the objects on the server. Security Options should also be implemented to protect AD. Are anonymous connections restricted? The restriction on anonymous connections should be configured if legacy computers and applications are not part of the domain. Additional anonymous restrictions can be obtained by restricting anonymous access to named pipes and to registry keys. Is task scheduling restricted to administrators? As previously mentioned, task scheduling should not be turned on for server operators. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 37
38 Evaluate Services Is the Clear virtual memory pagefile when system shuts down option enabled? Information stored in the pagefile may be accessible if the system can be rebooted to another OS. Are LAN Manager authentication choices restricted? While Kerberos is the default network authentication protocol, the LAN Manager protocol may be used by legacy clients, or when Kerberos cannot be used. LAN Manager should be restricted to prevent the use of LM or even NTLM authentication, and the hashes necessary for LM authentication should be removed from the password database. Every service that runs on the DC may reduce its security because it increases the attack surface. Are Unnecessary services disabled? The Microsoft security templates provided with the Windows Server 2003 security guide ( 643c d89-b ea6c7b4db&displaylang=en) recommend services that are required by the DC. Services not required for its operation should be disabled. Is the right to reconfigure services startup controlled? Only service administrators should have the right to modify the startup status of system services. This right is controlled in Group Policy by defining the policy in the services node for each service. When managing the startup mode, use the Edit Security button and then the object picker to give service administrators Full Control while ensuring the Interactive group the group of all users locally logged on has only Read permission. 38 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
39 Evaluate Event Log Settings Evaluate EFS Are event log sizes adequate? Event logs should be large enough to accommodate the number of events recorded between the times they are archived and cleared. Are event logs archived? Event logs should be frequently archived to ensure continuity of log information. Is the retention method set to overwrite older events? If you miscalculate the size of the log required or the time to archive and clear, or if an attack rapidly fills the log, ensure that the latest events remain in the log. Is EFS disabled in the domain if not managed? EFS is a powerful file encryption system, but should not be enabled unless properly managed. It should not be used to encrypt system files. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 39
40 Step 9: Evaluate File and Registry Permissions on DCs File and registry permissions strengthen or weaken security. Most security settings created in the GUI are echoed in the registry. If permissions are weak, registry settings can be manually hacked and security compromised. The interaction between Group Policy and the registry is complex; Group Policy refresh may override manual registry configurations, but the system may already be compromised. Are drive root permissions hardened? Root drive permissions provide users with create file and folder and write data permissions on subfolders. When new folders are added, these permissions are inherited and may provide excessive access. Root drive permissions need to be hardened. Provide Full Control for administrators, and Read and Execute for everyone else. Are share permissions on the SYSVOL correct? When the server is promoted to a DC, its shares the SYSVOL. Permission on this share and its underlying directory are set to accommodate connections from other DCs and domain member computers, as well as allowing users to authenticate. Permissions should not be changed. Are object permissions correct for securing AD? Default permissions on the file system and registry should not be weakened. Object permissions prevent misuse, deletion or misconfiguration of AD. Is 8.3 name generation disabled? A number of attacks are 16-bit applications that expect 8.3- compatible file names. DCs should not be running 16-bit applications locally and therefore do not need 8.3-compatible file names. The REG_DWORD registry value NtfsDisable8dot3NameCreation should be set to 1 at the location HKLM\SYSTEM\CurrentControlSet\Control\FileSystem 40 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
41 Step 10: Review Protection for AD Communications AD data must be replicated between replication partners within each domain; some data is also replicated between domains in the forest. In addition, clients connect to DCs for machine and user authentication as well. Protection for these communications can be increased by using VPNs, SSL, IPSec and LDAP signing. In legacy-free domains, are LAN communications signed? The security option LDAP Server Signing Requirement requires the signing of LDAP traffic between AD and clients. This setting should not be required if legacy clients (Windows NT 4.0, Windows 9x, Windows ME) still exist in the domain. Is SMB message signing turned on? SMB is the basis for NetBIOS communications between Windows computers. When used, SMB signing guarantees the origination of the message, helping secure communications. It cannot be used for some legacy systems and may interfere with communications between some systems. Is session security for NTLM configured? Session security can be configured to provide encryption and integrity. Legacy systems and applications may not be compatible. Is IPSec used to secure communications between DCs and also administrative clients and DCs? IPSec can be used to control who communicates to what, and whether approved communications are encrypted. Using IPSec to secure all communications may not be a practical idea, but for some uses it is necessary. Are L2TP/IPSec VPNs used to secure DC communications over firewalls? Rather than open the many ports necessary for DC replication over firewalls, a VPN can be used. Are event logs reviewed for communication errors? Review event logs to find evidence of communication errors. Don t rely on configuration settings to prove current security is correct and working. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 41
42 Step 11: Review Maintenance Procedures Securing AD is an ongoing process. It is not enough to test the health of AD, review security configuration, or evaluate employees trustworthiness only once. You should do so repeatedly, and address issues such as logging, updating, patching, and other maintenance issues. Review Logging Configuration and Management DC event logs provide information on system health, serve as an early warning system for attack monitoring and can trace attacks to determine type and any security compromises. Following an attack, the logs can forensically support investigation and prosecution. Are logs adequately sized and frequently archived? Security logging can create many records. Is centralized logging in place? Centralized logging removes log data from the DCs (if the machine is compromised, the log might be tampered with) and makes it more easily searchable. Are logs reviewed and the results acted upon? Without review, logs only serve as historical data, but they can be hard to collect and make sense of. There are a number of commercial products that assist in sorting and collecting events. In a small environment, a free product such as EventCombMT ( can be used to consolidate information from event logs on multiple systems by event categories. Do audit settings include success and failure? If settings are only set to record failures, how do you know if an attacker has succeeded? Are account logon and logon events audited for success and failure? It is critical to monitor logon events for evidence of possible attacks and account compromise. Are account management events audited for success and failure? Users should not have membership in administrative groups without approval. Monitoring account management events and comparing them against approved changes can detect variances. 42 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
43 Is object access turned on? If object access is not turned on in Group Policy, you cannot audit object access on the file, registry, and printer objects. Are system events audited for success and failure? Server shutdown and startup event monitoring can provide evidence of unauthorized shutdowns. Many attacks require shutting down the system. Are policy changes logged? Changes in audit policy should be monitored. Review Change Management Procedures Change management is the process of managing updates, configuration adjustments, and patching. Are suggested changes and updates reviewed before being made? The impact of suggested changes should be reviewed and its impact on AD security considered. Are changes tested before implementation? Without testing, you cannot be sure that the effect of a change will be positive or know what its impact on security will be. Are changes to DCs made by approved personnel? Trained, aware personnel should always make or supervise changes to ensure they are done correctly and that problems are reported and managed. Are processes flexible, allowing for triage of changes? Many changes, upgrades, new products, and so on can and should be evaluated over time. Others, such as configuration or patching changes that improve security or patch vulnerabilities, should be quickly reviewed, tested, and implemented. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 43
44 Review Security Patch Processing Security patching should have accelerated procedures in place and not be delayed by cumbersome change management processes. Is monitoring for alerts of new security patches or configuration performed? You have to be aware of problems before you can correct them. Are new patches reviewed for applicability before application? Not every patch should be applied. Some are not meant for DCs or applicable unless specific circumstances exist. Are patches tested before application? Any change should be tested. Is an automated method for patch application in place? Manual patching hinders the prompt and complete application of patches when many machines are involved. Are patched machines evaluated to ensure patch implementation and continued smooth network operation? A testing lab is just that a simulation of your environment. Once a patch is applied, you may find other issues. Are new DCs patched when built to ensure that they are brought online as fully patched machines? A new installation presents an easy target to malicious software. Installation routines can be modified to include application of the latest service packs and security patches. Is anti-virus protection added to DCs? Servers being promoted to DCs should be scanned first. If DCs are built from scratch, anti-virus protection should be added during the install. Is anti-virus protection prevented from modifying SYSVOL security descriptors? Some anti-virus software modifies the security descriptor of SYSVOL files when scanning. Each modification of these files triggers FRS replication, creating high volumes of replication traffic. Is the DCpromo answer file adjusted to provide a more secure installation of DCs? The DCpromo answer file should be modified. Note that there should be a different answer file for the first DC in a domain. 44 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
45 Are the AD database and SYSVOL folder on a separate drive from the system volume? There are attacks against the system volue that seek to disable the system by filling up drive space. Having AD on a separate drive prevents damage from such an attack. Is pre-win2k compatibility disabled? Pre-Win2K compatibility provides anonymous access to directory queries. Is the ability to use cached credentials prevented when accessing the DC console? Cached credentials might be used by an administrator whose account is disabled due to termination. Is a reserve file provided to protect against disk space attacks? A reserve file is simply a large file that takes up disk space. In the event of a disk space attack that fills up the disk, the reserved file can be deleted to recover the system. Step 12: Review Non-Technical Controls Review Security Policy Non-technical controls cannot be enforced by configuring security. An information system security policy is a written management directive that states how information systems should be secured. Every organization should have one. Questions that should be asked: Is the policy periodically reviewed for applicability and new requirements? Who takes part in the review? In the formation of new policy? Does the policy reflect security that will enhance the protection of AD? Is a computer and Internet acceptable use policy established? Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 45
46 Evaluate User Security Awareness A naïve user can do more to ruin information security than many outsiders who want to attack and damage your systems. Are users provided information security awareness training? Awareness training can be as simple as explaining the reason behind policies such as disallowed password sharing or how to create a complex password that is less vulnerable to cracking. Are users provided copies of the acceptable use and other security policies and given opportunity to study and ask questions about them? Understanding does not guarantee compliance, but it does enable it. It also has the benefit that users understand the penalties for non-compliance; that may help enhance compliance. Evaluate Policy and Procedure for DC Administration All policies and procedures should be reviewed with respect to their impact on DC and AD security. However, even casual observance and attitude checks should be made. It should be obvious, for example, that Internet browsing from the DC is not allowed and a bad idea; still, some may do so. Are DCs only used for AD? In other words, no server or user applications should co-exist on the DC. Every piece of code introduced onto a DC can weaken its security. These applications may require access and configuration changes that weaken security, and they expose the DC to compromise if they have vulnerabilities. Is Web browsing prevented and restricted controls left in place? In addition to having a policy, the Internet Explorer Enhanced Security Configuration option should be left in place. 46 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
47 Review Business Continuity/Disaster Recovery Plans A business continuity plan details how a business will stay in business after a major disaster. (Disaster recovery is the process of getting essential business services up and running again. Business continuity is concerned with making sure the business can stay in business.) Is AD recovery a part of the organization s business continuity plan? In addition to IT backup and recovery practices, the organization itself must understand and prepare for the return of a fully functional AD environment. Are periodic, proper backups of AD made? While copies of AD exist on each DC, and recovery of a single DC may be easily accomplish by promoting a new server, you will not always be able to rely on this strategy. What happens, for example, if the first DC of the root domain of the forest dies? Backup and recovery plans should be in place and followed. Are backups stored on- and offsite? Recovery when the main site is destroyed, or onsite backups are destroyed, is possible if offsite storage is also used. Are offsite recovery operations arranged for? Is recovery possible if the main data center is destroyed? Are restoration procedures periodically tested? Without testing, there is no guarantee that backups or procedures will work. Are recovery drills practiced? It is not enough to test backup media or recovery of a single DC. All staff should be trained in recovery procedures. Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 47
48 SUMMARY This chapter provides a set of questions that should be asked as part of a self-audit of AD security. Some may need more details and background in order to put it to use. Others may want to use it as the basis for developing their own comprehensive security review plans. Following this summary, there is a checklist created from the steps reviewed in this chapter. It may be helpful for you to use this checklist as a guide in completing the self-audit. Future chapters of this e-book will delve further into topics. Although this document can serve as a starting point, reading the lessons cannot serve as your sole effort. You must put your new knowledge into practice; once that s done, the next step is to constantly update those practices. Knowledge of how to protect systems changes rapidly just like the knowledge of those who try to destroy them. I look forward to your comments, questions, additions, and suggestions on how I can make this e-book even more useful to you in succeeding chapters. 48 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
49 SELF-AUDIT CHECKLIST Item Comments 1) 2) 3) Documentation of AD infrastructure Physical security for DCs Active Directory health a) b) c) d) e) f) Connectivity DNS operation DNS security Time services operation AD replication FRS replication 4) 5) AD infrastructure design, including security boundaries Infrastructure design and defense a) b) Network design Intrusion detection and response 6) Administrative roles and structures a) b) c) d) e) Default administrative groups Delegated permissions on AD objects Group Policy administration Administrative workstations Administrative access f) g) Administrative connections between workstations and DCs Administrative practices h) Management of administrative tools Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 49
50 Item Comments 7) Group Policy details a) b) GPO files and AD records Policy application 8) Technical controls a) b) c) d) e) f) g) h) Domain security policy DC security policy Audit policy User rights on DCs Security options Services Event log settings EFS 9) File and registry permissions on DCs 10) Protection for AD communications 11) Maintenance procedures a) b) c) Logging configuration and management Change management procedures Security patch processing 12) Non-technical controls a) b) c) d) Security policy User security awareness Policy and procedure for DC administration Business continuity/disaster recovery plans 50 Securing Your Active Directory. Chapter 1 - Perform a Self-Audit
51 ABOUT QUEST WINDOWS MANAGEMENT Quest Software, now including the people and products of Aelita Software, provides solutions that simplify, automate and secure Active Directory, Exchange and Windows environments. The Quest Windows Management group delivers comprehensive capabilities for secure Windows management and migration. For more information on Quest Software s Windows Management group, please visit ABOUT QUEST SOFTWARE, INC. Quest Software, Inc. provides business-critical software for 18,000 customers worldwide, including 75 percent of the Fortune 500. Quest offers products for application performance management for packaged applications and Java environments; database management for Oracle, DB2, SQL Server, Sybase and MySQL environments; and Windows management in Active Directory and Exchange. These management solutions help customers develop, deploy, manage and maintain the IT enterprise without expensive downtime or business interruption. Headquartered in Irvine, Calif., Quest Software can be found in offices around the globe and at Quest Software Windows Management 6500 Emerald Parkway Suite 400 Columbus, OH USA Phone: Securing Your Active Directory. Chapter 1 - Perform a Self-Audit 51
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Published: June 02, 2011 Language(s): English Audience(s): IT Professionals Level: 200
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course OutlineModule 1: Introducing Active Directory Domain Services This module provides an overview
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Securing. Active. Directory. Your. Five Key Lessons to. Chapters. Sponsored by: 1. Perform a Self-Audit
Five Key Lessons to Securing Your Active Directory Chapters Roberta Bragg MCSE, CISSP, Author, Columnist, Speaker, Consultant 1. Perform a Self-Audit 2. Know and Use Security Tools and Techniques 3. Monitor
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
www.etidaho.com (208) 327-0768 Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 5 Days About this Course This five-day instructor-led course provides in-depth
Securing Active Directory Presented by Michael Ivy
Securing Active Directory Presented by Michael Ivy Presenter: Michael Ivy Consultant, Rook Security Michael Ivy Thank you for being here today August 20, 2014 Brief Overview Securing NTDS and Replication
Dell InTrust 11.0 Best Practices Report Pack
Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File
Configuring and Troubleshooting Windows 2008 Active Directory Domain Services
About this Course Configuring and Troubleshooting Windows This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting Active Directory Domain
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Active Directory About this Course This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting (AD DS) in and R2 environments. It covers core
6445A - Implementing and Administering Windows Small Business Server 2008
6445A - Implementing and Administering Windows Small Business Server 2008 Course Number: 6445A Course Length: 5 Days Course Overview This 5 day course provides students with the necessary knowledge to
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
AV-006: Installing, Administering and Configuring Windows Server 2012
AV-006: Installing, Administering and Configuring Windows Server 2012 Career Details Duration 105 hours Prerequisites This course requires that student meet the following prerequisites, including that
6425C - Windows Server 2008 R2 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services
Best Practice Guide for Securing Active Directory Installations
Best Practice Guide for Securing Active Directory Installations Microsoft Corporation First published: October 2005 Updated and republished: January 2009 Abstract This guide contains recommendations for
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Managing and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Outline Module 1: Introducing Active Directory Domain Services This module provides
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course Code: M6425 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Overview This five-day instructor-led course
6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Code: Duration: Notes: 6425C 5 days This course syllabus should be used to determine whether
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
6419: Configuring, Managing, and Maintaining Server 2008
6419: Configuring, Managing, and Maintaining Server 2008 Course Number: 6419 Category: Technical Duration: 5 days Course Description This five-day instructor-led course combines five days worth of instructor-led
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
70-640 R4: Configuring Windows Server 2008 Active Directory
70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Domain Services Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 02 June 2011 200 Windows
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
How to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
Lesson Plans Managing a Windows 2003 Network Infrastructure
Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Five Days, Instructor-Led About this course This five-day instructor-led course provides in-depth training
MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers
MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers Description: Days: 5 Prerequisites: This five-day instructor-led course provides students with the knowledge and skills that
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Course Outline Module 1: Introducing Active Directory Domain Services This module provides an overview of Active Directory
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure
Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure (Exam 70-294) Table of Contents Course Overview... 2 Section 1.1: Introduction to Active Directory... 3 Section
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003
Course Outline. Course 6419 : Configuring, Managing and Maintaining Windows Server 2008-based Servers. Duration: 5 Days
Course 6419 : Configuring, Managing and Maintaining Windows Server 2008-based Servers Duration: 5 Days What you will learn This five-day instructor-led course provides students with the knowledge and skills
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Configuring Windows Server 2008 Active Directory
Configuring Windows Server 2008 Active Directory Course Number: 70-640 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-640: TS: Windows Server 2008
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Windows Server 2003 Active Directory: Perspective
Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Configuring, Managing and Maintaining Windows Server 2008-based Servers
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers OVERVIEW About this Course This five-day instructor-led course provides students with the knowledge and skills that
Course 6425C: Five days
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Five
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides
Administering Windows Server 2012
www.etidaho.com (208) 327-0768 Course 20411D: Administering Windows Server 2012 5 Days About this Course Get hands on instruction and practice administering Windows Server 2012, including Windows Server
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server
WINDOWS 2000 Training Division, NIC
WINDOWS 2000 Active TE Directory Services WINDOWS 2000 Training Division, NIC Active Directory Stores information about objects on the network and makes this information easy for administrators and users
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services About this Course This five-day instructor-led course provides to teach Active Directory Technology Specialists
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
PLANNING AND DESIGNING GROUP POLICY, PART 1
84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group
Administering Windows Server 2012
WINDOWS 2012 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Administering Windows Server 2012 Course Title Administering Windows Server 2012 Course Code 20411D Days / Duration
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425C Course Length: 5 Days Course Overview This five-day course provides in-depth training on implementing,
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
MOC 20413C: Designing and Implementing a Server Infrastructure
MOC 20413C: Designing and Implementing a Server Infrastructure Course Overview This course provides students with the knowledge and skills to provide an enterprise solution that supports manual and automated
411-Administering Windows Server 2012
411-Administering Windows Server 2012 Course Duration: 5 Days Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
Client Server Networks
Name: Date: Quiz 3: Load 2008 Server, LAN Setup, Driver Load, Windows Update, Windows Defender, Active Directory, Organizational Units, Groups, Password and Lockout Polices, Joining a Domain, Wireless
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers
M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers Looking at Training Differently... Course 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers Length: Published:
Course 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers
Course 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers Duration 5 Days About this Course This five-day instructor-led course combines five days worth of instructor-led training
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
Microsoft. Jump Start. M11: Implementing Active Directory Domain Services
Microsoft Jump Start M11: Implementing Active Directory Domain Services Rick Claus Technical Evangelist Microsoft Ed Liberman Technical Trainer Train Signal Jump Start Target Agenda Day One Day 1 Day 2
OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES
Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and
Chapter 3: Building Your Active Directory Structure Objectives
Chapter 3: Building Your Active Directory Structure Page 1 of 46 Chapter 3: Building Your Active Directory Structure Objectives Now that you have had an introduction to the concepts of Active Directory
Outpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
Configuring, Managing and Maintaining Windows Server 2008 Servers
Configuring, Managing and Maintaining Windows Server 2008 Servers MOC6419 About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network
Introduction to Auditing Active Directory
Introduction to Auditing Active Directory Prepared and presented by: Tanya Baccam CPA, CITP, CISSP, CISA, CISM, GPPA, GCIH, GSEC, OCP DBA Baccam Consulting LLC [email protected] Objectives Understand
Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425B Course Length: 5 Days Course Overview This five-day course provides to teach Active Directory Technology
Configuring, Managing and Maintaining Windows Server 2008 Servers
Configuring, Managing and Maintaining Windows Server 2008 Servers About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network Infrastructure
Fundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005 Revision 1.3: Cleaned up resources and added additional detail into each auditing table. Revision 1.4:
Installing, Configuring, and Managing a Microsoft Active Directory
Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing
Configuring, Managing and Maintaining Windows Server 2008 Servers
Configuring, Managing and Maintaining Windows Server 2008 Servers Elements of this syllabus are subject to change Course Details Course Code: 6419 Duration: Notes: 5 day(s) This course syllabus should
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
Kaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
Administering Windows Server 2012
Course 20411D: Administering Windows Server 2012 Course Details Course Outline Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including
Dell Spotlight on Active Directory 6.8.4. Deployment Guide
Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Windows Server 2008 Active Directory Resource Kit
Windows Server 2008 Active Directory Resource Kit Stan Reimer, Conan Kezema, Mike Mulcare, and Byron Wright with the Microsoft Active Directory Team To learn more about this book, visit Microsoft Learning
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008
1 of 6 1/6/2010 3:23 PM MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 This five-day instructor-led course combines five days worth of instructor-led training content from the Network
What s New Guide: Version 5.6
What s New Guide: Version 5.6 A QUEST SOFTWARE COMPANY 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m WHAT S NEW IN ACTIVE ADMINISTRATOR 5.6? Contents...3 Active Administrator Product Overview...3
