Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

2/20/2017
12:00 PM
Derek Melber
Derek Melber
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Controlling Privileged Access To Prevent Rogue Users In Active Directory

Knowing which of your employees have which privileges is the first step to staying safe.

Often, a rogue user is an internal employee who has been granted privileges that he or she shouldn't have. Controlling privileges for your Windows servers, domain controllers, and Active Directory environment is key to limiting what your users can do. The problem is knowing who has privileges and how to restrict those privileges.

But there is a solution! First, you need to report on each area that grants privileged access to ensure the privileges are correct. If they are not correct, simply set the privileges to the appropriate level.

The following is a list of security controls that grant privileges within your Microsoft environment:

  • Group membership (domain admins, enterprise admins, Exchange admins, etc.)
  • User rights (backup files and folders, change system time, system shutdown, etc.)
  • File and folder permissions (access control lists for databases, IP files, etc.)
  • Delegation (Active Directory, Group Policy, etc.)
  • Service access control lists (stop, start, manage) 

To successfully secure your privileged access, have a process and stick to it. Following the steps illustrated in Figure 1 will allow you to get control of privileged access.

1. Report on what security settings are in place. This allows you to make corrections where needed.

2. Analyze the information in the reports that you obtain. Ideally, you should evaluate every area of privileged access to ensure that only the correct users have this level of access to your Windows Servers, domain controllers, and Active Directory.

3. Once you have decided on which security settings to implement, configure them. Usually, Group Policy will be the method to deploy your security controls, but you might also use other Active Directory tools such as Active Directory Users and Computers.

If you stop at just securing your environment, you will never know if anything changes. So, to ensure that a privileged access doesn't change without your knowledge, you need to monitor and alert on changes that occur.

4. Monitor and track all changes that occur to privileged access within your Microsoft environment. This will give you reporting and alerting capabilities.

5. For all of the security settings that can allow vulnerabilities, attacks, and malicious actors to enter your environment, have systems in place to alert you via email when changes to privileges occur.

Once you get control of privileged access for your Windows infrastructure, you will have reduced your attack surface and dramatically increased security for your organization.

Related Content:

Derek Melber is the technical evangelist for ManageEngine, a division of Zoho Corporation. As one of only a handful of Microsoft Group Policy MVPs, Derek helps Active Directory administrators, auditors, and security professionals understand the finer points of how to manage, ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kuingul
50%
50%
kuingul,
User Rank: Apprentice
2/21/2017 | 3:00:32 AM
Cure cause as well as symtopms
Just saying that alerts and reports on important security events that lead to overpriveleging users is a great thing to do and it definitely should be done, but it's a bit of taking care of the symptoms, not the causes.

IMO, it's equally (if not more) important to automate things like user lifecycle management, group membership management and other stuff like that. You can do that in a lot of different ways starting from a buch of PowerShell scripts to fully-featured 3rd party solutions like Adaxes or similar.

That is because most of the overprivileging happens because somebody makes a mistake and adds a user to a wrong group. Automation eliminates such things. It's also cool to add approvals that practically send an alert to an admin or another authority before overprivileging happens rather than after like an alert does.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.