rdr-it.lab - Healthcheck analysis

Date: 2021-06-10 - Engine version: 2.9.2.0

This report has been generated with the Basic Edition of PingCastle ?.
Being part of a commercial package is forbidden (selling the information contained in the report).
If you are an auditor, you MUST purchase an Auditor license to share the development effort.

This section focuses on the core security indicators.
Locate the sub-process determining the score and fix some rules in that area to get a score improvement.

Indicators

050100

Domain Risk Level: 65 / 100

It is the maximum score of the 4 indicators and one score cannot be higher than 100. The lower the better

050100

Stale Object : 26 /100

It is about operations related to user or computer objects

4 rules matched

050100

Trusts : 0 /100

It is about links between two Active Directories

0 rules matched

050100

Privileged Accounts : 55 /100

It is about administrators of the Active Directory

5 rules matched

050100

Anomalies : 65 /100

It is about specific security control points

10 rules matched

Stale ObjectsPrivileged accountsTrustsAnomalies
Inactive user or computer
Account take over
Old trust protocol
Audit
Network topography
ACL Check
SID Filtering
Backup
Object configuration
Admin control
SIDHistory
Certificate take over
Obsolete OS
Control paths
Trust impermeability
Golden ticket
Old authentication protocols
Delegation Check
Trust inactive
Local group vulnerability
Provisioning
Irreversible change
Trust with Azure
Network sniffing
Replication
Privilege control
Pass-the-credential
Vulnerability management
Read-Only Domain Controllers
Password retrieval
Reconnaissance
Temporary admins
Weak password
Legend:
  score is 0 - no risk identified but some improvements detected
  score between 1 and 10 - a few actions have been identified
  score between 10 and 30 - rules should be looked with attention
  score higher than 30 - major risks identified

This section represents the maturity score (inspired from ANSSI).

This feature is reserved for customers who have purchased a license

050100

Stale Objects : 26 /100

It is about operations related to user or computer objects

+ 10 Point(s)

DC Vulnerability (SMB v1)

Rule ID:

S-SMB-v1

Description:

The purpose is to verify if Domain Controller(s) are vulnerable to the SMB v1 vulnerability

Technical explanation:

The SMB downgrade attack is used to obtain credentials or executing commands on behalf of a user by using SMB v1 as protocol. Indeed, because SMB v1 supports old authentication protocol, the integrity can be bypassed

Advised solution:

It is highly recommended by Microsoft to disable SMB v1 whenever it is possible on both client and server side. Do note that if you are still not following best practices regarding the usage of deprecated OS (Windows 2000, 2003, XP, CE), regarding Network printer using SMBv1 scan2shares functionalities, or regarding software accessing Windows share with a custom implementation relying on SMB v1, you should consider fixing this issues before disabling SMB v1, as it will generates additional errors.

Points:

10 points if present

Documentation:

https://github.com/lgandx/Responder-Windows
https://blogs.technet.microsoft.com/josebda/2015/04/21/the-deprecation-of-smb1-you-should-be-planning-to-get-rid-of-this-old-smb-dialect
https://docs.microsoft.com/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3
[FR]ANSSI CERTFR-2017-ACT-019
[FR]ANSSI CERTFR-2016-ACT-039

Details:

The detail can be found in Domain controllers

Domain controller
LAB-DC1
+ 10 Point(s)

Check the process of registration of computers to the domain

Rule ID:

S-ADRegistration

Description:

The purpose is to ensure that basic users cannot register extra computers in the domain

Technical explanation:

By default, a basic user can register up to 10 computers within the domain. This default configuration represents a security issue as basic users shouldn't be able to create such accounts and this task should be handled by administrators.

Advised solution:

To solve the issue limit the number of extra computers that can be registered by a basic user. It can be reduced by modifying the value of ms-DS-MachineAccountQuota to zero (0). Another solution can be to remove altogether the authenticated users group in the domain controllers policy. Do note that if you need to set delegation to an account so it can add computers to the domain, it can be done through 2 methods: Delegation in the OU or by assigning the SeMachineAccountPrivilege to a special group

Points:

10 points if present

Documentation:

https://docs.microsoft.com/troubleshoot/windows-server/identity/default-workstation-numbers-join-domain
http://prajwaldesai.com/allow-domain-user-to-add-computer-to-domain/
http://blog.backslasher.net/preventing-users-from-adding-computers-to-a-domain.html

+ 5 Point(s)

Check for completeness of network declaration

Rule ID:

S-DC-SubnetMissing

Description:

The purpose is to ensure that the minimum set of subnet(s) has been configured in the domain

Technical explanation:

When multiple sites are created in a domain, networks should be declared in the domain in order to optimize processes such as DC attribution. In addition, PingCastle can collect the information to be able to build a network map. This rule has been triggered because at least one domain controller has an IP address which was not found in subnet declaration. These IP addresses have been collected by querying the DC FQDN IP address in both IPv6 and IPv4 format.

Advised solution:

Locate the IP address which was found as not being part of declared subnet then add this subnet to the "Active Directory Sites" tool. If you have found IPv6 addresses and it was not expected, you should disable the IPv6 protocol on the network card.

Points:

5 points if present

Details:

The detail can be found in Domain controllers

Domain controllerip
LAB-DC1 192.168.100.1
+ 1 Point(s)

Check that there is no account with never-expiring passwords

Rule ID:

S-PwdNeverExpires

Description:

The purpose is to ensure that every account has a password which is compliant with password expiration policies

Technical explanation:

Some accounts have passwords which never expire. Should an attacker compromise one of these accounts, he would be able to maintain long-term access to the Active Directory domain.

We have noted that some Linux servers, domain joined, are configured with a password which never expires.
This is a misconfiguration because a password change can be configured. It was however not the default on some plateform.
See one of the link below for more information.

Advised solution:

In order to make Active Directory enforce periodic password change, accounts must not have the "Password never expires" flag set in the "Account" tab of the user properties. Their passwords should then be rolled immediately.
For services accounts, Windows provide the "managed service accounts" and "group managed service accounts" features to facilite the automatic change of passwords.
Please note that there is a document in the section below which references solutions for service accounts of well known products.
Also Linux servers should be configured with automatic machine account change.

Points:

1 points if present

Documentation:

https://adsecurity.org/?p=4115
https://access.redhat.com/discussions/1283873
[FR]ANSSI - Accounts with never-expiring passwords (vuln2_dont_expire)2

Details:

The detail can be found in User information

050100

Privileged Accounts : 55 /100

It is about administrators of the Active Directory

+ 20 Point(s)

At least one Administrator Account can be delegated

Rule ID:

P-Delegated

Description:

The purpose is to ensure that all Administrator Accounts have the configuration flag "this account is sensitive and cannot be delegated" (and are not member of the built-in group "Protected Users" when your domain functional level is at least Windows Server 2012 R2).

Technical explanation:

Without the flag "This account is sensitive and cannot be delegated" any account can be impersonated by some service account. It is a best practice to enforce this flag on administrators accounts.

Advised solution:

To correct the situation, you should make sure that all your Administrator Accounts has the check-box "This account is sensitive and cannot be delegated" active or add your Administrator Accounts to the built-in group "Protected Users" if your domain functional level is at least Windows Server 2012 R2 (some functionalities may not work properly afterwards, you should check the official documentation). Please note that there is a section bellow in this report named "Admin Groups" which give more information.

Points:

20 points if present

Documentation:

[US]STIG V-36435 - Delegation of privileged accounts must be prohibited.

Details:

The detail can be found in Admin Groups

+ 10 Point(s)

Ensure that the Recycle Bin feature is enabled

Rule ID:

P-RecycleBin

Description:

The purpose is to ensure that the Recycle Bin feature is enabled

Technical explanation:

The Recycle Bin avoids immediate deletion of objects (which can still be partially recovered by its tombstone). This lowers the administration work needed to restore. It also extends the period where traces are available when an investigation is needed.

Advised solution:

First, be sure that the forest level is at least Windows 2008 R2.
You can check it with Get-ADForest or in the Domain Information section.
Then you can enable it using the powershell command:
Enable-ADOptionalFeature -identity 'CN=Recycle Bin Feature,CN=Optional Features,CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,DC=test,DC=mysmartlogon,DC=com' -Scope ForestOrConfigurationSet -Target 'test.mysmartlogon.com'

Points:

10 points if present

Documentation:

https://enterinit.com/powershell-enable-active-directory-recycle-bin

Details:

The detail can be found in Domain Information

+ 10 Point(s)

Check if all privileged accounts are in the special group Protected Users.

Rule ID:

P-ProtectedUsers

Description:

The purpose is to ensure that all privileged accounts are in the special group Protected Users

Technical explanation:

The Protected Users group is a special group which is a very effective mitigation solution to counter attacks using Credential theft starting with Windows 8.1. Older Operating System must be updated to take this protection in account such as the Windows 7 KB2871997 patch.
For admins, it:
- disable NTLM authentication
- reduce Kerberos ticket lifetime
- enforce usage of strong encryption algorthms such as AES
- prevent caching of passwords on workstations
- prevent any type of Kerberos delegation

Please also note that a few links (see below) recommends that at least one account is kept outside of the group Protected Users in case there is a permission problem.
That's why this rule is not triggered if only one account is not protected.

Advised solution:

After having reviewed the potential impact on adding users to this group, add the missing privileged accounts to this group.

Points:

10 points if the occurence is greater than or equals than 2

Documentation:

https://docs.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/protected-users-security-group
https://blog.netwrix.com/2015/02/20/add-sensitive-user-accounts-to-active-directory-protected-users-group/
https://dirteam.com/sander/2014/11/25/ten-things-you-need-to-be-aware-of-before-using-the-protected-users-group/
https://blog.andreas-schreiner.de/2018/09/07/active-directory-sicherheit-teil-1-privilegierte-benutzer/
[US]STIG V-78131 - Accounts with domain level administrative privileges must be members of the Protected Users group in domains with a domain functional level of Windows 2012 R2 or higher.
[FR]ANSSI CERTFR-2017-ALE-012
[FR]ANSSI - Privileged accounts outside of the Protected Users group (vuln3_protected_users)3

Details:

The detail can be found in Admin Groups

User
Administrateur
bgates
+ 10 Point(s)

Avoid unexpected schema modifications which could result in domain rebuild

Rule ID:

P-SchemaAdmin

Description:

The purpose is to ensure that no account can make unexpected modifications to the schema

Technical explanation:

The group "Schema Admins" is used to give permissions to alter the schema. Once a modification is performed on the schema such as new objects, it cannot be undone. This can result in a rebuild of the domain. The best practice is to have this group empty and to add an administrator when a schema update is required then to remove this group membership.

Advised solution:

Remove the accounts or groups belonging to the "schema administrators" group.

Points:

10 points if present

Documentation:

[US]STIG V-72835 - Membership to the Schema Admins group must be limited
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R13 [subsection.3.2]

Details:

The detail can be found in Admin Groups

+ 5 Point(s)

Check if there is an explicit delegation on DNS servers.

Rule ID:

P-DNSDelegation

Description:

The purpose is to ensure that no specific delegation has been setup to manage the Microsoft DNS.

Technical explanation:

Administrators of the DNS Service have the possibility to inject a DLL in this service.
However this service is hosted most of the time in the domain controller and is running as system.
That means that DNS Admins are potentially domain admins.

The security descriptor used to grant admin rights is located on the nTSecurityDescriptor attribute of the object CN=MicrosoftDNS,CN=System.
The "Write All Prop" access right induces the vulnerability.

In this case, an explicit delegation has been setup and this delegation is not using the existing DnsAdmins group.

Advised solution:

You should remove the explicit write delegation located in the CN=MicrosoftDNS,CN=System container and do a proper delegation.
First, grant only "Read Property", "List", "List object" and "Read permssions" to CN=MicrosoftDNS,CN=System to enable access to the RPC service.
Then on each zone (the object in the tree below with the class dnsZone), grant "Read Property", "List", "List object", "Read permissions", "Create Child", "Delete Child", "Delete", "Delete Tree".

Points:

5 points if present

Documentation:

https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dnsp/007efcd2-2955-46dd-a59e-f83ae88f4678

Details:

The detail can be found in Delegations

AccountRight
AUTORITE NT\ENTERPRISE DOMAIN CONTROLLERS GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
050100

Trusts : 0 /100

It is about links between two Active Directories

No rule matched

050100

Anomalies : 65 /100

It is about specific security control points

+ 15 Point(s)

Check if the LAPS tool to handle the native local administrator password is installed

Rule ID:

A-LAPS-Not-Installed

Description:

The purpose is to make sure that there is a proper password policy in place for the native local administrator account.

Technical explanation:

LAPS (Local Administrator Password Solution) is the advised solution to handle passwords for the native local administrator account on all workstations, as it is a simple way to handle most of the subject.

Advised solution:

If you don't have any provisioning process or password solution to manage local administrators, you should install the LAPS solution. If you mitigate the risk differently, you should add this rule as an exception, as the risk is covered.

Points:

15 points if present

Documentation:

https://www.microsoft.com/en-us/download/details.aspx?id=46899
[US]STIG V-36438 - Local administrator accounts on domain systems must not share the same password.
[FR]ANSSI CERTFR-2015-ACT-046

Details:

The detail can be found in LAPS

+ 15 Point(s)

Check for the last backup date according to Microsoft standard

Rule ID:

A-BackupMetadata

Description:

The purpose is check if the backups are actually up to date in case they are needed. The alert can be triggered when a domain is backed up using non-recommended methods

Technical explanation:

A verification is done on the backups, ensuring that the backup is performed according to Microsoft standards. Indeed at each backup the DIT Database Partition Backup Signature is updated.  If for any reasons, backups are needed to perform a rollback (rebuild a domain) or to track past changes, the backups will actually be up to date. This check is equivalent to a REPADMIN /showbackup *.

Advised solution:

Plan AD backups based on Microsoft standards. These standards depend on the Operating System. For example with the wbadmin utility: wbadmin start systemstatebackup -backuptarget:d:

Points:

15 points if the occurence is greater than or equals than 7

Documentation:

https://technet.microsoft.com/en-us/library/jj130668(v=ws.10).aspx
[US]STIG V-25385 - Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.

Details:

The detail can be found in Backup

+ 10 Point(s)

Check if there is the expected audit policy on domain controllers.

Rule ID:

A-AuditDC

Description:

The purpose is to ensure that the audit policy on domain controllers collect the right set of events.

Technical explanation:

To detect and mitigate an attack, the right set of events need to be collected.
The audit policy is a compromise between too much and too few events to collect.
To solve this problem, the suggested audit policy from adsecurity.org is checked against the audit policy in place.

Advised solution:

Identify the Audit settings to apply and fix them.
Be aware that there are two places for audit settings.
For "Simple" audit configuration:
in Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Audit Policies
For "Advanced" audit configuration:
in Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration
Also be sure that the audit GPO is applied to all domain controllers, as the underlying object may be in a OU where the GPO is not applied.

Points:

10 points if present

Documentation:

https://adsecurity.org/?p=3299

Details:

The detail can be found in Audit settings
The table below shows the settings that were not found as configured in GPO for a given domain controller.

TypeAuditProblemRationaleDomain controller
Advanced Policy Change / Authentication Policy Change No GPO check for audit success Collect events 4713, 4716, 4739, 4867, to track trust modifications LAB-DC1
Advanced Account Management / Computer Account Management No GPO check for audit success Collect events 4741, 4742 to track computer changes LAB-DC1
Advanced Detailed Tracking / DPAPI Activity No GPO check for audit success Collect event 4692 to track the export of DPAPI backup key LAB-DC1
Advanced Account Logon / Kerberos Authentication Service No GPO check for audit success Collect events 4768, 4771 for kerberos authentication LAB-DC1
Advanced Account Logon / Kerberos Service Ticket Operations No GPO check for audit success Collect events 4769 for kerberos authentication LAB-DC1
Advanced Logon/Logoff / Logoff No GPO check for audit success Collect events 4634 for account logoff LAB-DC1
Advanced Logon/Logoff / Logon No GPO check for audit success Collect events 4624, 4625, 4648 for account logon LAB-DC1
Advanced Detailed Tracking / Process Creation No GPO check for audit success Collect event 4688 to get the history of executed programs LAB-DC1
Advanced Account Management / Security Group Management No GPO check for audit success Collect events 4728, 4732, 4756 for group membership change LAB-DC1
Advanced System / Security System Extension No GPO check for audit success Collect events 4610, 4697 to track lsass security packages and services LAB-DC1
Advanced Privilege Use / Sensitive Privilege Use No GPO check for audit success Collect events 4672, 4673, 4674 for privileges tracking such as the debug one LAB-DC1
Advanced Logon/Logoff / Special Logon No GPO check for audit success Collect event 4964 for special group attributed at logon LAB-DC1
Advanced Account Management / User Account Management No GPO check for audit success Collect events 4720,22,23,38,65,66,80,94 for user account mamangement LAB-DC1
+ 10 Point(s)

Check for Short password length in password policy

Rule ID:

A-MinPwdLen

Description:

The purpose is to verify if the password policy of the domain enforces users to have at least 8 characters in their password

Technical explanation:

A check is performed to identify if the GPO regarding password policy allows less than 8 characters password. Short passwords represents a high risk because they can fairly easily be brute-forced. Most CERT and agencies advises for at least 8 characters (and often this number goes up to 12)

Advised solution:

To solve the issue, the best way is to either remove the GPO enabling short password, or to modify it in order to increase the password length to at least 8 characters

Points:

10 points if present

Documentation:

https://www.microsoft.com/en-us/research/publication/password-guidance/
[FR]ANSSI - Privileged group members with weak password policy (vuln2_privileged_members_password)2

Details:

The detail can be found in Password policies

GPO
Default Domain Policy
PSO:PSO_Marvel
PSO:PSO_DcComics
PSO:PSO_Default
+ 10 Point(s)

Ensure that the printer spooler cannot be abused to get the DC Credentials

Rule ID:

A-DC-Spooler

Description:

The purpose is to ensure that credentials cannot be extracted from the DC via its printer spooler

Technical explanation:

When there’s an account with unconstrained delegation configured (which is fairly common) and the Print Spooler service running on a computer, you can get that computers credentials sent to the system with unconstrained delegation as a user. With a domain controller, the TGT of the DC can be extracted allowing an attacker to reuse it with a DCSync attack and obtain all user hashes and impersonate them.

Advised solution:

The spooler service should be deactivated on domain controllers. Please note as a consequence that the Printer Pruning functionality (rarely used) will be unavailable.

Points:

10 points if present

Documentation:

https://adsecurity.org/?p=4056
https://www.slideshare.net/harmj0y/derbycon-the-unintended-risks-of-trusting-active-directory

Details:

The detail can be found in Domain controllers

Domain controller
LAB-DC1
+ 5 Point(s)

Ensure that there are enough DCs to provide basic redundancy

Rule ID:

A-NotEnoughDC

Description:

The purpose is to ensure the failure of one domain controller will not stop the domain.

Technical explanation:

A single domain controller failure can lead to a lack of availability of the domain if the number of servers is too low. To have a minimum redundancy, the number of DC should be at least 2. For Labs, this rule can be ignored and you can add this rule into the exception list.

Advised solution:

Increase the number of domain controllers by installing new ones.

Points:

5 points if the occurence is strictly lower than 2

Documentation:

https://social.technet.microsoft.com/wiki/contents/articles/14355.capacity-planning-for-active-directory-domain-services.aspx

Details:

The detail can be found in Domain controllers

Informative rule

Check the Password Policy for Service Accounts (Information)

Rule ID:

A-NoServicePolicy

Description:

The purpose is to give information regarding a best practice for the Service Account password policy. Indeed, having a 20+ characters password for this account greatly helps reducing the risk behind Kerberoast attack (offline crack of the TGS tickets)
Note: PSO (Password Settings Objects) will be visible only if the user which collected the information has the permission to view it.

Technical explanation:

The rule is purely informative, as it gives insights regarding a best practice. It verifies if there is a GPO or PSO enforcing a 20+ characters password for the Service Account.

Advised solution:

The recommended way to handle service accounts is to use "Managed service accounts" introduced since Windows 2008 R2 (search for "msDS-ManagedServiceAccount").
To solve the anomaly, you should implement a PSO or GPO password guarantying a 20+ length password.

Points:

Informative rule (0 point)

Documentation:

https://www.microsoft.com/en-us/research/publication/password-guidance/

Details:

The detail can be found in Password Policies

Informative rule

Check if NetCease has been put in place to mitigate Bloodhound

Rule ID:

A-NoNetSessionHardening

Description:

The purpose is to ensure that mitigations are in place against the Bloodhound tool

Technical explanation:

By default, Windows computers allow any authenticated user to enumerate network sessions to it.
This means an attacker could enumerate network sessions to a file share hosting home directories or a Domain Controller to see who’s connected to SYSVOL (to apply Group Policy) and determine which workstations each user and admin account is logged into.
Bloodhound uses this capability extensively to map out credentials in the network.

Disabling Net Session Enumeration removes the capability for any user to enumerate net session info (Recon).

Advised solution:

If this mitigation is not part of the computer image, apply the following recommandations:
Run the NetCease PowerShell script (referenced below) on a reference workstation.
Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit .
In the console tree under Computer Configuration, expand the Preferences folder, and then expand the Windows Settings folder.
Right-click the Registry node, point to New, and select Registry Wizard.
Select the reference workstation on which the desired registry settings exist, then click Next .
Browse to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\DefaultSecurity\
and select the check box for “SrvsvcSessionInfo” from which you want to create a Registry preference item. Select the check box for a key only if you want to create a Registry item for the key rather than for a value within the key.
Click Finish.
The settings that you selected appear as preference items in the Registry Wizard Values collection

Points:

Informative rule (0 point)

Documentation:

https://github.com/p0w3rsh3ll/NetCease
https://adsecurity.org/?p=3299

Details:

The detail can be found in Security settings

Informative rule

Check if there is powershell logging enabled.

Rule ID:

A-AuditPowershell

Description:

The purpose is to ensure that Powershell logging is enabled.

Technical explanation:

Powershell is a powerful language, also used by hackers because of this quality. Hackers are able to run programs such as mimikatz in memory using obfuscated commands such as Invoke-Mimikatz.
Because there is no artefact on the disk, the incident response task is difficult for the forensic analysts.
For this reason, we recommend to enable Powershell logging via a group policy, despite the fact that these security settings may be part of the workstation or server images.

Advised solution:

Go to Computer Configuration -> Administrative Templates -> Windows Components -> Windows PowerShell
And enable "Turn on Module logging" and "Turn on Powershell Script Block logging"
We recommend to set "*" as the module list.

Points:

Informative rule (0 point)

Documentation:

https://adsecurity.org/?p=2604
https://docs.microsoft.com/en-us/powershell/scripting/wmf/whats-new/script-logging?view=powershell-6
[US]STIG V-68819 - PowerShell script block logging must be enabled

Details:

The detail can be found in Security settings

Informative rule

Check if LLMNR can be used to steal credentials

Rule ID:

A-NoGPOLLMNR

Description:

The purpose is to ensure that local name resolution protocol (LLMNR) cannot be used to collect credentials by performing a network attack

Technical explanation:

LLMNR is a protocol which translates names such as foo.bar.com into an ip address. LLMNR has been designed to translate name locally in case the default protocol DNS is not available.
Regarding Active Directory, DNS is mandatory which makes LLMNR useless.
LLMNR exploits typo mistakes or faster response time to redirect users to a specially designed share, server or website.
Being trusted, this service will trigger the single sign on procedure which can be abused to retrieve the user credentials.

LLMNR is enabled by default on all OS except starting from Windows 10 v1903 and Windows Server v1903 where it is disabled.

Advised solution:

Enable the GPO Turn off multicast name resolution and check that no GPO override this setting.
(if it is the case, the policy involved will be displayed below)

Points:

Informative rule (0 point)

Documentation:

https://youtu.be/Fg2gvk0qgjM

Details:

The detail can be found in Security settings

This section shows the main technical characteristics of the domain.

DomainNetbios NameDomain Functional LevelForest Functional LevelCreation dateDC countSchema versionRecycle Bin enabled
rdr-it.labRDR-ITWindows Server 2016Windows Server 20162021-02-13 18:02:01Z1Windows Server 2016FALSE

This section gives information about the user accounts stored in the Active Directory

Account analysis

Nb User AccountsNb Enabled ?Nb Disabled ?Nb Active ?Nb Inactive ?Nb Locked ?Nb pwd never Expire ?Nb SidHistory ?Nb Bad PrimaryGroup ?Nb Password not Req. ?Nb Des enabled. ?Nb unconstrained delegations ?Nb Reversible password ?
16142140011000000
[11]
NameCreationLast logonDistinguished name
Administrateur2021-02-13 18:02:09Z2021-06-02 16:50:06ZCN=Administrateur,CN=Users,DC=rdr-it,DC=lab
arthur.curry2021-06-02 15:01:53ZNeverCN=Arthur Curry - Aquaman,OU=Aquaman,OU=DC Comics,OU=Super Héros,OU=Departements,DC=rdr-it,DC=lab
bgates2021-05-11 13:27:10ZNeverCN=Benjamin Gates,CN=Users,DC=rdr-it,DC=lab
clark.kent2021-06-02 14:57:22ZNeverCN=Clark Kent - Superman,OU=Superman,OU=DC Comics,OU=Super Héros,OU=Departements,DC=rdr-it,DC=lab
ironman2021-05-11 13:27:49ZNeverCN=Iron Man,OU=Marvel,OU=Super Héros,OU=Departements,DC=rdr-it,DC=lab
lois.lane2021-06-02 14:57:51ZNeverCN=Lois Lane,OU=Superman,OU=DC Comics,OU=Super Héros,OU=Departements,DC=rdr-it,DC=lab
marie2021-05-03 13:16:49Z2021-05-03 16:38:07ZCN=Marie AtouPrix,OU=HR,OU=Departements,DC=rdr-it,DC=lab
mera2021-06-02 15:02:59ZNeverCN=Mera,OU=Aquaman,OU=DC Comics,OU=Super Héros,OU=Departements,DC=rdr-it,DC=lab
pierre2021-05-03 13:16:20Z2021-05-03 16:27:23ZCN=Pierre KiRoule,OU=Compta,OU=Departements,DC=rdr-it,DC=lab
rdrit2021-05-11 13:30:33Z2021-05-11 15:59:57ZCN=rdr it,OU=IT,OU=Departements,DC=rdr-it,DC=lab
vulko2021-06-02 15:02:24ZNeverCN=Vulko,OU=Aquaman,OU=DC Comics,OU=Super Héros,OU=Departements,DC=rdr-it,DC=lab

Password Age Distribution

This feature is reserved for customers who have purchased a license

Account analysis

This section gives information about the computer accounts stored in the Active Directory

Nb Computer AccountsNb Enabled ?Nb Disabled ?Nb Active ?Nb Inactive ?Nb SidHistory ?Nb Bad PrimaryGroup ?Nb unconstrained delegations ?Nb Reversible password ?
330300010
[1]
NameCreationLast logonDistinguished name
LAB-DC1$2021-02-13 18:03:05Z2021-06-02 16:49:20ZCN=LAB-DC1,OU=Domain Controllers,DC=rdr-it,DC=lab

Operating Systems

Operating SystemNb OSNb Enabled ?Nb Disabled ?Nb Active ?Nb Inactive ?Nb SidHistory ?Nb Bad PrimaryGroup ?Nb unconstrained delegations ?Nb Reversible password ?
Windows 10110100000
Windows 2016220200010

Domain controllers

Here is a specific zoom related to the Active Directory servers: the domain controllers.

[1]
Domain controllerOperating SystemCreation Date ?Startup TimeUptimeOwner ?Null sessions ?SMB v1 ?Remote spooler ?FSMO role ?
LAB-DC1Windows 20162021-02-13 18:03:05Z2021-06-10 16:48:42Z0 daysRDR-IT\Admins du domaineNOYESYESPDC,
RID pool manager,
Infrastructure master,
Schema master,
Domain naming Master

Groups

This section is focused on the groups which are critical for admin activities. If the report has been saved which the full details, each group can be zoomed with its members. If it is not the case, for privacy reasons, only general statictics are available.

Group NameNb Admins ?Nb Enabled ?Nb Disabled ?Nb Inactive ?Nb PWd never expire ?Nb Smart Card required ?Nb Service accounts ?Nb can be delegated ?Nb external users ?Nb protected users ?
Account Operators0000000000
Administrators2201200200
Backup Operators0000000000
Certificate Operators0000000000
Certificate Publishers0000000000
Domain Administrators2201200200
Enterprise Administrators1100100100
Enterprise Key Administrators0000000000
Key Administrators0000000000
Print Operators0000000000
Replicator0000000000
Schema Administrators1100100100
Server Operators0000000000
[2]
SamAccountName ?Enabled ?Active ?Pwd never Expired ?Locked ?Smart Card required ?Service account ?Flag Cannot be delegated present ?Creation date ?Last login ?Password last set ?In Protected Users ?Distinguished name ?
AdministrateurYESYESYESNONONONO2021-02-13 18:02:09Z2021-06-02 16:50:06Z2021-02-10 12:29:53ZNOCN=Administrateur,CN=Users,DC=rdr-it,DC=lab
bgatesYESNOYESNONONONO2021-05-11 13:27:10ZNot set2021-05-11 15:27:10ZNOCN=Benjamin Gates,CN=Users,DC=rdr-it,DC=lab

Last Logon Distribution

This feature is reserved for customers who have purchased a license

Delegations

Each specific rights defined for Organizational Unit (OU) are listed below.

[10]
DistinguishedNameAccountRight
DC=rdr-itRDR-IT\Contrôleurs de domaineEXT_RIGHT_REPLICATION_GET_CHANGES_ALL
CN=KeysAUTORITE NT\ENTERPRISE DOMAIN CONTROLLERSGenericAll, GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=KeysRDR-IT\Administrateurs clésGenericAll, GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=KeysRDR-IT\Administrateurs clés EnterpriseGenericAll, GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=KeysRDR-IT\Contrôleurs de domaineGenericAll, GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=MicrosoftDNS,CN=SystemAUTORITE NT\ENTERPRISE DOMAIN CONTROLLERSGenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=MicrosoftDNS,CN=SystemRDR-IT\DnsAdminsGenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=RAS and IAS Servers Access Check,CN=SystemRDR-IT\Serveurs RAS et IASGenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=WMIPolicy,CN=SystemRDR-IT\Propriétaires créateurs de la stratégie de groupeGenericWrite, DSSelf, Write all prop
CN=SOM,CN=WMIPolicy,CN=SystemRDR-IT\Propriétaires créateurs de la stratégie de groupeGenericWrite, DSSelf, Write all prop

This section focuses on permissions issues that can be exploited to take control of the domain.
This is an advanced section that should be examined after having looked at the Admin Groups section.

Foreign domain involved

This analysis focuses on accounts found in control path and located in other domains.

No operative link with other domains has been found.

Indirect links

This part tries to summarize in a single table if major issues have been found.
Focus on finding critical objects such as the Everyone group then try to decrease the number of objects having indirect access.
The detail is displayed below.

Priority to remediate ?Critical Object Found ?Number of objects with Indirect ?Max number of indirect numbers ?Max ratio ?
CriticalNO000
HighNO000
MediumNO000
OtherNO000

Admin groups

If the report has been saved which the full details, each object can be zoomed with its full detail. If it is not the case, for privacy reasons, only general statictics are available.

Group or user account ?Priority ?Number of users member of the group ?Number of computer member of the group ?Number of object having indirect control ?Number of unresolved members (removed?) ?Link with other domainsDetail
Account OperatorsHigh0000NoneAnalysis
AdministratorCritical00NoneAnalysis
AdministratorsCritical2 (Details)000NoneAnalysis
Backup OperatorsHigh0000NoneAnalysis
Certificate OperatorsMedium0000NoneAnalysis
Certificate PublishersOther0000NoneAnalysis
Domain AdministratorsCritical2 (Details)000NoneAnalysis
Enterprise AdministratorsCritical1 (Details)000NoneAnalysis
Enterprise Key AdministratorsMedium0000NoneAnalysis
Key AdministratorsMedium0000NoneAnalysis
Print OperatorsMedium0000NoneAnalysis
ReplicatorMedium0000NoneAnalysis
Schema AdministratorsCritical1 (Details)000NoneAnalysis
Server OperatorsHigh0000NoneAnalysis

Critical Infrastructure

If the report has been saved which the full details, each object can be zoomed with its full detail. If it is not the case, for privacy reasons, only general statictics are available.

Group or user account ?Priority ?Number of users member of the group ?Number of computer member of the group ?Number of object having indirect control ?Number of unresolved members (removed?) ?Link with other domainsDetail
Builtin OUMedium00NoneAnalysis
Computers containerMedium00NoneAnalysis
Domain ControllersCritical01 (Details)00NoneAnalysis
Domain RootMedium00NoneAnalysis
Enterprise Read Only Domain ControllersOther0000NoneAnalysis
Group Policy Creator OwnersMedium1 (Details)000NoneAnalysis
Krbtgt accountMedium00NoneAnalysis
Read Only Domain ControllersMedium0000NoneAnalysis
Users containerMedium00NoneAnalysis

This section focuses on the relations that this domain has with other domains

Discovered Domains

This part displays the direct links that this domain has with other domains.

Trust PartnerTypeAttributDirection ?SID Filtering active ?TGT Delegation ?Creation ?Is Active ? ?

Reachable Domains

These are the domains that PingCastle was able to detect but which is not releated to direct trusts. It may be children of a forest or bastions.

Reachable domainDiscovered usingNetbiosCreation date

This section focuses on security checks specific to the Active Directory environment.

Backup

The program checks the last date of the AD backup. This date is computed using the replication metadata of the attribute dsaSignature (reference).

Last backup date: 2021-03-08 16:34:57Z

LAPS

LAPS is used to have a unique local administrator password on all workstations / servers of the domain. Then this password is changed at a fixed interval. The risk is when a local administrator hash is retrieved and used on other workstation in a pass-the-hash attack.

Mitigation: having a process when a new workstation is created or install LAPS and apply it through a GPO

LAPS installation date: Never

Windows Event Forwarding (WEF)

Windows Event Forwarding is a native mechanism used to collect logs on all workstations / servers of the domain. Microsoft recommends to Use Windows Event Forwarding to help with intrusion detection Here is the list of servers configured for WEF found in GPO

Number of WEF configuration found: 0

krbtgt (Used for Golden ticket attacks)

The account password for the krbtgt account should be rotated twice yearly at a minimum. More frequent password rotations are recommended, with 40 days the current recommendation by ANSSI. Additional rotations based on external events, such as departure of an employee who had privileged network access, are also strongly recommended.

You can perform this action using this script

You can use the version gathered using replication metadata from two reports to guess the frequency of the password change or if the two consecutive resets has been done. Version starts at 1.

Kerberos password last changed: 2021-02-13 19:03:06Z version: 2

AdminSDHolder (detect temporary elevated accounts)

This control detects accounts which are former 'unofficial' admins. Indeed when an account belongs to a privileged group, the attribute admincount is set. If the attribute is set without being an official member, this is suspicious. To suppress this warning, the attribute admincount of these accounts should be removed after review.

Number of accounts to review: 0

Unix Passwords

This control detects if one of the attributes userPassword or unixUserPassword has been set on accounts. Indeed, these attributes are designed to store encrypted secrets for unix (or mainframe) interconnection. However in the large majority, interconnected systems are poorly designed and the user password is stored in these attributes in clear text or poorly encrypted. The userPassword attribute is also used in classic LDAP systems to change the user password by setting its value. But, with Active Directory, it is considered by default as a normal attribute and doesn't trigger a password but shows instead the password in clear text.

Number of accounts to review: 0

Logon scripts

You can check here backdoors or typo error in the scriptPath attribute

Script NameCount
None14

Certificates

This detects trusted certificate which can be used in man in the middle attacks or which can issue smart card logon certificates

Number of trusted certificates: 0

[0]
SourceStoreSubjectIssuerNotBeforeNotAfterModule sizeSignature AlgSC Logon

Advanced

This section display advanced information, if any has been found

Password policies

Note: PSO (Password Settings Objects) will be visible only if the user which collected the information has the permission to view it.
PSO shown in the report will be prefixed by "PSO:"

Policy NameComplexityMax Password AgeMin Password AgeMin Password LengthPassword HistoryReversible EncryptionLockout ThresholdLockout DurationReset account counter locker after
Default Domain Policy ?True42 day(s)1 day(s)724False0Not SetNot Set
PSO:PSO_MarvelTrue42 day(s)0 day70False030 minute(s)30 minute(s)
PSO:PSO_DcComicsFalseNever expires0 day00False030 minute(s)30 minute(s)
PSO:PSO_DefaultFalse75 day(s)0 day624False030 minute(s)30 minute(s)

Screensaver policies

This is the settings related to screensavers stored in Group Policies. Each non compliant setting is written in red.

Policy NameScreensaver enforcedPassword requestStart after (seconds)Grace Period (seconds)

GPO

This section focuses on security settings stored in the Active Directory technical security policies.

Obfuscated Passwords

The password in GPO are obfuscated, not encrypted. Consider any passwords listed here as compromised and change it immediatly.

Restricted Groups

Giving local group membership in a GPO is a way to become administrator.
The local admin of a domain controller can become domain administrator instantly.

Security settings

A GPO can be used to deploy security settings to workstations.
The best practice out of the default security baseline is reported in green.
The following settings in red are unsual and may need to be reviewed.
Each setting is accompagnied which its value and a link to the GPO explanation.

Policy NameSettingValue

Audit settings

Audit settings allow the system to generate logs which are useful to detect intrusions. Here are the settings found in GPO.

Simple audit events are described here and Advanced audit events are described here

You can get a list of all audit settings with the command line: auditpol.exe /get /category:* (source)

Simple audit settings are located in: Computer Configuration / Policies / Windows Settings / Security Settings / Local Policies / Audit Policy. Simple audit settings are named [Simple Audit].

Advanced audit settings are located in: Computer Configuration / Policies / Windows Settings / Security Settings / Advanced Audit Policy Configuration. There category is displayed below.

Policy NameCategorySettingValue

Privileges

Giving privileges in a GPO is a way to become administrator without being part of a group.
For example, SeTcbPriviledge give the right to act as SYSTEM, which has more privileges than the administrator account.

GPO NamePrivilegeMembers
Default Domain Controllers Policy ?SeAssignPrimaryTokenPrivilegeAUTORITE NT\SERVICE RÉSEAU
Default Domain Controllers Policy ?SeAssignPrimaryTokenPrivilegeAUTORITE NT\SERVICE LOCAL
Default Domain Controllers Policy ?SeBackupPrivilegeBUILTIN\Opérateurs de serveur
Default Domain Controllers Policy ?SeBackupPrivilegeBUILTIN\Opérateurs de sauvegarde
Default Domain Controllers Policy ?SeBackupPrivilegeAdministrators
Default Domain Controllers Policy ?SeDebugPrivilegeAdministrators
Default Domain Controllers Policy ?SeLoadDriverPrivilegeBUILTIN\Opérateurs d’impression
Default Domain Controllers Policy ?SeLoadDriverPrivilegeAdministrators
Default Domain Controllers Policy ?SeMachineAccountPrivilegeAuthenticated Users
Default Domain Controllers Policy ?SeRestorePrivilegeBUILTIN\Opérateurs de serveur
Default Domain Controllers Policy ?SeRestorePrivilegeBUILTIN\Opérateurs de sauvegarde
Default Domain Controllers Policy ?SeRestorePrivilegeAdministrators
Default Domain Controllers Policy ?SeSecurityPrivilegeAdministrators
Default Domain Controllers Policy ?SeTakeOwnershipPrivilegeAdministrators
Default Domain Controllers Policy ?SeEnableDelegationPrivilegeAdministrators

Login

Login authorization and restriction can be set by GPO. Indeed, by default, everyone is allowed to login on every computer except domain controllers. Defining login restriction is a way to have different isolated tiers. Here are the settings found in GPO.

GPO NamePrivilegeMembers
Default Domain Controllers Policy ?Log on as a batch job ?BUILTIN\Utilisateurs du journal de performances
Default Domain Controllers Policy ?Log on as a batch job ?BUILTIN\Opérateurs de sauvegarde
Default Domain Controllers Policy ?Log on as a batch job ?Administrators
Default Domain Controllers Policy ?Allow log on locally ?AUTORITE NT\ENTERPRISE DOMAIN CONTROLLERS
Default Domain Controllers Policy ?Allow log on locally ?BUILTIN\Opérateurs d’impression
Default Domain Controllers Policy ?Allow log on locally ?BUILTIN\Opérateurs de serveur
Default Domain Controllers Policy ?Allow log on locally ?BUILTIN\Opérateurs de compte
Default Domain Controllers Policy ?Allow log on locally ?BUILTIN\Opérateurs de sauvegarde
Default Domain Controllers Policy ?Allow log on locally ?Administrators
Default Domain Controllers Policy ?Access this computer from the network ?BUILTIN\Accès compatible pré-Windows 2000
Default Domain Controllers Policy ?Access this computer from the network ?AUTORITE NT\ENTERPRISE DOMAIN CONTROLLERS
Default Domain Controllers Policy ?Access this computer from the network ?Authenticated Users
Default Domain Controllers Policy ?Access this computer from the network ?Administrators
Default Domain Controllers Policy ?Access this computer from the network ?Everyone

GPO Login script

A GPO login script is a way to force the execution of data on behalf of users. Only enabled users are analyzed.

GPO Deployed Files

A GPO can be used to deploy applications or copy files. These files may be controlled by a third party to control the execution of local programs.