Top 25 Active Directory Security Best Practices - Active Directory Pro
Top 25 Active Directory Security Best Practices - Active Directory Pro
This is the most comprehensive list of Active Directory Security Best Practices
online.
In this guide, I’ll share my recommendations for Active Directory Security and how
you can improve the security of your Windows domain environment.
You don’t have to spend a fortune to improve security there are many no cost and
low cost solutions that I’ll show you in this guide.
Table of contents:
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 1/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Active Directory has been around a long time and over the years malicious actors
have discovered vulnerabilities in the system and ways to exploit them. In addition
to vulnerabilities its become very easy for hackers to just steal or obtain user
credentials which then gives them access to your data. If they can get access to
your computer or your login then they could potentially gain Full access to Active
Directory and own your network.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 2/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Domain Admins are what the bad guys try to seek out.
Microsoft recommends that when DA access is needed, you temporarily place the
account in the DA group. When the work is done you should remove the account
from the DA group.
This process is also recommended for the Enterprise Admins, Backup Admins,
and Schema Admin groups.
Once attackers gain access to one system they can move laterally within a
network to seek out higher permissions (domain admins).
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 3/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Pass the hash allows an attacker to use the password hash to authenticate to
remote systems instead of the regular password. These hashes can be obtained
from end user computers.
Scary right?
All it takes is for one compromised computer or a user account for an attacker to
compromise a network.
Cleaning up the Domain Admins group is a great first step to increasing your
network security. This can defiantly slow down an attacker.
The process to remove accounts from the DA group is not easy. I know first hand
as I’ve recently gone through this process. It’s very common to have way too
many accounts in the DA group.
Summary
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 4/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Instead create two accounts, a regular account with no admin rights and a
privileged account that is used only for administrative tasks.
BUT
Do not put your secondary account in the Domain Admins group, at least
permanently.
Instead, follow the least privileged administrative model. Basically, this means
all users should log on with an account that has the minimum permissions to
complete their work.
You may read in other articles and forums to put your secondary account in the
Domain Admins group.
This is not a Microsoft best practice and I would advise against it. Again temporary
is OK but it needs to be removed as soon as the work is done.
With that said Microsoft does not make it easy to get away from Domain admin
rights. There is no easy process to delegate rights to all systems like DNS, DHCP,
group policy and so on. This is often the reason so many people have Domain
Admin rights.
You should use a regular non admin account for day to day tasks such as
checking email, browsing the internet, ticket system, and so on. You would only
use the privileged account when you need to perform admin tasks such as
creating a user in Active Directory, logging into a server, adding a DNS record, etc.
Now, take the same scenario but this time Steve is logged in with his regular non
admin account.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 5/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
By simply using a regular account you can increase security and avoid causing
serious damage.
Here are some common tasks that can be delegated to a secondary admin
account.
Some organizations use more than two accounts and use a tiered approach. This
is defiantly more secure but may be an inconvenience to some.
Regular account
Account for Server Administration
Account for Network Administration
Account for Workstation Administration
Summary
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 6/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
The 2nd account (admin account) should not have VPN access, email
and if possible no internet.
The built in Administrator account should only be used for the domain setup and
disaster recovery (restoring Active Directory).
No one should know the Domain Administrator account password. Set a really
long 20+ characters password and lock it in a vault. Again the only time this is
needed is for recovery purposes.
For more details on securing the Domain Administrator account see this Microsoft
article, Securing Built in Administrator Accounts in Active Directory
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 7/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Yes
You should be using an individual account that has the necessary rights to
complete tasks.
Two Problems.
1. It is a well known account, even if you re-name it the SID is the same and is
well known by attackers.
2. It’s often configured with the same password on every computer in the
domain.
Attackers just need to compromise one system and now they have local admin
rights on every domain joined computer. They could then use this account to pivot
to another system with the goal of finding domain admin access.
If you need to perform admin tasks on the computer (install software, delete files,
etc) you should be doing so with your individual account, not the local admin
account.
Even if the account is disabled you can boot into safe mode and use the local
administrator account.
What if the network is down or the NIC card died, what if you need to drop it from
the domain and re-add it? There are ways around this but it can really slow you
down.
If you cannot disable the account here are recommendations for securing the
account. A better alternative is to use the Microsoft LAPS tool (Covered
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 8/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
For more details see the following article, Securing local administrator accounts
and groups
Summary
This is one of the best free options for mitigation against pass the hash attacks
and lateral movement from computer to computer.
It’s very common that organizations deploy Windows using an image based
system. This makes it quick to deploy a standard configuration to all devices.
But..
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 9/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
This often means the local administrator account will be the same on every
computer. Since the local Administrator account has full rights to everything on the
computer, all it takes is for one of them to get compromised, then the hacker can
access all the systems.
LAPS is built upon the Active Directory infrastructure so there is no need to install
additional servers.
The solution uses the group policy client side extension to perform all the
management tasks on the workstations. It is supported on Active Directory 2003
SP1 and above and client Vista Service Pack 2 and above.
If you need to use the local admin account on a computer you would retrieve the
password from Active Directory and it would be unique to that single computer.
For step by step instructions on installing LAPS see this article, How to Install
Local Administrator Password Solution (LAPS)
Summary
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 10/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
LAPS can help resolve this issue by setting a random password for
the local administrator account on every computer.
It should not be used for checking email or browsing the internet. In fact… it
should not even have internet access.
Basically, when you need to use your privileged account to perform admin tasks
you should be doing it from a SAW. Daily use workstations are more vulnerable to
compromise from pass the hash, phishing attacks, fake websites, keyloggers, and
more.
Using a secure workstation for your elevated account provides much greater
protection from those attack vectors. Since attacks can come from internal and
external it’s best to adopt an assumed breach of security posture.
Due to the continuous threats and changes to technology the methodology on how
to deploy a SAW keeps changing. There are also PAW and jump servers to make
it even more confusing.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 11/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
1. Log into my computer with my regular account to check email and view new
support requests.
2. If I have some administrative task I will log into my SAW with my privileged
account that has rights to modify AD group membership and add the user
to the necessary AD security group.
It may seem like a hassle but I actually find it more convenient this way. I can
remote in when off network and have a server that has all the tools I need. I also
don’t have to worry about re-install all of my support software if I need to re-image
my computer.
Resources:
https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-
access/privileged-access-workstations
Summary
Computer Configuration -> Policies -Windows Settings -> Security Settings ->
Advanced Audit Policy Configuration
Account Logon
Ensure ‘Audit Credential Validation’ is set to ‘Success and Failure’
Account Management
Audit ‘Application Group Management’ is set to ‘Success and Failure’
Detailed Tracking
Audit ‘PNP Activity’ is set to ‘Success’
Logon/Logoff
Audit ‘Account Lockout’ is set to ‘Success and Failure’
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 13/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Object Access
Audit ‘Removable Storage’ is set to ‘Success and Failure’
Policy Change
Audit ‘Audit Policy Change’ is set to ‘Success and Failure’
Privilege Use
Audit ‘Sensitive Privilege Use’ is set to ‘Success and Failure’
System
Audit ‘IPsec Driver’ is set to ‘Success and Failure’
Malicious activity often starts on workstations, if you’re not monitoring all systems
you could be missing early signs of an attack.
In the next section, I’ll cover what events you should be monitoring.
Summary
If you do not have the proper auditing and logging settings configured
you can’t monitor for malicious activity or investigate a security breach.
You should be monitoring the following Active Directory events to help detect
compromise and abnormal behavior on the network.
Here are some events you should be monitoring and reviewing on a weekly basis.
Some log analyzers come pre built with Active Directory security reports and
others you will need to build them yourself.
Elk Stack
Lepid
Splunk
ManageEngine ADAudit Plus
Windows Event Forwarding
With a good log analyzer, you will be able to quickly spot suspicious activity in
your Active Directory environment.
Here are some screenshots from an analyzer that I use. The first screenshot
shows a spike in account lockouts.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 15/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
In this screenshot, you can see a huge spike in logon failures. Without a log
analyzer, these events would be hard to spot.
Summary
You should have a log analyzer installed to monitor and alert for
malicious activity on the network.
The benefit is you can see malicious attempts and cut attackers off
before they breach your systems
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 16/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
A log analyzer also helps for analyzing events after a breach but is
more important to spot abnormal activity early on.
Passphrases are simply two or more random words put together. You can add
numbers and characters if you want but I wouldn’t make it a requirement.
Studies have shown when you require complexity it is used in a similar pattern
and then repeated. Hackers have caught onto this and there are now huge
passwords lists (freely available) that contain millions of easy to guess passwords.
Long passwords and using the passphrase technique make it more difficult for
password cracking software and for hackers to guess.
The key to using passphrases is to be totally random with each word, you don’t
want to type out a sentence where the next word can be guessed.
Bucketguitartire22
Screenjugglered
RoadbluesaltCloud
The above examples are totally random. These would take a very long time to
crack and most likely no one would guess them.
Theskyisblue44
If your organization must meet certain standards then make sure those standards
support these password recommendations.
Summary
Next, don’t name your security groups with a generic name like helpdesk or HR
Training.
When you have generic names like this they will get used on all kinds of resources
and you will have lost all control of security.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 18/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
And there is no easy way to see what all a security group has permissions to. Yes,
there are tools that you can run but if you have a medium or large size
environment this will be a huge task.
Here is an example
IT_Local is very generic. Just by looking at the name, I don’t know what this is
used for. Yes, it’s probably used by the IT department but where?
This is how permissions can get out of control and you could end up giving people
access to things they shouldn’t have access to. Some sysadmin might get a
request for access to the IT department network share and add users to this
group. But what he doesn’t know is that group might be used on other systems.
Now he just gave some users full permissions to some other systems.
When you use a descriptive name like the “N Drive HR_Training” group you can
look at the name and have a good idea of what it is for. In this example, it’s for the
N drive, it’s for HR and has something to do with Training. Your IT staff should
have a good idea what this is just by the name.
Here is a real world example of how bad group names can lead to issues.
There was a group called helpdesk, another group IS Support, and one more
called AD Modify.
I was under the impression only Helpdesk staff had rights to Active Directory to
reset passwords and unlock accounts.
Come to find out these groups were used for other resources such as the
helpdesk software, network share, and printers. So it included various IT staff.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 19/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Once I removed these groups I got phone calls from programmers and business
analysts asking why they couldn’t reset user’s passwords anymore. Why on earth
are programmers resetting user passwords?
I clear precise Security group name would have prevented this from happening.
If you don’t name the security group specific then it can be a catch all for
permissions to many other things.
Since the group name is precise, this would help prevent it from being used on
other resources like a printer or network share.
Again, this has a very specific name and helps identify what it should be used for.
You can come up with your own naming convention just get specific with the name
and avoid generic one word group names.
Summary
You need to have a procedure in place to detect inactive users and computer
accounts in Active Directory.
You don’t want a bunch of unused accounts sitting in Active Directory just waiting
for an attacker to discover and use. This can also cause issues with reporting,
patching, and slow down group policy.
CIS Critical Security Controls says “There are many ways to covertly obtain
access to user accounts, including weak passwords, accounts still valid after a
user leaves the enterprise, dormant or lingering test accounts”
I created a tool called AD Cleanup Tool that lets you quickly find inactive users
and computer accounts.
If you want more details on finding inactive users or how to do this with
PowerShell check out this article titled Finding inactive Users in Active Directory
A user with local admin rights gives them full access to the entire Windows
Operating system. This can lead to all kinds of security issues, such as installing
software, disabling antivirus, downloading and installing malware, stealing data,
hacking credentials, pivoting to other computers, and so on.
“Of all the Windows vulnerabilities discovered in 2018, 169 of these were
considered ‘critical’. Removing admin rights could have mitigated 85% of these
critical vulnerabilities”
By removing users from the local administrator group you greatly reduce the
opportunities for attackers to gain access to your computer and network.
I recommend you control the local administrator group by using group policy. If you
remove them from the computer with no centralized control then someone will just
add the rights back. I have fought this battle many times with helpdesk. I remove
the rights then they just add it back when troubleshooting an issue.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 22/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
By using group policy and restricted groups, this will prevent your staff from
leaving accounts in the group.
I wrote a complete guide on this check it out here -> Remove Users from Local
Administrator Group using Group Policy.
DC’s are critical to the enterprise, you don’t want to increase security risks by
having additional software running on them.
Windows Server Core is a great option for running the DC role and other roles
such as DHCP, DNS, print servers, and file servers. Server Core runs without a
GUI and requires fewer security patches due to its smaller footprint.
Server core can have its challenges though with some 3rd party software not
being compatible.
Summary
If you do not regularly scan and remediate discovered vulnerabilities you are at a
much greater risk for comprise.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 23/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
There are a large number of vulnerability and scanning tools available, see my list
of the best patch management software.
Anytime a system needs to access the internet it will in most cases use a domain
name. Computers talk to each other by IP address so the computers use DNS to
map a domain name to an IP address.
There are several services available that check DNS queries for malicious
domains and blocks them.
These DNS services gather intelligence about malicious domains from various
public and private sources. When it gets a query for a domain that it has flagged
as malicious it will block access when your system attempts to contact them.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 24/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Here is an example:
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 25/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Step 3: DNS Service checks if the domain is on its threat list, it is so it returns a
block reply.
In the above example since the DNS query returned a block, no malicious traffic
ever entered into the network.
Quad9
OpenDNS
Also, most IPS (Intrusion Prevention Systems) systems support the ability to
check DNS lookups against a list of malicious domains.
Summary
Secured-core Server
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 26/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Summary
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 27/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Check your Office 365 or ADFS logs, you will be surprised at how many login
attempts are coming from China and Russia.
One of the best ways to protect against compromised accounts is two factor
authentication. This will also help against password spraying attacks.
Let’s say a user fell for a phishing attempt that asked the user to verify their
username and password.
Now the attacker has that user’s Active Directory credentials. The attacker could
now gain access to a number of systems from anywhere.
If the user had two factor enabled this could prevent access even though the
account has been compromised. The attacker would need the second set of
credentials to get logged in.
There really is no stopping accounts from getting compromised there are too
many ways for attackers to gain the credentials.
If you are using Office 365 and depending on what package you have MFA may
be included. Take advantage of this feature.
DUO
RSA
Microsoft MFA
There are ways to prevent only authorized devices from connecting but this can
be costly and a lot of work to set up. If you have the resources then that is the way
to go.
Another method that is already available to you is to monitor the DHCP logs for
connected devices.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 28/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
You should have all end user devices setup to use DHCP. You can then look at the
logs to see what is connecting. You should have a naming convention for your
equipment, this will make it easy to spot possible unauthorized devices.
In the screenshot below I can easily spot a device that does not follow my
computer naming convention.
minint-1bdvd67 is not something I recognize. I will need to look into this and see if
it is an authorized device.
With this setup, you can log every internal and external DNS lookup. When a
client device makes a connection to a malicious site it will log that site name in the
DNS logs.
These malicious domains are usually odd, random character domains that don’t
look normal.
Here are some screenshots of suspicious DNS lookups from my logs. These
repeatedly show up in my logs for a handful of devices.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 29/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
To view the DNS lookups you first need to enable the DNS debug logs on the
Windows Servers.
Once you have the debug logs setup you can import those logs into an analyzer to
quickly spot malicious activity.
You can also convert the log file to a CSV to make it easier to read and filter.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 30/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
No matter what level of office 365 you are on there are some features you should
look into.
But
Microsoft does improve and add new features at every level (At least this is what
I’ve noticed since being on Office 365).
I’m currently running a hybrid office 365 setup. In azure I can see several risky
sign on reports.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 31/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Azure alerted me to a sign on that came from China from one of our accounts.
Some of these features are available with the latest ADFS version and some are
included with an office 365 subscription.
Definitely check out all the available security features in ADFS, Office 365, and
Azure.
Resources:
https://cloudblogs.microsoft.com/enterprisemobility/2018/03/05/azure-ad-and-adfs-
best-practices-defending-against-password-spray-attacks/
Secure score analyzes your office 365 organization security based on activity and
security settings.
Secure Score checks your Office 365 services then checks your settings and
activities and provides you a security score.
Once it analyzes your score it will provide a detailed list of what was scored and
recommended actions to fix the issues.
Do you have a response policy? Have you tested and trained staff on how to
handle such an event?
Cyber attacks can shut down systems and bring business operations to a halt.
The City of Atlanta was shut down by a cyber attack, this prevented residents from
paying online utility bills. In addition, Police officers had to write reports by hand.
Last I checked it cost more than $5 million for them to recover from the attack.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 33/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
A good incident response plan could have limited the impact and enabled services
back online much faster.
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
If you are delegating rights to individuals then you are losing control of who has
access.
Create custom groups with very specific names, document who has rights, and a
process for adding new users. Don’t just allow users to be added to these custom
groups without an approval process. This is just another way permissions can get
out of control.
Know what groups are delegated to what resources, document it, and make sure
your team is on the same page.
These are wildly used and often have a password set to never expire.
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 34/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
These accounts will often end up with too many permissions and more often than
not are a member of the domain admins group.
Bad..very bad
Don’t allow that to happen, there are ways to make it work without DA access.
Summary
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 35/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Establishing a secure configuration on all systems can reduce the attack surface
while maintaining functionality. There are several resources that provide security
benchmarks.
Microsoft has a Security Compliance Toolkit that allows you to analyze and test
against Microsoft’s recommended security configuration baselines.
Most of the recommended settings can be set up using Group Policy and
deployed to all computers.
CIS Securesuite can also scan against other systems like Cisco, VMware, Linux,
and more.
Download this guide in a simple checklist format. It includes 3 bonus security tips.
Email address
DOWNLOAD FREE CHECKLIST
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 37/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Leandro
August 22, 2018 at 3:16 pm
HI There,
Reply
Robert Allen
August 23, 2018 at 11:58 am
Reply
Damon Hina
June 2, 2019 at 8:32 am
Reply
Robert Allen
June 2, 2019 at 6:39 pm
Thanks Damon
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 38/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Reply
Ale
September 17, 2018 at 9:18 am
HI,
great guide, really!
What about application that may require admin rights (e.g. Backup)?
BR
Reply
Robert Allen
September 22, 2018 at 7:14 pm
Limit the permissions as much as you can. There are programs such as
Powerbrowker for windows that can escalate permissions to a program
only when its executed, you can also specify the credentials. So instead
of escalating permissions to a domain account you could use the local
system account.
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 39/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Ed Kuskowski
January 28, 2019 at 2:31 pm
Robert,
I’ve enabled policies according to step 7. Enable Audit policy Settings with
Group Policy
If a user fails logon with bad password, will I see this on a domain
controller log ? what log, where ?
I definitely see it on the workstation log, but I would like to see it on the
DC. Maybe I need a rebpoot of DC’s . let me know. Thanks . The guide is
great
Reply
Robert Allen
January 29, 2019 at 11:06 pm
You will need to enable this in the default domain controller policy or
create a new GPO and link it to the domain controllers OU. This will log
security related events on the domain controllers security event logs.
Reply
ce1
February 12, 2019 at 10:32 am
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 40/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Reply
Rick
March 13, 2019 at 1:50 pm
Great information!! A great consolidated list of high hitting items that give
you best bang for your time as system admins.
Reply
Edward
April 9, 2019 at 2:09 am
Reply
Robert Allen
April 12, 2019 at 11:14 pm
No problem, Edward.
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 41/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Minh
May 10, 2019 at 10:32 pm
Reply
Robert Allen
January 1, 2021 at 5:13 pm
Reply
Mike Ivanoff
May 21, 2019 at 9:52 am
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 42/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Robert Allen
May 21, 2019 at 12:33 pm
Hi Mike. There are many log and analysis tools out there, I did list a few
of them under tip #8. ManageEngine ADAudit Plus is a great tool for
auditing and analyzing account lockouts. I’m also creating a simple
PowerShell tool that will help troubleshoot account lockouts and test for
weak passwords.
Reply
David
May 24, 2019 at 1:17 am
When will you have PowerShell tool available? Do you have a more
detail list then what you posted that you can share?
Reply
Robert Allen
May 29, 2019 at 10:35 pm
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 43/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Inky
July 26, 2019 at 9:11 am
Reply
William
July 30, 2019 at 1:19 pm
Hi, Robert. Excellent info here. Quick question if there are no Domain
Admins what account is used to grant temporary access to Domain
Admins especially since it states no one should know the Built-in
Administrator password?
Reply
Robert Allen
August 1, 2019 at 12:49 am
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 44/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
fenrizx
August 30, 2019 at 8:48 am
Reply
Robert Allen
September 1, 2019 at 2:37 pm
Thanks
Reply
Brian Kelly
September 3, 2019 at 2:31 pm
Reply
Vasil Lilov
November 2, 2019 at 5:46 pm
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 45/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Great article!!! I really enjoyed. Thank you for supporting the community.
Reply
Robert Allen
November 3, 2019 at 3:15 pm
Reply
Geekgal
November 20, 2019 at 5:20 pm
The best guide I have ever seen!! Thank you for publishing this, as a
sysadmin this really helps to make my points to the boss.
Reply
Robert Allen
November 23, 2019 at 9:24 pm
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 46/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Ren
February 10, 2020 at 8:22 am
Reply
Robert Allen
February 15, 2020 at 8:14 pm
OUs are a great way to organize your users and computers. I don’t see
any security risk with them. I provide some OU organizing tips in another
article https://activedirectorypro.com/active-directory-management-tips/
Reply
Byron
March 8, 2020 at 4:51 pm
Elk Stack
Lepid
Splunk
Just curious which analyzer you currently use? If you don’t mind sharing.
Thanks!
Reply
Robert Allen
March 15, 2020 at 2:38 pm
I’m currently using ManageEngine ADAudit Plus. It has some really good
pre-configured audit reports and it’s easy to setup.
Reply
Homayoon
March 31, 2020 at 5:47 am
Reply
Robert Allen
January 1, 2021 at 5:43 pm
Homayoon,
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 48/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Reply
Naren
June 5, 2020 at 6:03 am
Reply
Robert Allen
June 6, 2020 at 3:03 pm
Thanks dude!
Reply
Radim
June 12, 2020 at 8:32 am
Hello,
Great article !
I have a question, I want to know your opinion what is better for logging
into domain servers (DC even member servers):
IT staff user Steve has two account. First account with “Regular Rights”
(e.g. SteveD) and second account with “privileged Domain Rights” (e.g.
Admin01).
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 49/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Scenario 1 : Steve logs into domain server as Admin01 and he does his all
job with “privileged Domain Rights”.
Scenario 2 : Steve logs into domain server as SteveD and he does his job
with “Regular Rights”. If he needs escalate he use “run as administrator …
Admin01”.
Reply
Robert Allen
June 20, 2020 at 8:23 pm
Hi Radim.
I would not recommend logging into a domain controller and doing daily
work from there.
https://docs.microsoft.com/en-us/windows-server/identity/securing-
privileged-access/privileged-access-workstations
I typically setup a server with remote desktop services for admin work.
Most admin tools get installed on this server and then consoles and
access to critical infrastructure can be locked down to this admin server.
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 50/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
fabio
July 29, 2020 at 3:05 pm
APPLOCKER !!!!!
so whitelist just installed app , and no NEW app can RUN from user.
Reply
Robert Allen
August 9, 2020 at 2:22 pm
I agree. Application whitelisting is a must. I’ll have to add that to the list.
Thanks for the tip.
Reply
David
August 6, 2020 at 11:37 pm
Hi,
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 51/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Reply
Robert Allen
August 10, 2020 at 11:17 pm
3. If you create a regular user account then read these tips ->
https://www.lepide.com/blog/nine-tips-for-preventing-misuse-of-service-
accounts-in-active-directory/
Reply
jon
August 27, 2020 at 9:27 pm
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 52/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Robert Allen
January 2, 2021 at 4:20 pm
Make a firewall rule and only allow the saw access to the azure cloud
and only allow the needed ports.
Example firewall rule. The FQDN is made up, you would need to look up
the correct FQDN.
Reply
Clement
September 22, 2020 at 9:43 am
This is a wonderful guide. Thank you very much for it. I am still new in
system administration, so I need article on how to secure office 365
Reply
Robert Allen
September 24, 2020 at 11:09 am
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 53/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Thanks Clement.
Reply
Dhananjay Vadukul
August 24, 2021 at 12:03 pm
Can you please share that link over here for O365 best practices…
Thanks in Advance!
Reply
Robert Allen
August 24, 2021 at 1:46 pm
Reply
Fabio Moretto
October 15, 2020 at 6:38 pm
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 54/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Robert Allen
November 7, 2020 at 3:52 pm
Thanks Fabio
Reply
Travis Widener
November 4, 2020 at 4:44 pm
Great Info! Thank you for sharing this and I will be reading your Office 365
best practice guide when you complete it.
Reply
Kristof Reinkens
December 9, 2020 at 10:54 pm
Reply
Robert Allen
December 12, 2020 at 2:59 pm
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 55/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Thank Kristof
Reply
Sandeep
January 19, 2021 at 3:20 pm
Reply
Leif
March 29, 2021 at 1:49 pm
Hi,
Reply
Pablo
April 10, 2021 at 12:48 am
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 56/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Amazing guide!
Can you please share your feedback about Account Operators and
Administrators groups?
Reply
Michael
September 14, 2021 at 8:42 am
Reply
Robert Allen
September 16, 2021 at 3:49 pm
Seems like I remember seeing a guide from Microsoft but now I can’t find
it. Here is a process I use:
1. For anyone that needs admin rights to a system they get a secondary
admin account
Reply
Geert
April 4, 2022 at 8:46 am
Reply
Robert Allen
April 4, 2022 at 11:35 am
You could allow it through the firewall for the SAW. There are a lot of
URLs and IPs that need allow. Here is the Microsoft list
https://docs.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-
address-ranges?view=o365-worldwide
Reply
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 58/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Leave a Comment
Name *
Email *
Website
Post Comment
Resources
Tools
Blog
Contact
Account Login
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 59/60
4/5/22, 1:57 PM Top 25 Active Directory Security Best Practices - Active Directory Pro
Follow Us
https://activedirectorypro.com/active-directory-security-best-practices/#stop-adding-to-domain-admin 60/60