AD Security Administration Best Practices
Secure AD Administration
- Separate accounts for each administrative tier
- Tier 2: workstations
- Tier 1: servers
- Tier 0: AD/DC, PKI, ADFS, AAD connect, etc.
- AD admins only use admin workstations
- AD admins only logon to admin servers/DC
- Block AD admin groups from logging on to workstations & servers via Group Policy
- Limit DC management protocols (RDP, WMI, WinRM) to AD admin systems/subnets
- Limit service accounts with privileged AD rights
Secure AD Admin OU
- Create a new top-level OU in the domain
- Eg.: Management, AD Management, Administrative, etc
- Modify security so Authenticated Users don't have view access
- Remove Authenticated Users from OU permissions.
- Block GPO Inheritance. Create, apply & link Admin OU specifics GPOs.
- Create child OUs
- Admin Servers
- Admin Workstations
- Admin Accounts
- Admin Groups
- Place all AD Admin related objects (users/groups) in this OU structure
- Only AD Admin have:
- Modify rights to this OU structure
- Modify/Owner rights to GPOs linked to this OU
Securing AD: Level 1
- Randomize computer local Administrator account passwords. (MS LAPS)
- Minimize groups/users with DC admin/logon scripts.
- Separate user and admin accounts
- No user accounts in admin groups
- Admin accounts = "sensitive and cannot be delegated"
- All AD Admin accounts added to "Protected Users" group
- Long and complex (> 25 characters) passwords for SA
- Set GPO to prevent local accounts from connecting over network to computers.
Securing AD: Level 2
- Service Accounts (SA):
- Leverage "(Group) Managed Service Accounts"
- Implement Fine-Grained Password Policies (DFL > 2008)
- Limit SA to systems of the same security tier, not shared between workstations and servers.
- Ensure passwords are >25 char
- Ensure all computers are talking NTLMv2 & Kerberos, deny LM/NTLMv1
- Disable SMBv1
- Separate Admin workstations for administrators (locked-down and no Internet)
- No Domain Admin service account on non-DCs
- Limit management protocol access on DC to admin subnets
Securing AD: Level 3
- Complete separation of administration
- AD Admin never logon to other security tier
- AD Admin should only logo to a DC (or admin workstation or admin server)
- Time-based, temporary group membership
- Restrict workstation to workstation communication with host firewalls
- AD clients don't need special rules, default Block All Inbound works (add exceptions for authorized management systems)
- Implement network segmentation
- Start by reserving IP ranges/VLAN by device type (routers, switches, DC, servers, workstations, printers,etc).
Protect Admin Creds
- Ensure all admin only log onto approaved admin workstations and servers.
- Add all admin accounts to Protected Users group (requires Windows 2012 R2 DC).
- Admin workstation and server:
- Control and limit access to admin workstations and servers.
- Remove NetBIOS over TCP/IP.
- Disable LLMNR.
- Disable WPAD.
Additional Mitigations
- Enable NTLM Auditing on DC.
- Enable SMB Auditing on DC and file servers.
- Enable PowerShell logging everywhere and send to SIEM.
- Monitor scheduled tasks on sensitive systems (DC, etc)
- Block Internet access to DC and servers.
- Change the KRBTGT account password (twice) every year and when an AD admin leaves
- Use Invoke-TrimarcADChecks (https://trimarc.co/ADCheckScript) to help identify problematic AD configurations.