#activedirectorysecuritytips search results
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember Administrators -Recursive | select DistinguishedName Ask Why? for: * Service accounts * Accounts/groups from another forest * Computer accounts (remove) * Normal users * Accounts with SPNs (work to remove)
#ActiveDirectorySecurityTips Run this AD module cmd: Get-ADGroupMember 'Administrators' -Recursive | % {Get-ADUser $_ -prop ServicePrincipalName} | Where {$_.ServicePrincipalName} Investigate & remove any SPNs on 'people' accounts. Determine why service accounts are AD admins.
All of the #ActiveDirectorySecurityTips I posted here are now located on ADSecurity.org adsecurity.org/?tag=activedir…
#ActiveDirectorySecurityTips Run this AD module cmd: get-aduser Administrator -prop PasswordLastSet,LastLogonDate,servicePrincipalName (change name as needed) * PW should change every year. * If there's a SPN, get this removed ASAP. * Account should not have a recent logon.
#ActiveDirectorySecurityTips Run this AD module cmd: get-aduser krbtgt -prop Created,PasswordLastSet,msDS-KeyVersionNumber * PW should change 2x every year. * If Created = PWLastSet, then work to change soon. * KeyVersionNum typically identifies how many times PW changed (n-1).
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember 'Account Operators' -Recursive The Account Operators group should not be used. Custom delegate instead. This group is a great "backdoor" priv group for attackers. Microsoft even says don't use this group!
Pro Tip: Listening to Amon Amarth makes AD Roaming Profiles load faster on Windows XP SP1 #activedirectorysecuritytips
Limit membership in the DNSAdmins group since this group is able to "execute" DLLs on Domain Controllers (by design). adsecurity.org/?p=4064 Original research & post: medium.com/@esnesenon/fea… #ActiveDirectorySecurityTips
On Domain Controllers, LDAP Signing & LDAP Channel Binding become mandatory security settings. portal.msrc.microsoft.com/en-us/security… Test & Enable these before Microsoft Enables by Default: support.microsoft.com/en-us/help/935… support.microsoft.com/en-us/help/403… #ActiveDirectorySecurity #activedirectorysecuritytips
Microsoft strongly advises customers... always a warning, especially if it involves DCs and LDAP and MS announces upcoming changes support.microsoft.com/en-us/help/452…
* Block AD Admins from logging onto non-DA systems using GPOs docs.microsoft.com/en-us/windows-… * Add all AD Admins to the Protected Users group to provide additional protections (including Kerberos delegation attack mitigation) docs.microsoft.com/en-us/windows-… #ActiveDirectorySecurityTips
* Add service accounts to a group and restrict logon type via GPO (just realized I have never written about this) experts-exchange.com/questions/2908… #ActiveDirectorySecurityTips
Remember when @PyroTek3 started tweeting out components of the Trimarc Active Directory Security Assessment (#ActiveDirectorySecurityTips)? Pepperidge farm remembers... 😀 We check these & so do attackers.
#ActiveDirectorySecurityTips Run this AD module cmd: get-aduser Administrator -prop PasswordLastSet,LastLogonDate,servicePrincipalName (change name as needed) * PW should change every year. * If there's a SPN, get this removed ASAP. * Account should not have a recent logon.
* Rotate local admin passwords using LAPS adsecurity.org/?p=1790 * Block local account (including RID 500) network access to systems. docs.microsoft.com/en-us/windows-… docs.microsoft.com/en-us/windows-… #ActiveDirectorySecurityTips
There's more but this is a solid start. A couple of previous tweets on this: #ActiveDirectorySecurityTips
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember 'Account Operators' -Recursive The Account Operators group should not be used. Custom delegate instead. This group is a great "backdoor" priv group for attackers. Microsoft even says don't use this group!
* Ensure appropriate AD auditing adsecurity.org/?p=3377 * Review domain Administrators membership * Review the "Default" GPOs for inappropriate rights adsecurity.org/?p=3700 * Review AD permissions github.com/cyberark/ACLig… #ActiveDirectorySecurityTips
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember Administrators -Recursive | select DistinguishedName Ask Why? for: * Service accounts * Accounts/groups from another forest * Computer accounts (remove) * Normal users * Accounts with SPNs (work to remove)
Configure Azure AD Connect Step By Step #Azure #microsoft #activedirectorysecuritytips #youtube @youtube #MicrosoftTeams @Azure #database #cloud #clouds #CloudComputing youtu.be/xYrleawy_CQ
Active Shooter Considerations for Off-Duty Police. calibrepress.com/2019/08/are-yo… #activedirectorysecuritytips #activeshootercalifornia #IACP #ILEETA
Must read if you are interested in securing your environment against various attacks 😍 #BlueTeam #activedirectorysecuritytips #redteam #sysadmin
Please share in this thread some defensive techniques that are relatively simple to configure/deploy that has a high success rate (low false positives). I'll start: * Detect Kerberoasting: trimarcsecurity.com/single-post/Tr… * Detect PW Spraying: trimarcsecurity.com/single-post/20… #BlueTeam
Offline #GPO parsing and analysis. #DFIR - github.com/gtworek/PSBits…
Looking for a Windows Server administrator? Check this out, Lakunzo will setup and configure your server and roles on @fiverr #activedirectory #activedirectorysecuritytips #DNS #DHCP #NAT fiverr.com/s2/9fdc8f3570?…
All of the #ActiveDirectorySecurityTips I posted here are now located on ADSecurity.org adsecurity.org/?tag=activedir…
Limit membership in the DNSAdmins group since this group is able to "execute" DLLs on Domain Controllers (by design). adsecurity.org/?p=4064 Original research & post: medium.com/@esnesenon/fea… #ActiveDirectorySecurityTips
#ActiveDirectorySecurityTips Run this AD module cmd: Get-ADGroupMember 'Administrators' -Recursive | % {Get-ADUser $_ -prop ServicePrincipalName} | Where {$_.ServicePrincipalName} Investigate & remove any SPNs on 'people' accounts. Determine why service accounts are AD admins.
There's more but this is a solid start. A couple of previous tweets on this: #ActiveDirectorySecurityTips
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember 'Account Operators' -Recursive The Account Operators group should not be used. Custom delegate instead. This group is a great "backdoor" priv group for attackers. Microsoft even says don't use this group!
* Add service accounts to a group and restrict logon type via GPO (just realized I have never written about this) experts-exchange.com/questions/2908… #ActiveDirectorySecurityTips
* Rotate local admin passwords using LAPS adsecurity.org/?p=1790 * Block local account (including RID 500) network access to systems. docs.microsoft.com/en-us/windows-… docs.microsoft.com/en-us/windows-… #ActiveDirectorySecurityTips
* Ensure appropriate AD auditing adsecurity.org/?p=3377 * Review domain Administrators membership * Review the "Default" GPOs for inappropriate rights adsecurity.org/?p=3700 * Review AD permissions github.com/cyberark/ACLig… #ActiveDirectorySecurityTips
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember Administrators -Recursive | select DistinguishedName Ask Why? for: * Service accounts * Accounts/groups from another forest * Computer accounts (remove) * Normal users * Accounts with SPNs (work to remove)
* Block AD Admins from logging onto non-DA systems using GPOs docs.microsoft.com/en-us/windows-… * Add all AD Admins to the Protected Users group to provide additional protections (including Kerberos delegation attack mitigation) docs.microsoft.com/en-us/windows-… #ActiveDirectorySecurityTips
Offline #GPO parsing and analysis. #DFIR - github.com/gtworek/PSBits…
On Domain Controllers, LDAP Signing & LDAP Channel Binding become mandatory security settings. portal.msrc.microsoft.com/en-us/security… Test & Enable these before Microsoft Enables by Default: support.microsoft.com/en-us/help/935… support.microsoft.com/en-us/help/403… #ActiveDirectorySecurity #activedirectorysecuritytips
Microsoft strongly advises customers... always a warning, especially if it involves DCs and LDAP and MS announces upcoming changes support.microsoft.com/en-us/help/452…
Looking for a Windows Server administrator? Check this out, Lakunzo will setup and configure your server and roles on @fiverr #activedirectory #activedirectorysecuritytips #DNS #DHCP #NAT fiverr.com/s2/9fdc8f3570?…
Must read if you are interested in securing your environment against various attacks 😍 #BlueTeam #activedirectorysecuritytips #redteam #sysadmin
Please share in this thread some defensive techniques that are relatively simple to configure/deploy that has a high success rate (low false positives). I'll start: * Detect Kerberoasting: trimarcsecurity.com/single-post/Tr… * Detect PW Spraying: trimarcsecurity.com/single-post/20… #BlueTeam
Pro Tip: Listening to Amon Amarth makes AD Roaming Profiles load faster on Windows XP SP1 #activedirectorysecuritytips
Active Shooter Considerations for Off-Duty Police. calibrepress.com/2019/08/are-yo… #activedirectorysecuritytips #activeshootercalifornia #IACP #ILEETA
Configure Azure AD Connect Step By Step #Azure #microsoft #activedirectorysecuritytips #youtube @youtube #MicrosoftTeams @Azure #database #cloud #clouds #CloudComputing youtu.be/xYrleawy_CQ
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember 'Account Operators' -Recursive The Account Operators group should not be used. Custom delegate instead. This group is a great "backdoor" priv group for attackers. Microsoft even says don't use this group!
Remember when @PyroTek3 started tweeting out components of the Trimarc Active Directory Security Assessment (#ActiveDirectorySecurityTips)? Pepperidge farm remembers... 😀 We check these & so do attackers.
#ActiveDirectorySecurityTips Run this AD module cmd: get-aduser Administrator -prop PasswordLastSet,LastLogonDate,servicePrincipalName (change name as needed) * PW should change every year. * If there's a SPN, get this removed ASAP. * Account should not have a recent logon.
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember Administrators -Recursive | select DistinguishedName Ask Why? for: * Service accounts * Accounts/groups from another forest * Computer accounts (remove) * Normal users * Accounts with SPNs (work to remove)
#ActiveDirectorySecurityTips Run this AD module cmd: get-aduser krbtgt -prop Created,PasswordLastSet,msDS-KeyVersionNumber * PW should change 2x every year. * If Created = PWLastSet, then work to change soon. * KeyVersionNum typically identifies how many times PW changed (n-1).
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember Administrators -Recursive | select DistinguishedName Ask Why? for: * Service accounts * Accounts/groups from another forest * Computer accounts (remove) * Normal users * Accounts with SPNs (work to remove)
#ActiveDirectorySecurityTips Run this AD module cmd: Get-ADGroupMember 'Administrators' -Recursive | % {Get-ADUser $_ -prop ServicePrincipalName} | Where {$_.ServicePrincipalName} Investigate & remove any SPNs on 'people' accounts. Determine why service accounts are AD admins.
#ActiveDirectorySecurityTips Run this AD module cmd: get-aduser Administrator -prop PasswordLastSet,LastLogonDate,servicePrincipalName (change name as needed) * PW should change every year. * If there's a SPN, get this removed ASAP. * Account should not have a recent logon.
#ActiveDirectorySecurityTips Run this AD module cmd: get-aduser krbtgt -prop Created,PasswordLastSet,msDS-KeyVersionNumber * PW should change 2x every year. * If Created = PWLastSet, then work to change soon. * KeyVersionNum typically identifies how many times PW changed (n-1).
#ActiveDirectorySecurityTips Run this AD module cmd: get-adgroupmember 'Account Operators' -Recursive The Account Operators group should not be used. Custom delegate instead. This group is a great "backdoor" priv group for attackers. Microsoft even says don't use this group!
All of the #ActiveDirectorySecurityTips I posted here are now located on ADSecurity.org adsecurity.org/?tag=activedir…
Pro Tip: Listening to Amon Amarth makes AD Roaming Profiles load faster on Windows XP SP1 #activedirectorysecuritytips
Limit membership in the DNSAdmins group since this group is able to "execute" DLLs on Domain Controllers (by design). adsecurity.org/?p=4064 Original research & post: medium.com/@esnesenon/fea… #ActiveDirectorySecurityTips
On Domain Controllers, LDAP Signing & LDAP Channel Binding become mandatory security settings. portal.msrc.microsoft.com/en-us/security… Test & Enable these before Microsoft Enables by Default: support.microsoft.com/en-us/help/935… support.microsoft.com/en-us/help/403… #ActiveDirectorySecurity #activedirectorysecuritytips
Microsoft strongly advises customers... always a warning, especially if it involves DCs and LDAP and MS announces upcoming changes support.microsoft.com/en-us/help/452…
Remember when @PyroTek3 started tweeting out components of the Trimarc Active Directory Security Assessment (#ActiveDirectorySecurityTips)? Pepperidge farm remembers... 😀 We check these & so do attackers.
#ActiveDirectorySecurityTips Run this AD module cmd: get-aduser Administrator -prop PasswordLastSet,LastLogonDate,servicePrincipalName (change name as needed) * PW should change every year. * If there's a SPN, get this removed ASAP. * Account should not have a recent logon.
Something went wrong.
Something went wrong.
United States Trends
- 1. CarPlay 3,335 posts
- 2. Osimhen 71.4K posts
- 3. Cynthia 99.7K posts
- 4. Megyn Kelly 17.3K posts
- 5. Senator Fetterman 9,701 posts
- 6. Padres 28K posts
- 7. Katie Couric 7,206 posts
- 8. Black Mirror 4,196 posts
- 9. #WorldKindnessDay 15.1K posts
- 10. Gabon 109K posts
- 11. Vine 16.5K posts
- 12. Woody Johnson N/A
- 13. #LoveDesignEP7 205K posts
- 14. RIN AOKBAB BEGIN AGAIN 204K posts
- 15. #NGAGAB 14.7K posts
- 16. Bonhoeffer 3,792 posts
- 17. Sheel N/A
- 18. Massie 98.4K posts
- 19. ariana 85.2K posts
- 20. Clinton 134K posts