Reference articles to secure a Windows domain:
https://github.com/PaulSec/awesome-windows-domain-hardening
Microsoft audit Policy settings and recommendations:
Sysinternals sysmon:
On ADsecurity.org:
Beyond domain admins: https://adsecurity.org/?p=3700
Gathering AD data with PowerShell: https://adsecurity.org/?p=3719
Hardening Windows computers, secure Baseline check list: https://adsecurity.org/?p=3299
Hardening Windows domain, secure Baseline check list:
Securing Domain Controllers to Improve Active Directory Security
Domain hardening in general:
- Implement 2 or 3 tier model against Pass the Hash threat
- FGPP implementation
- LAPS Implementation
- Process for proper cleanup of unused AD accounts
- Reset of krbtgt account,domain admins account,IT administrators account
- Setting Up Jump servers for Tier0,1,2 users
- Domain joining of all windows boxes
- Proper account Management Based on privileges
- Usage of service accounts to run application instead of local system accounts
- Review of existing AD accounts/Deletion of Unnecessary Accounts/ Review Ou structuring/GPO etc
- HoneyToken Account Creation in Local boxes as well domain
- GPO changes for disabling guest accounts across system,restricted RDP mode,Password Policy changes,disabling internet in member servers
- GPO for Jump server implementation based on PAW GPO settings
- Rename existing builtin Administrator account and lockdown
- Sysmon deployment and WEF setup (WEC for symon events)
- Use Pingcastle www.pingcastle.com review to assess the AD security
- Use Bloodhound (https://github.com/BloodHoundAD/BloodHound) to assess the AD security
- Use ADTimeline to assess the AD security
Some interesting sites:
- ADSecurity
- Harmj0y’s blog
- Sysmon SecuriTay’s configuration file – template with default high-quality event tracing
- Explaining and adapting Tay’s Sysmon configuration
- Use of PSExec
Windows hardening: https://wp.me/p15Zft-Mr
Privilege admin workstation: https://wp.me/p15Zft-Mr
Delegate WMI access to domain controllers:
This post originally came about after several customers asked how to remove users accounts from Domain Admins and the Administrators group in the domain. These accounts are needed to monitor the systems, so we needed to find a way to get them to read the instrumentation of the system with non-elevated privilege.
https://blogs.technet.microsoft.com/askpfeplat/2018/04/30/delegate-wmi-access-to-domain-controllers/