Securing Active Directory Correctly



Similar documents
Top 10 Security Hardening Settings for Windows Servers and Active Directory

Next-Gen Monitoring of Active Directory. Click to edit Master title style

Installing, Configuring, and Managing a Microsoft Active Directory

Windows Server 2008/2012 Server Hardening

SECURE YOUR WINDOWS ENTERPRISE WITH STRONG PASSWORD MANAGEMENT

How to Join QNAP NAS to Microsoft Active Directory (AD)

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Web. Security Options Comparison

Best Practices for an Active Directory Migration

Effective Ways to Manage User Life Cycle in Active Directory

Outline SSC Configuring and Troubleshooting Windows Server 2008 Active Directory

True Continuous Auditing for Active Directory Derek Melber

About Microsoft Windows Server 2003

How to monitor AD security with MOM

Windows passwords security

Actuality of SMBRelay in Modern Windows Networks

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Hosts HARDENING WINDOWS NETWORKS TRAINING

Windows Assessment. Vulnerability Assessment Course

Data Stored on a Windows Server Connected to a Network

Active Directory Self-Service FAQ

qliqdirect Active Directory Guide

Outline SSS Configuring and Troubleshooting Windows Server 2008 Active Directory

COMPLETE COMPUTING, INC.

Activity 1: Scanning with Windows Defender

FileCloud Security FAQ

How To Configure An Active Directory Domain Services

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550

Microsoft Baseline Security Analyzer

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Implementing HIPAA Compliance with ScriptLogic

Course: Configuring and Troubleshooting Windows Server 2008 Active Direct-ory Domain Services

M6425a Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Active Directory Domain Migration Checklist ADUM Active Directory Migrator

QliqDIRECT Active Directory Guide

Auditing Security and Controls of Windows Active Directory Domains

Windows Log Monitoring Best Practices for Security and Compliance

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Basic principles of infrastracture security Impersonation, delegation and code injection

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

WINDOWS 7 & HOMEGROUP

TIBCO Spotfire Platform IT Brief

Keeping Tabs on the Top 5 Critical Changes in Active Directory with Netwrix Auditor

Windows Operating Systems. Basic Security

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin

English. Network Sharing. Ver.3.0. * Firmware

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

WHITE PAPER. Take Back Control of Your Active Directory Auditing

Netwrix Auditor. Role-Based Access. Version: /27/2015

Internal Penetration Test

Guide to Securing Windows NT/9x Clients in a Windows 2000 Network

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

AD Self-Service Suite for Active Directory

Administering Windows Server 2012

Dell InTrust 11.0 Best Practices Report Pack

IT HEALTHCHECK TOP TIPS WHITEPAPER

Transferring AIS to a different computer

Outlook Express POP Instructions - Bloomsburg University Students

Defense Security Service Office of the Designated Approving Authority

Stellar Active Directory Manager

Security and Rights Delegations for the Password Reset PRO Master Service Applies to software versions 2.x.x and 3.x.x

NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services

Security Options... 1

Centralized Oracle Database Authentication and Authorization in a Directory

Likewise Security Benefits

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

NHSmail mobile configuration guide Apple iphone

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

Agenda. How to configure

COURSE 20411D: ADMINISTERING WINDOWS SERVER 2012

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

User Management Guide

M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

WirelessOffice Administrator LDAP/Active Directory Support

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

Windows servers. NT networks

1 of 5. [SOLVED] smb_pwd_check_ntlmv1: incorrect password length

Reports, Features and benefits of ManageEngine ADAudit Plus

Creating Home Directories for Windows and Macintosh Computers

NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Quality Management Consultancy

Configuring User Identification via Active Directory

User Roles & Adding Domains & Users

Role Based Access Control for Industrial Automation and Control Systems

Transcription:

SESSION ID: TECH-F02 Securing Active Directory Correctly Derek Melber, MVP Technical Evangelist ManageEngine @derekmelber

About Your Speaker Derek Melber, MCSE & MVP (Group Policy and AD) derek@manageengine.com Global Active Directory Seminars Monitoring and Auditing AD Securing AD Delegations Recovering AD Modifications and Deletions Online Resources ManageEngine Active Directory Blog www.auditingwindowsexpert.com Publications Group Policy Resource Kit MSPress

Agenda Active Directory Delegation is Configured Properly Anonymous Connections are Protected Authentication is Secured Properly Password Policy is Configured Securely

Active Directory Delegation Ability for AD admin to grant control over AD objects Typically done to Jr Admins, managers, etc Provides control over AD, but only in limited fashion Delegation is not obvious using Microsoft tools Incorrect delegations could be granted very easily

Active Directory Delegation Delegation for administration of AD objects Users Create or delete Modify properties Enable/Disable Reset password Unlock Groups Creation, deletion, modification Group membership Computers Create or delete

Active Directory Delegation Verify AD Delegations by using dsacls

Anonymous Connections Anonymous access can grant too much access To shared folders Users and their properties Anonymous access is no longer needed for most apps Microsoft provides controls, but not highly noted Windows 2000 is still vulnerable!

Anonymous Connections Clean out Pre-Windows 2000.. Group At install Everyone could be placed into this group Ensure all 4 anonymous security settings are correct Network access: Allow anonymous SID/Name translation Network access: Do not allow anonymous enumeration of SAM accounts Network access: Do not allow anonymous enumeration of SAM accounts and shared folders Network access: Let Everyone permissions apply to anonymous users

Anonymous Connections

Use of LAN Manager Authentication LAN Manager is a legacy authentication protocol LAN Manager (LM) was designed for Windows 3.11 (Do you remember what this OS version was called?) LM is easily cracked with the correct information exposed Eliminating LM can be difficult, but not impossible Could break legacy applications which is major issue

LMCompatibilityLevel 0 and 1 Clients use LM and NTLM authentication and never use NTLMv2 session security. Domain controllers accept LM, NTLM, and NTLMv2 authentication. Client does not use NTLMv2 auth 2 3 Clients use NTLM authentication only and use NTLMv2 session security if the server supports it. Domain controllers accept LM, NTLM, and NTLMv2 authentication. Client refuses to send LM response Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it Domain controllers accept LM, NTLM, and NTLMv2 authentication.

LMCompatibilityLevel 4 5 Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it. Domain controllers refuse LM and accept only NTLM and NTLMv2 authentication. Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it Domain controllers refuse LM and NTLM (they accept only NTLMv2 authentication).

Use of LAN Manager Authentication

Restricting NTLM Authentication Traffic New Group Policy Controls (Server 2003+) Detailed control over NTLM Audit or restrict Incoming or outgoing traffic 14

Storage of LM Hash LM is a very weak authentication protocol LM hash is not required LM hash can be stored in AD and local SAM Obtaining LAN Manager hash is easy way to crack passwords

Storage of LM Hash

Password Policy Password policy controls structure of user password Password policy is rarely if ever understood and configured properly! A weak or incorrect password policy could leave your organization completely exposed! Approximately 1 out of every 100 auditors correctly analyze these configurations

Password Policy Local SAM (Servers and Desktops) Active Directory (Domain Controllers) Domain User Accounts Local SAM user accounts Fine-Grained Password Policies Provide granular control of passwords to different users Must have the correct environment configured

Password Policy

Apply What You Learned How to Properly Configure Active Directory Delegation Ensured Anonymous Connections are Protected Properly Secured AD Authentications Analyzed and Configured the Password Policy Correctly

Resources derek@manageenginecom Active Directory blog on www.manageengine.com www.auditingwindowsexpert.com www.windowsecurity.com www.windowsnetworking.com The Group Policy Resource Kit (MSPress)

Thank you! Questions? Derek Melber derek@manageengine.com