Restricted Admin & Credential Exposure MMS Minnesota 2014 Hasain Alshakarti – TrueSec Enterprise Security #MMSMinnesota #MMSConfigMgr #MMSLove.

Slides:



Advertisements
Similar presentations
4/14/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Advertisements

Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Internet Based Client Management
ASSUME BREACH PREVENT BREACH + Research & Preparation First Host Compromised Hours Domain Admin Compromised Data Exfiltration (Attacker.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Practical PowerShell Tips & Tricks MMS Minnesota 2014 Trevor Sullivan, Jeff Wouters, David O’Brien – @david_Obrien.
Automating Microsoft Azure with PowerShell MMS Minnesota 2014 Trevor Sullivan and David O’Brien – #MMSMinnesota.
Advanced Infrastructures In System Center Configuration Manager 2012 R2 Jason blog.configmgrftw.com m Wally.
Kerberos Underworld Ondrej Sevecek | MCM: Directory | MVP: Security |
2 User: Sue Password hash: C9DF4E… Sue’s Laptop User: Sue Password: a1b2c3 Sue’s User Session User: Sue Password hash: C9DF4E… File Server Sue’s.
Your CMDB and PowerShell DSC: DevOps Techniques
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | Certified Ethical Hacker | |
Access Gateway Operation
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
PCIT numbers/?_php=true&_type=blogs&_php=true&_type=blogs&_php=true&_type=blogs&_php=true&_type=blogs&_r=5&
Troubleshooting OS Deployment MMS Minnesota 2014 Johan Michael #MMSOSD.
PowerShell DSC v. ConfigMgr Compliance Settings MMS Minnesota 2014 Greg Ramsey David O’Brien Sherry Kissinger #MMSMinnesota.
SCORCH – Fun Recipes for RunBooks MMS Minnesota 2014 Steve Jesok & Matthew #MMSSCOrch.
Service Models in SCOM with VSAE examples
Get MMS Right at Home Every Month MMS Minnesota 2014 How to start / grow / sustain a professional user group community. #MMSMinnesota #MMSCommunity #MMSLove.
Advanced MP Authoring and Design Getting outside of the wizard and into the MP code with VSAE MMS Minnesota 2014 Nathan Foreman Jonathan Almquist #MMSSCOM.
System Center Reporting Zero to Hero 15 minutes x 4 MMS Minnesota 2014 Samuel Erskine (Sam) Dieter Gasser (Didi) IT Driving Fellow Principal Consultant.
Security in a shared infrastructure Björn Brolin.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Single Sign-On
Yes, Applications DO work in task sequences!
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Sudarshan Yadav Sr. Program Manager, Microsoft
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Bezpečnost Windows pro pokročilé: zajímavosti a UAC GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. |
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Topics The Problem Attack Scenario Demo Mitigations and Recommendations Next Steps.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
A ConfigMgr 2012 Site Review MMS Minnesota 2014 Kent Agerlund / Steve Thomson.
Windows 10 Setup InternalsWindows 10 Setup Internals Johan
Are you Ready for Configuration Manager vNext?
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Define, bundle, deployDefine, bundle, deploy Working with Windows Server Containers and Docker James David O’Brien.
Nano ServerNano Server The Future of Window Server Mikael Johan
Managing iOS Device Using ConfigMgr and Intune Hybrid MDM John Presenter #2 Twitter Handle Blog or address.
The Ultimate Guide to Building Wireless Network Security Hasain Alshakarti Senior Security Advisor, Microsoft MVP Enterprise Security TrueSec Inc SIA307.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
Introduction to Administering a SQL Server Matthew Steve Thompson, stevethompsonmvp.wordpress.com.
The Art of deploying Windows 10 With ConfigMgr 2012 R2 Johan Mikael
XPlatform ManagementxPlatform Management Windows Provisioning from *nix David James.
Midwest Management Summit MMSSQL – What are Your SQL Reporting Questions? #MMSMinnesot a #MMSSQL.
ConfigMgr 2012 SQL Refresher MMS Minnesota 2014 Matthew Teegarden/Steve Thompson.
ConfigMgr 2012 Jeopardy Quiz MMS Minnesota 2014 Kim Oppalfens & Kent Agerlund Microsoft MVP: Enterprise Client Management #MMSJeopardy.
Introduction to T-SQL – Part Deux Matthew Sherry Kissinger kissinger.
OS Deployment - LEVEL 500OS Deployment - LEVEL 500 Johan
App-V: An Overview MMS Minnesota 2014 Fred #MMSMinnesota #MMSAppV.
Server OS Deployment Deep Dive with two crazy guys and ConfigMgr 2012 R2 MMS Minnesota 2014 Greg Nash.
900 Degrees of Service Manager with 3 International System Center Chefs MMS Minnesota 2014 Steve Buchanan (System Center MVP) Dieter Gasser (CPMB - Author)
Sweet SUITE Imaging MMS Minnesota 2014 #MMSMinnesota #MMSConfigMgr #MMSLove Steven Rachui Premier Field Engineer Microsoft Corporation
Implementing SSTP VPN and 802.1x with RADIUS on Windows 2012 Ing. Ondřej Ševeček | Product Manager Windows Server | GOPAS a.s. MCM: Directory | MVP: Security.
Real Life Enterprise PKI MMS Minnesota 2014 Hasain Alshakarti – TrueSec Enterprise Security #MMSMinnesota #MMSConfigMgr #MMSLove.
Everything you want to know about
Winning at Virtualization Management with System Center MMS Minnesota 2014 James Moots Veeam Software Manager, Systems Engineers.
Stopping Attacks Before They Stop Business
Enterprise grade security in your Hadoop clusters on Azure
AuthLite 2-Factor for Windows Administration
Microsoft /21/ :21 AM BRK3292 Understand Credential Security: Important Things You Need to Know About Storing Your Identity Paula Januszkiewicz.
Module 1: Identity is the New Perimeter
Shielded VM and Guarded Fabric
Darren Mar-Elia Head of Product
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presenter # 1 • Presenter # 2 • Presenter # 3
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Restricted Admin & Credential Exposure MMS Minnesota 2014 Hasain Alshakarti – TrueSec Enterprise Security #MMSMinnesota #MMSConfigMgr #MMSLove

Pass-the-Hash (PtH) & Other Credential Theft Pass the Hash NT Hash SAM/AD LSASS “Pass The Dutchie” NTLM Reflection attack Kerberos Golden Ticket

Network Isolation & Dynamic Segmentation Windows Firewall with Advanced Security Authentication & Integrity Identity Aware Access MMS Minnesota 2014

Authentication Smart Card Logon NT Hash present Virtual Smart Card Authentication Mechanism Assurance Smart Card Logon Dynamic Security Group (Just in Time) Protected Users No Cache of “Fresh Credentials” Authentication Policies & Silos Kerberos Restrictions MMS Minnesota 2014

Remote Desktop RDP + TLS security RD Gateway TLS tunneling Authorization Audit Restricted Admin Mode Mitigate Pass-the-Hash

Powershell Remoting “Just Enough Admin” Restricted Endpoints MMS Minnesota 2014

Evaluations Please provide session feedback by clicking the Eval button in the scheduler app. One lucky winner will get a free ticket to the next MMS! Visit all of our sponsors in the expo area and online! Platinum Sponsors: Gold Sponsors : MMS Minnesota 2014 Hasain Alshakarti – TrueSec