ENSURING THE SECURITY OF CORPORATE USERS ACCOUNTS
DOI:
https://doi.org/10.28925/2663-4023.2023.22.214225Keywords:
network operating system, user accounts, domain controller, user access rights, directory service, server, corporate informationAbstract
Today, the need to protect user accounts of network operating systems is beyond doubt, as unauthorized changes to them in the system can negate the operation of software and hardware tools to protect corporate information. User access rights to the corporation's information resources are established in accordance with the organization's information security policy in order to maintain the confidentiality, integrity and availability of corporate information. With this in mind, the article discusses the rules for creating users accounts for a corporate network and explores ways to ensure their security based on Windows network operating systems. The basic list of rules for creating, assigning and using credentials is defined, namely: setting the maximum restriction of administrative rights for users with administrator rights, providing users and support groups with only those rights that they need to perform their daily tasks, using the organization's domain administrator accounts only to manage domain controllers. An installation file is organized that contains a set of the most common Active Directory (AD) administration utilities. The core of this package is made up of the following utilities: Account Lockout Examiner, Netwrix Auditor, SolarWinds Permissions Analyzer, Active Directory Health Profiler, and Semperis DS Protector. Modeling of AD security diagnostics has shown that using the collected tools in a single installation file greatly simplifies the process of monitoring the AD security status and diagnosing the established user access rights. It has been established that the highest level of security for accounts of privileged users and system administrators using Active Directory is achieved starting with Windows Server 2012 R2, since this OS and later versions implement the functionality of a protected user group, which provides additional protection against compromising their credentials during the authentication procedure.
Downloads
References
S. Reimer, M. Malker Active Directory for Windows Server 2003. Administrator's Guide/Per, with English, 2004.
Джон Мак-Кейб (John McCabe) and Windows Server16 staff. Microsoft Corporation, 2016.
Microsoft Windows Server 2019: Secure Vulnerabilities [Electronic resource]. – 2019. – Access mode: https://www.cvedetails.com/product/50662/Microsoft-Windows-Server-2019.html?vendor_id=26.
Symantec Internet Security Threat Report Volume 2015 [Electronic resource]. – 2015. – Access mode: https://www.slideshare.net/WaqasAmir/symantec-internetsecuritythreatreportvolume 2015social-v2.
Dosal E. How to Find Security Vulnerabilities [Electronic resource] / Eric Dosal – Access mode: https://www.compuquip.com/blog/how-to-find-security-vulnerabilities.
Robert W. Beggs. (2014). Mastering Kali Linux for Advanced Penetration Testing. Published by Packt Publishing Ltd., p. 356. ISBN 978-1-78216-312-1
Mimikatz DCSync Usage, Exploitation, and Detection [Electronic resource] - Access mode: https://adsecurity.org/?p=1729.
Sneaky Active Directory Persistence Tricks [Електронний ресурс] – Режим доступу до ресурсу: https://adsecurity.org/?p=1929.
AD account password policy [Electronic resource] – Access mode: https://mobiz.com.ua/polityka-paroliv-oblikovykh-zapysiv-v-active-directory.html.
Finding Passwords in SYSVOL & Exploiting Group Policy Preferences. [Electronic resource] - Access mode: https://adsecurity.org/?p=2288.
Cracking Kerberos TGS Tickets Using Kerberoast ~ Exploiting Kerberos to Compromisethe Active Directory Domain – [Electronic resource] - Access mode: https://adsecurity.org/?p=2293.
Detecting Kerberoasting Activity [Electronic resource] - Access mode: https://adsecurity.org/2p=3458.
Accidental Sabotage: Beware of CredSSP [Electronic resource] - Access mode: https://www.powershellmagazine.com/2014/03/06/accidental-sabotage-beware-of-credssp/.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Іван Тишик
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.