Hi Everyone,
I read a long time ago that it is quite difficult to harden a Windows Primary Domain Controller. I tried just yesterday to disable Windows Remote Shell on it and then it can't install the Domain Controller Role. Like what the heck, Windows uses Remote Shell to install a local server? I know I can disable that After choosing the role - so nothing else will break.
Anyways, what else can I do to protect it ?
Hi,
if you try to harden a Windows Server with a Domain Controller Role (DNS) it is great to have a Security centric DNS Chain.
Example:
So, if a request comes in for a local resource it passes thru the Firewall and then to the Domain Controller/s.
DC <<-----Firewall Appliance (With DNS Request Route) <<----Client
Then if a request comes in for a external resource (
www.google.com)
DNS Uplink Server (Cloudflare DNS or others) <<--------Firewall Appliance (DNS Uplink) <<--- Client
Like this you could also Use a TLD and harden your Services with a WildCard Cert from a known CA. (Not a Split-brain DNS approach). You still manage your local Zone on your Domain Controller and External Public DNS on the Public DNS Servers.
The other part is Services like Web, Mail and so on...
----------------------------
Remediation for Active Directory:
- Keep your Systems Up-to-date
- Use LAPS and GPO to Rename and Auto-Set Default strong Passwords for Domain Joined (Clients and Servers)
- Disable Remote PowerShell / RDP (I use Splashtop over a RMM Service to have granular Auditing - Even Splashtop as a Business License is genuinely nice)
- Create GPO to rename Local Administrator Account/s
- Disable SMBv1 and Block it!
- Enable Windows Firewall
- Proper IP/DNS Settings (Use BPA for help if needed ^^)
- Use an Endpoint Security for Servers (Example: Sophos Intercept X Advanced with XDR for Servers - For ppl that do not have an expert IT-Security Team use the MDR Complete option that has a 24/7 SOC Team for Monitoring and much more... )
---- With tools that have EDR / XDR you can have a DataLake and use queries to see changes, manipulations and so on...
- Implement RBAC (Role Based Access Control) [Never use a DA (Domain Admin.) or OA (Organization Admin.) Account for normal day to day work. Only use a DA or OA Account if you need to do Admin. work on the Servers]
- Check for Password Venerability's -> Free ->
Specops Password Auditor
- Never Stop researching it is a journey
-------------------------------------------------
Nice Video 1 Source Manage Engine:
Nice Video 2 Source Black Hills Information Security:
-----------------------------------------------
If you are a huge Enterprise, I recommend using BigFix by HCL former IBM Product:
- Build in Remediation with Fixes that are easy to deploy to X Servers and maintain a Baseline.
- Patch Managment
- Security Compliance with known standards by CIS and NIS with deployment options build in.
- Reports that ensure proper deployment of sed tasks
- It has tons more features...
- Link ->
HCLSoftware
Hope I could help.
Val.