* Use Group Managed Service Accounts (gMSAs) and rotate the passwords frequently
* Store a password history, so passwords won't be reused
* Set the password complexity through character pool and length of the password
* Use a passphrase
Set lifetime of passwords in the Group Policy Management Editor under Password Policy of Account Policies under Security Settings
```
Maximum password age
```
## Least Privilege Model
Do not use administrational accounts for everyday work.
Create accounts following these categories
* *User accounts*
* *Privileged accounts*
* *Shared accounts*
### Role Based Access Control (RBAC)
Grant permissions through temporary roles. Do not use Discretionary Access Control (DAC) if possible.
### Tiered Access Models (AD TAM)
Prevention of privileged credentials from crossing boundaries, either accidentally or intentionally.
Similar to the ring model
* *Tier 0*, includes administrational domain accounts, Domain Controller and groups
* *Tier 1*, Domain apps and servers
* *Tier 2*, unprivileged user
### Auditing Accounts
Frequent audits and continuous monitoring of the accounts and groups status and changes.
## Security Compliance Toolkit (MSCT)
Manage and implement domain-level policies via pre-defined baseline policies.
### Installing Security Baselines
Download the [Tools and the 'Security Baseline.zip'](https://www.microsoft.com/en-us/download/details.aspx?id=55319) and install the Powershell script.
### Policy Analyzer
It is included on [the same site](https://www.microsoft.com/en-us/download/details.aspx?id=55319) as the other tools.
### RDP
Do not expose RDP to the internet without additional security measures in place.
### Publicly Accessible Share
Use `Get-SmbOpenFile` cmdlet to look out for unwanted shares