Latest News

Mobilk.net offered in
العربية

Security Hardening of Windows by Reducing Privileged Access

- Derek Melber, Technical Evangelist, ManageEngine
2016-04-24 - 01:29 GMT


  • Security Hardening of Windows by Reducing Privileged Access

Mobilk - As I tour the world helping Active Directory administrators, security professionals, and auditors secure their Windows environment, I often get questions about privileged access. The questions usually are about how privileges are granted and how an organization can know if its privileges are correct. These are great questions considering the onset of so many attacks on Windows in the past five to seven years. It is important to see that privileged access is usually at the core of these attacks. 

There are many ways to grant privileges in a Windows environment. Granting privileges is rather easy. Reporting and analyzing the current privileged access, however, can be a bit harder. There is no centralized location that shows an administrator or auditor the current privileged access. Understanding the different technologies and features that grant privileged access is the first step. Then, for each area where privileges can be granted, there are five steps that should be taken to ensure ongoing privileged access security. Those steps include:

-Reporting on the current settings

-Analyzing the settings to understand who has privileged access

-Configuring the correct privileged access

-Monitoring for changes to privileged access

-Alerting, in real time, for key privileged access changes

The technologies and features in a Windows environment that grant privileged access include:

-Group membership

-User rights

-Delegation

-Access control lists or permissions

Group Membership

Depending on how the group is configured in the environment, it can have the highest level of privileges or just a few privileges. For example, the Domain Admins group has nearly the highest level of privileges in the entire Active Directory domain. Just adding a user to this group grants this level of privilege. However, the most complex concept with reporting on groups is to get the recursive group members, i.e., the users who are located in nested groups of the main group and who need to be reported as well. 

There are plenty of reporting tools that can get group membership recursively, though. PowerShell by Microsoft and ADManager Plus by ManageEngine are two options. 

User Rights

User rights control global access over different aspects of a domain controller, server, or workstation. User rights are configured using Group Policy, giving granular control of each computer individually. Therefore, each computer could have a unique set of user rights, making the reporting and configuration of these settings difficult and time consuming. 

Everyone Windows computer comes with a built-in tool, secpol.msc, which can report the current user rights on each computer. The tool must be run locally, but it is extremely powerful and gives precise configurations. Since each user right provides some level of privilege over the computer, each and every user right should be evaluated and configured to meet the minimum requirements for server access. 

 

Access Control Lists

Controlling access to files and folders is essential for assuring the security of data within any organization. You need to properly configure the access control lists for your key data and ensure that they only provide access to the appropriate people. The wrong privileges granted to a file or folder could severely hurt, or even destroy, a company. 

Reporting on who has access to a file or folder is a monumental task, due to the volume of files and folders on a typical network. Therefore, selection of the most important data must occur, and then those selected files and folders can be the focus of the security hardening. There are many tools that can help report on data access control lists, but if you do not want to purchase a tool you can always use the built-in xcacls.exe tool, which comes with all Windows computers. 

Delegation

The concept of delegation falls under the category of access control lists, but it is a specific term used for Active Directory and Group Policy management. Due to the complexity of Active Directory delegation, the configuration of the delegation is typically done through the Delegate Control Wizard. This wizard is located on the drop down menu for the domain node for each Organizational Unit in the Active Directory Users and Computers tool. The wizard defines which account (user or group) is granted a specific task. The most common tasks are resetting passwords for users and modifying group membership, both of which have a potential impressive security impact if the wrong account is granted the delegation. 

The Delegate Control Wizard can only configure the delegations—it can’t report or remove delegations. Therefore, a different tool must be used for each task. The built-in dsacls.exe tool is ideal for reporting on delegations for each Active Directory node. As for modifications to existing delegations, that is typically left up to manual efforts performed on the Security tab located on the objects Property page. 

Summary

Assuring that privileged access is understood, configured properly, and monitored is a huge step towards hardening the security of your Windows environment. Without the correct reports, configurations, or monitoring, it is impossible to know what privileges are granted. Beyond that, without the knowledge of privileged access, you are leaving your organization open for an easy attack. However, with the correct tools in place to monitor and alert on changes to correct privileged access, there is little that can sneak by you if an attack occurs. 

 







    Related News


Reports and Studies

China Telecom Global Limited (CTG), the world-leading provider of integrated telecommunication services, has signed a strategic subsea capacity and..


Reports and Studies

Espoo, Finland – Nokia, Qualcomm Technologies, Inc., and T-Mobile today announced that they have achieved a worlds first showcase of successfully..


Reports and Studies

Steven Yi, President of Huawei Middle East and Central Asia, gave a keynote on the second day of LEAP, Saudi Arabias largest and most comprehensive..

   Comments

Reports and Studies
Latest News

    New Phones


Galaxy A54
Samsung
White, Green, Purple, Black
Triple 50

Galaxy A34
Samsung
Green, Black, Silver
Triple 48

Galaxy S23 Ultra
Samsung
Black, Green, Lavender, Cream
Quad 200



© 2025 Mobilk.net All rights reserved.
© 2025 Mobilk.net All rights reserved.
Powered By DevelopWay