Introduction to Auditing Active Directory



Similar documents
Active Directory. By: Kishor Datar 10/25/2007

Configuring Windows Server 2008 Active Directory

Introduction to Active Directory Services

R4: Configuring Windows Server 2008 Active Directory

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

Windows Server 2012 / Windows 8 Audit Fundamentals

Module 1: Introduction to Active Directory Infrastructure

Forests, trees, and domains

Microsoft Virtual Labs. Active Directory New User Interface

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Active Directory Commands ( )

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval

Securing Active Directory Presented by Michael Ivy

LearnKey's Windows Server 2003 Active Directory Infrastructure with Dale Brice-Nash

Windows 2000/Active Directory Security

Administering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees

Admin Report Kit for Active Directory

WINDOWS 2000 Training Division, NIC

Microsoft. Jump Start. M11: Implementing Active Directory Domain Services

TestOut Course Outline for: Windows Server 2008 Active Directory

6425C - Windows Server 2008 R2 Active Directory Domain Services

70-413: Designing and Implementing a Server Infrastructure

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services

Create a printer preference in the Default Domain Policy that sets a default printer as laser5.nutex.com and designate the policy as Enforced.

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

IT ACADEMY LESSON PLAN. Microsoft Windows Server Active Directory

Understanding Active Directory. Heng Sovannarith

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Chapter 4: Implementing and Managing Group and Computer Accounts. Objectives

Windows Server 2003 Active Directory: Perspective

Active Directory Disaster Recovery Workshop. Lab Manual Revision 1.7

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Windows Server 2003 Active Directory MST 887. Course Outline

NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing

Windows Logging Configuration: Audit Policy Configuration

Active Directory Objectives

Chapter 2 Active Directory Design... 30

Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led

Outline SSS Configuring and Troubleshooting Windows Server 2008 Active Directory

Presenter s name here Date of presentation (optional) Windows Security and Domains for Experion

6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Designing the Active Directory

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

70-417: Upgrading Your Skills to MCSA Windows Server 2012

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

PassTest. Bessere Qualität, bessere Dienstleistungen!

Active Directory. Learning Objective. Active Directory

How To Configure An Active Directory Domain Services

Planning Domain Controller Capacity

COMPLETE COMPUTING, INC.

MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2

Microsoft. Official Course. Introduction to Active Directory Domain Services. Module 2

Course 6425C: Five days

Windows Domain/Workgroup

6.1.2 Installing AD DS 7:45

Websense Support Webinar: Questions and Answers

Designing a Windows Server 2008 Active Directory Infrastructure and Services

Module 4: Implementing User, Group, and Computer Accounts

Role Based Access Control for Industrial Automation and Control Systems

1. Name of Course: Windows Server 2008 Active Directory, Configuring

11 essential tools for managing Active Directory

Managing and Maintaining Windows Server 2008 Active Directory Servers

Course: Configuring and Troubleshooting Windows Server 2008 Active Direct-ory Domain Services

Understanding. Active Directory Replication

Lesson Plans LabSim for Microsoft s Configuring Windows Server 2008 Active Directory

M6425a Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Windows.NET Beta 3 Active Directory New Features

Core Active Directory Administration

Active Directory Restructuring Recommendations

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

Configuring Sites and Understanding AD replication. Dante Villarroel Saavedra

AV-006: Installing, Administering and Configuring Windows Server 2012

Exam : Installing and Configuring Windows Server 2012

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

Guide to Securing Microsoft Windows 2000 Active Directory

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

Managing an Active Directory Infrastructure

Course 20413: Designing and Implementing a Server Infrastructure

Transcription:

Introduction to Auditing Active Directory Prepared and presented by: Tanya Baccam CPA, CITP, CISSP, CISA, CISM, GPPA, GCIH, GSEC, OCP DBA Baccam Consulting LLC tanya@securityaudits.org

Objectives Understand the AD Architecture Identify key audit steps for AD Look at available tools for auditing Baccam Consulting LLC 2005-2015 2

What is Active Directory? Active Directory (AD) is a centrally managed database with information about AD objects Servers, workstations, people, printers, etc. Authentication, authorization First released with Windows 2000 server LDAP Baccam Consulting LLC 2005-2015 3

Active Directory Objects Resources printers, shared directories, etc. Security principals computers, servers, user accounts, groups, etc. Security principals are assigned a SID Baccam Consulting LLC 2005-2015 4

Directory Information Examples For a computer NetBIOS name, operating system version, service pack level, the last time the computer logged into the domain, etc. For a user account Person s name, phone number, group memberships, etc. Baccam Consulting LLC 2005-2015 5

Obtaining an Inventory Obtain a listing of servers and workstations Review the operating system, version, and service pack in use for any outdated versions A listing can be obtained with: csvde -f %COMPUTERNAME%- domaincomputerobjs.csv -r objectclass=computer -l dnshostname,operatingsystem,operatingsystemversi on,operatingsystemservicepack,lastlogon,lastlogont imestamp Baccam Consulting LLC 2005-2015 6

What Else can AD Do? Access Control Apply Security Policy Auditing Data protection for data at rest Data protection for data in transit PKI Trusts Baccam Consulting LLC 2005-2015 7

AD Terms Forest Set of one or more domains with a shared schema Tree One or more domains in a contiguous namespace Domain Core logical unit of AD One level below the forest Organizational Unit (OU) Logical container in the domain environment Objects A single entity and its attributes Baccam Consulting LLC 2005-2015 8

Objects Hierarchical arrangement of objects AD objects represent entities that make up a domain Each object is uniquely identified by a Globally Unique Identifier (GUID) Each security principal object is assigned a security identifier (SID) Used for security-enabled objects Baccam Consulting LLC 2005-2015 9

Organizational Units Organizational Units (OUs) are containers within the domain environment OUs can exist at multiple levels within the organization OUs can contain OUs within OUs Get a list of organizational units dsquery ou dc=mydom,dc=com dsquery ou domainroot Baccam Consulting LLC 2005-2015 10

Domain Can be a partition within an AD forest Default administrative owner of a domain is the Domain Admins group Domain is authoritative for the identity and credentials of the users, computers, and groups that reside in that domain Multiple domain controllers should exist for redundancy Baccam Consulting LLC 2005-2015 11

Tree Trees and Forests are used within Windows 2000 and later environments to logically connect domains Tree: a set of domains that have a common network configuration and catalog of information Each tree has a unique name ex. tree1.com Systems can be a part of the tree ex. servera.tree1.com, serverb.tree1.com Two or more domains where the DNS names of the domains are in a hierarchical, parent-child relationship A tree shares a single Schema, Configuration Naming Context and Global Catalog Baccam Consulting LLC 2005-2015 12

Example Tree Baccam Consulting LLC 2005-2015 13

Forests (1) A collection of domains with a shared naming context A forest consists of all trees that also contain two-way (transitive) trusts to other trees The root domain is the first domain created in the forest Schema and Enterprise Admins are in the root domain Forest is the replication boundary Baccam Consulting LLC 2005-2015 14

Forests (2) Forest is the security boundary Not the domain Baccam Consulting LLC 2005-2015 15

Example Forest Baccam Consulting LLC 2005-2015 16

Reasons to Create a Forest Testing/training labs Applications that require schema modifications Legal requirements Acquisitions/mergers of other forests Requirement for fault tolerance overrides everything else Inadequate bandwidth or requirements to be disconnected for long periods Isolate critical business resources Isolate dangerous users and computers Baccam Consulting LLC 2005-2015 17

Forest Audit Step Considerations Review the administrative controls to prevent unauthorized granting of trusts between forests Ensure that users from another forest are not members of the groups which Administer computers that store critical data Provide access to critical data Responsible for service management Administer server administrator groups Baccam Consulting LLC 2005-2015 18

Trusts (1) One-way Two-way Baccam Consulting LLC 2005-2015 19

Trusts (2) Transitivity Transitive trusts Intransitive (nontransitive) trusts Can facilitate single sign-on capability across domains Tool: netdom query trust Baccam Consulting LLC 2005-2015 20

Domain Controllers AD database is stored and managed by DCs Servers can be member servers or domain controllers (DCs) Responsible for allowing hosts to access domain resources DCs are the foundation to the AD directory services Stores user accounts Authenticated users Enforce security requirements Baccam Consulting LLC 2005-2015 21

Active Directory Replication One or more domain controllers can exist in a domain A single DC is a single point of failure. Multi-master replication Ensure that replication traffic is being encrypted as necessary AD Replication is organized around sites A site is a collection of one or more subnet objects Physical concept Baccam Consulting LLC 2005-2015 22

RODC Used primarily when physical security risks exist The RODC must be 2008 (or later) Can have other DCs that are not 2008 PDC Emulator must also be 2008 (or later) Gets a full copy of the AD database w/o certain password hashes By default, no password hashes are sent to the RODC Default Deny Deny overrides Allow if conflicts exist Can select which ones you want to send Two groups can be leveraged for enforcing RODC password replication policy other groups can be leveraged Allowed RODC Password Replication Group Denied RODC Password Replication Group Baccam Consulting LLC 2005-2015 23

DC Audit Steps Verify that there are enough domain controllers for faulttolerance and performance How many DCs are there and where are they located? Verify where the DCs are physically located Are there any RODCs/sites that lend themselves to RODCs? Verify whether DCs built are transported and placed in a physically secure and/or controlled location Review how traffic is sent for replication Encrypted? Signed? Review the DC build procedures for reasonableness Baccam Consulting LLC 2005-2015 24

Group Policy (1) Group Policy can be used to control security settings Apply and/or configure policy settings Group Policy Object (GPO) Group of information that specifies how objects within a particular group of users will act and be configured Contains the Group Policy (GP) settings Settings stored in multiple locations GP container GP template Baccam Consulting LLC 2005-2015 25

Group Policy (2) GPOs can be applied at multiple levels Site, domain, OU GPOs are inherited and cumulative Processed in order of local, site, domain, organizational unit GPO override options exist Block Inheritance No Override Tool: gpresult Baccam Consulting LLC 2005-2015 26

Global Catalog Servers Global Catalog (GC) is a distributed data repository Portion of the database that s replicated throughout the forest GC is stored on DCs that have been designated as Global Catalog Servers DCs that replicate across domain boundaries are called Global Catalog Servers Some AD data is marked as part of the Global Catalog, while other data is not A subset of the AD database Not a separate database from the AD database GC is distributed via multi-master replication Baccam Consulting LLC 2005-2015 27

GC Best Practices to be Covered in Audit Steps Each site should have at least one GC server, preferably two or more If a remote site can t have a GC server, then set the registry to allow logons without a GC (KB241789) Deny permissions should not be specified for universal groups, when possible Infrastructure Master should not be assigned to a DC hosting the GC server Updates may not occur Of course, an exception exists if there is only 1 domain Should be in the same site as at least one GC server though Domain Naming Master should be a GC server Otherwise creation of grandchild domains may fail if your forest is not in 2003 mode Baccam Consulting LLC 2005-2015 28

Operation Masters Some services don t operate well in multi-master replication mode Flexible Single Master Operation (FSMO) mode is used instead FSMO Master a DC running one or more of the five FSMO services FSMO Master now shortened to "Operations Master" Tool: netdom query fsmo Provides a list of the current Operation Masters Baccam Consulting LLC 2005-2015 29

Five Operation Master Roles Forest-wide roles Schema Master Domain Naming Master Domain-wide roles PDC Emulator Master RID Master Infrastructure Master http://technet.microsoft.com/enus/library/cc773108(ws.10).aspx Baccam Consulting LLC 2005-2015 30

AD Audit Steps (1) Determine where the Operation Masters are located Determine how many domains/trees/forests exist Identify the DNS/NetBIOS names for the domains Determine any trust relationships among the domains/forests Identify what kind of trusts exist Determine if there are any stand-alone systems Why are they stand-alone? How are they managed? Baccam Consulting LLC 2005-2015 31

AD Audit Steps (2) Determine what the domain and OU strategy is Determine whether OUs being used to delegate administrative authority Determine whether OUs are being used to control the security policy for users and computers Determine the strategy for GPOs Get a listing of the GPOs that exist Baccam Consulting LLC 2005-2015 32

CSVDE csvde comma separated value data exchange utility Some common switches -f : specifies the import/export file name -r : create a search filter based upon an attribute ex. objectclass=computer -l : allows you to specify list of attributes to return Note that some output, such as timestamps, may need to have a formula applied to get a human-readable date =IF(CE3>0,CE3/(8.64*10^11) - 109205,"") http://myserverstuff.blogspot.com/2009/03/csvde-to-excelhuman-readable-lastlogon.html. Baccam Consulting LLC 2005-2015 33

Tools for User and Groups (2) csvde csvde -f <<filename>> -r (samaccountname="domain Admins") -l member csvde -f <<filename>> -r (samaccountname="enterprise Admins") -l member csvde -f <<filename>> -r objectclass=user -r objectcategory=person csvde s 10.10.10.10 b administrator domain password -f alldomainobjs.csv Baccam Consulting LLC 2005-2015 34

DSQuery Summary of Commands dsquery server forest List all DCs dsquery server forest isgc List all Global Catalog Servers dsquery server hasfsmo [rid pdc name schema infr] List Operation Masters dsquery ou domainroot or dsquery ou dc=mydom,dc=com List all OUs in the domain dsquery group, dsquery user, dsget user memberof expand List all groups and members of groups dsquery * domainroot -scope subtree -filter objectcategory=computer -attr name List all computers dsquery * domainroot filter (&(objectclass=user)(objectcategory=person)) attr samaccountname List all domain users Baccam Consulting LLC 2005-2015 35

Summary Discussed the AD Architecture Looked at key audit steps for AD Looked at available tools for auditing Baccam Consulting LLC 2005-2015 36

Auditing Courses Available Auditing Network Security in Dallas, TX April 27-29, 2015 Auditing Active Directory and Windows in Dallas, TX May 18-20, 2015 Foundations of IT Auditing in Dallas, TX June 23-25, 2015 Auditing UNIX/Linux in Dallas, TX July 9-10, 2015 Auditing Oracle in Dallas, TX September 21-23, 2015 SANS Sec502: Perimeter Protection In-Depth June 15-June 20, 2015 http://www.sans.org/event/sansfire-2015/course/perimeter-protection-in-depth See www.securityaudits.org/events.html for more information and to register

Thank you! Prepared and presented by: Tanya Baccam CPA, CITP, CISSP, CISA, CISM, GPPA, GCIH, GSEC, OCP DBA Baccam Consulting LLC tanya@securityaudits.org