Modulul VII
Modulul VII
Modulul VII
Module 7
Securing Active Directory Domain Services
Contents:
Module Overview 7-1
Module Overview
In your organization’s information technology (IT) infrastructure, securing Active Directory Domain Services
(AD DS) domain controllers is a critical task. Domain controllers provide access to many different resources,
and they contain information about users and their passwords. If a single domain controller is
compromised, any objects in the same Active Directory domain or in any trusted domain are at risk of being
compromised, too.
The Windows Server 2016 operating system provides features and apps that you can use to help secure
your network against security threats. The operating system provides measures to secure domain
controllers by minimizing their attack surface and determining their domain-controller placements. The
operating system also determines the AD DS roles that are used for administration and design, and
implements password security, in addition to auditing when attacks occur. You also can use domain
controllers to deploy security measures to other clients and servers in your Windows-based infrastructure.
AD DS administrators must understand the threats to domain controllers and the methods that they can
use to secure AD DS and its domain controllers.
Objectives
After completing this module, you will be able to:
Lesson 1
Securing domain controllers
Your network’s domain controllers are the core of your AD DS infrastructure. They contain all of your user-
account information, and without them, users cannot sign in to the network or access the resources that
they need to perform their jobs. When user accounts are compromised, other accounts in the same domain
and any trusted domain also might be compromised. Therefore, securing your domain controllers is a
critical component in securing your entire IT infrastructure.
Lesson Objectives
After completing this lesson, you will be able to:
Describe security risks that can affect domain controllers.
Deploy an RODC.
To secure your Active Directory domain and domain controllers, you need to address security in terms of
the following risks:
Network security. An attacker must gain access to your network to get further information. Therefore,
you should ensure that network boundaries, such as firewalls and exposed services, are highly
protected. Also, you should ensure that your wireless networks are secured properly and do not allow
untrusted devices to connect to your internal network. Use certificates for wireless connections and
implement Network Access Protection (NAP) to secure network access.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-3
Authentication attacks. Access to authentication credentials, such as user names and passwords, is the
primary target for anyone who tries to access your network and data. Active Directory domain
controllers store all information about all users and their passwords, and they need sufficient security to
protect this information.
Elevation of privilege. While regular user credentials can access certain information, domain
administrators or other administrative groups have elevated privileges, giving those accounts control
over data. In many cases, administrators can grant themselves additional access to resources.
Additionally, they can configure security measures. If attackers can elevate the credentials they use by
putting their accounts into elevated groups in the same or trusted domains, they can lower security
and potentially bypass auditing or security safeguards.
Denial of service (DoS) attack. A malicious user or users do not launch DoS attacks to access data, but
rather to disable services, systems, or whole infrastructures. Certain security measures, such as account
lockout policies, might be useful in protecting your network against some threats, but they also
provide an easily accessible DoS attack surface.
Operating system, service, or app attacks. Network operating systems, in addition to services and apps
that support communication over networks, are vulnerable to security attacks. These systems provide
communication over a network, and attackers will try to trick the expected communications to make
these services do something differently than what was intended.
Operational risks. It is important to maintain any organization’s infrastructure properly. Any kind of
software that operates over networks could be a potential target for attackers. To tighten security,
software and hardware vendors release updates regularly. Administrators need to keep their systems
up-to-date and remove or disable any unused user and computer accounts that are likely to have
unsecure passwords. Any permissions that are granted need to be verified and monitored regularly to
ensure that they do not leave a network vulnerable.
Physical security threats. It is important for Active Directory domain controllers to be physically secure.
If someone gets physical access to a server, it is easier to disable security safeguards and run malicious
software locally to retrieve all passwords in a domain.
Some organizations prefer to use a different GPO than the Default Domain Controllers Policy. When
configuring security settings, it is possible to apply settings that might be too secure. For example, you
could configure policies that lock out some administrative groups, or policies that prevent anyone from
accessing the domain. While it is simple to unlink or disable a custom GPO, you should not disable or unlink
the Default Domain Controllers Policy. For this reason, we recommend that you create a custom GPO and
link it to the Domain Controllers OU instead of modifying the Default Domain Controllers Policy.
Default Domain Policy GPO. This GPO links to the domain, and it applies to all users and computers,
including client computers, domain controllers, and servers in the domain. You should use this policy
and others that link to a domain carefully. This policy should contain only settings that are explicitly
intended to apply to all objects in an organization.
Default Domain Controllers GPO. This GPO links to the Domain Controllers OU, and it applies to all
domain controllers in the domain. This is the GPO in which you configure most security settings that
pertain to domain controllers.
Account Policies. Under this node, you can configure the Password Policy, Account Lockout Policy,
and Kerberos Policy. These settings only apply to the local user accounts of the computers to which the
policy applies, unless you configure the settings in the Default Domain Policy. Only the Account
Policies that you configure in the Default Domain Policy apply to all domain accounts.
Local Policies. This node contains three of the most important nodes for security configuration:
o Audit Policy. These settings configure legacy-auditing policies that apply to all Windows
operating-system versions. However, if you have Windows Server 2008 R2 and Windows 7 or
newer deployed in your network, we recommend that you use Advanced Audit Policy
Configuration instead of these auditing policies.
o User Rights Assignment. These settings configure many security settings that apply to user
rights. For example, you can specify who can access the computer from the network, who can sign
in locally or through Remote Desktop Services (RDS), and who is able to change the time or shut
down the computer. For domain controllers, you also can specify who is able to synchronize
directory services data.
o Security Options. These settings contain important security settings, including options for
managing default accounts, such as the Guest and Administrator accounts, and these options also
pertain to managing devices, domain controllers, domain-member security protocols, logon
security settings, network access, and security settings, among others.
Event Log. Under this node, you can configure settings such as event log size, retention method, and
retention duration for the default Application, Security, and System event logs. It is important to have
all Security logs on domain controllers configured identically. If you configure the Security log on one
domain controller to keep logs for six days, and another retains logs for only three days, you will
receive inconsistent results, depending on the domain controller on which you perform the search.
Restricted Groups. Under this node, you can define two properties for security-sensitive groups (or
restricted groups). For each group that you add here, you can define Members and Member of
attributes. For groups that you configure as restricted, you cannot change membership by using other
tools, such as Active Directory Users and Computers.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-5
System Services. Under this node, you can define startup behavior and security permissions for system
services by using GPOs. This enables you to disable all services that are not required for a specific server
role, such as a domain controller.
Windows Firewall with Advanced Security. This setting allows you to administer Windows Firewall
with advanced security centrally. By using a GPO to configure Windows Firewall settings, you can
ensure that all servers that provide the same services, such as domain controllers, have a consistent
Windows Firewall configuration.
Public Key Policies. Under this node, you configure settings that rely on a public key infrastructure
(PKI), such as the Encrypting File System (EFS) and its recovery key, BitLocker Drive Encryption,
Automatic Certificate Request Settings (autoenrollment), and Trusted Root Certification Authorities,
among others.
Advanced Audit Policy Configuration. The settings under this node enable a more extensive policy
configuration than the Audit Policy under the Local Policies node. When targeting Windows
Server 2008 R2 or newer, or Windows 7 computers or newer, we recommend that you use the new
Advanced Audit Policy Configuration settings.
Secure groups with elevated permissions. Every organization has groups with elevated permissions.
These groups include the Domain Admins, Schema Admins, and Enterprise Admins groups.
Implementing secure management processes for these groups is important. For example, you might
limit who knows the passwords for members of these groups, and ensure that all administrators have
special administrative accounts and that they sign in only with those accounts when performing
administrative tasks. For these groups, you can also use the Restricted Groups setting in Group Policy,
which a later section of this module details.
Audit critical object changes. To track any changes to critical administrative groups, such as built-in
accounts, built-in groups, and especially groups with elevated permissions, configure your auditing
policy to track all changes made to these groups. If possible, ensure that only members of an auditing
team have access to the audited events, which prevents administrators from deleting events.
Deploy secure authentication. Two-factor authentication is the key to achieve heightened security,
beyond regular user name and password credentials. It is common to use smart cards to secure
authentication or implement multi-factor authentication with mobile phones. Smart cards have a
stored certificate that acts as a user’s credentials for signing in, rather than a user name and password.
To authenticate by using a smart card, you must possess the smart card, and you must have the
MCT USE ONLY. STUDENT USE PROHIBITED
7-6 Securing Active Directory Domain Services
personal identification number (PIN) or password to unlock the private key. The combination of the
public key, known to the domain controller, and the private key on the smart card, enables the domain
controller to authenticate the user. You also can enforce the use of smart cards if users want to access
additional apps and across RDS. If you use smartphones as a second factor for authentication, you can
require users to use the application, text message, or phone to prove their identity.
Secure network activity. Securing your network is necessary when trying to achieve a secure
client/server infrastructure. If your organization supports wireless networks, ensure that all networks
with access to your organization’s servers are secure, preferably by using certificates. If required,
provide public or guest networks to allow customers, partners, or other nonemployees to have Internet
access, rather than allowing them access to the corporate network. For your wired networks, consider
device health attestation to prevent unknown devices from connecting to your network. For critical
servers that host highly confidential information, consider enforcing Internet Protocol security (IPsec)
signatures or encryption to secure network communication.
Establish deprovisioning and cleanup processes. Basically, provisioning empowers a new employee by
creating their account, group memberships, mailbox, and other components that they need to work in
your organization. Although provisioning is important, you should remember that the often-forgotten
deprovisioning is even more important. You must define and establish processes for employees who
resign voluntarily, and more important, involuntarily. Also, consider other reasons an employee might
take leave, such as parental leave or sabbatical leave. Define what type of access, if any, is necessary.
Additionally, you should decide whether to deactivate accounts, delete accounts, or remove accounts
from certain groups, such as general distribution lists or critical human resources (HR) apps, and decide
whether to allow or prevent access by users who are outside your organization’s network.
A cleanup process also is necessary for domain members, such as for client computers, because they
also are allowed to authenticate against the domain, and a malicious user may utilize their credentials
to compromise a network. Furthermore, ensure that there are no client computers or users that were
created, but which have not been used to connect to the domain. This is because their passwords are
default, well-known passwords, which a malicious user might discover and utilize.
Secure client computers. If you want to secure your AD DS and Active Directory domain controllers,
you must secure your client computers. Client computers cache the last 10 logons, by default.
Therefore, if a client computer is lost, you need to have a process by which you track accounts that
signed in within the password-change interval, and you need to know how to reset passwords after a
loss is reported. You also need to protect your internal network from client computers that connect
from wired or wireless networks from homes, hotels, or airports. To protect client computers, ensure
that client computers have all security updates installed, that they have current virus protection and a
host-based firewall, and consider using drive encryption such as BitLocker drive encryption.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-7
Use RODCs, where possible. You can use RODCs as domain controllers in locations with less physical
security because, by default, RODCs do not store secrets such as account passwords. A later section of
this lesson details RODCs.
Use BitLocker drive encryption. To provide an extra level of security, consider encrypting domain-
controller hard drives by using BitLocker. This prevents attackers from accessing the data on server
hard drives if they are removed from the servers. Windows Server 2016 supports using BitLocker on
volumes that store AD DS databases. However, it does not support the use of EFS to protect AD DS
database files.
Monitor hot-swap disk systems. Usually, servers deploy with hot-swap disk systems, which enable you
to change a drive, without server interruption, when a hardware failure occurs. If you have Redundant
Array of Independent Disks (RAID) Level 1 mirroring in your servers, you should ensure that you have
monitoring in place, so you are aware if any disks are removed or exchanged. Otherwise, it is simple to
remove, and possibly replace, a drive from your domain controller. If someone possesses your domain
controller’s hard drive, he or she has the same ability to exploit the system as they would if they had the
whole domain controller.
Protect virtual disks. Many organizations deploy domain controllers as virtual machines. The virtual
disks used by virtual machines must be as secure as physical disks, and the administrators of your
virtual infrastructure must be as trusted as your Domain Admins. Sometimes, running a dedicated
virtual infrastructure for critical components such as domain controllers addresses these risks.
Store backups in secure locations. Your domain-controller backups contain all of the same information
as domain controllers. Make sure that backups are stored in secure locations, which only trusted
administrators can access.
MCT USE ONLY. STUDENT USE PROHIBITED
7-8 Securing Active Directory Domain Services
If you place a domain controller in a branch office, authentication occurs more efficiently. However, there
are several potentially significant concerns, which include:
A domain controller maintains a copy of all object’s attributes in its domain, including secure
information, such as user passwords. If a hacker accesses or steals a domain controller, or its hard drive
or backup drive, a determined malicious user could identify valid user names and passwords. At that
point, your entire domain is compromised, and you would have to reset passwords for every user and
computer account in the domain. Server security at branch offices often is not ideal, so a branch-office
domain controller poses a considerable security risk.
Changes to the Active Directory database on a branch-office domain controller replicate to the hub
site and to the environment’s other domain controllers. Therefore, corruption to a branch-office
domain controller poses a risk to the integrity of the organization’s AD DS. For example, a branch office
administrator who performs a restoration of the domain controller from an outdated backup could
cause significant repercussions for the entire domain.
A branch-office domain controller might require maintenance, such as the installation of new device
drivers. To perform maintenance on a standard domain controller, you must sign in as a member of the
Administrators group, which means that you effectively are an administrator of the domain. It might
not be appropriate to grant that level of capability to a branch-office support team.
These concerns can leave organizations with a difficult decision. For this reason, Microsoft introduced the
RODC, which addresses the branch-office scenario. An RODC is a domain controller that maintains a copy
of all objects and attributes in the domain, except for secure information such as password-related
properties. If you do not configure caching, an RODC receives sign-in requests from branch office users and
forwards them to a domain controller in the hub site for authentication.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-9
You can configure a password replication policy for an RODC that specifies the user and computer accounts
for which passwords might be cached on the RODC. If any user signs in by using an RODC, the RODC
requests that user’s credentials from a full domain controller. When the user is a member of the password
replication policy that applies to an RODC, the RODC can retrieve the password, and the full domain
controller allows the replication of the secret. This means that the next time the user requests
authentication from the same RODC, the RODC can perform the task locally. While users who are included
in the password replication policy sign in, the RODC builds its cache of credentials so that it can perform
authentication locally for those users. Normally, you add users and computers to the password replication
policy who are in the same physical site as the RODC.
Because RODCs maintain only a subset of user credentials, security exposure is limited if an RODC is
compromised or stolen. If an RODC is compromised, only the user and computer accounts that the RODC
cached must have their passwords reset.
The RODC replication process also enhances security. An RODC replicates changes to AD DS from writable
domain controllers, but it does not replicate any data to other domain controllers. This eliminates the
exposure of Active Directory services to corruption because of changes made to a compromised branch-
office domain controller. Finally, RODCs have the equivalent of a local Administrators group. You can give
one or more local support personnel the ability to maintain an RODC fully without granting them the
equivalent Domain Admins rights.
RODCs cannot be operations master role holders. Operations master role holders must be able to write
information to the Active Directory database. Because of the read-only nature of the RODC’s Active
Directory database, it cannot act as an operations master role holder.
RODCs cannot be bridgehead servers. Bridgehead servers specifically replicate changes from other
sites. RODCs perform only inbound replication, so they cannot act as a bridgehead server for a site.
You should have only one RODC per site, per domain. If you have multiple RODCs, the behavior of
caching is inconsistent because shared secrets are only cached if a user signs in to that specific RODC. It
is likely that one RODC has the shared secrets and another RODC in the same site does not have them
at all.
RODCs cannot authenticate across trusts when a WAN connection is not available. If your users and
computers are in different domains, they cannot perform logons when the branch site uses RODCs and
is disconnected from the hub site.
RODCs cannot support any app properly that needs to update AD DS interactively, such as Microsoft
Exchange Server. If you are going to deploy Exchange Server or similar apps at a site, you also should
deploy a writable domain controller. Further, if you deploy Exchange Server at a site, you also should
have a physically secure location for your servers.
MCT USE ONLY. STUDENT USE PROHIBITED
7-10 Securing Active Directory Domain Services
You can install the Domain Name System (DNS) server service on RODCs. RODCs can replicate all app
directory partitions that DNS uses, including ForestDnsZones and DomainDnsZones. If you install a
DNS server on an RODC, clients can query it for name resolution just as they would query any other
DNS server. Similar to the AD DS information on an RODC, the DNS zone information on an RODC is
read-only, and therefore, it does not support client updates directly. When client computers try to
register a resource record in a DNS zone hosted on an RODC, the RODC returns the name of a full
domain controller that contains a writable copy of that zone to the client. The client uses the full
domain controller to register the record.
Deploying an RODC
Before deploying an RODC in your Windows
Server 2016-based AD DS, you must:
After completing the preparatory steps, you can install an RODC. An RODC can be a full or Server Core
installation of Windows Server 2016. You can perform an RODC installation in one step or in two steps by
prestaging the account.
Alternatively, you can use the Install-ADDSDomainController cmdlet with the –ReadOnlyReplica switch
to install an RODC.
On a Server Core installation of Windows Server 2016, we recommend that you use Server Manager
remotely or to use the Install-ADDSDomainController Windows PowerShell command-line interface
cmdlet remotely by using the Invoke-Command cmdlet.
The administrator who creates the RODC account also can specify which users or groups can complete the
next stage of the installation. Any user or group in the branch office who was delegated the right to
complete the installation can perform the next stage. This stage does not require any membership in built-
in groups, such as the Domain Admins group. If the user who creates the RODC account does not specify
any delegate to complete the installation and administer the RODC, only a member of the Domain Admins
or Enterprise Admins groups can complete the installation.
You can perform a staged installation of an RODC by using several approaches. You can precreate an RODC
account by using Active Directory Administrative Center, which is appropriate for a small number of
accounts. You also can use the Add-ADDSReadOnlyDomainControllerAccount cmdlet with appropriate
switches.
Allowed RODC Password Replication Group. Members of this group are included in the allowed list of
each new RODC. By default, the group has no members. Therefore, by default, a new RODC does not
cache any user’s credentials. You should add users for whom you want all domain RODCs to cache
credentials to the Allowed RODC Password Replication Group.
Denied RODC Password Replication Group. Members of this group are included in the denied list of
each new RODC. You should add users whose credentials you want to ensure are never cached by
domain RODCs to the Denied RODC Password Replication Group. By default, this group contains
security-sensitive accounts that are members of groups including Domain Admins, Enterprise Admins,
and Group Policy Creator Owners.
Note: Users are not the only generators of authentication and service-ticket activity.
Computers in a branch office also require such activity. To improve system performance and to
ensure that computers can establish a secure channel with a domain controller in a branch office,
also allow the branch RODC to cache computer credentials. During a WAN outage, be aware that
users are only able to sign in when both the computer’s and the user’s credentials are cached.
MCT USE ONLY. STUDENT USE PROHIBITED
7-12 Securing Active Directory Domain Services
AD DS
If you have apps that you want to use the RODC filtered attribute set, you have to verify with the app
vendor if they support it. While write-requests to an RODC receive referrals to a full domain controller, apps
that ask an RODC for an attribute in the RODC filtered attribute set receive it as empty. RODC knows about
the attribute but never receives a value for it. The app must be aware of this feature and know to request a
writable domain controller when reading the RODC filtered attribute set.
Demonstration Steps
2. Start Active Directory Administrative Center, and then navigate to the Domain Controllers OU.
3. Precreate an RODC account with the name MUC-RODC1, which also should be a DNS server and a
Global catalog.
4. Delegate Bill Norman to install and administer the RODC.
2. In the Extensions section, select the Password Replication Policy tab, and then note its settings.
2. Navigate to the Users container, and then create a new group named Munich Allowed RODC
Password Replication Group.
3. Add Ana Cantrell to the new group.
4. Switch to Active Directory Administrative Center and then open the properties of MUC-RODC1.
5. In the Extensions section, on the Password Replication Policy tab, configure the Munich Allowed
RODC Password Replication Group to allow password replication, and then close the properties of
MUC-RODC1.
2. Note that this dialog box displays all accounts whose passwords are stored in the RODC.
3. Select Accounts that have been authenticated to this Read-only Domain Controller, and then
note that this page only shows accounts that have the requisite permissions and that the RODC has
authenticated.
4. Select the Resultant Policy tab, and then add Ana Cantrell. Note that Ana has a Resultant Setting of
Allow.
Each RODC maintains a local database of groups for specific administrative purposes. You can add a
domain user account to these local roles to allow support of a specific RODC.
You can configure the delegated administrators for an RODC when you precreate an RODC computer
account or when you install the RODC. You can add a user or group on the Delegation of RODC
Installation and Administration page in the Active Directory Domain Services Installation Wizard.
You also can add the user or group account on the Managed By tab of the RODC account properties in
Active Directory Users and Computers.
Question: How can you provide extra security for hard drives in domain controllers?
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-15
Lesson 2
Implementing account security
As an administrator, you must make sure that user accounts in your environment conform to the security
standards set by your organization. To achieve this, Window Server 2016 allows you to use account policies
to configure security-related settings for user accounts. Additionally, with Windows Server 2016, you can
configure additional security with protected groups, authentication policies, and authentication policy silos.
This lesson explains the settings that are available for account security and the methods to configure those
settings.
Lesson Objectives
After completing this lesson, you will be able to:
Describe how to enhance password authentication with Windows Hello and the Microsoft Azure Multi-
Factor Authentication (MFA) service.
Fine-grained password policies that provide the ability to specify different password policies and
account lockout policies for different groups of users, such as executives, administrators, service
accounts, or regular users.
Protected users, which enables you to specify critical accounts that should be additionally secured.
Authentication policies and authentication policy silos that provide you the ability to use claim-based
rules to specify which users are able to sign in to which computers.
Kerberos policies that determine Kerberos-related settings, such as ticket lifetimes and enforcement.
Password policies
Account policies in AD DS define the default
settings for security-related attributes that are
assigned to user objects. In AD DS, account
policies classify into three different groups of
settings: password policy, account lockout, and
Kerberos policy. You can configure password
policy and account lockout settings in the local
policy settings for an individual Windows
Server 2016 server, or you can configure all three
groups of settings for the entire domain by using
the Group Policy Management console in AD DS.
When local policy settings and Group Policy
settings conflict, Group Policy settings override local policy settings.
In Group Policy Management within AD DS, most policy settings can apply at different levels within the
AD DS structure: domain, site, or OU. However, account policies for domain accounts can apply only at one
level in AD DS—to the entire domain. Therefore, only one set of account policy settings can apply to an
AD DS domain.
The password policy is one of the most important policies when securing your AD DS user accounts. Use the
password policy to configure the properties of the passwords that users might choose. You use these
settings to ensure that users cannot use simple passwords, which provide insufficient protection against
password attacks.
Enforce password history. This is the number of unique, new passwords that must be associated with
a user account before an old password can be reused. The default setting is 24 previous passwords.
When you use this setting with the minimum password age setting, the enforced password history
setting prevents constant reuse of the same password.
Maximum password age. This is the number of days that a user can utilize a password before they
must change it. Regularly changing passwords helps prevent the compromise of passwords. However,
you must balance this security consideration against the logistical considerations that result from
requiring users to change passwords too often. The default setting of 42 days is appropriate for most
organizations.
Minimum password age. This is the number of days that a password must be used before the user
can change it. The default value is one day, which is appropriate if you also enforced password history.
You can restrict the constant use of the same password if you use this setting with the enforced
password history setting.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-17
Minimum password length. This is the minimum number of characters that a user’s password must
contain. The default value is seven. This default is a widely used minimum, but you should consider
increasing the password length to at least 10 characters to enhance security.
Complexity requirements. Windows Server includes a default password filter that is enabled by
default, and you should not disable it. The filter requires that a password have the following
characteristics:
Account lockout duration. Defines the number of minutes that a locked account remains locked.
After the specified number of minutes, the account unlocks automatically. To specify that an
administrator must unlock the account, set the value to 0. Consider using fine-grained password
policies to require administrators to unlock high-security accounts, and then configure this setting to
30 minutes for normal users.
Account lockout threshold. Determines the number of failed sign-in attempts that are allowed
before a user account is locked out. A value of 0 means that the account is never locked out. You
should set this value high enough to allow for mistyped passwords, but low enough to ensure the
failure of brute force attempts to guess a password. Common values for this setting range from three
through five.
Reset account lockout counter after. Determines how many minutes must elapse after a failed sign-
in attempt before the sign-in counter is reset to 0. This setting applies when a user has typed in a
password incorrectly, but the user has not exceeded the account lockout threshold. Consider setting
this value to 30 minutes.
MCT USE ONLY. STUDENT USE PROHIBITED
7-18 Securing Active Directory Domain Services
Most organizations implement account lockout policies to prevent attackers from using password-guessing
techniques to gain access to a network. Although this approach provides a level of security, it also exposes
your organization to a DoS attack because attackers can run scripts to guess user passwords and lock out all
user accounts. This prevents the correct person from being able to access his or her account. If you choose
not to implement account lockout policies, it is critical that you monitor failed sign-in attempts in real time
to prevent attackers from taking advantage of this configuration.
Kerberos policies
You deploy Kerberos policy settings for the entire
domain from the Default Domain Policy. This
policy is for domain user and computer accounts,
and determines Kerberos-related settings such as
ticket lifetimes and enforcement. Kerberos policies
do not exist in the Local Computer Policy.
The Kerberos Policy configuration options contain
settings for the Kerberos v5 authentication
protocol ticket-granting ticket (TGT), the session
ticket lifetimes, and time-stamp settings. For most
organizations, the default settings are appropriate.
You will find the Kerberos policy in the Group
Policy Object Editor in the Account Policy section of the Computer Configuration node, Security
Settings page, under the Password and Account Lockout policies.
Kerberos is an authentication protocol that issues identity tickets, which allow entities to prove who they are
to other entities in a secure manner. Kerberos has several unique advantages as an authentication protocol.
It has the ability to provide delegated authentication by allowing Windows operating system services to
impersonate a client computer when accessing resources for it. Kerberos provides single sign-on for
domain users and computers by issuing TGTs that they can trade for session tickets to access specific server
sessions. Kerberos has expansive interoperability with other networking components because Kerberos is
part of the TCP/IP suite of nonproprietary protocols. Kerberos provides a more efficient authentication with
servers because you use Kerberos session tickets presented by user-level services for approved access to
server resources. Finally, Kerberos delivers mutual authentication because the server presents its credentials
back to the user-level services.
Kerberos policy
You can use the Kerberos policy in a GPO to enforce user sign in restrictions and to define thresholds for
maximum service and user ticket lifetime, maximum user ticket renewal lifetime, and the maximum time
computer clocks can be out of synchronization. The following settings are available:
Enforce user logon restrictions. Determines if the Kerberos v5 Key Distribution Center (KDC) will
validate every session ticket request against the user account’s user rights policy. This can add extra
security, but it is not required. Choosing to enforce user logon restrictions can slow down services’
access to network resources. This setting is enabled by default.
Maximum lifetime for service ticket. Defines the maximum time a service ticket is valid for
authenticating client access to a particular service. If the service ticket expires before the client requests
the server connection, the server will respond with an error and the client redirects requests back to the
KDC to receive a new service ticket. This maximum lifetime must be at least 10 minutes but not greater
than the maximum lifetime for a user ticket. By default, the maximum service-ticket lifetime is 600
minutes, or 10 hours.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-19
Maximum lifetime for user ticket. Sets the amount of time a user account’s TGT is valid. The default
is 10 hours.
Maximum lifetime for user ticket renewal. Sets the amount of time, in days, for which the user
account’s TGT can be renewed. The default is seven days.
Maximum tolerance for computer clock synchronization. Determines the amount of time that
client computers' clocks can be out of sync with the domain controller. The primary domain controller
(PDC) emulator operation master role on a domain determines the correct time for the entire domain.
The domain replication packets of TGT and service tickets are time stamped and the times on the
various tickets and packets are verified between correspondent computers. However, it is possible for
any two computers to be out of sync on their clocks. Administrators can set the amount of time by
which the clocks can be out of sync. The default for this setting is five minutes.
You can create access control based on claims and compound authentication by deploying Dynamic Access
Control (DAC). You must ensure that you have sufficient Windows Server 2008 or newer domain controllers
available that use these new authorization types. The KDC administrative template policy setting allows
you to configure a domain controller to support claims and compound authentication for DAC and
Kerberos armoring. Additionally, Windows Server 2012 or newer domain controller is required for Kerberos
clients running the Windows 10, Windows 8.1, or Windows 8 operating systems to support claims and
compound authentication by using Kerberos authentication.
Note: Devices that are running Windows 8 and newer operating systems will fail
authentication if they cannot find a domain controller that is running Windows Server 2012 or
newer. You must ensure that there are sufficient domain controllers that are running Windows
Server 2012 or newer for any account, referral, and resource domains that are supported.
Demonstration Steps
2. Edit the Default Domain Policy, and then configure the following account password policy settings:
2. Close the Group Policy Management Editor window and the Group Policy Management console.
Protecting groups in AD DS
In most AD DS deployments, some security groups
are considered as security critical. Windows Server
2016 provides the Restricted Groups feature and
the Protected Users security groups feature to
provide additional protection for these groups.
Restricted groups
For security-critical local groups on servers or
workstations, you can use the Restricted Groups
functionality available in Group Policy to control
membership in these groups and membership of
these groups.
Restricted Groups allow you to select a local security group and define two attributes: Members and
Member of.
When defining the Members attribute, you specify who should and should not belong to the restricted
group being configured. When you configure the Members attribute, any current member of a restricted
group that is not listed as member is removed automatically, with the exception of the administrator in the
Administrators group. Additionally, any user that is listed as member, who is not currently a member of the
restricted group, is added automatically.
When you use the Member of attribute of a restricted group, make sure that the restricted group is a
member of groups that are listed in the Member Of text box. You cannot use this attribute to remove the
restricted group from any other group.
To configure Restricted Groups, open Group Policy Management Editor and navigate to the
Computer Configuration\Policies\Windows Settings\Security Settings node.
An example of when you might want to use Restricted Groups is if you want to control membership in the
local Administrator group on your organization’s workstations.
Note: You cannot use this feature to manage domain groups in AD DS. You must use the
Restricted Groups feature only with local groups on client or server computers.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-21
Devices and computers that are running Windows Server 2012 R2 and Windows 8.1 or newer operating
systems.
Domain controllers in domains with a primary domain controller that are running Windows
Server 2012 R2 or newer.
This substantially reduces the memory footprint of credentials when users sign in to computers on the
network from an uncompromised computer. Consider the following points when using Protected Users
groups:
The Protected Users group membership cannot authenticate by using NTLM, Digest authentication, or
Credential Security Support Provider (an authentication mechanism also known as CredSSP). On
devices running Windows 8.1 and newer, passwords are not cached, so the device that uses any one of
these Security Support Providers (SSPs) will fail to authenticate to a domain when the account is part of
the Protected User group.
The Kerberos protocol will not use the weaker Data Encryption Standard (DES) or RC4 encryption types
in the preauthentication process. Therefore, you must configure the domain to support at least the
Advanced Encryption Standard (AES) cipher suite.
You cannot delegate the user’s account with Kerberos constrained or unconstrained delegation. This
can cause former connections to other systems to fail if the user is in the Protected Users group.
The default Kerberos TGTs lifetime setting of four hours is configurable by using Authentication
Policies and Silos, which you can access through the Active Directory Administrative Center. This
means that the user must authenticate again after four hours.
Fine-grained password policies only apply to user objects, InetOrgPerson objects, or global security
groups. By linking a PSO to a user or a group, you are modifying an attribute called msDS-PSOApplied,
which is empty by default. This approach now treats password and account lockout settings not as domain-
wide requirements, but as attributes of a specific user or a group. For example, to configure a strict
password policy for administrative accounts, create a global security group, add the administrative user
accounts as members, and then link a PSO to the group. Applying fine-grained password policies to a
group in this manner is more manageable than applying policies to each individual user account. If you
create a new service account, you simply add it to a group, and the PSO manages the account.
By default, only members of the Domain Admins group can create and apply fine-grained password
policies. However, you also can delegate the ability to set these policies to other users on a domain-by-
domain basis.
The settings that fine-grained password policies manage are identical to those in the Password Policy and
Accounts Policy nodes of a GPO. However, you neither implement fine-grained password policies as part
of Group Policy nor are they applied as part of a GPO. Instead, the PSO is a separate class of object in AD DS
that maintains the settings for fine-grained password policy. Additionally, fine-grained password policies
do not interfere with custom password settings or filters that you might have implemented.
You can create one or more PSOs in your domain. Each contains a complete set of password and lockout
policy settings, and each allows the same configuration options that are available in domain-based
password and lockout settings. You apply a PSO by linking it to one or more global security groups or users.
To use a fine-grained password policy, your domain functional level must be at least Windows
Server 2008, which means that all of your domain controllers in the domain must be running at
least Windows Server 2008. To meet this condition, you must raise the domain functional level to
at least Windows Server 2008.
To confirm and modify the domain functional level, use the following procedure:
2. In the console tree, expand Active Directory Domains and Trusts, and then expand the tree until you
can see the domain.
3. Right-click the domain, and then click Raise domain functional level.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-23
Password settings
General settings
You can create and apply PSOs in the Windows Server 2012 and newer environment by using either of the
following tools:
Windows PowerShell
New-ADFineGrainedPasswordPolicy. This cmdlet creates a new PSO and defines its parameters. For
example, the following command creates a new PSO named TestPwd and then specifies its settings:
2. Click Manage, click Add Navigation Nodes, in the Add Navigation Node dialog box, select the
appropriate target domain, and then click OK.
3. In the Active Directory Administrative Center navigation pane, open the System container, and
then click Password Settings Container.
4. In the Tasks pane, click New, and then click Password Settings.
6. Under Directly Applies To, click Add, type Marketing, and then click OK.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-25
This associates the Password Policy object with the members of the global group that you created for
the test environment.
7. Click OK to submit the creation of the PSO.
Note: The Active Directory Administrative Center interface for PSO management uses the
Windows PowerShell cmdlets mentioned previously to carry out the creation and management of
PSOs.
Demonstration Steps
1. On LON-DC1, open Active Directory Administrative Center.
Note: Ensure that you open the Properties dialog box for the Managers group, and not the
Managers OU.
3. In Active Directory Administrative Center, configure a fine-grained password policy for the
Adatum\Managers group with the following settings:
o Name: ManagersPSO
o Precedence: 10
1. Any PSO that you link directly to a user object is the resultant PSO. If you link multiple PSOs directly to
the user object, the PSO with the lowest msDS-PasswordSettingsPrecedence value is the resultant
PSO. If two PSOs have the same precedence, the PSO with the mathematically smallest objectGUID is
the resultant PSO.
2. If you do not link any PSOs directly to the user object, AD DS compares the PSOs for all global security
groups that contain the user object. The PSO with the lowest msDS-PasswordSettingsPrecedence
value is the resultant PSO. If you apply multiple PSOs to the same user, and they have the same msDS-
PasswordSettingsPrecedence value, AD DS applies the PSO with the mathematically smallest
objectGUID.
3. If you do not link any PSOs to the user object, either directly or indirectly through group membership,
AD DS applies the Default Domain Policy.
All user objects contain a new attribute called msDS-ResultantPSO. You can use this attribute to
determine the distinguished name of the PSO that AD DS applies to the user object. If you do not link a PSO
to the user object, this attribute does not contain any value and the Default Domain Policy GPO contains
the effective password policy. To view the effective PSO that AD DS applies to a user, open Active
Directory Users and Computers, and on the View menu, ensure that Advanced Features is enabled. You
then should open the properties of a user account, and you can view the msDS-ResultantPSO attribute on
the Attribute Editor tab if you have configured the Show Constructed Attributes option under the Filter
options.
Note: While you must define PSOs from a highly privileged group such as Domain Admins,
you should train help-desk administrators to evaluate the effective PSOs for a user. This helps
administrators answer users’ questions when they do not understand which password settings
apply.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-27
Certain user accounts and computers contain highly critical information. Therefore, ensure that only
authorized users can sign in to their workstations, and make sure that other users cannot access the
same computers.
You should configure highly trusted service accounts for authorization only on a certain set of computers.
To provide administrators with the ability to address these risks and requirements, Windows Server 2016
and Windows Server 2012 R2 include new functionalities for credential protection and management:
Protected Users
Authentication policies
Protected Users
The Protected Users security group prevents highly sensitive accounts from being locally cached on domain
member computers. It requires domain-controller authentication for those accounts for every sign in that
occurs.
Protected Users is a new group that you can use to configure highly sensitive accounts and you can find it
in the Users container in AD DS. To enable Protected Users, an administrator simply adds the highly trusted
accounts to the Protected Users security group. This Protected Users feature does not require Windows
Server 2012 R2 domain controllers. However, this group is created only when a Windows Server 2012 R2 or
newer domain controller receives the PDC emulator operations master role. For further use of this feature, it
is not necessary that the PDC emulator operations master remain on the Windows Server 2012 R2 domain
controller, and it is not necessary to maintain the domain controller. However, because the domain
controller can only be promoted when the schema has been extended, the schema extension for Windows
Server 2012 R2 or newer needs to be in place even if the feature does not require it.
The Protected Users feature is a client-side feature that protects domain accounts on domain member
computers. Protected Users depend on the domain member’s operating system and is available on the
following operating systems:
Older operating systems will not support this feature and will not prevent the accounts in the Protected
Users group from being cached locally. To ensure that accounts within the Protected Users group are not
compromised on older operating systems, use the other methods such as the Deny log on locally security
setting where appropriate.
Protected Users who sign in to a domain member computer that has a supported operating system will be
prevented from using the following protocols:
Digest authentication
NTLM
When all domain controllers of the sign-in domain are based on Windows Server 2012 R2, and the domain
functional level is raised to Windows Server 2012 R2, additional security is provided. Because of this
additional security, users cannot:
The following applies when a user is a member of the Protected Users security group:
The user must be able to use authentication based on AES encryption. Therefore, all domain controllers
must be at a Windows Server 2008 level or newer.
The password of any account in the Protected Users group must have been changed against a
Windows Server 2008 or newer domain controller to ensure that the password was encrypted by using
AES.
On supported domain members, such as Windows 10 and Windows Server 2016, the credentials of the
user will not be cached.
The user will only be able to sign in to domain members that are able to authenticate against a domain
controller. Offline sign in will not work for these accounts. The startup of services that use an account
that is a member of the Protected Users group will fail when the domain member is offline.
The maximum lifetime of the issued Kerberos TGT and the maximum lifetime for ticket renewal are
limited to 240 minutes (four hours). While administrators configure all other accounts by using the
domain policy settings, which are 10 hours by default for the ticket and seven days for renewal, four
hours are hard-coded for Protected Users.
Protected Users is a security setting that is global within the domain. This setting does not allow you to
protect certain users only on certain devices. Therefore, use Protected Users carefully and test it before
relying on the Protected Users feature.
Authentication policies
With authentication policies, you can configure more-restrictive Kerberos settings for specific user or
service accounts. Additionally, you can use DAC claims to define conditions that need to be met by users,
service accounts, and/or devices during sign in.
Authentication policies implement by using a new object class with the name authentication policy in
AD DS.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-29
To implement authentication policies, you need to ensure that you meet the following prerequisites,
including that:
All domain controllers in the domain must be based on Windows Server 2012 R2 or newer.
The domain functional level must be Windows Server 2016 or Windows Server 2012 R2.
When configuring an authentication policy in the Active Directory Administrative Center, you can configure
the following settings:
Description.
If the policy should be enforced (default), or if you want to validate the policy by audit policy
restrictions only.
Accounts to which the policy should apply. Accounts are in the authentication policy settings; however,
be aware that you configure this on the account, unlike authentication policy silos, where the accounts
are configured within the silo.
For user, service, and computer accounts, you can define the following settings separately:
o Access control conditions using DAC claims that define which users or services are able to run on
which devices.
You can configure these settings to user accounts either within the user properties window in the Active
Directory Administrative Center, or by configuring them in the authentication policy properties window.
Regardless of where you configure these settings, they are written to the authentication policy. After you
configure these settings, you will sign in to a device, or you will receive the message that “Your account is
configured to prevent you from using this PC.” In either case, an event is logged.
Note: While older operating systems had options to restrict users from signing in to specific
devices, they were easy to circumvent. Authentication policies and authentication-policy silos that
are built on Kerberos (instead of names only), and DAC claims, provide a secure method to ensure
that only certain users can sign in to certain devices.
Note: Authentication policies do not prevent users from signing in by using NTLM. When a
domain member is fully able to communicate by using Kerberos, it is likely that the rules
configured in the authentication policy work as expected. However, there might be scenarios
where NTLM is used. To prevent this, consider combining Protected Users and account policies.
The prerequisites of authentication policy silos are the same as the prerequisites of authentication policies.
You should use them as an alternative means to assign user, service, or computer accounts to use certain
authentication policies. By using Active Directory delegation, you are able to assign different roles to create
authentication policies, and then assign those policies to security principals by using authentication policy
silos.
Like authentication policies, you can configure authentication policy silos to be enforced or in auditing
mode. Authentication policies are enforced by default, while authentication policy silos are configured in
auditing mode. Additionally, authentication policy silos have a higher precedence than authentication
policies.
Furthermore, authentication policy silos do provide a claim and an administrator can use it to ensure that
certain files or certain file structures can only be accessed when users or computers have been validated by
an authentication policy silo.
The settings found within the Account Policies node are the same settings found in the Local Security
Policy, with the addition of the Kerberos Policy settings that apply to domain authentication.
The Group Policy account policy settings exist in the template of every GPO that you create in the Group
Policy Management console. However, you can apply an account policy only once in a domain and in only
one GPO. This is the Default Domain Policy, and it links to the root of the AD DS domain. Therefore, the
account policy settings in the Default Domain Policy apply to every computer that is joined to the domain.
Note: If settings conflict between the account policy settings in the Local Security Policy and
the account policy settings in the Default Domain Policy GPO, the Default Domain Policy settings
take precedence.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-31
When you initially install a Windows operating system, such as Windows 8.1, Windows 10, or Windows
Server 2016, the computer will have a password policy with settings configured and established by default,
but the account lockout policy does not have any settings configured. When you install a domain, the
Default Domain Policy that is created contains all three policies. You can make changes to any of the
policies, including configuring the settings in the account lockout policy. However, you need to consider
the implications carefully before doing so.
In most cases, your organization will already have established domains and computer systems that have
these settings configured. Most organizations also have numerous written security policies that dictate
standards for password and account lockout policies. In these cases, you cannot make changes without
approval or without addressing the written security policies.
Windows Hello is the biometric technology that allows users to sign in to Windows by using their
fingerprints, facial recognition, or iris scan. Many business laptops today have built-in fingerprint readers,
and Windows Hello supports most of the existing fingerprint-reader hardware. Additionally, on some
mobile devices, such as Microsoft Lumia 950, an iris-scan camera is available, and it uses Windows Hello to
recognize a user and allow them to sign in.
Windows Hello technology enables you to use alternative and more secure methods to sign in to your
computer or mobile device. Additionally, because Windows Hello is an extensible technology, it will be
compatible with new hardware that has not yet reached the market.
Microsoft Passport is a technology that complements Windows Hello. Microsoft Passport provides a two-
factor authentication by combining biometrics data from Windows Hello with encryption keys taken from
the device. Microsoft Passport also lets you establish a PIN that you can use to sign in to a Windows 10
device, instead of using a password. Using a PIN instead of a password is more secure, as the PIN is bound
to the device that you use. For each device that you use, you can establish a different PIN, but still be signed
in with a same user account.
Microsoft Passport is a technology that uses trusted platform module (TPM) chips intensively. TPM provides
the ability to store authentication keys securely. When the user authenticates to Windows Hello, by using
the biometrics mechanism, Microsoft Passport takes the authentication data and uses it to have the TPM
chip generate a set of public and private keys.
MCT USE ONLY. STUDENT USE PROHIBITED
7-32 Securing Active Directory Domain Services
On each Windows 10 device (mobile, desktop, and laptop), you can configure more than one
authentication method. For example, you can configure a PIN and also utilize your fingerprint to sign in to
your Windows 10 computer. Furthermore, upon each sign in, you can decide which method you will use.
Similarly, on your mobile Windows 10 device, such as Lumia 950, you can use a PIN or an iris scan to unlock
the device.
Windows Hello is the technology that you can also use to authenticate to your application, not just to the
operating system. Developers can use Windows Hello to enhance security on their applications that require
authentication.
Multi-Factor Authentication is integrated into Azure Active Directory (Azure AD). It allows the use of a
phone as the physical device that provides the means of confirming a user’s identity. The process of
implementing Multi-Factor Authentication for an Azure AD user account starts when a user with the global
administrator role enables the account for Multi-Factor Authentication from the Azure portal. At the next
sign-in attempt, the user is prompted to set up authentication by selecting one of the following options:
Mobile phone. Requires the user to provide a mobile phone number. Verification can be a text
message or in the form of a phone call—at the end of which, the user must press the pound key (#).
Office phone. Requires the specification of the OFFICE PHONE entry of the user’s contact information
in Azure AD. An administrator must preconfigure this entry, and the user cannot modify or provide this
entry at verification time.
Mobile app. Requires that the user has a smartphone on which the user must install and configure the
mobile phone app.
As part of the verification process, a user also can generate application passwords, because Multi-Factor
Authentication is limited to authenticating access to applications and services from a browser. Effectively, it
does not apply to traditional desktop applications or modern applications such as Outlook, Skype for
Business, or mobile apps for email. A user then can use their configuration settings to assign randomly
generated application passwords to individual applications.
However, application passwords can be vulnerable to attacks. Therefore, as an administrator, you can
prevent all directory users from creating application passwords. You also can invalidate all application
passwords for an individual user if the computer or device where the applications are installed is
compromised.
After the verification process is complete, the Multi-Factor Authentication status for the user changes from
enabled to enforced. The same verification process repeats during every subsequent authentication
attempt. The additional security verification option appears in the Access Panel, reflecting the status
change. From the Access Panel, you can choose and configure a different verification mechanism and
generate application passwords. Generating application passwords is especially important, because without
assigned application passwords, desktop applications and modern applications that rely on authenticated
access to Azure AD will fail to connect to Azure Cloud Services.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-33
You can use Multi-Factor Authentication to protect on-premises resources by using the Azure Multi-Factor
Authentication Server. Multi-Factor Authentication Server integrates with Internet Information Services (IIS)
authentication to secure Microsoft IIS web applications, Remote Authentication Dial-in User Service
(RADIUS) authentication, Lightweight Directory Access Protocol (LDAP) authentication, and Windows
authentication.
Before you can use the Multi-Factor Authentication Server, you must download and activate it. The
download is available through a link on the Multi-Factor Authentication management portal. The Azure
Multi-Factor Authentication Users Portal is an Internet Information Services (IIS) website at which users can
enroll for Azure Multi-Factor Authentication and manage their Multi-Factor Authentication accounts.
User enrollment and self-management involves users completing their enrollment, such as by selecting an
authentication method if the administrator has not prespecified this.
Question: Which technology allows you to use biometric functionality to sign in to Windows
devices?
MCT USE ONLY. STUDENT USE PROHIBITED
7-34 Securing Active Directory Domain Services
Lesson 3
Implementing audit authentication
Auditing is an important security component. Windows Server 2016 domain controllers and other servers
log security-related events to the Security log, where you can monitor and identify issues that might
warrant further investigation. Auditing can log successful activities to provide documentation of changes. It
also can log failed and potentially malicious attempts to access enterprise resources. Auditing involves up
to three management steps: configuring an audit policy, configuring auditing settings on objects, and
viewing events in the Security log. In this lesson, you will learn how to configure auditing to address several
common scenarios.
Lesson Objectives
After completing this lesson, you will be able to:
When a user connects to a folder on a server in the domain, that server authorizes the user for a type of
logon called a network logon. Again, the server does not authenticate the user. Instead, it relies on the
ticket that the domain controller gives to the user. However, the user connection generates a logon event
on the server.
In Windows Server 2012 and Windows Server 2016, the number of auditable events expanded from nine to
53, which enables administrators to be more selective in the number and types of events to audit.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-35
These new, advanced audit policies allow administrators to connect business rules and audit policies. This
gives administrators much more control over the logon process, and they can obtain information about
very specific events that happen during the logon or logoff process.
For an account logon event, you now can define four different audit settings:
Credential validation. Audits events that validation tests generate on user-account logon credentials.
Kerberos service ticket operations. Audits events that Kerberos service-ticket requests generate.
Other account logon events. Audits events that are generated by responses to credential requests
that are not credential validation or Kerberos tickets requests.
Kerberos authentication service. Audits events that Kerberos authentication TGT requests generate.
Logon. Audits events that are generated by user account logon attempts on a computer.
Logoff. Audits events that closing a logon session generates. These events occur on the accessed
computer, and for an interactive logon, the security audit event is generated on the computer to which
the user account logged on.
Account lockout. Audits events that are generated by a failed attempt to sign in to an account that is
locked out.
IPsec main mode. Audits events that are generated by the Internet Key Exchange (IKE) protocol and
Authenticated Internet Protocol (AuthIP) during main mode negotiations.
IPsec quick mode. Audits events that IKE and AuthIP generate during quick-mode negotiations.
IPsec extended mode. Audits events that IKE and AuthIP generate during extended-mode
negotiations.
Other logon and logoff events. Audits of other events that are related to logon and logoff, and which
are not included in the Logon and Logoff settings.
Network Policy Server. Audits events that are generated by RADIUS, Internet Authentication Service,
and NAP user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and
Unlock.
The new set of advanced audit policies enables administrators to be more selective in the number and
types of events to audit. For example, where a basic audit policy provides a single setting for account logon,
advanced audit policy provides four. Enabling the single basic account logon setting is the equivalent of
setting all four advanced account logon settings. In comparison, setting a single advanced audit policy
setting does not generate audit events for activities for which you have no interest. For example, if you
enable success auditing for the basic Audit account logon events policy setting, only success events will
be logged for all account logon-related behaviors. In comparison, you can configure success auditing for
one advanced account logon setting, failure auditing for a second advanced account logon setting, success
and failure auditing for a third advanced account logon setting, or no auditing, depending on the needs of
your organization.
MCT USE ONLY. STUDENT USE PROHIBITED
7-36 Securing Active Directory Domain Services
Note: Using both the basic and advanced settings can cause unexpected results. Therefore,
do not combine the two sets of audit policy settings. If you use Advanced Audit Policy
Configuration settings, you should enable the Audit: Force audit policy subcategory
settings (Windows Vista or later) to override audit policy category settings policy setting
under Local Policies\Security Options. This will prevent conflicts between similar settings by
forcing basic security auditing to be ignored.
Demonstration Steps
1. On LON-DC1, from Server Manager, open the Group Policy Management console.
2. Navigate to the Default Domain Controllers Policy, and then edit the policy.
4. Explain the nine legacy policy categories shown in the details pane.
6. View the ten main categories under advanced audit policies, and then click Account Logon and
Logon/Logoff to view the available subcategories.
7. Under Account Logon, open the properties of the Audit Kerberos Authentication Service policy.
8. Note that you can enable the policy to log a Success or Failure event. Enable the policy, and select
Success and Failure.
9. Click the Explain tab to view the detailed information about the event, the default logging settings,
and the predicted auditing volume.
10. Apply the changed policy, and then click OK to close the policy setting.
Only domain controllers generate account-logon events for domain users. Remember that an account-
logon event occurs on the domain controller that authenticates a domain user, regardless of where that
user logs on. If you want to audit logons to domain accounts, you should ensure account logon event
auditing to affect all domain controllers. The Default Domain Controllers GPO that is created when you
install your first domain controller is an ideal GPO in which to configure account logon audit policies.
Demonstration Steps
1. On LON-DC1, run gpupdate /force.
2. Sign out.
7. Show the Audit Failure event with the Event ID 4771, and then show the Audit Success event with the
Event ID 4768.
Verify the correctness of the statement by placing a mark in the column to the right.
Statement Answer
Lesson 4
Configuring managed service accounts
Creating user accounts to provide authentication for applications, system services, and background
processes is a common practice in the Windows environment. Historically, you would create accounts and
name them for use by a specific service. Windows Server 2016 supports AD DS account-like objects, known
as managed service accounts (MSAs), which make service accounts easier to manage and which pose less of
a security risk to your environment.
This lesson will introduce you to MSAs and the new functionality related to MSAs introduced in Windows
Server 2016.
Lesson Objectives
After completing this lesson, you will be able to:
Describe MSAs.
Therefore, because of the possible security issues, you could consider running the program or service by
using a built-in local account. Windows operating systems have three built-in local accounts to allow
program and service access of resources. These accounts are tied to the individual computer rather than a
user account, as follows:
Local System. Has extensive privileges on the local system and acts as the computer on the network. It
is a very high-privileged built-in account. The name of the account is NT AUTHORITY\SYSTEM.
Local Service. Has the same level of access to resources and objects as members of the local Users
group. This limited access helps protect the system if individual services or processes are compromised.
Services running as the Local Service account will access network resources as a null session without
any credentials. The name of the account is NT AUTHORITY\LOCAL SERVICE.
Network Service. Has more access to resources and objects than members of the Users group have,
such as the Local Service account. Services that run as the Network Service account access network
resources by using the credentials of the computer account. The name of the account is NT
AUTHORITY\NETWORK SERVICE.
You should be aware that using the Local System account still might compromise security, considering the
high-level privileges under which it operates. Therefore, you should take extra care when using this account
for program access. Alternatively, the Local Service account might not have enough privileges to access all
the resources required by the program. If the program needs resources on other computers, you could use
the Network Service account. However, you must add the machine account to a group in the domain or
individually on the other computers. In all cases, you should make a thorough security analysis to ensure
you consider all aspects of using the service accounts.
To help centralize administration and to meet program requirements, many organizations choose to use a
domain-based account to run program services. Although this does provide some benefit over using a local
account, there are several associated challenges, such as the following:
Extra administration effort might be necessary to manage the service account password securely. This
includes tasks such as changing the password and resolving situations that cause an account lockout.
Service accounts also typically are configured to have passwords that do not expire, which may go
against your organization’s security policies.
Difficulty in determining where a domain-based account is used as a service account. You might use a
standard user account for multiple services on various servers throughout the environment. A simple
task, such as changing the password, may cause authentication issues for some applications. It is
important to know where and how to use a standard user account when it is associated with a program
service.
Extra administration effort may be necessary to manage the service principal name (SPN). Using a
standard user account may require manual administration of the SPN. If the logon account of the
service changes, the computer name is changed. Alternatively, if a DNS host name property is
modified, you may need to modify the SPN registrations manually to reflect the change. A
misconfigured SPN causes authentication problems with the program service.
Windows Server 2016 supports an AD DS object, named a Managed Service Account (MSA), which you use
to facilitate service-account management. The subsequent topics provide information on the requirements
and use of MSAs in Windows Server 2016.
Automatic password management. An MSA maintains its own password, including password changes,
automatically.
Simplified SPN management. SPN management happens automatically if you configure your domain
at the Windows Server 2008 R2 domain functional level or higher.
MSAs are stored in the CN=Managed Service Accounts, DC=<domain>, DC=<com> container. You can
view this by enabling the Advanced Features option on the View menu within Active Directory Users
and Computers. This container is visible by default in the Active Directory Administrative Center.
Note: You cannot share a standard MSA between multiple computers or that you use in
server clusters where the service is replicated between nodes. Additionally, you cannot use MSAs
for unattended scheduled tasks.
To simplify and provide full automatic password and SPN management, we strongly recommend that the
AD DS domain be at the Windows Server 2008 R2 functional level or higher. However, if you have a domain
controller that is running Windows Server 2008, you can update the Active Directory schema to Windows
Server 2008 R2 to support this feature. The only disadvantage is that the domain administrator must
configure SPN data manually for the MSAs.
The next topic discusses group MSAs in more detail, including providing further explanation of how you
can create a KDS root key and the Add-KDSRootKey cmdlet.
At least one domain controller must be running Windows Server 2012 or newer to store managed
password information.
Client computers using group MSAs must have Windows 8 or newer, and server-based computers must
have Windows Server 2012 or newer.
You must create a KDS root key on one of the domain’s domain controllers. To create the KDS root key,
you must run the following command from the Active Directory Module for Windows PowerShell on a
Windows Server 2016 domain controller:
Add-KdsRootKey –EffectiveImmediately
Note: The –EffectiveImmediately switch uses the current time to establish the timestamp
that marks the key as valid. However, when using the –EffectiveImmediately switch, the actual
effective time is set to 10 hours later than the current time. This 10-hour difference is to allow for
AD DS replication to replicate changes to other domain controllers in the domain. For testing
purposes, you can bypass this functionality by setting the –EffectiveTime parameter to 10 hours
before the current time by running the following command:
Add-KdsRootKey –EffectiveTime ((get-date).addhours(-10))
The group managed service account object contains a list of principals, either computers or AD DS groups,
which are allowed to retrieve group MSA password information from AD DS. The principals then can use
the Managed Service Account group for authentication for services.
You create group MSAs by using the same cmdlets that you used for creating the standard MSA from the
Active Directory Module for Windows PowerShell. That is, the cmdlets used for managed service account
management create group MSAs by default.
On a Windows Server 2016 domain controller, create a new MSA by using the New-ADServiceAccount
cmdlet with the –PrinicipalsAllowedToRetrieveManagedPassword parameter. This parameter accepts
one or more comma-separated computer accounts or AD DS groups that are permitted to obtain password
information for the group MSA that is stored in AD DS on Windows Server 2016 domain controllers.
For example, the following cmdlet creates a new group MMSA called SQLFarm, and enables the LON-SQL1,
LON-SQL2, and LON-SQL3 hosts to use the group MSA:
Demonstration Steps
3. Use the Get-ADSeviceAccount cmdlet to view the newly-created MSA and confirm proper
configuration.
Install an MSA
1. On LON-SVR1, open the Active Directory Module for Windows PowerShell console.
4. Open the Properties pages for the Data Sharing Service, and then select the Log On tab.
When you use constrained delegation, you can configure service account delegation to specific sets of
service accounts. You can configure a particular service account to be trusted for delegation to a specific
instance of a service running on a specific computer or a set of specific instances of services running on
specified computers.
An SPN is a unique identifier for each instance of a service running on a computer. When using Kerberos
authentication, a defined SPN for a service allows clients to identify that instance of the service on the
network. The SPN is registered in AD DS and is associated with the account of the service that the SPN
specifies. When a service needs to authenticate to another service, it uses that service’s SPN to distinguish it
from other services on that computer. A service can use constrained delegation if it can obtain a Kerberos
service ticket for itself on behalf of the user being delegated, in this case, another service. When using
constrained delegation, the user can obtain the service ticket directly by authenticating through curb roles
or the service can obtain the service ticket on behalf of the user.
One problem with this model is that when a domain administrator configured the service for constrained
delegation, the service administrator did not know which front-end service was being delegated to the
resource services they owned. In Windows Server 2016, this is overcome by also allowing the service
administrator to configure a service’s constrained delegation. This means that the back-end service
administrator to allow or deny access by front-end services.
Windows Server 2012 and Windows Server 2016 implement new extensions for constrained delegation. For
example, the Service for User to Proxy, known as S4U2proxy extension allows a service to use its Kerberos
service ticket for a user to obtain a service ticket from the KDC to a back-end service. A service
administrator can configure constrained delegation on the back-end service’s account, even in another
domain. You can configure front-end services, such as Microsoft Office Outlook on the Web and Microsoft
SharePoint Server, for constrained delegation to back-end servers on other domains. This enhances your
ability to support service solutions across domains by using your existing Kerberos authentication
mechanisms.
Lab: Securing AD DS
Scenario
The security team at A. Datum Corporation has been examining possible security issues in the organization,
focusing on AD DS. The security team is particularly concerned with AD DS authentication and security of
branch-office domain controllers.
You must help improve security and monitoring of authentication against the enterprise’s AD DS domain.
Additionally, management at A. Datum has instituted a password policy, and you must enforce it for all user
accounts and develop a more-stringent password policy for security-sensitive administrative accounts. It
also is important that you implement an appropriate audit trail to help monitor authentication attempts
within AD DS.
The second part of your assignment includes deploying and configuring RODCs to support AD DS
authentication within a branch office. Lastly, you should evaluate the usage of a group MSA by deploying it
to the test server.
Objectives
After completing this lab, you will be able to:
Lab Setup
Estimated Time: 60 minutes
Password: Pa55w.rd
For this lab, you will use the available virtual machine environment. Before you begin the lab, you must
complete the following steps:
1. On the host computer, start Hyper-V Manager.
2. In Hyper-V Manager, click 20742B-LON-DC1, and then in the Actions pane, click Start.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
o Password: Pa55w.rd
Supporting documentation
A. Datum GPO strategy proposal
Requirements overview
A. Datum has identified the following requirements regarding account logon and password policies:
All users must use a password that is at least eight characters long. For IT administrators, the minimum
length must be 10 characters.
Passwords for all users must be complex and stored securely.
All users, except IT administrators, must change their password every 60 days or less.
IT administrators must change their password every 30 days or less.
If users enter the wrong password more than five times within 20 minutes, their accounts must be locked.
For normal users, accounts are unlocked automatically after one hour.
For IT administrators, accounts must be locked after three incorrect password attempts. IT administrator
accounts are never unlocked automatically. An administrator must unlock the account. IT administrator
accounts include all members of the IT group and the Domain Admins group.
No users should be able to use at least 10 of their previous passwords.
The membership list for the local Administrators group on all member servers must be limited to only the
local Administrator account, the Domain Admins group, and the IT group.
The Domain Admins group must include only the Administrator account.
The Enterprise Admins and Schema Admins groups must be empty during normal operations. Users must
be added explicitly to these groups only when they need to perform tasks that require this level of
administrative rights.
Other built-in groups, such as Account Operators and Server Operators, should contain no members. If
users are added to one of these groups, they should be removed from the group automatically.
All changes made to user objects and security groups in AD DS must be audited.
Proposals
List the settings that you must configure to meet A. Datum’s requirements regarding password policies and
account lockout.
Configuration for IT
Setting Configuration for all users administrators
Enforce password history
1. How can you configure that IT administrators have different password and account lockout settings than
regular users?
2. How can you identify IT administrators in terms of more restricted password and account lockout
settings?
3. How can you meet the requirement to limit the membership list for the local Administrators groups on all
member servers to only the local Administrator account, the Domain Admins group, and the IT group?
4. How can you meet the requirement that the Domain Admins group must include only the Administrator
account, and that the Enterprise Admins and Schema Admins groups must be empty during normal
operations?
5. How can you meet the requirement that other built-in groups, such as Account Operators and Server
Operators, must not contain members?
6. How can you meet the requirement that you must audit all changes to AD DS?
5. Select Account Lockout Policy, and then define and configure the following policy settings:
o Account lockout duration: 60 minutes
6. Close the Group Policy Management Editor window and the Group Policy Management console.
o Account will be locked out: Until an administrator manually unlocks the account
4. In the Directly Applies To section, configure the PSO to apply to the IT group.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 7-49
5. IT will not work because it is not a global group. Open Windows PowerShell, and then verify the IT
group’s scope with the following command:
Get-ADGroup IT
7. In the Directly Applies To section, configure the PSO to apply to the following groups:
o IT
o Domain Admins
9. In Active Directory Administrative Center, switch to the Overview page, and in the Global Search
box, search for Abbi Skinner. Use the View resultant password settings to verify that the Adatum
Administrative Password Settings PSO applies to Abbi; he is in the IT group.
10. Repeat step nine to verify the user Adam Hobbs. He is not in an IT group, and the Default Domain
Policies settings apply to him.
3. Open the Group Policy Management console, and then create and link a policy named Restricted
Administrators on Member Servers to the Adatum Servers OU.
4. Edit the GPO to restrict the local Administrators group to the Administrator account, the Domain
Admins group, and the IT group.
5. Switch to LON-SVR1 and refresh Group Policy.
6. Verify that the policy has applied to LON-SVR1 and has restricted the local Administrators group.
9. Configure the GPO with Restricted Groups. Add the groups Account Operators and Server
Operators, and configure both to contain no members.
4. In the Default Domain Controllers Policy, enable Success auditing of Audit Security Group
Membership under Computer Configuration\Policies\Windows Settings\Security Settings
\Advanced Audit Policy Configuration\Audit Policies\Account Management.
MCT USE ONLY. STUDENT USE PROHIBITED
7-50 Securing Active Directory Domain Services
5. In the Default Domain Controllers Policy, enable the policy Audit: Force audit policy subcategory
settings (Windows Vista or later) to override audit policy category settings under Computer
Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options.
7. Open Active Directory Users and Computers and enable the Advanced Features view. In the
Adatum.com properties dialog box, under Advanced Security Settings, in Auditing, locate the
Success auditing entry for Everyone with Special access, which applies to This object only.
8. Open and change the auditing entry to apply to This object and all descendent objects.
9. In Active Directory Users and Computers, add the user Abbi Skinner to the Domain Admins group.
10. Locate the user Ada Russel in the Marketing OU, and then change her city from London to
Birmingham.
11. Open Event Viewer, go into the Security log, and then open the most recent Event ID 4728. In the
properties, note that ADATUM\Administrator has added ADATUM\Abbi to the Domain Admins
groups.
12. In Event Viewer, open the most recent Event ID 5136, and note that ADATUM\Administrator has
modified the user object cn=Ada Russel and deleted the value London.
13. Move and open the next event in the Event Properties details page, and notice that
ADATUM\Administrator has modified Ada Russel and added the value Birmingham.
Results: After this exercise, you should have identified and configured the security policies for A. Datum.
2. Run the Active Directory Domain Services Installation Wizard on an RODC to complete the deployment
process.
Preparation
To prestage an RODC account, the computer name must not be in use in the domain. Therefore, you first
need to remove LON-SVR1 from the domain by performing the following steps:
1. Remove LON-SVR1 from the domain, add it to the MUNICH workgroup, and then restart the server.
2. Sign in as:
o Password: Pa55w.rd
3. Switch to LON-DC1.
4. From Server Manager, start Active Directory Users and Computers, navigate to the Adatum
Servers OU, and then delete LON-SVR1. Confirm the deletion.
2. Start Active Directory Administrative Center, and then navigate to the Domain Controllers OU.
3. Precreate an RODC account with the name LON-SVR1, which also should be a DNS Server and a
Global Catalog.
Task 2: Run the Active Directory Domain Services Installation Wizard on an RODC to
complete the deployment process
1. Switch to LON-SVR1. From Server Manager, start the Add Roles and Features Wizard.
2. Use the wizard to install Active Directory Domain Services on LON-SVR1. Accept the installation of
features and management tools.
3. When the installation is finished, click in the notification area of Server Manager to promote this
server to a domain controller.
4. Configure to add the server as a domain controller to an existing domain. Click Change, and provide
the following credentials:
o Password: Pa55w.rd
6. Notice that the Active Directory Domain Services Installation Wizard finds the precreated account.
Accept all further defaults in the wizard to use that account, and then configure AD DS.
MCT USE ONLY. STUDENT USE PROHIBITED
7-52 Securing Active Directory Domain Services
2. Make the IT group, found in the IT OU, a member of the Denied RODC Password Replication Group.
Note: The members of the IT group have elevated permissions, so storing their password on
an RODC would be a security risk. Therefore, you add the IT group to the global Deny List, which
applies to every RODC in the domain.
Task 4: Create a group to manage password replication to the branch office RODC
1. Switch to Server Manager, and from the Tools menu, start Active Directory Users and Computers.
2. Navigate to the Users container, and then create a new group named Munich Allowed RODC
Password Replication Group.
4. In Active Directory Administrative Center, from the Domain Controllers OU, view the properties
for LON-SVR1.
5. In the Extensions section, on the Password Replication Policy tab, configure the Munich Allowed
RODC Password Replication Group to allow password replication. Close the properties for
LON-SVR1.
2. Select Accounts that have been authenticated to this Read-only Domain Controller, and then
note that this only shows accounts that have the permissions and already have been authenticated by
this RODC.
3. Click the Resultant Policy tab, and then add Ana Cantrell. Notice that Ana Cantrell has a resultant
policy of Allow.
Results: After this exercise, you should have deployed and configured an RODC.
2. Create the KDS root key by using the Add-KdsRootKey cmdlet. Make the effective time minus 10
hours, so the key will be effective immediately.
3. Create the new service account named Webservice for the host LON-DC1.
2. From the Tools menu in Server Manager, open Internet Information Services (IIS) Manager.
3. Expand LON-DC1 (Adatum\Administrator), and then click Application Pools.
4. In the DefaultAppPool actions pane, in the Advanced Settings dialog box, configure the
DefaultAppPool to use the Webservice$ account as the identity. Note that you can click the ellipsis
(…) by the identity name to add the Webservice$ account as a custom account.
Results: After completing this exercise, you should have configured an MSA.
Question: In the lab, you configured the password settings for all users within the Default
Domain Policy, and you configured the password settings for Administrators within a PSO.
What other options were available to help you accomplish the solution?
Question: In the lab, you were using precedence for the administrative PSO with a value of 10.
What is the reason for this?
MCT USE ONLY. STUDENT USE PROHIBITED
7-54 Securing Active Directory Domain Services
Question: You need to implement auditing policies for domain authentication and changes
to directory services. What is the best way to implement these auditing settings?
Question: Your organization requires you to maintain a highly reliable and secure AD DS
infrastructure. It also requires that users can access corporate email from the Internet by using
Outlook Web Access. You are considering implementing account-lockout settings. What must
you consider?
Tools
The following table lists the tools that this module references.
Active Directory Users Managing objects within AD DS, such as users, groups, Server Manager
and Computers and computers.
Active Directory Managing objects within AD DS, such as users, groups, Server Manager
Administrative Center and computers.
Group Policy Managing, reporting, backup, and restoration of GPOs. Server Manager
Management