Top 10 security settings after installing Active Directory
Derek Melber
The initial settings that you need to perform with Active Directory to secure the network before you delve into setting up the entire infrastructure.
Installing Active Directory is not too difficult, but once you have installed it, there is quite a bit of work to do. The first thing in Active Directory configuration is its security settings. There are many areas you need to consider and many settings need to be changed to prepare for network actions. Let's take a look at the initial settings that you should make to Active Directory to secure the network before entering the entire infrastructure setup.
Create a separate admin account
After installing Active Directory, you need to take care of your resources immediately. Not only does it protect new Active Directory resources but also create a world through which it can be safely managed. To do that, you need to create a new user account that is used when administering anything related to Active Directory.
Note :
This means that you should not use the associated Administrator account in the habit or administration of Active Directory in the usual way!
Once you have created this new account, you need to add it to the Domain Admins group. Since there is only one domain at this time, you will get the ability to do anything within this domain if necessary.
Note :
By becoming a member in the Domain Admins group in the root domain (the first domain in forest), you will be able to add or remove users from the Schema Admins and Enterprise Admins groups. However, there is no reason to have members in these groups until you need to perform an action that requires this privilege level.
During the process of creating user accounts, you should create a long and complex password. This will help protect your account against attackers and hackers. If the password is weak, it will easily be unlocked by hackers and attack the domain as an administrator.
Set up a long and complex password for an administrator account
Now that you have an account to administer the domain, you should protect the previously designed Administrator account in the fullest sense. Initially, you need to protect the passwords of these accounts. At the very least, create a password of about 15 to 20 characters in length and complexity.
Note that all of these passwords must be very long and use at least 3 character types in each password.
Rename the Administrator account in the first Active Directory domain
This tip is not the most technical thing you can ever hear, but it should be done because it is good for you anyway. Change the name of the default Administrator account to another name. You should use the same format for other user accounts (JohnDoe, GatesBill, SLJackson, .). This will help protect the account by simple and ordinary hackers. Obviously, this does not change the SID for the account, but at least browsing through a list of users will not be easy to identify immediately.
Set password policy in default domain policy (Default Domain Policy)
There have indeed been many articles on how to properly set up a password policy for a domain to reduce the attack surface. Only when those parameters are taken away can your network be vulnerable. However, in Default Domain Policy, password policy settings must be set as shown in Figure 1.
Figure 1
Here are some guidelines for setting up these policies:
Policy setting Minimum value Safety value Minimum password life11 Maximum password life18045 Password minimum length814 + Complexity of Enabled password (Enabled) Enabled (Enabled)
Set up account lockout policy in Default Domain Policy
Account lock policy settings are a much debated topic for a long time. There are two views to this debate. The first view is that the password must be locked if there are 3 or more attempts to enter the password failed. The second view suggests that there should be an unlimited number of attempts to log in, because sometimes they don't remember the password at all.
This type of argument is quite natural because its views are reasonable. The problem with password locking after only a few attempts to block an attacker sometimes also affects the employees themselves .
With a second point of view, arguing for an unlimited number of attempts may allow an attacker to attempt multiple attempts to log into the account by guessing multiple passwords.
From my standpoint, the option to allow a certain number but not infinite for the test will be better and safer. If you follow good password restrictions on complexity and length, the ability to guess a password is nearly impossible, or even use a script to search for it. However, I suggest you set the number of tries to about 100 times before the account is locked.
Figure 2 shows the options for setting up Account Lockout Policy.
Figure 2
Create OU (Organizational Unit) for user accounts
In order for user accounts and their settings on the desktop to be controlled you need to create an OU for user accounts. User accounts (default) are placed in an item named 'Users', and there is absolutely no GPO associated with it.
You not only create an OU for user accounts, but in most cases you will create a hierarchical structure and a structured OU for user accounts. This will allow you to manage which GPO settings affect which user accounts. The ideas for the logical structure of the OU for user accounts with the OUs are given below:
- Offices such as finance, IT, .
- Regions such as the Northeast, Asia, Branch 1, .
- Job Roles such as Manager, Executive, HelpDesk, .
Create OUs for computer accounts
You can also create OUs for computer accounts, for the same reason as user accounts. Here you can look at existing computer types, which can be categorized into the following categories:
- Servers like IIS, Exchange, application, .
- Desktops such as IT, mobile, .
Create a GPO and link to the new OU for computer accounts
To ensure your computers are safe when they are in the domain, you need to have a set of security settings when you join a domain. To do this, you only need to create a GPO and link it to the OU for computer accounts created. The idea for the settings you should have in a GPO includes:
- Activate UAC
- Reset internal admin password
- Control membership of the Administrators group
- Control anonymous connections
- Control of login authentication protocols has been supported
Configure DSN to forward
Most companies need this installation, but not all. However, based on what you have seen in the field, most companies need to target DNS configuration immediately to allow access to the Internet, but also protect DNS that supports Active Directory. To do this, you need to configure DNS to support the Active Directory environment to forward all Internet requests to an Internet-enabled DNS server. This requires the following settings:
- Configure all domain clients to use DNS to support Active Directory
- Configure Active Directory DNS servers to forward requests to outgoing DNS servers.
Rename the entire Administrator account in all domains
You should reset the Administrator account name in the Security Accounts Manager (SAM) internally for each computer (server and desktop) in the domain as well as for each new domain you add to the forest. You can do this through the GPO, shown in Figure 3, which will make your configuration easier and more efficient. In addition, it does not exclude an attack that is looking for a new name, but it will reduce attacks on the system with the default name.
Figure 3
Conclude
Once you have installed Active Directory and are running, you have just started your configuration. To ensure a safe and stable Active Directory, you need to make some settings immediately to get everything configured and secure. You need to target domain administration, including the associated Administrator account and the accounts that will be used to manage Active Directory daily. With user and desktop control in the environment, you need to make settings that allow users to password protect, as well as control desktops and user accounts through Group Policy. If you do this important security after installing Active Directory, it is also good to protect your network and your company.
You should read it
- Instructions for changing Zing ID password and installing 2-layer password
- How to share a secure account without changing the password
- How to Hack a Password Protected Computer Account
- Marvel at how Vietnamese people choose passwords
- How to Remember Passwords
- Top 3 best password management software 2020
- How to Reset a Forgotten Password on Windows
- How to Cancel Bluehost
May be interested
- Network basics: Part 9 - Information about Active Directoryin the last part of this article series, i have talked about active directory and how it works with network domain controllers. in this section, we will continue to introduce it to you
- Restore deleted components in Active Directoryin essence, active directory is a 'massive' database based on a hierarchical architecture, which contains complete information about network systems such as computers, servers, user accounts, and user groups. ... the main purpose of active directory is to provide and ensure the validation of all accounts in the system ...
- How to enable RSAT for Active Directory in Windows 10this tutorial introduces 3 methods to enable active directory in windows 10. to be exact, it is not to activate active directory in windows 10 because you cannot install ad in windows 10. you can only enable rsat for active directory in windows 10 only.
- Prevent deleting data in Windows Server 2003 Active Directoryit can be said that one of the most 'problematic' issues in managing and working with active directory is mistakenly deleting data or objects accidentally or incorrectly handled by users. of course, technically they must have full rights in active directory to be able to perform the deletion of internal objects ...
- Prepare Active Directory for Exchange 2007 (Part 3)in the previous two sections, we took the first necessary action when preparing active directory to receive exchange 2007, which is the process of preparing the legacy exchange permission.
- DNS protection for Windows (Part 2)in the previous section of this article we have introduced you to some basic security concepts about dns. one of the security concepts is integrated dns active directory and establishes a more secure dns environment with dhcp communication.
- Wireless network traffic security - Part 6in this next article, i will show you how to deploy policy servers and how to enroll certificates and register active directory for that server.
- How to check which Domain Controller holds the FSMO role in Active Directorythis tutorial illustrates how to test the fsmo role in server 2016. the 5 fsmo roles in active directory include: rid master, pdc emulator master, infrastructure master, domain naming master, schema master.
- Prepare Active Directory for Exchange 2007 (Part 2)in part one, we went over the first four steps to take to prepare the active directory schema to receive exchange 2007.
- Extend the Active Directory schema capabilities in Exchange Server 2007in this article, i will show you how to extend exchange server 2007's microsoft active directory schema and why active directory schema extensions are necessary.