
I recently came across the Active Directory Pro blog post Top 25 Active Directory Security Best Practices. It’s a great read for anyone interested in AD security. I decided to type up the 25 points onto my blog so I could quickly reference them easily when required.
Top 25 Active Directory Security Best Practices
- Clean up the Domain Admins group
- limit accounts
- no day-to-day accounts
- Use at Least Two Accounts (Regular and Admin Account)
- least privilege
- accountA for day-to-day
- accountB for admin tasks
- Secure The Domain Administrator account
- 20+ char password
- only used for domain setup and recovery
- Disable the Local Administrator Account (on all computers)
- often same password
- can mitigate pass-the-hash/pass-the-password
- Use Local Administrator Password Solution (LAPS)
- sets random password for every admin account
- Use a Secure Admin Workstation (SAW)
- for admin tasks
- no internet access
- login with secondary account
- Enable Audit policy Settings with Group Policy
- audit policy on all pcs/devices
- Monitor Active Directory Events for Signs of Compromise
- event logs
- IoCs
- Password Complexity Sucks (Use Passphrases Instead)
- article recommends 12 chars min
- 12 isn’t exactly secure anymore
- Use Descriptive Security Group Names
- avoid generic names
- specific group names
- prevents control permissions
- Cleanup Old Active Directory User & Computer Accounts
- set up process
- Do NOT Install Additional Software or Roles on Domain Controllers
- limited software/roles
- use server core - no GUI
- more software/roles == more security risk
- Continuous Patch Management & Vulnerability Scanning
- don’t forget about 3rd parties
- upgrade if no longer supported
- Use Secure DNS Services to Block Malicious Domains
- Quad9
- OpenDNS
- Comodo Secure DNS
- Run Critical Infrastructure on latest Windows Operating System
- better security
- Use Two Factor Authentication for Remote Access
- DUO
- RSA
- Msoft MFA
- Monitor DHCP Logs for Connected Devices
- DHCP logs
- know what’s connected to network
- identify anomalies
- Monitor DNS Logs for Security Threats
- malicious DNS lookups
- Windows DNS debug logs
- identify anomalies
- Use Latest ADFS and Azure Security Features
- security enhancements
- Use Office 365 Secure Score
- reports/improves security posture
- compare with benchmarks and establish KPIs
- Plan for Compromise (recovery plan)
- NIST
- IR/DR
- Document Delegation to Active Directory
- control access to resources
- security groups
- know what groups use what
- Lock Down Service Accounts
- often perms too high
- Disable SMBv1
- unsecure
- over 30 years old
- Use Security Baselines and Benchmarks
- default installs unsecure
- can be deployed with group policy
- Security Compliance Toolkit
- CIS SecureSuite