Protecting Privileged Domain Accounts Restricted Admin and Protected Users

11次阅读
没有评论

It’s been a while since I’ve written about this topic, and in that time, there have been some useful security updates provided by Microsoft, as well as some troubling developments with Microsoft’s Kerberos implementation. In order to fully cover these topics, I’m going to split the discussion into two articles. This article will cover specific updates Microsoft has provided to help protect user credentials. I’ll follow up next week to discuss the Kerberos issues in depth.

Protecting Privileged Domain Accounts Restricted Admin and Protected Users

As a quick reminder, the major takeaway from my previous articles on this subject are that we can successfully protect our privileged domain accounts by taking these 3 steps:

Protecting Privileged Domain Accounts Restricted Admin and Protected Users

Let’s take a look at the changes in the newest Microsoft operating systems, as well as recent patches for older operating systems, that have helped with each of these 3 areas.

Protecting Privileged Domain Accounts Restricted Admin and Protected Users

Of the 3 steps we should take to protect our privileged domain accounts, avoiding interactive logons is the most important because traditional interactive logons store the keys to a user’s kingdom?including password hashes, Kerberos keys and tickets, and even the password itself. I used the word “traditional” because we now have a new type of interactive logon that mitigates this credential exposure, called Restricted Admin Remote Desktop. More on that in a moment.

Protecting Privileged Domain Accounts Restricted Admin and Protected Users

The previous password hashes article in this series includes a detailed look at what constitutes an interactive logon, but to quickly summarize, it includes the following: local desktop logons at the console, remote desktop logons via RDP/VNC/Citrix and the like, and even RunAs logons. Although less common, an interactive logon can also be generated programmatically with tools such as PsExec when the “-u” option is invoked.

Protecting Privileged Domain Accounts Restricted Admin and Protected Users

So rather than logging on interactively, exposing all of those credentials, you should instead connect with network logons remotely using tools such as PowerShell Remoting, WMI/WMIC, as well as most SMB/CIFS connections such as mapping drives, using Computer Management, etc.

Protecting Privileged Domain Accounts Restricted Admin and Protected Users

That said, a feature in Windows 8.1 and Server 2012R2 provides a modified version of an interactive logon which has the same beneficial effect of a network logon?it does not store the user’s credentials on the remote system.

Protecting Privileged Domain Accounts Restricted Admin and Protected Users

Here’s a look at the description of this feature from the new Remote Desktop client’s help dialog box (run “mstsc /?” from a command prompt):

Protecting Privileged Domain Accounts Restricted Admin and Protected Users
正文完
 0
评论(没有评论)