Top 25 Active Directory Security Best Practices - Active Directory Pro
Top 25 Active Directory Security Best Practices - Active Directory Pro
com/active-directory-security-best-practices/
This is the most comprehensive list of Active Directory Security Best Practices
online.
In this guide, I’ll share my recommendations for Active Directory Security and
how you can improve the security of your Windows domain environment.
You don’t have to spend a fortune to improve security there are many no cost
and low cost solutions that I’ll show you in this guide.
1 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
2 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Active Directory has been around for a long time and over the years malicious
actors have discovered vulnerabilities in the system and ways to exploit them.
In addition to vulnerabilities, it becomes very easy for hackers to just steal or
obtain user credentials which then gives them access to your data. If they can
get access to your computer or your login then they could potentially gain Full
access to Active Directory and own your network.
Now let’s dive into the list of Active Directory Security Best Practices.
Domain Admins are what the bad guys try to seek out.
This process is also recommended for the Enterprise Admins, Backup Admins,
3 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Once attackers gain access to one system they can move laterally within a
network to seek out higher permissions (domain admins).
Pass the hash allows an attacker to use the password hash to authenticate to
remote systems instead of the regular password. These hashes can be
obtained from end user computers.
4 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Scary right?
All it takes is for one compromised computer or a user account for an attacker
to compromise a network.
Cleaning up the Domain Admins group is a great first step to increasing your
network security. This can defiantly slow down an attacker.
The process to remove accounts from the DA group is not easy. I know first
hand as I’ve recently gone through this process. It’s very common to have way
too many accounts in the DA group.
Instead create two accounts, a regular account with no admin rights and a
privileged account that is used only for administrative tasks.
BUT
Do not put your secondary account in the Domain Admins group, at least
permanently.
You may read other articles and forums to put your secondary account in the
Domain Admins group.
5 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
This is not a Microsoft best practice and I would advise against it. Again
temporary is OK but it needs to be removed as soon as the work is done.
With that said Microsoft does not make it easy to get away from Domain
admin rights. There is no easy process to delegate rights to all systems like
DNS, DHCP, group policy, and so on. This is often the reason so many people
have Domain Admin rights.
You should use a regular non admin account for day to day tasks such as
checking email, browsing the internet, ticket system, and so on. You would
only use the privileged account when you need to perform admin tasks such
as creating a user in Active Directory, logging into a server, adding a DNS
record, etc.
Now, take the same scenario but this time Steve is logged in with his regular
non admin account.
By simply using a regular account you can increase security and avoid causing
serious damage.
6 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Here are some common tasks that can be delegated to a secondary admin
account.
Some organizations use more than two accounts and use a tiered approach.
This is defiantly more secure but may be an inconvenience to some.
• Regular account
• Account for Server Administration
• Account for Network Administration
• Account for Workstation Administration
The built-in Administrator account should only be used for the domain setup
and disaster recovery (restoring Active Directory).
No one should know the Domain Administrator account password. Set a really
7 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
long 20+ characters password and lock it in a vault. Again the only time this is
needed is for recovery purposes.
For more details on securing the Domain Administrator account see this
Microsoft article, Securing Built in Administrator Accounts in Active Directory
Yes
You should be using an individual account that has the necessary rights to
complete tasks.
Two Problems.
8 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
1. It is a well-known account, even if you rename it the SID is the same and is
well-known by attackers.
2. It’s often configured with the same password on every computer in the
domain.
Attackers just need to compromise one system and now they have local admin
rights on every domain-joined computer. They could then use this account to
pivot to another system with the goal of finding domain admin access.
If you need to perform admin tasks on the computer (install software, delete
files, etc) you should be doing so with your individual account, not the local
admin account.
Even if the account is disabled you can boot into safe mode and use the local
administrator account.
What if the network is down or the NIC card died, what if you need to drop it
from the domain and re-add it? There are ways around this but it can really
slow you down.
If you cannot disable the account here are recommendations for securing the
account. A better alternative is to use the Microsoft LAPS tool (Covered
below in tip #5)
For more details see the following article, Securing local administrator
9 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
This is one of the best free options for mitigation against pass the hash attacks
and lateral movement from computer to computer.
It’s very common that organizations deploy Windows using an image based
system. This makes it quick to deploy a standard configuration to all devices.
But..
This often means the local administrator account will be the same on every
computer. Since the local Administrator account has full rights to everything
on the computer, all it takes is for one of them to get compromised, then the
hacker can access all the systems.
The solution uses the group policy client side extension to perform all the
management tasks on the workstations. It is supported on Active Directory
2003 SP1 and above and client Vista Service Pack 2 and above.
If you need to use the local admin account on a computer you would retrieve
the password from Active Directory and it would be unique to that single
computer.
10 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
For step-by-step instructions on installing LAPS see this article, How to Install
Local Administrator Password Solution (LAPS)
It should not be used for checking email or browsing the internet. In fact… it
should not even have internet access.
11 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Basically, when you need to use your privileged account to perform admin
tasks you should be doing it from a SAW. Daily use workstations are more
vulnerable to compromise from pass the hash, phishing attacks, fake websites,
keyloggers, and more.
Using a secure workstation for your elevated account provides much greater
protection from those attack vectors. Since attacks can come from internal and
external it’s best to adopt an assumed breach of security posture.
1. Log into my computer with my regular account to check email and view
new support requests.
2. If I have some administrative task I will log into my SAW with my privileged
12 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
account that has rights to modify AD group membership and add the user
to the necessary AD security group.
It may seem like a hassle but I actually find it more convenient this way. I can
remote in when off network and have a server that has all the tools I need. I
also don’t have to worry about re-install all of my support software if I need to
re-image my computer.
For more information on this topic check out Microsoft’s Privileged access
devices documentation.
Computer Configuration -> Policies -Windows Settings -> Security Settings ->
Advanced Audit Policy Configuration
Account Logon
Ensure ‘Audit Credential Validation’ is set to ‘Success and Failure’
Account Management
Audit ‘Application Group Management’ is set to ‘Success and Failure’
Audit ‘Computer Account Management’ is set to ‘Success and Failure’
Audit ‘Other Account Management Events’ is set to ‘Success and Failure’
Audit ‘Security Group Management’ is set to ‘Success and Failure’
Audit ‘User Account Management’ is set to ‘Success and Failure’
Detailed Tracking
13 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Logon/Logoff
Audit ‘Account Lockout’ is set to ‘Success and Failure’
Audit ‘Group Membership’ is set to ‘Success’
Audit ‘Logoff’ is set to ‘Success’
Audit ‘Logon’ is set to ‘Success and Failure’
Audit ‘Other Logon/Logoff Events’ is set to ‘Success and Failure’
Audit ‘Special Logon’ is set to ‘Success’
Object Access
Audit ‘Removable Storage’ is set to ‘Success and Failure’
Policy Change
Audit ‘Audit Policy Change’ is set to ‘Success and Failure’
Audit ‘Authentication Policy Change’ is set to ‘Success’
Audit ‘Authorization Policy Change’ is set to ‘Success’
Privilege Use
Audit ‘Sensitive Privilege Use’ is set to ‘Success and Failure’
System
Audit ‘IPsec Driver’ is set to ‘Success and Failure’
Audit’ Other System Events’ is set to ‘Success and Failure’
Audit ‘Security State Change’ is set to ‘Success’
Audit ‘Security System Extension’ is set to ‘Success and Failure’
Audit ‘System Integrity is set to ‘Success and Failure’
14 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
In the next section, I’ll cover what events you should be monitoring.
Here are some events you should be monitoring and reviewing on a weekly
basis.
Some log analyzers come pre-built with Active Directory security reports and
others you will need to build yourself.
• Elk Stack
15 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
• Lepid
• Splunk
• ManageEngine ADAudit Plus
• Windows Event Forwarding
With a good log analyzer, you will be able to quickly spot suspicious activity in
your Active Directory environment.
Here are some screenshots from an analyzer that I use. The first screenshot
shows a spike in account lockouts.
In this screenshot, you can see a huge spike in logon failures. Without a log
analyzer, these events would be hard to spot.
16 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Passphrases are simply two or more random words put together. You can add
numbers and characters if you want but I wouldn’t make it a requirement.
Studies have shown when you require complexity it is used in a similar pattern
and then repeated. Hackers have caught onto this and there are now huge
password lists (freely available) that contain millions of easy to guess
passwords.
Long passwords and using the passphrase technique make it more difficult for
17 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
The key to using passphrases is to be totally random with each word, you
don’t want to type out a sentence where the next word can be guessed.
The above examples are totally random. These would take a very long time to
crack and most likely no one would guess them.
If your organization must meet certain standards then make sure those
standards support these password recommendations.
First of all, make sure you apply permissions to resources with security groups,
not individual accounts, this makes managing resources much easier.
Next, don’t name your security groups with a generic name like helpdesk or
HR Training.
When you have generic names like this they will get used on all kinds of
resources and you will have lost all control of security.
And there is no easy way to see where security groups are being used. Yes,
there are tools that you can run but if you have a medium or large size
environment this will be a huge task.
Here is an example
IT_Local is very generic. Just by looking at the name, I don’t know what this is
used for. Yes, it’s probably used by the IT department but where?
This is how permissions can get out of control and you could end up giving
people access to things they shouldn’t have access to. Some sysadmin might
get a request for access to the IT department network share and add users to
this group. But what he doesn’t know is that the group might be used on
other systems. Now he just gave some users full permissions to some other
systems.
When you use a descriptive name like the “N Drive HR_Training” group you
can look at the name and have a good idea of what it is for. In this example,
it’s for the N drive, it’s for HR, and has something to do with Training. Your IT
staff should have a good idea of what this is just by the name.
19 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Here is a real-world example of how bad group names can lead to issues.
There was a group called helpdesk, another group IS Support, and one more
called AD Modify.
I was under the impression only Helpdesk staff had rights to Active Directory
to reset passwords and unlock accounts.
Come to find out these groups were used for other resources such as the
helpdesk software, network share, and printers. So it included various IT staff.
Once I removed these groups I got phone calls from programmers and
business analysts asking why they couldn’t reset user’s passwords anymore.
Why on earth are programmers resetting user passwords?
I clear precise Security group name would have prevented this from
happening.
If you don’t name the security group specific then it can be a catch all for
permissions to many other things.
Since the group name is precise, this would help prevent it from being used on
other resources like a printer or network share.
20 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Again, this has a very specific name and helps identify what it should be used
for.
You can come up with your own naming convention just get specific with the
name and avoid generic one word group names.
You don’t want a bunch of unused accounts sitting in Active Directory just
waiting for an attacker to discover and use. This can also cause issues with
reporting, patching, and slowing down group policy.
CIS Critical Security Controls says “There are many ways to covertly obtain
access to user accounts, including weak passwords, accounts still valid after a
user leaves the enterprise, dormant or lingering test accounts”
I created a tool called AD Cleanup Tool that lets you quickly find inactive users
and computer accounts.
21 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
If you want more details on finding inactive users or how to do this with
PowerShell check out this article titled Finding inactive Users in Active
Directory
A user with local admin rights has full access to the entire Windows Operating
system. This can lead to all kinds of security issues, such as installing software,
disabling antivirus, downloading and installing malware, stealing data, hacking
credentials, pivoting to other computers, and so on.
“Of all the Windows vulnerabilities discovered in 2018, 169 of these were
considered ‘critical’. Removing admin rights could have mitigated 85% of these
critical vulnerabilities”
22 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
By removing users from the local administrator group you greatly reduce the
opportunities for attackers to gain access to your computer and network.
I recommend you control the local administrator group by using group policy.
If you remove them from the computer with no centralized control then
someone will just add the rights back. I have fought this battle many times
with helpdesk. I remove the rights then they just add it back when
troubleshooting an issue.
Using group policy and restricted groups will prevent your staff from leaving
accounts in the group.
I wrote a complete guide on this check it out here -> Remove Users from Local
Administrator Group using Group Policy.
23 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Domain controllers should have limited software and roles installed on them.
DC’s are critical to the enterprise, you don’t want to increase security risks by
having additional software running on them.
Windows Server Core is a great option for running the DC role and other roles
such as DHCP, DNS, print servers, and file servers. Server Core runs without a
GUI and requires fewer security patches due to its smaller footprint.
Server core can have its challenges though with some 3rd party software not
being compatible.
If you do not regularly scan and remediate discovered vulnerabilities you are
at a much greater risk for comprise.
There are a large number of vulnerability and scanning tools available, see my
list of the best patch management software.
24 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Anytime a system needs to access the internet it will in most cases use a
domain name. Computers talk to each other by IP address so the computers
use DNS to map a domain name to an IP address.
There are several services available that check DNS queries for malicious
domains and blocks them.
These DNS services gather intelligence about malicious domains from various
public and private sources. When it gets a query for a domain that it has
flagged as malicious it will block access when your system attempts to contact
them.
Here is an example:
Step 3: DNS Service checks if the domain is on its threat list, it is so it returns a
25 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
block reply.
In the above example since the DNS query returned a block, no malicious
traffic ever entered the network.
• Quad9
• OpenDNS
• Comodo Secure DNS
Also, most IPS (Intrusion Prevention Systems) systems support the ability to
check DNS lookups against a list of malicious domains.
• Secured-core Server
• Hardware root of trust
• Firmware protection
• UEFI secure boot
• Virtualization based security
26 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Check your Office 365 or ADFS logs, you will be surprised at how many login
attempts are coming from China and Russia.
One of the best ways to protect against compromised accounts is two factor
authentication. This will also help against password spraying attacks.
Let’s say a user fell for a phishing attempt that asked the user to verify their
username and password.
Now the attacker has that user’s Active Directory credentials. The attacker
could now gain access to a number of systems from anywhere.
If the user had two-factor enabled this could prevent access even though the
27 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
account has been compromised. The attacker would need the second set of
credentials to get logged in.
There really is no stopping accounts from getting compromised there are too
many ways for attackers to gain the credentials.
If you are using Office 365 and depending on what package you have MFA
may be included. Take advantage of this feature.
• DUO
• RSA
• Microsoft MFA
There are ways to prevent only authorized devices from connecting but this
can be costly and a lot of work to set up. If you have the resources then that is
the way to go.
Another method that is already available to you is to monitor the DHCP logs
for connected devices.
You should have all end user devices setup to use DHCP. You can then look at
the logs to see what is connecting. You should have a naming convention for
your equipment, this will make it easy to spot possible unauthorized devices.
In the screenshot below I can easily spot a device that does not follow my
computer naming convention.
28 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
minint-1bdvd67 is not something I recognize. I will need to look into this and
see if it is an authorized device.
With this setup, you can log every internal and external DNS lookup. When a
client device makes a connection to a malicious site it will log that site name in
the DNS logs.
These malicious domains are usually odd, random character domains that
don’t look normal.
Here are some screenshots of suspicious DNS lookups from my logs. These
repeatedly show up in my logs for a handful of devices.
To view the DNS lookups you first need to enable the DNS debug logs on the
29 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Windows Servers.
Once you have the debug logs setup you can import those logs into an
analyzer to quickly spot malicious activity.
You can also convert the log file to a CSV to make it easier to read and filter.
30 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
ADFS and Azure have some great security features. These features will help
with password spraying, account compromise, phishing, and so on.
No matter what level of office 365 you are on there are some features you
should look into.
But
Microsoft does improve and add new features at every level (At least this is
what I’ve noticed since being on Office 365).
I’m currently running a hybrid office 365 setup. In azure, I can see several risky
sign on reports.
31 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Azure alerted me to a sign on that came from China from one of our accounts.
Some of these features are available with the latest ADFS version and some
are included with an office 365 subscription.
Definitely check out all the available security features in ADFS, Office 365, and
Azure.
Resources:
32 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Secure Score checks your Office 365 services then checks your settings and
activities and provides you a security score.
Once it analyzes your score it will provide a detailed list of what was scored
and recommended actions to fix the issues.
Refer to my article Office 365 Security best practices for more details.
33 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Cyber attacks can shut down systems and bring business operations to a halt.
The City of Atlanta was shut down by a cyber attack, which prevented
residents from paying online utility bills. In addition, Police officers had to
write reports by hand.
Last I checked it cost more than $5 million for them to recover from the attack.
A good incident response plan could have limited the impact and enabled
services back online much faster.
NIST has a great computer security incident handling guide that I recommend
looking at.
34 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
If you are delegating rights to individuals then you are losing control of who
has access.
Create custom groups with very specific names, document who has rights, and
a process for adding new users. Don’t just allow users to be added to these
custom groups without an approval process. This is just another way
permissions can get out of control.
Know what groups are delegated to what resources, document it, and make
sure your team is on the same page.
These are wildly used and often have a password set to never expire.
These accounts will often end up with too many permissions and more often
than not are a member of the domain admins group.
Bad..very bad
Don’t allow that to happen, there are ways to make it work without DA access.
35 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Microsoft has a Security Compliance Toolkit that allows you to analyze and test
against Microsoft’s recommended security configuration baselines.
Most of the recommended settings can be set up using Group Policy and
deployed to all computers.
36 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
CIS Securesuite can also scan against other systems like Cisco, VMware, Linux,
and more.
I hope you found my list of Active Directory security best practices useful.
37 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
This FREE tool lets you get instant visibility into user and group permissions
and allows you to quickly check user or group permissions for files, network,
and folder shares.
Leandro
HI There,
38 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Robert Allen
Reply
Damon Hina
Reply
Robert Allen
Thanks Damon
Reply
39 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Ale
HI,
great guide, really!
What about application that may require admin rights (e.g. Backup)?
Is there any best practice in term of using one admin credentials OR
create dedicated ones and assign a human responsible… ?
BR
Reply
Robert Allen
40 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Limit the permissions as much as you can. There are programs such as
Powerbrowker for windows that can escalate permissions to a
program only when its executed, you can also specify the credentials.
So instead of escalating permissions to a domain account you could
use the local system account.
Reply
Ed Kuskowski
41 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Robert,
I’ve enabled policies according to step 7. Enable Audit policy Settings
with Group Policy
If a user fails logon with bad password, will I see this on a domain
controller log ? what log, where ?
I definitely see it on the workstation log, but I would like to see it on
the DC. Maybe I need a rebpoot of DC’s . let me know. Thanks . The
guide is great
Reply
Robert Allen
You will need to enable this in the default domain controller policy or
create a new GPO and link it to the domain controllers OU. This will
log security related events on the domain controllers security event
logs.
Reply
ce1
42 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Rick
Reply
Edward
Reply
Robert Allen
No problem, Edward.
43 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Minh
Reply
Robert Allen
Reply
Mike Ivanoff
44 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Robert Allen
Hi Mike. There are many log and analysis tools out there, I did list a
few of them under tip #8. ManageEngine ADAudit Plus is a great tool
for auditing and analyzing account lockouts. I’m also creating a simple
PowerShell tool that will help troubleshoot account lockouts and test
for weak passwords.
Reply
David
When will you have PowerShell tool available? Do you have a more
detail list then what you posted that you can share?
Reply
45 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Robert Allen
Reply
Inky
Reply
William
Hi, Robert. Excellent info here. Quick question if there are no Domain
Admins what account is used to grant temporary access to Domain
Admins especially since it states no one should know the Built-in
Administrator password?
46 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Robert Allen
Reply
fenrizx
Reply
Robert Allen
Thanks
47 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Brian Kelly
Reply
Vasil Lilov
Reply
Robert Allen
48 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Geekgal
The best guide I have ever seen!! Thank you for publishing this, as a
sysadmin this really helps to make my points to the boss.
Reply
Robert Allen
Reply
Ren
49 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
OUs?
Reply
Robert Allen
OUs are a great way to organize your users and computers. I don’t
see any security risk with them. I provide some OU organizing tips in
another article https://activedirectorypro.com/active-directory-
management-tips/
Reply
Byron
Elk Stack
Lepid
Splunk
ManageEngine ADAudit Plus
Windows Event Forwarding
Just curious which analyzer you currently use? If you don’t mind
50 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
sharing.
Thanks!
Reply
Robert Allen
Reply
Homayoon
Reply
Robert Allen
Homayoon,
51 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Naren
Reply
Robert Allen
Thanks dude! �
Reply
Radim
Hello,
52 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Great article ! �
I have a question, I want to know your opinion what is better for
logging into domain servers (DC even member servers):
IT staff user Steve has two account. First account with “Regular Rights”
(e.g. SteveD) and second account with “privileged Domain Rights” (e.g.
Admin01).
Scenario 1 : Steve logs into domain server as Admin01 and he does his
all job with “privileged Domain Rights”.
Scenario 2 : Steve logs into domain server as SteveD and he does his
job with “Regular Rights”. If he needs escalate he use “run as
administrator … Admin01”.
Thanks for reply.
Reply
Robert Allen
Hi Radim.
53 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
https://docs.microsoft.com/en-us/windows-server/identity/securing-
privileged-access/privileged-access-workstations
I typically setup a server with remote desktop services for admin work.
Most admin tools get installed on this server and then consoles and
access to critical infrastructure can be locked down to this admin
server.
Reply
fabio
APPLOCKER !!!!!
APPLOCKER for admin and user is a MUST in every server !!!!
so whitelist just installed app , and no NEW app can RUN from user.
so usually virus .exe .visual cannot run and install !!
so No more Cryptofile or virus!!
And that must do on all SERVER , Domain , active , terminal server,
Gateway.
Reply
54 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Robert Allen
Reply
David
Hi,
Reply
Robert Allen
55 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
jon
Reply
Robert Allen
Make a firewall rule and only allow the saw access to the azure cloud
and only allow the needed ports.
56 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Example firewall rule. The FQDN is made up, you would need to look
up the correct FQDN.
Reply
Clement
This is a wonderful guide. Thank you very much for it. I am still new in
system administration, so I need article on how to secure office 365
Reply
Robert Allen
57 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Thanks Clement.
Reply
Dhananjay Vadukul
Can you please share that link over here for O365 best practices…
Thanks in Advance!
Reply
Robert Allen
Reply
Fabio Moretto
58 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Robert Allen
Thanks Fabio
Reply
Travis Widener
Great Info! Thank you for sharing this and I will be reading your Office
365 best practice guide when you complete it.
Reply
Kristof Reinkens
59 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Robert Allen
Thank Kristof
Reply
Sandeep
Reply
Leif
Hi,
60 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Pablo
Amazing guide!
Can you please share your feedback about Account Operators and
Administrators groups?
Reply
Michael
Reply
61 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Robert Allen
Seems like I remember seeing a guide from Microsoft but now I can’t
find it. Here is a process I use:
Reply
Geert
62 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
Robert Allen
You could allow it through the firewall for the SAW. There are a lot of
URLs and IPs that need allow. Here is the Microsoft list
https://docs.microsoft.com/en-us/microsoft-365/enterprise/urls-and-
ip-address-ranges?view=o365-worldwide
Reply
Duff Browne
Learn
Thanks for the excellent ideas in this. Glad I ran across it!
Do you have any warnings about domain member laptops that travel
Group Policy
outside the corporate network, which are connecting in via VPN? Is this
Best Practice Guides
a serious security concern, or manageable?
63 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
DNSReply
& DHCP
Office 365
PowerShell
Robert Allen
Domain Services
Tools
Hi Duff,
Use always-on
AD Cleanup Tool VPN or a cloud based management solution such as
intune.
AD Last Logon Reporter
GroupReply
Membership Reports
Support
hi, if you remove local admin account for workstation how do you
install the apps again or troubleshoot?
Home
Regards,
About
Contact
Reply
My Account
Documentation
Robert Allen
Connect
With an individual account that has those permissions.
64 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Reply
© 2022 Active Directory Pro. All Rights Reserved | Terms and Conditions | Privacy Policy
Samir
Reply
Robert Allen
Create a domain account that has install permissions. You can use
group policy and restricted groups to add accounts or groups to
computers.
Reply
Leave a Comment
65 of 66 11/30/2022, 07:58
Top 25 Active Directory Security Best Practices - Active Directory Pro https://activedirectorypro.com/active-directory-security-best-practices/
Name *
Email *
Post Comment
66 of 66 11/30/2022, 07:58