Figure 1
Here are some guidelines for setting up these policies:
Policy setting Minimum value Safety value Minimum password life11 Maximum password life18045 Password minimum length814 + Complexity of Enabled password (Enabled) Enabled (Enabled)
Set up account lockout policy in Default Domain Policy
Account lock policy settings are a much debated topic for a long time. There are two views to this debate. The first view is that the password must be locked if there are 3 or more attempts to enter the password failed. The second view suggests that there should be an unlimited number of attempts to log in, because sometimes they don't remember the password at all.
This type of argument is quite natural because its views are reasonable. The problem with password locking after only a few attempts to block an attacker sometimes also affects the employees themselves .
With a second point of view, arguing for an unlimited number of attempts may allow an attacker to attempt multiple attempts to log into the account by guessing multiple passwords.
From my standpoint, the option to allow a certain number but not infinite for the test will be better and safer. If you follow good password restrictions on complexity and length, the ability to guess a password is nearly impossible, or even use a script to search for it. However, I suggest you set the number of tries to about 100 times before the account is locked.
Figure 2 shows the options for setting up Account Lockout Policy.
Figure 2
Create OU (Organizational Unit) for user accounts
In order for user accounts and their settings on the desktop to be controlled you need to create an OU for user accounts. User accounts (default) are placed in an item named 'Users', and there is absolutely no GPO associated with it.
You not only create an OU for user accounts, but in most cases you will create a hierarchical structure and a structured OU for user accounts. This will allow you to manage which GPO settings affect which user accounts. The ideas for the logical structure of the OU for user accounts with the OUs are given below:
Create OUs for computer accounts
You can also create OUs for computer accounts, for the same reason as user accounts. Here you can look at existing computer types, which can be categorized into the following categories:
Create a GPO and link to the new OU for computer accounts
To ensure your computers are safe when they are in the domain, you need to have a set of security settings when you join a domain. To do this, you only need to create a GPO and link it to the OU for computer accounts created. The idea for the settings you should have in a GPO includes:
Configure DSN to forward
Most companies need this installation, but not all. However, based on what you have seen in the field, most companies need to target DNS configuration immediately to allow access to the Internet, but also protect DNS that supports Active Directory. To do this, you need to configure DNS to support the Active Directory environment to forward all Internet requests to an Internet-enabled DNS server. This requires the following settings:
Rename the entire Administrator account in all domains
You should reset the Administrator account name in the Security Accounts Manager (SAM) internally for each computer (server and desktop) in the domain as well as for each new domain you add to the forest. You can do this through the GPO, shown in Figure 3, which will make your configuration easier and more efficient. In addition, it does not exclude an attack that is looking for a new name, but it will reduce attacks on the system with the default name.
Figure 3
Conclude
Once you have installed Active Directory and are running, you have just started your configuration. To ensure a safe and stable Active Directory, you need to make some settings immediately to get everything configured and secure. You need to target domain administration, including the associated Administrator account and the accounts that will be used to manage Active Directory daily. With user and desktop control in the environment, you need to make settings that allow users to password protect, as well as control desktops and user accounts through Group Policy. If you do this important security after installing Active Directory, it is also good to protect your network and your company.