ad hardening
This commit is contained in:
parent
32c50cb82e
commit
12ff223c52
|
@ -0,0 +1,86 @@
|
||||||
|
# Active Directory Hardening
|
||||||
|
|
||||||
|
## Policy Management Editor
|
||||||
|
|
||||||
|
Can be opened by right clicking on a domain in the Policy Management tool.
|
||||||
|
|
||||||
|
### Do Not Store The LM Hash
|
||||||
|
|
||||||
|
LM hashes can be bruteforced, disable them under security options in the Windows settings of the group Policy Management Editor
|
||||||
|
```
|
||||||
|
Network Security: Do not store LAN Manager hash value on next password change
|
||||||
|
```
|
||||||
|
|
||||||
|
### SMB Signing
|
||||||
|
|
||||||
|
Enable SMB signing in the Group Policy Mangement Editor under Security Options of the Local Policies of Windows Settings
|
||||||
|
```
|
||||||
|
Microsoft network server: Digitally sign communications (alway)
|
||||||
|
```
|
||||||
|
|
||||||
|
### LDAP Signing
|
||||||
|
|
||||||
|
Enable LDAP signin in the Group Policy Mangement Editor under Security Options of the Local Policies of Windows Settings
|
||||||
|
```
|
||||||
|
Domain Controller: LDAP servers signing requirements
|
||||||
|
```
|
||||||
|
|
||||||
|
### Passwords Policies
|
||||||
|
|
||||||
|
* Use Multi-factor authentication
|
||||||
|
* Use Group Managed Service Accounts (gMSAs) and rotate the passwords frequently
|
||||||
|
* Store a password history, so passwords won't be reused
|
||||||
|
* Set the password complexity through character pool and length of the password
|
||||||
|
* Use a passphrase
|
||||||
|
|
||||||
|
Set lifetime of passwords in the Group Policy Management Editor under Password Policy of Account Policies under Security Settings
|
||||||
|
```
|
||||||
|
Maximum password age
|
||||||
|
```
|
||||||
|
|
||||||
|
## Least Privilege Model
|
||||||
|
|
||||||
|
Do not use administrational accounts for everyday work.
|
||||||
|
Create accounts following these categories
|
||||||
|
|
||||||
|
* *User accounts*
|
||||||
|
* *Privileged accounts*
|
||||||
|
* *Shared accounts*
|
||||||
|
|
||||||
|
### Role Based Access Control (RBAC)
|
||||||
|
|
||||||
|
Grant permissions through temporary roles. Do not use Discretionary Access Control (DAC) if possible.
|
||||||
|
|
||||||
|
### Tiered Access Models (AD TAM)
|
||||||
|
|
||||||
|
Prevention of privileged credentials from crossing boundaries, either accidentally or intentionally.
|
||||||
|
Similar to the ring model
|
||||||
|
|
||||||
|
* *Tier 0*, includes administrational domain accounts, Domain Controller and groups
|
||||||
|
* *Tier 1*, Domain apps and servers
|
||||||
|
* *Tier 2*, unprivileged user
|
||||||
|
|
||||||
|
### Auditing Accounts
|
||||||
|
|
||||||
|
Frequent audits and continuous monitoring of the accounts and groups status and changes.
|
||||||
|
|
||||||
|
## Security Compliance Toolkit (MSCT)
|
||||||
|
|
||||||
|
Manage and implement domain-level policies via pre-defined baseline policies.
|
||||||
|
|
||||||
|
|
||||||
|
### Installing Security Baselines
|
||||||
|
|
||||||
|
Download the [Tools and the 'Security Baseline.zip'](https://www.microsoft.com/en-us/download/details.aspx?id=55319) and install the Powershell script.
|
||||||
|
|
||||||
|
### Policy Analyzer
|
||||||
|
|
||||||
|
It is included on [the same site](https://www.microsoft.com/en-us/download/details.aspx?id=55319) as the other tools.
|
||||||
|
|
||||||
|
### RDP
|
||||||
|
|
||||||
|
Do not expose RDP to the internet without additional security measures in place.
|
||||||
|
|
||||||
|
### Publicly Accessible Share
|
||||||
|
|
||||||
|
Use `Get-SmbOpenFile` cmdlet to look out for unwanted shares
|
Loading…
Reference in New Issue