BACHELOR’S THESIS DEFENSE

Slides:



Advertisements
Similar presentations
Managing User, Computer and Group Accounts
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
 Overview User Accounts Groups User Rights Permissions.
Module 4: Implementing User, Group, and Computer Accounts
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Module 8: Implementing Administrative Templates and Audit Policy.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Chapter 7 WORKING WITH GROUPS.
Module 8: Designing Active Directory Disaster Recovery in Windows Server 2008.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Working with Workgroups and Domains
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
CN1276 Server (V3) Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Managing Active Directory Domain Services Objects
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter 7: WORKING WITH GROUPS
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Security Planning and Administrative Delegation Lesson 6.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Maintaining Active Directory Domain Services
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Company Confidential 1 A Course on Global Catalog And Flexible Single Master Operations (Fsmo) Roles Prepared for: *Stars* New Horizons Certified Professional.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Chapter 10: Rights, User, and Group Administration.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
NetTech Solutions Security and Security Permissions Lesson Nine.
1 Active Directory Administration Tasks And Tools Active Directory Administration Tasks Active Directory Administrative Tools Using Microsoft Management.
Module 10: Implementing Administrative Templates and Audit Policy.
MIS Chapter 41 Chapter 4 – Implementing and Managing Group and Computer Accounts MIS 431 – Created Spring 2006.
11 GLOBAL CATALOG AND FLEXIBLE SINGLE MASTER OPERATIONS (FSMO) ROLES Chapter 4.
Module 7: Designing Security for Accounts and Services.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
MIM/PAM Case Study Dean Guenther IAM Manager Washington State University May 2016 Copyright 2016, Washington State University.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Windows Vista Configuration MCTS : User Account Security.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Basharat Institute of Higher Education
Module 9: Preparing to Administer a Server
Tactic 1: Adopt Least Privilege
Configuring Windows Firewall with Advanced Security
Introduction to Operating Systems
ACTIVE DIRECTORY ADMINISTRATION
Active Directory Administration
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Module 9: Preparing to Administer a Server
Security Planning and Administrative Delegation
Presentation transcript:

BACHELOR’S THESIS DEFENSE Protecting Windows Privileged Accounts BACHELOR’S THESIS DEFENSE Loc Phan Van -- 175353IDCR Supervisor: Ilhan Celebi – Infrastructure Engineer

Agenda Introduction Effectiveness of Implementation Windows Active Directory Security Principles Define Sensitive Groups Windows Active Directory Security Development Best Practices Conclusions

Introduction Background Problems Objectives Privileged accounts have always become a primary target It’s like a regular accounts, have a valid set of credentials -> system, network Windows privileged accounts are complicated compared to other systems Most popular Operating System, directory service Due to the complexity -> hard to manage, gets ignored. Expensive security software Give administrative principles Point out sensitive groups Develop a tool for privileged accounts information gathering Develop monitoring solution for privileged accounts

Effectiveness of implementation Time line for typical attack scenario 80% from external attacks 75% of attacks take weeks or more (Verizon Report) $1,2M over a week for recovering (IT Sec Risk Report)

Effectiveness of implementation Detect abnormal behaviors Alert to Administrators Extend the time of escalation by applying RBAC Tier Model Secondary account Tier-0 Groups Privileged Admin Workstation Naming Convention Privileged Account Cleaning-up

Windows AD Security Principles Role based access control Tier Model Dealing With Tier-0 Groups Secondary accounts Privileged Admin Workstation Naming Convention Privileged accounts cleaning-up 1 2 3 4 5 6 +

Windows AD Security Principles Privileged Account Cleaning-up Implement the data investigation on the AD objects. Have more focus on Administrative objects (accounts, groups). Have more focus on Service accounts and check if the services are still running. Promulgate the policies for those unused objects (delete them or deactivate them).

Windows AD Security Development 1 Privileged Accounts Information Gathering 2 Privileged Accounts Monitoring

Windows AD Security Development 1 Privileged Accounts Information Gathering

Windows AD Security Development 2 Privileged Accounts Monitoring +

Windows AD Security Development 2 Privileged Accounts Monitoring

Best practices Inventory and reduce the number of privileged accounts. Secondary accounts. Enforce least privileged for standard user accounts. Store password securely. Create a process for on- and off-boarding employees that have privileged accounts. Eliminate the practice of accounts that have non-expiring passwords. Password complexity and password age policy. Implement automated password verification and reconciliation. Privileged account information gathering. Proactivity detect malicious behavior.

Conclusions Very first stepping stones in Windows Security Contribute Windows administrative principles Implement privileged accounts information gathering Manipulate and develop a monitoring solution Give best practices Further work: Dealing with service account

Thank you

Reviewer’s questions

Tier 0 groups Domain Admins Active Directory group with full admin rights to the Active Directory domain and all computers (default). Enterprise Admins Active Directory group with full admin rights to all Active Directory domains in the AD forest and gains this right through automatic membership in the Administrators group in every domain in the forest. Schema Admins Members of the Schema Admins group can modify the Active Directory schema. This group exists only in the root domain of an Active Directory forest of domains. Backup Operators Local or Active Directory group. AD group members can backup or restore Active Directory and have logon rights to Domain Controllers (default). Server Operators Members in the Server Operators group can administer domain servers. This group exists only on domain controllers. By default, the group has no members. Members of the Server Operators group can sign in to a server interactively, create and delete network shared resources, start and stop services, back-up and restore files, format the hard disk drive of the computer, and shut down the computer. This group cannot be renamed, deleted, or moved. Print Operators Members of this group can manage, create, share, and delete printers that are connected to domain controllers in the domain. They can also manage Active Directory printer objects in the domain. Members of this group can locally sign in to and shut down domain controllers in the domain. Account Operators Active Directory group with default privileged rights on domain users and groups, plus the ability to logon to Domain Controllers. Administrators Local or Active Directory group. The AD group has full admin rights to the Active Directory domain and Domain Controllers.

Sensitive groups Pre–Windows 2000 Compatible Access Members of the Pre–Windows 2000 Compatible Access group have Read access for all users and groups in the domain. Remote Desktop Users The Remote Desktop Users group on an RD Session Host server is used to grant users and groups permissions to remotely connect to an RD Session Host server. This group cannot be renamed, deleted, or moved. It appears as a SID until the domain controller is made the primary domain controller and it holds the operations master role (also known as flexible single master operations or FSMO). WinRMRemoteWMIUsers__ In Windows Server 2012, the Access Denied Assistance functionality adds the Authenticated Users group to the local WinRMRemoteWMIUsers__ group. Therefore, when the Access Denied Assistance functionality is enabled, all authenticated users who have Read permissions to the file share can view the file share permissions. The WinRMRemoteWMIUsers_ group allows running Windows PowerShell commands remotely whereas the Remote Management Users group is generally used to allow users to manage servers by using the Server Manager console. Protected User Members of the Protected Users group are afforded additional protection against the compromise of credentials during authentication processes. This security group is designed as part of a strategy to effectively protect and manage credentials within the enterprise. Members of this group automatically have non-configurable protection applied to their accounts.

Windows AD Security Principles Role based access control Tier Model

Windows AD Security Principles Dealing with Tier-0 Groups Domain Admins Enterprise Admins Schema Admins Backup Operators Server Operators Print Operators Account Operators Administrators One account for normal user activities: Mail Internet Browsing Line of business applications etc. Separate account for doing administration. One admin account for each tier For example: pe889 [^pe]: for regular user accounts ad335 [^ad]: for administrative accounts Secondary accounts

Windows AD Security Principles Privileged Admin Workstation Role: Role-<Role Tier>-<Role Name> Prefix: Role Role Tier: T0/T1/2 Role Name: Job Function Role-T2-WorkstationAdmins Task: Task-<Target Object Type>-<Operation>-<Target> Prefix: Task Target Object Type: AD object type Operation: Create/Delete/Manage etc. Target: Short Name for OU/Target Task-Computer-Create-CORP Naming Convention