Active Directory Security

From Glitchdata
Jump to navigation Jump to search
  • Has groups
  • Has Roles
  • RBAC-based

Consider

  • Avenues to Compromise
  • Attractive Accounts for Credential Theft
  • Reducing the Active Directory Attack Surface
  • Implementing Least-Privilege Administrative Models
  • Implementing Secure Administrative Hosts
  • Securing Domain Controllers Against Attack
  • Monitoring Active Directory for Signs of Compromise
  • Audit Policy Recommendations
  • Planning for Compromise
  • Maintaining a More Secure Environment
  • Summary of Best Practices
  • Appendix A: Patch and Vulnerability Management Software
  • Appendix B: Privileged Accounts and Groups in Active Directory
  • Appendix C: Protected Accounts and Groups in Active Directory
  • Appendix D: Securing Built-In Administrator Accounts in Active Directory
  • Appendix E: Securing Enterprise Admins Groups in Active Directory
  • Appendix F: Securing Domain Admins Groups in Active Directory
  • Appendix G: Securing Administrators Groups in Active Directory
  • Appendix H: Securing Local Administrator Accounts and Groups
  • Appendix I: Creating Management Accounts for Protected Accounts and Groups in Active Directory
  • Appendix J: Third-Party RBAC Vendors
  • Appendix K: Third-Party PIM Vendors
  • Appendix L: Events to Monitor
  • Appendix M: Document Links and Recommended Reading


Links