9781119450610
9781119450610
9781119450610
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Securing Privileged Access in Active Directory®
For Dummies®, ManageEngine Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2017 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording, scanning,
or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States
Copyright Act, without the prior written permission of the Publisher. Requests to the
Publisher for permission should be addressed to the Permissions Department, John Wiley &
Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or
online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, and related trade
dress are trademarks or registered trademarks of John Wiley & Sons, Inc., and/or its affiliates
in the United States and other countries, and may not be used without written permission.
ManageEngine and the ManageEngine logo are trademarks or registered trademarks of ZOHO
Corporation. All other trademarks are the property of their respective owners. John Wiley &
Sons, Inc., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For
Dummies book for your business or organization, please contact our Business Development
Department in the U.S. at 877-409-4177, contact info@dummies.biz, or visit www.wiley.
com/go/custompub. For information about licensing the For Dummies brand for products or
services, contact BrandedRights&Licenses@Wiley.com.
ISBN 978-1-119-45060-3 (pbk); ISBN 978-1-119-45061-0 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
We’re proud of this book and of the people who worked on it. Some of the
people who helped bring this book to market include the following:
A
s more and more important data is stored on an
organization’s networks and computers, those
networks and computers will continue to come
under attack. Many in the industry feel that these attacks are
successful because of the lack of control of privileged access.
1
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Monitoring privileged account changes includes tracking
and logging changes, logging what the accounts accessed,
alerting administrators that changes to these accounts
are made, and being able to run reports of historical
changes to the accounts.
2
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
IN THIS CHAPTER
»» Securing local Administrator accounts
»» Determining whether Administrator
is being used
»» Creating a honeypot Administrator
account
»» Tracking failed logons to
Administrator account
Chapter 1
Administrator
Accounts
A
dministrator accounts are everywhere. All desk-
tops, servers, and Active Directory domains have
an Administrator account. Because these accounts
can be used to change security settings, install software
and hardware, access all a computer’s files, and make
changes to other user accounts, you must protect them.
3
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
You can use many techniques to secure Administrator
accounts, all of which contribute to the overall security
profile for these accounts.
Local Administrator
Every desktop and server has a local Administrator
account. These accounts have full control over every
aspect of the computer (or server), and so need to be
secured.
4
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Unfortunately, each new computer that the image is
installed on receives the same password for the local
Administrator account. Each computer with the same
password is vulnerable to attacks such as pass-the-hash
and pass-the-ticket, which take advantage of the
oversight.
5
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Before you disable the built-in Administrator
account, be sure to create another user
account that has administrative privileges so
you can still administer the computer.
Active Directory
Administrator
With the Administrator in Active Directory having ultimate
privileges, this account must be secured and protected.
Nearly every moderately sophisticated attacker is aware
that every Administrator account created (desktops, serv-
ers, and Active Directory) has an SID ending with -500.
6
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
cannot be locked out. For all of these reasons, this account
should be protected and not used for daily tasks.
7
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
associated with the bad logons configured, an email can be
sent when the new Administrator account is under attack.
8
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
IN THIS CHAPTER
»» Determining privileged groups
»» Enumerating privileged groups
recursively
»» Tracking privileged group changes
Chapter 2
Privileged Group
Accounts
T
he most common way users are granted privileges
is to be placed into groups that have privileges. You
need to know these things about group privileges:
9
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Not only can groups be nested, but there is
nearly an unlimited depth of nested groups
possible.
Granting privileges
You have many ways to grant privileges to groups (and
therefore to users) in a Windows environment. Having so
many options for granting privileges makes reporting on
all of them difficult because they are not centralized.
»» Adding to a group
»» Granting user rights
10
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
»» Access control list (ACL)
»» Delegation
12
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
enumerated the members for each group, you need to
configure the group members to be correct.
Logging changes
Microsoft provides auditing technology that allows all
changes to AD groups to be logged. Auditing is part of
Group Policy. If you enable account management audit-
ing, all group changes are monitored and logged.
14
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
IN THIS CHAPTER
»» Protecting service accounts
»» Documenting service accounts
»» Tracking service accounts
Chapter 3
Service Accounts
S
ervice accounts are either local accounts or user
accounts from Active Directory that perform func-
tions for applications or services. Usually these
functions are communications outside the computer
where the application or service is installed. Most service
accounts must have elevated privileges to perform actions
on the computer and on other devices on the network.
15
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Service accounts can be configured for nearly
every operating system. This chapter covers
service accounts for Windows services.
Group membership
Like privileged users in Chapter 1, service accounts can
have membership in a privileged group, which immedi-
ately grants them some level of privilege. This membership
16
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
is usually granted at the installation of the service and
association of the service account to the service.
User rights
User rights are a per-computer configuration. There are
more than 35 user rights that grant privileges such as
changing the system time, backing up files, and having
service-level access to the computer. Each user right
provides a different level of privilege over the computer.
Knowing which user rights a service has been granted
can help you track the service account.
Service ACLs
Service ACLs aren’t typically used to grant privileges, but
it’s possible. The service ACLs include the ability to stop
the service, start the service, and even shut it down.
17
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
In the list of services, you also see a Log On As column.
This entry enables you to get a listing of the service
accounts that are responsible for each service. These
accounts can be local or from Active Directory (AD).
18
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
»» Set up alerts: Service accounts are so high profile that
notifications should be sent to key employees when
changes are made. The alerts must be in real-time
and include details: who made the change, what the
change was, and when the change was made.
19
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Alerting service account changes
Notifying an administrator of changes to a service account
is very important. Administrators are often too busy to
check logs or run reports to ensure no changes have
occurred. If the administrator receives an email indicating
a change has occurred, he or she can take immediate action
to rectify the change or ensure the change is correct.
20
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Chapter 4
Ten Ways to Secure
Privileged Access
T
racking and securing privileged access requires
experience and knowledge. It also requires that
you take action to ensure that only the correct
users have privileges in your Active Directory controlled
environment.
21
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Without knowing who has access 24/7, you are
allowing incorrect changes or even attackers access
to your information without your knowledge.
22
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Monitor failed honeypot Administrator logons to
track down attackers.
23
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
See the appendix for more useful tools and
resources.
24
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
Appendix
Free Tools and
Resources
T
he chapters of this book give insight to securing
and monitoring privileged accounts. Before you
begin that tracking and securing, however, you
must know who and what has access in your environ-
ment. The free tools and resources listed in this appendix
provide you with the means and the guidance to help you
accomplish these goals.
Free Tools
The tools listed here are either free or come with a free
30-day trial that will allow you to explore the tool before
making a purchase.
25
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
»» ADManager Plus (30-day trial)
www.manageengine.com/products/ad-manager/
»» AD Query Tool
www.manageengine.com/products/free-windows-
active-directory-tools/free-windows-active-
directory-query-tool.html
»» CSV generator
www.manageengine.com/products/free-windows-
active-directory-tools/free-active-directory-
csv-generator-tool.html
26
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
»» Last Logon Reporter
www.manageengine.com/products/free-windows-
active-directory-tools/free-windows-last-
logon-reporter.html
»» AD Replication Manager
www.manageengine.com/products/free-windows-
active-directory-tools/free-windows-ad-
replication-manager.html
27
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
»» Weak Password Users Report
www.manageengine.com/products/free-windows-
active-directory-tools/free-active-directory-
weak-password-finder.html
Free Resources
The ManageEngine blog provides hands-on information
for tracking and securing privileged accounts, explains
why each task is important, and gives an overview of the
many tools that can help you manage your Active Direc-
tory environment.
https://blogs.manageengine.com/active-directory/
adauditplus/2014/05/31/automating-privileged-
group-modifications-in-active-directory.html
28
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
»» Windows Service Account Finder and Reporter
https://blogs.manageengine.com/free-tools/
active-directory-free-tools/2015/07/16/windows-
service-account-finder-and-reporter.html
https://blogs.manageengine.com/active-
directory/2015/07/02/tracking-admin-logon-
failures-down-to-the-ip-address.html
https://blogs.manageengine.com/active-
directory/2015/04/16/securing-active-
directory-group-membership-alerts.html
https://blogs.manageengine.com/active-
directory/admanager/2015/04/03/securing-
active-directory-analyzing-group-membership.
html
29
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
»» Automatically Disable Unused User Accounts,
Except Service Accounts
https://blogs.manageengine.com/active-directory/
2016/12/08/automatically-disable-unused-user-
accounts-except-service-accounts.html
https://blogs.manageengine.com/active-
directory/2015/11/19/alerting-and-reporting-
on-windows-service-account-modifications.html
https://blogs.manageengine.com/active-
directory/2015/11/12/reporting-on-windows-
service-account-configurations.html
https://blogs.manageengine.com/active-
directory/admanager/2015/11/05/reducing-
attack-surface-of-windows-service-accounts.
html
30
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use
is strictly prohibited.
WILEY END USER LICENSE AGREEMENT