Securing Active Directory Presented by Michael Ivy



Similar documents
Introduction to Auditing Active Directory

MS Exam Objectives Administering Windows Server 2012 R2

Microsoft. Jump Start. M11: Implementing Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

70-413: Version: Designing and Implementing. a Server Infrastructure. Demo

70-413: Designing and Implementing a Server Infrastructure

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

MOC 20413C: Designing and Implementing a Server Infrastructure

MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

AV-006: Installing, Administering and Configuring Windows Server 2012

Core Active Directory Administration

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows Server 2012 / Windows 8 Audit Fundamentals

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Exam : Administrating Windows Server 2012 R2. Course Overview

R4: Configuring Windows Server 2008 Active Directory

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

6425C - Windows Server 2008 R2 Active Directory Domain Services

Planning Domain Controller Capacity

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

PassTest. Bessere Qualität, bessere Dienstleistungen!

How the Active Directory Installation Wizard Works

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services

Outline SSS Configuring and Troubleshooting Windows Server 2008 Active Directory

Configuring Windows Server 2008 Active Directory

Administering Windows Server 2012

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

EXAM Designing and Implementing a Server Infrastructure. Buy Full Product.

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 (MS6416)

Lesson Plans Managing a Windows 2003 Network Infrastructure

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers

MCSE: server infrastructure Syllabus

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Cisco ASA. Administrators

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Managing and Maintaining Windows Server 2008 Active Directory Servers

Designing and Implementing a Server Infrastructure MOC 20413

Designing and Implementing a Server Infrastructure

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425

70-685: Enterprise Desktop Support Technician

Windows.NET Beta 3 Active Directory New Features

70-417: Upgrading Your Skills to MCSA Windows Server 2012

Microsoft Virtual Labs. Active Directory New User Interface

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Microsoft Windows Server 2008 Active Directory, Configuring

WINDOWS 2000 Training Division, NIC

Administering Windows Server 2012

Windows 7, Enterprise Desktop Support Technician

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

LearnKey's Windows Server 2003 Active Directory Infrastructure with Dale Brice-Nash

Planning and Implementing Windows Server 2008

Windows Server. Introduction to Windows Server 2008 and Windows Server 2008 R2

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

Course Outline. Course 6419 : Configuring, Managing and Maintaining Windows Server 2008-based Servers. Duration: 5 Days

6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Managing and Maintaining a Windows Server 2003 Network Environment

Administering Windows Server 2012

COURSE 20411D: ADMINISTERING WINDOWS SERVER 2012

ITTEST QUESTION & ANSWER. Guías de estudio precisos, Alta tasa de paso!

1. Name of Course: Windows Server 2008, Enterprise Administrator

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Administering Windows Server 2012

Configuring, Managing and Maintaining Windows Server 2008-based Servers

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

411-Administering Windows Server 2012

Introduction to Active Directory Services

TestOut Course Outline for: Windows Server 2008 Active Directory

Active Directory Objectives

Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers

Installing Active Directory

COMPLETE COMPUTING, INC.

Lesson Plans. LabSim Windows Server Pro: Manage and Administer. Exam

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

Administering Windows Server 2012

Transcription:

Securing Active Directory Presented by Michael Ivy

Presenter: Michael Ivy Consultant, Rook Security Michael Ivy Thank you for being here today August 20, 2014

Brief Overview Securing NTDS and Replication Permission, Delegation and Auditing Forests and Trust Design Securing DNS

Visibility, Intelligence, & Response User Education Logging & Auditing Visibility Configuration Security Tier 1 Controls Vulnerability Management Response Intelligence Active Defense Incident Response

RESPONSE INTELLIGENCE VISIBILITY Key Components 0.0 Foundational Tools Firewall IPS/Threat Log/SIEM 1.0 Configuration Tier 1 Controls Tier 2 Controls 2.0 Monitoring Technical Activity (Standard IOCs) Compliance & Standards Digital Asset Management Social Media Management 3.0 Intelligence Threat Enrichment Data Timely, Custom IOCs Business Intelligence Event Correlation 4.0 Response ROE & Timely Remote and/or Hands-on IR Tracking to Resolution Identify & Resolve Root Causes Key Performance Indicators (KPIs)

Tier 1 Controls

Securing NTDS and Replication

Securing NTDS and Replication DC s should be in a locked, access controlled room Consider surveillance equipment Prefer granting access via Terminal Services Prefer locating in a locking rack Don t forget about power UPS, RPS etc

Encrypt Hashes/Keys with SYSKEY.EXE SYSKEY.EXE creates a 128-bit RC4 key which is used to protect: Protection keys for users passwords in AD or the local SAM database User s Master Keys that protect private keys for digital certificates Protection key for LSA Secrets in the registry Protection key for the local administrator account used when booting into Safe Mode

SYSKEY.EXE continued SYSKEY.EXE can be executed from the command line to reconfigure how System Key is created and stored The System Key can be stored locally (default) The System Key can be derived from a password that must then be entered at boot The System Key can lastly be derived randomly and stored on a floppy which is then required to boot

Whole Disk Encryption Server 2008 and Later Bitlocker Benefits: Boot-up Verification 128 or 256bit AES sector level encryption Transparent to user Optional TPM chip integration is preferred Emergency recovery options including AD backup

Read Only Domain Controllers Used for insecure locations (like remote offices) Limited Replication and attack surface When Compromised Delete the RODC computer account and clean up Requires: Server 2008+ Forest Level 2003+ PDC Emulator must be 2008+

Backups for DR and Auditing What would you choose, a firewall or good backups? Authoritative Restore Issues: For both the AD and the SYSVOL share There is no authoritative restore for the Schema NTDSUTIL.EXE 2008-R2 + Recycle Bin

Securing Replication Traffic Leased Lines (though MPLS is not encrypted) Dial-up VPN IPSec SMTPS + S/MIME Always have redundant pathways

Secure the Schema Schema defines classes of objects in the AD and their attributes Physical Security Read-Only DCs Empty the Schema Admins group Have good backups Audit all Changes

Permission, Delegation and Auditing

Active Directory Permissions ADUC: View > Advanced will reveal the Security tab on all objects Every Property of every object in AD can have it s own ACL Objects also have Owners

AD Access Control List Tools DSACLS.EXE ACLDIAG.EXE SDCHECK.EXE DSREVOKE.EXE ADSI

Delegation of Control Delegate authority using: Active Directory Permission Group Policy Delegation of AD objects is much like delegation of control in NTFS Leading Practices Have Written Policies Focus Delegation on OU s Assign Permissions to Groups Use GPO s to restrict access to powerful snap-ins Consider customized MMC Consoles Audit - everything

Auditing Access to Active Directory Every Property of every object in AD can have its own separate set of audit settings Active Directory SACLs are mostly built in unlike NTFS SACLs Enable the audit policy for: Audit Directory Service Access (S/F) Audit Account Logon Events (S/F) Audit Logon Events (S/F) Audit Account Management (S/F) Audit Object Access (S/F) Audit Policy Change (S/F) Audit System Events (S/F)

Directory Service Change Auditing Requires Server 2008 or later on DC s Adds auditing subcategory for change: Logs both pre and post values for altered attributes Logs non-default values added during the creation of a new object Logs Previous and new locations when objects are moved or undeleted CMD > auditpol.exe /get /category:*

Forest and Trust Design

Forest Design Affects Security Trust Types: External Intra-Forest Cross-Forest Shortcut Kerberos Realm Issues for consideration: Logon Location Permissions Authentication protocols RADIUS, LDAP, PKI Replication Firewalling

Three Scenarios Federated Forests Empty Root Domains Extranet Forests

When to Create More Forests To isolate mission-critical resources To isolate dangerous users/computers Testing/Training labs Applications with schema modifications Acquisitions/mergers of other forests Legal/Contractual mandates Need for fault tolerance is top priority Lack of bandwidth

When to Create More Domains For differing domain-wide GPO s With poor but manageable bandwidth For separate DNS names For international organizations

Securing DNS

DNS Tools DNS MMC Snap-In IPCONFIG.EXE NSLOOKUP.EXE DIG.EXE DNSCMD.EXE DNSLINT.EXE DNSDIAG.EXE Performance Monitor Event Viewer DNS Log

Active Directory Swallows DNS DNS Records have become more AD objects No zone files No zone transfers No more primary/secondary distinction DNS Servers must be DC s All this adds up to: No separate DNS replication topology No single point of failure Permissions on DNS records for secure dynamic updates More efficient replication

Use Secure Dynamic Updates Requires AD-integrated DNS servers Adds permissions on DNS records Requires Kerberos Does not support Unix-esque secure dynamic updates Secure Updates can be mandatory Windows DHCP Server can update DNS records on behalf of computers/devices that don t support MS-style secure dynamic updates

DNS Security Leading Practices Use a split DNS architecture Require secure Dynamic updates from everyone Disable Zone Transfers Secure against cache poisoning attacks Enable Logging Harden ACL s on critical DNS records, including SACL s

Questions We ll now open it up for questions

Presenter: Michael Ivy Consultant, Rook Security www.rooksecurity.com @rooksecurity Thank You