Active Directory Security Journey
Active Directory Security Journey
The Journey
https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnectsync-implement-
password-synchronization Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Azure AD Connect Server Recommendations
• Protect like a Domain Controller
• Lock down AAD Connect server
• Firewall off from the network – only needs to connect to Azure AD
& DCs
• Only AD Admins should be allowed to logon/admin
• Lock down AADC service account (MSOL_*) logon ability
• Monitor AADC service account logon
• Keep the Account Operators group empty
• Enables impersonation
without prior AD
authentication
(NTLM/Kerberos).
DerbyCon 2015: Red vs. Blue: Modern Active Directory Attacks & Defense
Sean Metcalf [@Pyrotek3 | [email protected]]
KCD Protocol Transition To DCSYNC
Unconstrained
Constrained
KCD – Protocol Transition
https://support.microsoft.com/en-us/help/305144/how-to-use-the-useraccountcontrol-flags-to-manipulate-user-account-
properties Sean Metcalf [@Pyrotek3 | [email protected]]
Kerberos Delegation Mitigations
GOOD:
• Set all AD Admin accounts to:
“Account is sensitive and cannot be delegated”
BEST:
• Add all AD Admin accounts to the “Protected Users” group (Windows
2012 R2 DFL).
• Use delegation service accounts with long, complex passwords
(preferably group Managed Service Accounts).
• Don’t use Domain Controller SPNs when delegating.
• Monitor who has the ability to configure Kerberos delegation.
”if you run tscon.exe as the SYSTEM user, you can connect to
any session without a password”
https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-
move-through-an-da2a1e73a5f6
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Alexander Korznikov demonstrates using Sticky Keys and tscon to access an administrator RDP
session — without even logging into the server.
https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-
move-through-an-da2a1e73a5f6 Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Microsoft Active Directory
Security Guidance
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Security Privileged Access Roadmap: Stage 1
https://docs.microsoft.com/en-us/windows-server/identity/securing-privileged-access/privileged-access-workstations
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Lower attack surface of Domain & DCs:
What’s Missing?
• Clear guidance on recommended GPO security settings beyond default.
• Protocol/feature reduction/lockdown
• Implementation guidance for implementing Admin systems (PAWs,
Admin/Jump servers, etc) to limit management protocols.
• Beyond RDP: Limit WMI, WinRM, etc
• AppLocker on DCs…
• The last 4 - 5 items are focused on preventing DC internet access. Use a
host firewall/IPSec rule and reinforce on perimeter firewalls and call it a
day.
Securing Domain Controllers to Improve Active Directory
Security
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
https://adsecurity.org/?p=3377
Lower attack surface of Domain & DCs
https://technet.microsoft.com/en-us/library/mt631193.aspx
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Achieving Tier 0: AD Admin & DCs
• DCs have separate management and patching system than other
tiers (ex. WSUS or SCCM).
• All admin systems for DCs and other systems in Tier 0 only exist
in this tier.
• All AD admin accounts use PAWs.
• All privileged AD service accounts are only on Tier 0 systems.
• Requires all relevant systems to exist in this tier.
• Domain Controllers
• ADFS
• Azure AD Connect Server
• Virtualization Platform servers
Difficulty Level:
Medium-High
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
What’s Missing?
• Removing local admin rights from users.
• Limiting broad system access
• Workstation Admin
• Server Admin
• Limiting network access from any system to any system
(host-based firewall with default block inbound rule.
• Practical guidance on achieving each tier with case
studies.
• Service Account risks
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Red Forest aka ESAE
Separate forest for Active Directory Administration
Sean Metcalf (@PyroTek3) TrimarcSecurity.com
Admin Forest
aka Enhanced Security Administrative Environment
(ESAE)
Slides: Presentations.ADSecurity.org
Sean Metcalf (@PyroTek3) TrimarcSecurity.com