Ad Notes Testing
Ad Notes Testing
Securing
YourActive
Directory
Chapters
1. Perform a Self-Audit
Roberta Bragg
MCSE, CISSP, Author, Columnist, 2. Know and Use Security Tools and Techniques
Speaker, Consultant
3. Monitor Active Directory Operations
Sponsored by:
CONTENTS
CHAPTER 2: KNOW AND USE SECURITY TOOLS AND TECHNIQUES .............5
TECHNIQUES FOR MANAGING AD SECURITY ...........................................6
SECURING AUTHENTICATION, DCS, AND DC COMMUNICATION ..................................6
Securing Authentication Via Group Policy .......................................................................8
Hardening Domain Controllers Via Group Policy....................................................... 11
Using Security Templates to Secure Domain Controllers ........................................ 13
Using Group Policy Administrative Templates ............................................................ 14
Hardening Domain Controller Communications Via Group Policy........................ 14
HARDEN DNS..................................................................................................................... 15
Securing DNS Using Placement and Policy.................................................................. 15
Securing DNS Configuration............................................................................................ 16
Securing DNS Using Group Policy.................................................................................. 18
MANAGING DOMAINS AND TRUSTS ................................................................................. 19
MANAGING DIRECTORY OBJECTS .................................................................................... 20
Protect Active Directory by Restricting Group Membership and
Understanding Active Directory ACLs............................................................................ 21
Standard and Extended Rights ....................................................................................... 21
Adding AD Classes.............................................................................................................. 23
Modifying AD Default Permissions and Properties.................................................... 24
Assigning Authority for AD Administration................................................................... 24
TOOLS..................................................................................................................25
USING GROUP POLICY TOOLS .......................................................................................... 26
Group Policy Editor............................................................................................................. 26
Understanding and Controlling GPO Inheritance....................................................... 29
Reporting............................................................................................................................... 39
Ensuring Permission Consistency .................................................................................. 41
Backup and Restore........................................................................................................... 42
Managing Backups............................................................................................................. 44
Delegating Group Policy.................................................................................................... 45
GPO Planning and Analysis Modeling............................................................................ 47
Modeling a Group Policy Hierarchy ............................................................................... 47
Determining the Results of Group Policy Implementation....................................... 49
USING SECURITY CONFIGURATION AND ANALYSIS AND SECURITY TEMPLATES ......... 50
USING ADSI EDIT TO MANAGE DIRECTORY OBJECTS ................................................... 51
USING THE ACTIVE DIRECTORY DOMAINS AND TRUSTS CONSOLE ......................................... 53
Selective Authentication .................................................................................................... 53
SID Filtering.......................................................................................................................... 54
SUMMARY ...........................................................................................................55
ABOUT QUEST WINDOWS MANAGEMENT..............................................56
ABOUT QUEST SOFTWARE, INC..................................................................56
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 3
CHAPTER 2: KNOW AND USE SECURITY TOOLS
AND TECHNIQUES
How-tos with an Emphasis on Securing Active Directory
Hardening steps for Active Directory (AD) can be divided into four
major categories:
Many of the processes and functions used to perform these steps rely
on Group Policy, AD administration tools and other common
Windows administration tools. This chapter will discuss both the
techniques used to harden AD and the how-tos of using these tools.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 5
TECHNIQUES FOR MANAGING AD SECURITY
Security principles for hardening AD:
6 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Figure 1. Account Policies.
• User rights for the domain are configured in the Default Domain
Controller Security Policy. They can also be configured in
additional GPOs linked to the DC OU.
• Security settings to manage domain controllers should be
configured in GPOs linked to the domain controller OU. Security
settings made in GPOs linked to the site or domain object within
which domain controllers reside will also have an impact on DC
security, as will settings on individual DCs. The rule is that GPOs
are applied in the order of local, site, domain and OU-linked
GPOs. All settings are merged unless there is a conflict or
restrictions, such as No Override, are applied. When conflicts
occur, the last setting applied wins. (Those settings applied in the
domain controller default security policy should therefore win.)
• GPOs linked to domain objects for other domains have no
impact on domain member computers or domain user accounts.
• Additional settings that can be used to lock down computers and
provide additional user and computer security are contained in
the Administrative Templates section of Group Policy.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 7
Securing Authentication Via Group Policy
Controlling access to domain resources is an important part of AD
security and must be managed by having strong authorization and
authentication controls. Authentication is the process whereby an
entity attempts to prove they are who they say they are, while
authorization is the process that specifics what an authenticated
user can do.
Authorization, in the form of assigned privileges and resource access
permissions is critical, but if the authentication process is weak,
authorization is weak as well. If administrators with access and
privilege throughout systems, domains and forests use simple
passwords, it does not matter that they are the only ones who can
configure security, manipulate objects in AD or take ownership of
any resource. An attacker will soon deduce the password and simply
access and control systems as the administrator. If users share or
leave passwords vulnerable, it does not matter how few can access
some critical resource like customer records. An attacker will obtain
the passwords and do damage as authorized users.
Strengthen authentication to support sound authorization controls.
Five areas must be managed:
8 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Strengthening the password policy will require management
approval. Don’t forget to discuss the technical and non-technical
controls that are part of a good policy. Technical controls are those
things that can be implemented in the Windows password policy
such as password length and complexity and how often the password
must be changed. Non-technical controls are things such as not
sharing passwords, not writing them down, and requiring complexity
beyond what can technically be controlled by the operating system.
When a strong policy is approved, changes should be made to the
Default Domain GPO. There can be only one password policy per
domain; changes made to the default domain GPO affect all domain
accounts. A strong policy should also be required for computers if
local accounts are used to authenticate to these systems. Password
policies for local computer accounts on domain computers can be
set in GPOs linked to the OU within which the computer account
resides. The password policy for stand-alone computers (computers
that are not members of a domain) should be set in the Local
Security Policy.
Account Lockout should be set to prevent an attacker from guessing
passwords or running automated dictionary attacks against
accounts. A number of incorrect entries, whether manually or
automatically generated, triggers account lockout. At this point, even
a correct password will fail. Lockout can be configured to
automatically be released after a time period, or require
administrative action.
The Account Lockout threshold must be carefully considered. Set too
low, it may lock out legitimate users who occasionally fat finger their
attempts. It can also be an avenue for a denial of service attack, since
an attacker could effectively lock out all accounts by attacking them
all. In organizations with strong perimeter controls, opportunities for
such attacks may be few, making account lockout viable.
By default, Kerberos Policy is correctly configured for most
organizations and should be left alone. Two settings that are often
modified—and should not be—are Maximum Tolerance for
Computer Clock Synchronization and Enforce User Logon
Restrictions. The computer clock synchronization time can prevent
replay attacks. In a replay attack, the attacker captures valid
credentials and attempts to use them to gain access to networks and
systems. Kerberos requires that communications from the client not
be older than the clock synchronization time. If they are, they are
rejected. Lengthening this time weakens this security feature of
Kerberos. When the Enforce User Logon Restrictions policy is
enabled, each request for a session ticket is evaluated against the
target computer’s user rights policy. If a user is denied the right to
log on at the target computer, his request for a session ticket will fail.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 9
Disabling Enforce User Logon Restrictions may save time and
therefore improve performance, but it weakens security.
In addition to Account Policy, other areas of Group Policy can impact
authentication. These include the policies described below, which
are found in Computer Configuration, Windows Settings, Security
Settings, Local Policies, Security Options.
Policy Recommendation/Description
Network Security: LAN Set to “Send NTLMv2 response, only, refuse LM and NTLM”
Manager Authentication
Level Note: Down-level clients can be configured to use NTLMv2.
Windows 9x must install the AD Client and apply registry edits.
Windows NT must have registry edits applied. This change in
policy may also impact older server applications such as RRAS,
and should be tested before being deployed in a production
environment.
Network Security: LDAP Negotiate signing if some domains require it; require it if all
Client Signing domains require it
Secures communications between clients and domain
controllers and between domain controllers.
10 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Reducing or eliminating anonymous access can be managed via
Security Options. Security Options can vary through the domain, but
in some cases they only make sense for GPOs linked to the domain
controller OU. Security Options that impact anonymous access:
Policy Description
Network Access: Named Remove named pipes not used by DCs. For example, the
Pipes that Can Be Accessed SQL\QUERY named pipe is not needed unless SQL is
Anonymously installed on the DC. Installing SQL on the DC is not a good
practice.
Policy Recommendation/Description
Shut Down the System Remove the right from the Account Operators group and the
Print Operators group. Do not allow users permission to shut
down DCs.
Backup Files and Remove Backup Operators and assign this right to a special
Directories group for DCs.
Restore Files and Remove Backup Operators and assign this right to a special group
Directories for DCs. This group should be different than the group assigned
Backup Files and Directories.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 11
Multiple registry entries are exposed in the GUI as Security Options.
Many of these settings directly relate to audit checkpoints listed in
Chapter 1. Specific settings useful in managing DC security include:
Policy Recommendation/Description
Devices: Unsigned Driver Installation Do not allow installation. If a driver required for
Behavior DC operation is not signed, temporarily modify
this setting, install the driver, and then re-
enable the setting.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 13
Using Group Policy Administrative Templates
Administrative Templates are an often-overlooked portion of the
GPO. Both user and computer settings are contained in
Administrative Templates. Their use is even more important on DCs
and other servers than on many desktops, since many of the
application templates they control are not needed on servers and
DCs, but are installed anyway. Use Administrative Templates to
harden applications such as Internet Explorer (IE), Windows Media
Player and so on.
14 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Harden DNS
AD cannot exist without DNS. Without DNS, clients cannot locate
DCs and authenticate to the domain, and DCs cannot locate
replication partners, blocking AD changes. If an attacker can
compromise DNS, he can disrupt the very backbone of AD and mine
DNS for information useful in further attacks. There are three ways
to harden DNS:
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 15
Securing DNS Configuration
DNS services can be further secured by making adjustments in the
DNS administration console. The following settings should be used
to harden DNS.
16 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
• Restrict Zone Transfers. When DNS is integrated with AD, DNS
information is replicated as part of AD. If DNS is not AD-
integrated, secondary DNS servers should be used to provide
alternatives for DNS lookup. Zone transfers are used to keep
secondary servers up-to-date. Only approved secondary DNS
servers should have the right to request and receive a zone
transfer. To restrict zone transfers, add approved computers to
the Name Servers property page for the zone or to the Zone
Transfers page, select the Allow zone transfers check box, and
choose the appropriate option on the Zone Transfers page, as
shown in Figure 3.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 17
• Disable Recursion, where possible. DNS servers that use
forwarders must have recursion enabled in order to perform
recursive inquiries for clients. (Recursive queries are managed
by the DNS server; they eventually return the answer to the
requesting client. In an iterative query, the DNS server returns a
pointer to the requesting client, then the client continues the
search.) However, if some DNS servers in your infrastructure are
not used in this manner, disable recursion to prevent flooding
attacks. (DNS servers use iterative responses to communicate
with each other.) Recursion can be disabled on the Advanced
page of DNS server properties pages.
• Create a computer OU
• Create a unique DNS server OU as a child OU of the computer OU
• Place all DNS server accounts in this OU
• Import the general hardening security template (use a
Microsoft-provided template or create one of your own) into a
GPO linked to the computer OU
• Import the infrastructure security template (use a Microsoft-
provided template or create one of your own) into a GPO linked
to the DNS server OU
18 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
If this process is used, any computers in the computer OU or its child
OUs will be locked down according to settings in the template as well
as settings made in the GPO linked to the computer OU. Before
implementing this method, you should determine what additional
steps might be needed to ensure that all computers can perform
their designated functions. For example, in the general hardening
template the DNS service is disabled, but since a special template is
applied to the DNS server that enables the DNS service, the DNS
server will be able to function as a DNS server.
Check out these online Microsoft server hardening resources:
• Windows Server 2003 Security Guide
www.microsoft.com/technet/security/prodtech/win2003/w2003hg/sgch00.mspx
• Windows 2000 Security Hardening Guide
www.microsoft.com/technet/security/prodtech/win2000/win2khg/default.mspx
• Windows 2000 Security Operations Guide
www.microsoft.com/downloads/details.aspx?familyid=f0b7b4ee-201a-4b40-a0d2-
cdd9775aeff8&displaylang=en
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 21
• GENERIC_ALL: Create or delete children; delete a subtree; read and
write properties; examine children and the object; add and remove
object from the directory; read or write an extended right.
• CREATE_CHILD: Create children. The Access Control Entry (ACE)
ObjectType member can contain a Globally Unique Identifier
(GUID), which identifies the type of child object that can be
created. (GUIDs are unique numbers generated by Windows and
by some applications to identify a component.) If there is no
GUID in the ObjectType, all child object types can be created.
• DELETE_CHILD: Delete children of the object. The ACE
ObjectType member can contain a GUID which identifies the
type of child object that can be deleted. If there is no GUID in
the ObjectType, all child object types can be deleted.
• LIST: List children of the object. The right to list children of this
object. For more information about this right, see “Controlling
Object Visibility” within the “ADSI-Edit” tool section.
• SELF: Perform an operation controlled by validated write access
right. The ACE member ObjectType can contain a GUID identifying
the validated write. If no GUID is in the ObjectType, all validated
write operations possible for this object can be performed.
• READ_PROP: Read the object properties. A property set or
property can be defined by a GUID in the ObjectType member of
the ACE. If no GUID is present, all object properties can be read.
• WRITE_PROP: Write object properties. A property set or property
can be defined by a GUID in the ObjectType member of the ACE. If
no GUID is present, all object properties can be written.
• DELETE_TREE: Delete all children of this object. Permissions on
the children do not matter; that is, a user with this right can
delete a child object even if the child object denies deletion.
• LIST_OBJECT: List this object. Without this right, or the LIST
right (listed earlier), the object is hidden from the user.
• CONTROL_ACCESS: Perform an operation that is controlled by
an extended access right. The ObjectType member of the ACE
may contain a GUID which identifies the extended right. If it
does not, all extended write operations associated with the
object can be performed.
Extended rights are specific to only some objects within the AD. This
list is very long, and there is no comprehensive list. Table 1 lists a few
extended rights specific to Windows 2003.
22 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Rights Object(s) Explanation
Create inbound forest User or group The right to create an inbound-only trust between
trust forests
Enable per user User The right of a user to enable or disable the
reversibly encrypted Reversible Encrypted Password setting for a
password user(s) or computer(s) account
Adding AD Classes
AD classes define the types of objects that can be included in the AD
and what properties these objects will have. Included in the class
definition are the default permissions that will be assigned. Classes
added to AD cannot be removed; this can cause problems if a new
class has the same name as an existing class that is no longer
required. Windows 2003 allows AD classes to be disabled, thus
freeing up the name and preventing the proliferation of objects no
longer required in the directory.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 23
In order for applications to work well in an AD domain, they must be
integrated with the AD; to do so, they will typically add new classes.
One example is Microsoft Exchange Server. In order to install such
applications, the administrator must be a member of Schema
Admins. Keeping the membership of this group empty until such
applications must be installed is a sound security practice. Adding
new object classes to the AD should not be done without a great deal
of thought, planning and testing. Restricting membership of the
Schema Admins group will prevent accidental additions and make
malicious additions harder. It will also be much easier to prove
intent, as the individual must first have his account added to Schema
Admins and install the application. He cannot claim that he did not
know the application would add new object classes.
24 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
TOOLS
Many tools can be used to manage AD, and all of them are important
to security in some way. Information about the different types of
tools can be found in various chapters of this book, some of which
will be available in future installments:
Note Other tools have functionality beyond what’s needed to ensure the security
of AD, and are beyond the scope of this book. But they are all important,
since if used incorrectly they can weaken security. Please do not make the
mistake of thinking that only the tools mentioned in this e-book can impact
the security of AD.
Even more important than learning how to use all the tools is to
learn when to use them, and how to use them correctly. More harm
can be done by an untrained, unthinking employee with
administrative privileges than by most attackers. Take a caution from
medical practitioners: whatever you do, “Above all, do no harm.” If
you do not know how to properly use a tool or if you do not
understand why you are making changes, stay away from a
production network until you do.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 25
Using Group Policy Tools
Tools to manage Group Policy for DCs include the Group Policy
Editor (GPE), Group Policy Management Console (GPMC) and
security templates. The Security Configuration and Analysis tool can
be used to directly apply security settings to DC, one at a time, or to
analyze a DC’s current security settings. Finally, direct editing of the
Registry using regedit is also available.
The Group Policy Editor can be directly loaded in a Microsoft
Management Console (MMC); it is also available by accessing the
properties page of an AD site, domain, or OU, or by using the GPMC.
(Once the GPMC is installed, the GPE is no longer accessible from
the GPO properties page.) The GPE is easy to use, and provides basic
utility. However, it does not provide many essential features for
managing Group Policy. You cannot determine, for example, the
impact of a combination of multiple GPOs on a specific computer,
server or user. You cannot copy the GPO or export it and use it in
another domain. You cannot even print the policy. To examine the
settings in the policy you must browse through the policy, opening
many sub containers to determine if anything in them is set.
In Windows 2003, the GPMC provides the missing parts of Group
Policy management. The tool (which was not part of the initial release
of Windows 2003) can also be used to manage Group Policy in a
Windows 2000 domain. To do that, you must run the GPMC on a
Windows XP Professional or Windows 2003 computer and have at
least one license for Windows 2003 (you will also lose some
functionality). The GPMC is not essential for creating and using GPOs;
but it is much more difficult to manage Group Policy without it.
26 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
To create a new GPO:
Figure 4. Create a new GPO from the domain, site or OU properties page.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 27
Figure 5. Open items to make changes.
8) When your edit is complete, click OK in the item view, then close
the GPO by closing the policy windows.
28 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Figure 6. Select the policy to edit by browsing
the AD objects where policy can be linked.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 29
To inspect the policy and ensure that blocking inheritance has not
been set:
1) Select the Group Policy property page of the site, domain, or OU.
2) View the Block Policy Inheritance check box as shown in Figure 7.
If the box is selected, policy inheritance is blocked.
3) Click OK.
30 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
It is important to note that No Override always beats Block Policy
Inheritance. If, for example, No Override is set on a GPO linked to the
domain, and Block Policy Inheritance is set on an OU, the domain
GPO settings are inherited by accounts in the OU. The use of Block
Policy Inheritance and No Override should be carefully coordinated
within the domain to ensure that the proper policy is applied. To
determine if No Override has been set:
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 31
Using WMI Filters
Windows 2003 GPOs can be restricted via the Windows Management
Instrumentation (WMI) Filters defined in the GPO. WMI is a way to
manage Windows computers. WMI Filters on GPOs limit GPO
application to computers or user accounts that meet specific
characteristics. This is done by creating a dynamic group that
contains a collection of accounts with a specific characteristic.
For example, a WMI filter could select all computers with a specific
Network Interface Card (NIC). This could be important for the
management of DC policies. Another WMI filter could be useful
when the DHCP client service is disabled on DCs, which can in turn
disable certain client NICs. In this scenario, a GPO that enabled the
DHCP client service could be filtered to bypass those computers.
• Click Start, click Run…, type “GPMC.msc”, and then click OK.
• Use the Group Policy Management shortcut from Administrative
Tools.
• Open GPMC from the property pages of sites, domains and OUs.
(The old access to GPE is no longer available; however, it can be
accessed through GPMC.)
• Create a custom GPMC console by adding the Group Policy
Management snap-in to an MMC.
Figure 9. The Group Policy Management Console (GPMC) is a new tool that
provides management of Group Policy much superior to the Group Policy
Editor.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 33
Top-level containers are:
34 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
• The Linked Group Policy Objects tab displays GPOs linked to the
container.
• The Group Policy Inheritance tab, shown in Figure 11, displays a
list of GPOs inherited from parent containers in order of their
application (precedence). The list does not include any Site
policies. Read the list from the bottom up to see the order in
which the policies are applied. In the figure, the order indicates
that the default domain policy is applied, then the
Communications Policy for DCs, then the Default Domain
Controller Policy. The Default Domain Controller Policy has
precedence over the other policies.
Figure 11. All inherited GPOs are listed, with the exception of Site policies.
Site policies can vary depending on the computer and user account,
and what Site they are located in.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 35
Figure 12. Delegated Permissions are listed. You must change
the drop-down list to view different permissions.
Figure 13. Use the Scope page to determine where the GPO is linked.
36 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
• The Details tab of a GPO provides information relative to the
GPO, including whether or not the user and/or computer
portions of the GPO are enabled.
• The Settings tab displays only the settings configured for the GPO.
• The Delegation tab lists the explicit permissions on the GPO and
includes the users, computers and groups to which the GPO will
apply, as well as who can edit and delete the GPO.
Basic Operations
Creating, editing, testing, protecting, reporting, backup/restoring,
and copy/pasting are all basic Group Policy management processes
available via GPMC. Other operations, such as designating which DC
to use for Group Policy, can also be managed from the console.
To edit the settings in any GPO, right-click the GPO and select Edit.
Scoping GPOs
The process of assigning which users and computers will be
impacted by a GPO is called “scoping” the GPO. This may be
accomplished by linking the GPO, using security filtering or using a
WMI filter. The methods are described below:
• Linking. Explicitly link the GPO during or after creation. The linked
scope of a GPO can also be changed by dragging a GPO from the
Group Policy Object node to an OU in the same domain.
• Security filtering. Prior to the GPMC, this required using the ACL
editor to set the Read and Apply Group Policy permissions for
specific users and groups. With GPMC, the user or group is added
to the Scope tab for the GPO or GPO link. This automatically sets
the Read and Apply Group Policy permissions. Should you want to
Deny these permissions, you must use the ACL editor.
• WMI filter. WMI filters dynamically determine the scope of
GPOs, based on attributes. WMI client-side support is only
available for XP Pro and Windows 2003 (Windows 2000 ignores
WMI filters). The filter is always evaluated on the client
computer, meaning that each client examines the WMI filter to
see if it applies. Don’t overuse WMI filters, since they can mean
extended processing time.
38 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Reporting
Prior to the GPMC, Group Policy lacked native reporting. This made
a seemingly simple activity, like documenting a Group Policy, a
tedious, manual chore. The GPMC provides extensive HTML
reporting, and reports can be viewed and printed. Some of the
reports that can be produced include:
• GPO settings. Click the Settings tab of the GPO or GPO link pane
to produce a report, an example of which is shown in Figure 14.
Figure 14. Use the Show all link to see all settings in the GPO, or view only selected areas.
Only configured settings will display.
To save a report, right-click on the object and select Save Report (or
select Save Report from the Action menu); name the report then save
it as an XML or HTML file.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 39
Reports are automatically displayed in a condensed fashion, as
shown in Figure 15, and show only areas where settings are
established. This simplifies viewing. To examine the settings requires
expanding the category. To expand all of the settings, use the “show
all” option at the top of the report. In the Administrative templates
portion of the report, the Explain information can be viewed by
clicking the setting name as shown in Figure 16.
Figure 15. A full report of the GPO settings can be produced by clicking on the Settings tab.
40 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Figure 16. Administrative Template settings can display the ‘Explain’ information.
Bug Alert Check Windows 2000 domains for this issue by looking at the Default
Domain Policy and the Default Domain Controllers Policy from the GPMC.
There is a bug in Windows 2000 that incorrectly sets the ACLs on the
Sysvol portion of the GPO to allow inheritance. This may cause them to be
out of synch with the permissions set in AD. To correct the error, examine
the GPOs in the GPMC and, when prompted, click OK to make the
permissions match. The permissions will be synched with the ACLs on the
AD portion of the GPO, and the allow inheritance feature will be removed.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 41
Backup and Restore
When backup is selected from the context menu, a copy of the GPO
is saved to the file system. Likewise, backup also serves as the export
function for the GPO. Hence, a GPO backup can be used with either
the restore or import function. The backup includes:
The backup does not include items stored outside the GPO (only
items stored in Sysvol or AD portions of the GPO are backed up.) Be
careful; some items many think are part of the GPO are not stored
with the GPO and thus are not backed up, including WMI filters
(these can be backed up separately using GPMC); IPSec Policies
(export to a file from the IP Security Policy snap-in to back up); and
links from the domain, site or OU object to the GPO.
Warning: Anyone who can access the backup, or a copy of the
exported GPO, has a large amount of information about the security
configuration of the enterprise. This information should not be
readily available. Only authorized administrators, security teams and
auditors should have access to this information. The location, and
the DACLs set on these files, are critical. Think of these backups like
you do any other backups of sensitive data and maintain good copies
of your critical data both locally and off-site.
Additionally, protect AD from accidental or malicious use of these
backups in a restore that might leave systems vulnerable. If an
outdated GPO is restored, or a weaker one imported, enormous
damage could be done. Ensure limited access to these files and limit
all GPMC operations to those trusted individuals who need access in
order to do their jobs.
Restore takes a backup and reinstates it in the domain. The GUID of
the original GPO is used, as is the domain information. You cannot
use a backup/restore process to move a GPO to another domain. The
restore replaces the GOP setting, the ACLs on the GPO and the WMI
filter links.
42 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
To back up a GPO:
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 43
To restore a GPO that still exists:
Sample scripts that perform basic functions are provided with the
GPMC. To back up a GPO, use the provided script BackupGPO.wsf or
BackupAllGPOs.wsf. To restore a GPO, use the example scripts
RestoreGPO.wsf or RestoreAllGPO.wsf. Information about GPO
backups can be found using the QueryBackuplocation.wsf script.
Managing Backups
Information on backups, as well as the ability to delete, organize
(sort), restore and view backup settings is located in the Manage
Backups dialog. To access this page:
Figure 18. The Group Policy Objects Delegation tab displays all users and
groups that can create GPOs in the domain.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 45
This tab can be used to add a user or group and configure their
access using permissions. Major permission categories include:
To manage delegation for a GPO, use the Delegation tab of the GPO
and/or permissions directly on the GPO. These privileges are more
granular and include (as shown in figure 19):
46 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Figure 19. For each GPO, specific rights can be delegated.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 47
Figure 20. Previous queries are displayed from the Group Policy Modeling node.
Group policy modeling requires GPOs. Best practices call for using a
test forest. Follow these steps:
48 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
The Summary page displays information that impacts the results,
including a list of GPOs that will be applied, security group members
affected, and WMI filters applied. The Settings page displays the
setting which will be applied, and the Query page displays the
parameters used to create the query.
A list of GPOs that will impact the user or computer can be a
confirmation of proper structure; or, conversely, can point to a flaw
in your GPO design.
The results of the query are available for later review; the query can
also be re-run after GPO changes have been made. Delete any
queries that are no longer needed. To save a copy of the report to the
file system, right-click on the query in the details pane and select
Save from the context menu, then browse to a location, enter a file
name, and click Save.
The GPMC provides HTML reporting of the results, but not the
precedence information provided by the RSoP MMC snap-in. The
HTML report tells you the final result, such as what setting will be
applied. Precedence information will show the history. The
Advanced View (right-click on the query in the console pane and
select Advanced View) option opens the RSoP snap-in and provides
information on every GPO that attempts to set the setting, along with
what it would have set the setting to.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 49
Using Security Configuration and Analysis and
Security Templates
Security templates are text files that contain a list of security settings.
They can be configured using a text editor; but to ensure correct
syntax, and make the job easier, add the security templates snap-in
to an MMC console, as shown in Figure 21. Settings in a template can
be applied to a single machine at a time by using the Security
Configuration and Analysis snap-in or by using the secedit
command-line tool.
50 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Figure 22. Template files can contain Registry settings that are not displayed in the GUI.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 51
To use ADSI Edit:
Figure 23. ADSI Edit can be used to view or modify directory objects.
52 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
Using the Active Directory Domains and Trusts Console
The Active Directory Domains and Trusts console is used to add,
remove and configure trusts. Two important features of trust
creation and management are often overlooked. These features limit
access by controlling cross-trust authentication and implementing
SID Filtering.
Selective Authentication
Many administrators believe that no access across a completed trust
is possible until the trusting domain administrator modifies access
controls on domain resources. This is not precisely true. After a trust
is completed, the trusting domain will pass through authentication
of users from the trusted domain. This means that these users may
have access to domain resources.
For example, trusted domain users could log on from a computer in
a trusting domain and access any computer resources available to
the Everyone or Interactive groups. To limit this type of access, the
authentication scope of a trust can be managed between domains in
different Windows 2003 forests. This process is called Selective
Authentication. When Selective Authentication is configured and a
user authenticates a new SID across a trust, the Other Organization
SID is assigned. This SID’s presence prompts a check on the resource
domain to ensure that the user is authorized to authenticate. (If the
user is not from across a trust, the “This Organization SID” is
assigned. Only one of these SIDs can be present in a user’s Access
Token.)
To configure Selective Authentication for trusts:
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 53
8) For the forest trust, select either Forest-wide authentication or
Selective authentication.
9) If Selective Authentication is selected, the domain and/or server
properties must be modified to provide the Allowed to
authenticate permission on the object. If server properties are
not modified in the external trust, no users can access their
resources even if provided explicit access to objects on the
server. If domain properties do not provide authentication in the
forest trust, no resources in the domain can be accessed even if
explicit access is granted to external users.
SID Filtering
SID Filtering removes the SIDs in users’ authorization credentials
that represent group membership or user accounts from a different
forest. (SIDs from a different forest can be added to the user’s access
token by the forest, but not delivered across the forest trust.) This
prevents spoofed credentials from being used across a trust. SID
Filtering is automatically enabled when Windows 2003 external or
forest trusts are created, or when Windows 2000 SP4 or later DCs are
used to establish the trust.
54 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
SUMMARY
Securing AD requires much more planning and activity than simply
protecting the AD database itself. Peripheral services such as DNS
must be hardened, and domain authentication and domain
controller access controls must be strengthened. Native security
tools can be used to perform many of these functions.
Other Windows tools can be used to monitor, maintain, prepare for
recovery, and audit AD. Some of the more interesting management
tasks that ensure the security of AD are those that monitor its health.
In the next chapter, we’ll focus on these processes and the tools used
to accomplish them.
Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques 55
ABOUT QUEST WINDOWS MANAGEMENT
Quest Software, now including the people and products of Aelita
Software, provides solutions that simplify, automate and secure
Active Directory, Exchange and Windows environments. The Quest
Windows Management group delivers comprehensive capabilities
for secure Windows management and migration. For more
information on Quest Software’s Windows Management group,
please visit www.quest.com/microsoft.
Quest Software
Windows Management
Phone: 614-336-9223
1-800-263-0036
56 Securing Your Active Directory. Chapter 2 - Know and Use Security Tools and Techniques
NOTES