Active Directory Security

Active Directory Security

Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…

  • Home
  • About
  • AD Resources
  • Attack Defense & Detection
  • Contact
  • Mimikatz
  • Presentations
  • Schema Versions
  • Security Resources
  • SPNs
  • Top Posts

Tag: Control Local Administrator Account

Oct 21 2016

Securing Windows Workstations: Developing a Secure Baseline

  • By Sean Metcalf in Microsoft Security, Security Recommendation, Technical Reference

Securing workstations against modern threats is challenging. It seems like every week there’s some new method attackers are using to compromise a system and user credentials. Post updated on March 8th, 2018 with recommended event IDs to audit. The best way to create a secure Windows workstation is to download the Microsoft Security Compliance Manager …

Continue reading

  • AppLocker, block macros, Block macros from running in Office files from the Internet, cmd, Control Local Administrator Account, Control Macros, DHCP option 43 hex 0104.0000.0002, Direct hosting of SMB over TCP/IP, Disable LLMNR, Disable NetBIOS, Disable NetSession Enumeration, Disable PowerShell version 2, Disable SMB 1, Disable Windows Scripting Host (WSH), Disable WPAD, EMET, Group Policy, jscript, KB2871997, KB3177451, Lanman Authentication, LAPS, LLMNR, Microsoft Office Macro Security, Microsoft Office Macros, mimikatz, NetCease, NTLM session security, Office 2013 macro, Office 2016 macro security, Office OLE, OLE, packager.dll, port 445, Responder, RID 500, Secure Windows Workstation, Server Message Block, SMB, Telemetry Dashboard, VBA, VBScript, WDigest, Windows 10 build image, WPAD, wscript
  • 6 comments

Recent Posts

  • Attacking Active Directory Group Managed Service Accounts (GMSAs)
  • From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path
  • What is Azure Active Directory?
  • Slides Posted for Black Hat USA 2019 Talk: Attacking & Defending the Microsoft Cloud
  • AD Reading: Windows Server 2019 Active Directory Features

Trimarc Active Directory Security Services

Have concerns about your Active Directory environment? Trimarc helps enterprises improve their security posture.

Find out how... TrimarcSecurity.com

Popular Posts

  • Attack Methods for Gaining Domain Admin Rights in…
  • PowerShell Encoding & Decoding (Base64)
  • Kerberos & KRBTGT: Active Directory’s…
  • Finding Passwords in SYSVOL & Exploiting Group…
  • Securing Domain Controllers to Improve Active…
  • Securing Windows Workstations: Developing a Secure Baseline
  • Mimikatz DCSync Usage, Exploitation, and Detection
  • Detecting Kerberoasting Activity
  • Scanning for Active Directory Privileges &…
  • The Most Common Active Directory Security Issues and…

Categories

  • ActiveDirectorySecurity
  • Apple Security
  • Cloud Security
  • Continuing Education
  • Entertainment
  • Exploit
  • Hacking
  • Hardware Security
  • Hypervisor Security
  • Linux/Unix Security
  • Malware
  • Microsoft Security
  • Mitigation
  • Network/System Security
  • PowerShell
  • RealWorld
  • Security
  • Security Conference Presentation/Video
  • Security Recommendation
  • Technical Article
  • Technical Reading
  • Technical Reference
  • TheCloud
  • Vulnerability

Tags

ActiveDirectory Active Directory ActiveDirectoryAttack ActiveDirectorySecurity Active Directory Security ADReading ADSecurity AD Security DCSync DEFCON DomainController EMET5 GoldenTicket HyperV Invoke-Mimikatz KB3011780 KDC Kerberos KerberosHacking KRBTGT LAPS LSASS MCM MicrosoftEMET MicrosoftWindows mimikatz MS14068 PassTheHash PowerShell PowerShellCode PowerShellHacking PowerShellv5 PowerSploit Presentation Security SIDHistory SilverTicket SneakyADPersistence SPN TGS TGT Windows10 WindowsServer2008R2 WindowsServer2012 WindowsServer2012R2

Copyright

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned. Content Ownership: All content posted here is intellectual work and under the current law, the poster owns the copyright of the article. Terms of Use Copyright © 2011 - 2020.

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned.

Made with by Graphene Themes.