AD Account Lockout Investigation and Root Cause Analysis



Similar documents
GFI White Paper PCI-DSS compliance and GFI Software products

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook

Session 17 Windows 7 Professional DNS & Active Directory(Part 2)

LockoutGuard v1.2 Documentation

Windows Operating Systems. Basic Security

Windows XP Exchange Client Installation Instructions

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Administering Windows Server 2012

Activity 1: Scanning with Windows Defender

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

NETWRIX IDENTITY MANAGEMENT SUITE

ProxySG TechBrief Enabling Transparent Authentication

Comprehensive List of XenDesktop Event Log Entries

Understand Troubleshooting Methodology

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

User-ID Best Practices

qliqdirect Active Directory Guide

White Paper. PCI Guidance: Microsoft Windows Logging

Active Directory Services with Windows Server 10969B; 5 days, Instructor-led

Operating Instructions (For User Authentication)

NETWRIX ACCOUNT LOCKOUT EXAMINER

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Websense Support Webinar: Questions and Answers

Course Active Directory Services with Windows Server

A Guide to New Features in Propalms OneGate 4.0

74% 96 Action Items. Compliance

ACME Enterprises IT Infrastructure Assessment

DIGIPASS Authentication for Windows Logon Product Guide 1.1

411-Administering Windows Server 2012

Agency Pre Migration Tasks

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General

End-user Security Analytics Strengthens Protection with ArcSight

Section 12 MUST BE COMPLETED BY: 4/22

Release Notes for Websense Security v7.2

Entrust Managed Services PKI

Administering Windows Server 2012

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Administering Windows Server 2012

Active Directory Services with Windows Server

Active Directory Services with Windows Server

Sophos Endpoint Security and Control standalone startup guide

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Using Nessus In Web Application Vulnerability Assessments

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Enabling Security Operations with RSA envision. August, 2009

Secret Server Qualys Integration Guide

Kaseya 2. User Guide. Version R8. English

QliqDIRECT Active Directory Guide

Course 10969A Active Directory Services with Windows Server

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

Password Reset PRO INSTALLATION GUIDE

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Network Connect Installation and Usage Guide

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Administering Windows Server 2012

DC Agent Troubleshooting

Active Directory Services with Windows Server MOC 10969

Step by step guide for connecting PC to wired LAN at dormitories of University of Pardubice

Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines. Regional Product Management Team Endpoint Security

Administering Windows Server 2012

AV-006: Installing, Administering and Configuring Windows Server 2012

Industrial Security for Process Automation

Course 20411D: Administering Windows Server 2012

Security Content Update Release Notes for CCS Update

Top 10 PCI Concerns. Jeff Tucker Sr. Security Consultant, Foundstone Professional Services

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

XIA Configuration Server

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES

Administering Windows Server 2012

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Endpoint Protection Analyzer Report

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Administering Windows Server 2012

Evaluation Guide. iprism Web Security V7.000

ServiceDesk 7.1 Installation and Upgrade. ServiceDesk 7.1 Installation and Upgrade - Using Domain Service Credentials A Step by Step Guide

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

PineApp Surf-SeCure Quick

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Microsoft Active Directory Services with Windows Server

User Identification and Authentication

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

Automate PCI Compliance Monitoring, Investigation & Reporting

Chapter 9 Firewalls and Intrusion Prevention Systems

Net Protector Admin Console

Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1

Q&A. DEMO Version

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Configuring Windows Server 2008 Active Directory

SIEM Implementation Approach Discussion. April 2012

IBM QRadar Security Intelligence April 2013

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Administering Windows Server 2012

"Charting the Course... MOC D Administering Windows Server Course Summary

Transcription:

AD Account Lockout Investigation and Root Cause Analysis Allen Chin Principal Consultant allen_chin@symantec.com 1

Contents 1 Background Issue 2 What was done 3 What were discovered 4 Recommendations 5 Challenges faced & Lesson Learned 2

Background Issue 3

Background Issue Downadup/Conficker worm was first discovered during end of year 2008. Like many other organizations, <abc> customer was also faced with this worm outbreak then. One of the side effect when this worm entered the network was to cause huge number of user accounts locked out, rendered these user unable to logon to the network and unable to work. Huge number of lockout incidents still occurred today. Customer decided to create a script in all their AD servers that runs periodically to unlock all locked out user accounts despite the locked out was legitimate or were due to illegitimate logon attempt by this worm. The script has been activated since. The consequence of the existence of this unlocking script is a violation to security practices but more critical would be on the violation to customer internal audit policies and audit findings. Ultimately, customer would like to terminate the usage of the script and be able to be in compliance with audit policies and recommendation. Competitor has been approaching the customer throwing FUD that this event was due to Downadup/Conficker infection and SEP is not able to detect it. Customer was getting convinced as there s no evident to proof Symantec s innocent. Customer indicated that potentially they will displace SEP! Therefore timeline of a month was set for Symantec to perform the necessary investigation to identify the root cause for the lockout event and subsequently lead to script termination. 4

What was done 5

What was done A Special Task Force was formed with collaboration from Symantec, Partner and various customer operation teams (Desktop, Server, Network and Security) to assist on the investigate. Data sources collected and analyzed are based on the following, Locked out reports correlated from existing SIEM solution (Arcsight) to identify source machines causing locked out from various AD servers, Raw AD logs (~38GB logs) from 10 AD servers (out of 50+ AD) Copy of AD account lockout policy, Enduser comments and experience, Logs and loadpoint from various Endpoints that caused ID locked out events, SEPM logs and reports, Logs and reports from 3 rd party scanning tool/av, Reports from existing network IPS. 6

Lockout Trending Statistics Top Accounts 6 5 4 3 2 1 12:00:00 0 AM 4:00:00 AM 7:00:00 AM 9:00:00 AM 11:00:00 AM 1:00:00 PM 3:00:00 PM 5:00:00 PM Sample report 1 : Day with high lock out events 7

Lockout Trending Statistics Top Accounts 6 5 4 3 2 1 12:00:00 0 AM 2:00:00 AM 4:00:00 AM 6:00:00 AM 8:00:00 AM 10:00:00 AM 12:00:00 PM 2:00:00 PM 4:00:00 PM 6:00:00 PM 8:00:00 PM 10:00:00 PM Sample report 2 : Day with high lock out events 8

What were discovered 9

Logon Attempts from Web Proxy What were discovered Web Proxy High account logon attempts triggered from Web proxy 7000 Detected numerous failure audit for account logon attempts These did not correlate with account lockout events Investigated AD account lockout policy with Windows team 6000 5000 4000 3000 FAILURE SUCCESS 2000 1000 0 User IDs 10

Likely Cause of High Logon Attempts from Web Proxy Crypt32 function trying to auto update retrieval of third-party root list sequence number http://support.microsoft.com/kb/317541/en-us Event generated if Update Root Certificates component is installed and computer cannot connect to Windows Update server on Internet Symc Internal Only 11

What were discovered Account Lockout Policy Customer Account Policies/Account Lockout Policy Description Value Account lockout duration Account lockout threshold Reset account lockout counter after 0 minutes (forever / manual unlock) 5 invalid logon attempts 99,999 minutes (69 days) Policy set were too strict, even more aggressive than Best Practice at High Security Level! Best Practice Benchmark Settings (CIS) Center for Internet Security (CIS) Account lockout duration Account lockout threshold Reset account lockout counter after Value 15 minutes or more 15 invalid logon attempts 15 minutes or more 12

What were discovered Account Lockout Policy Customer Account Policies/Account Lockout Policy Description Value Account lockout duration Account lockout threshold Reset account lockout counter after 0 minutes (forever / manual unlock) 5 invalid logon attempts 99,999 minutes (69 days) Policy set were too strict, even more aggressive than Best Practice at High Security Level! Best Practice Benchmark Settings (Microsoft) Microsoft Account Lockout Best Practices Low Med High Account lockout duration N/A 30min 0min Account lockout threshold N/A 10min 10min Reset account lockout counter after N/A 30min 30min 13

What were discovered Kerberos Traffic Being Blocked Windows Firewall blocked Kerberos Traffic 14

What were discovered Kerberos Traffic Being Blocked Event ID 40960, 40961 in Windows XP Client Logs 15

Possible Reason #1 http://support.microsoft.com/kb/938457 Symc Internal Only 16

Possible Reasons #2 Symc Internal Only 17

Possible Reasons #2 Symc Internal Only 18

Possible Reasons #3 Symc Internal Only 19

Possible Reasons #3 Symc Internal Only 20

What were discovered Kerberos Traffic Being Blocked Sample Windows XP Client logs 21

What were discovered Cached Credentials Stale Service Account Password on client machines 22

What were discovered Cached Credentials Stale Credential Manager Entries on Client Machines 23

What were discovered - Others Other observed potential root causes of Account Lockout, Mapped network shared drives/folders with wrongly cached or non-updated credentials on endpoints, Scheduled tasks with logon scripts configured with wrongly cached or nonupdated credentials on endpoints, Scheduled scripts running on some servers that used wrongly configured/cached or non-updated credentials, Old or non-updated logon credentials cached by Applications NTLM authentication error in (McAfee) Web Gateway Failure of Active Directory replication between domain controllers No identification of Downadup worm based on the analysis of the collected loadpoint logs from the identified source machines causing lockout. No identification of Downadup worm using 3 rd party scanning tool/av on source machines identified. No identification of Downadup worm from SEPM and Network IPS reports 24

Recommendations Remedy for Web Proxy logon issue, To allow unauthenticated access to Windows Update server, Turn off Update Root Certificates component, Update AD Account Lockout Policy, inline with Best Practices, Plan for purging of stale credentials inclusive of following areas, Service Account Password in Service Control Manager (SCM) Logon credentials cached by Stored User Names and Passwords in Control Panel (Credentials Manager) Persistent drive mappings / network share, Scheduled tasks and/or scripts, Applications, Health check on Microsoft Active Directory inclusive of, Architecture and configuration review (GC, DC, RODC, DNS) Investigation on errors encountered in Server and Client logs 25

Recommendations Ensure Kerberos & AD traffic/port are not being blocked between Server- Server & Client-Server communication, Adopt Microsoft recommendation for addressing Crypt32 events, more info on URL http://support.microsoft.com/kb/317541/en-us Ensure McAfee Web Gateway is updated to latest level to resolve NTLM related issues observed, Expand coverage and improve performance of current SIEM tool, All AD servers Internal and external FW + IPS SEP Managers Web Gateway Gather baseline statistics of typical daily locked out incidents as a moving forward strategy to ascertain legitimate locked out vs abnormal locked out count, such as caused by presence of Downadup worm in the network, To have client OS image standardization to eliminate deviations from unknown configuration, applications and client access. 26

Challenges faced & Lesson Learned SIEM AD locked out reports collected was not wide enough for lock out pattern identification due to configured AD logging limitation. No effective perimeter or network monitoring capability to identify Downadup threats in the environment. Faced difficulty collecting more detail AD locked out reports from network/siem team due to infrastructure complexity and know how issue. The amount of AD logs collected was extremely huge due to high logging level and large number of users (more than 10,000 seats) therefore it was significantly taxing to mine the data. Task force was not familiar with existing customer applications, map drives and inhouse scripts, hence it was challenging to rule out the root causes. No involvement from other principals in the exercise such as Microsoft, McAfee (Web Gateway/Proxy) and Arcsight (SIEM) that would help to expedite some of the investigation processes. Last but not least, despite all the FUDs the competitor (Trend Micro) has thrown in, customer s confidence on Symantec is still retained and there IS NO evident of Downadup infection that SEP is not able to detect so far! 27

Thank you! Allen Chin allen_chin@symantec.com +6019-212 0126 SYMANTEC PROPRIETARY/CONFIDENTIAL INTERNAL USE ONLY Copyright 2010 Symantec Corporation. All rights reserved. 28