egia.com - Healthcheck analysis

Date: 2024-07-17 - Engine version: 3.2.0.1

This report has been generated with the Auditor Edition of PingCastle ?.

This section focuses on the core security indicators.
Locate the sub-process determining the score and fix some rules in that area to get a score improvement.

Indicators

050100

Domain Risk Level: 100 / 100

It is the maximum score of the 4 indicators and one score cannot be higher than 100. The lower the better

050100

Stale Object : 100 /100

It is about operations related to user or computer objects

16 rules matched

050100

Trusts : 0 /100

It is about connections between two Active Directories

0 rules matched

050100

Privileged Accounts : 100 /100

It is about administrators of the Active Directory

12 rules matched

050100

Anomalies : 100 /100

It is about specific security control points

20 rules matched

Stale ObjectsPrivileged accountsTrustsAnomalies
Inactive user or computer
Account take over
Old trust protocol
Audit
Network topography
ACL Check
SID Filtering
Backup
Object configuration
Admin control
SIDHistory
Certificate take over
Obsolete OS
Control paths
Trust impermeability
Golden ticket
Old authentication protocols
Delegation Check
Trust inactive
Local group vulnerability
Provisioning
Irreversible change
Trust with Azure
Network sniffing
Replication
Privilege control
Pass-the-credential
Vulnerability management
Read-Only Domain Controllers
Password retrieval
Reconnaissance
Temporary admins
Weak password
Legend:
  score is 0 - no risk identified but some improvements detected
  score between 1 and 10 - a few actions have been identified
  score between 10 and 30 - rules should be looked with attention
  score higher than 30 - major risks identified

This section represents the maturity score (inspired from ANSSI).

Maturity Level:

12345

Maturity levels:

  • 1 Critical weaknesses and misconfigurations pose an immediate threat to all hosted resources. Corrective actions should be taken as soon as possible;
  • 2 Configuration and management weaknesses put all hosted resources at risk of a short-term compromise. Corrective actions should be carefully planned and implemented shortly;
  • 3 The Active Directory infrastructure does not appear to have been weakened from what default installation settings provide;
  • 4 The Active Directory infrastructure exhibits an enhanced level of security and management;
  • 5 The Active Directory infrastructure correctly implements the latest state-of-the-art administrative model and security features.
Level 1

6 rule(s) matched

Level 2

12 rule(s) matched

Level 3

22 rule(s) matched

Level 4

7 rule(s) matched

Level 5

1 rule(s) matched

To reach Level 2 you need to fix the following rules:

+ 20 Point(s)

Check if admin accounts are vulnerable to the Kerberoast attack.

Rule ID:

P-Kerberoasting

Description:

The purpose is to ensure that the password of admin accounts cannot be retrieved using the Kerberoast attack.

Technical explanation:

To access a service using Kerberos, a user requests a ticket (named TGS) to the DC specific to the service.
This ticket is encrypted using a derivative of the service password, but can be brute-forced to retrieve the original password.
Any account having the attribute SPN populated is considered as a service account.
Given that any user can request a ticket for a service account, these accounts can have their password retrieved.
In addition, services are known to have their password not changed at a regular basis and to use well-known words.

Please note that this program ignores service accounts that had their password changed in the last 40 days ago to support using password rotation as a mitigation.

Advised solution:

If the account is a service account, the service should be removed from the privileged group or have a process to change its password at a regular basis.
If the user is a person, the SPN attribute of the account should be removed.

Points:

5 points per discovery

Documentation:

https://adsecurity.org/?p=3466
[FR]ANSSI - Privileged accounts with SPN (vuln1_spn_priv)1
[MITRE]T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting

Details:

The detail can be found in Admin Groups

GroupUser
Administrators Administrator
Domain Administrators Administrator
Enterprise Administrators Administrator
Schema Administrators Administrator
+ 15 Point(s)

Check if Service Accounts (aka accounts with never expiring password) are domain administrators

Rule ID:

P-ServiceDomainAdmin

Description:

The purpose is to check for accounts with non-expiring passwords in the "Domain Administrator" group

Technical explanation:

PingCastle is checking accounts with never expiring password, that are mostly used as service accounts.
"Service Accounts" can imply a high security risk as their password are stored in clear text in the LSA database, which can then be easily exploited using Mimikatz or Cain&Abel for instance. In addition, their passwords don't change and can be used in Kerberoast attacks.

Advised solution:

Accounts with never expiring passwords are mostly service accounts.
To mitigate the security risk, it is strongly advised to lower the privileges of the "Service Accounts", meaning that they should be removed from the "Domain Administrator" group, while ensuring that the password of each and every "Service Account" is longer than 20 characters

Points:

15 points if the occurence is greater than or equals than 2

Documentation:

[FR]ANSSI - Privileged accounts with never-expiring passwords (vuln1_dont_expire_priv)1
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R11 [subsection.2.5]
[US]STIG V-36432 - Membership to the Domain Admins group must be restricted to accounts used only to manage the Active Directory domain and domain controllers.
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[MITRE]T1003.004 OS Credential Dumping: LSA Secrets

Details:

The detail can be found in Admin Groups

+ 10 Point(s)

Inactive account check

Rule ID:

S-Inactive

Description:

The purpose is to ensure that there are as few inactive accounts as possible within the domain. Stale user accounts are a significant security issue, as former employees and external attackers could use those accounts to attack the organization.

Technical explanation:

Inactive accounts often stay in the network because of weaknesses in the decommissioning process. These stale computer accounts can be used as backdoors and therefore represents a possible security breach.

Advised solution:

To mitigate the risk, you should monitor the number of inactive accounts and reduce it as much as possible. A list of all inactive accounts is obtainable through the command: Search-ADAccount –AccountInActive –UsersOnly –TimeSpan 180:00:00:00 –ResultPageSize 2000 –ResultSetSize $null | ?{$_.Enabled –eq $True} | Select-Object Name, SamAccountName, DistinguishedName.

Points:

10 points if the occurence is greater than or equals than 25

Documentation:

[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R45 [paragraph.3.6.6.2]
[FR]ANSSI - Dormant accounts (vuln1_user_accounts_dormant)1

Details:

The detail can be found in User information and Computer information

+ 10 Point(s)

Check if all admin passwords are changed on the field.

Rule ID:

P-AdminPwdTooOld

Description:

The purpose is to ensure that all admins are changing their passwords at least every 3 years

Technical explanation:

This rule ensure that passwords of administrator are well managed.

Advised solution:

We advised to read the ANSSI guidelines about this, which is quoted in the documentation section below.

Points:

10 points if present

Documentation:

[FR]ANSSI - Privileged account passwords age too old (vuln1_password_change_priv)1
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:

The detail can be found in Admin Groups

AccountCreationLastChanged
itsonicwall 2019-08-01 23:45:55Z 2019-08-01 16:45:55Z
BCMBackup 2012-11-27 22:16:25Z 2012-11-27 14:16:25Z
nkahal 2010-12-20 04:57:36Z 2011-12-26 12:25:15Z
rmehra 2012-07-11 06:02:30Z 2013-01-17 21:51:15Z
VipreService 2011-01-20 19:58:42Z 2011-06-27 23:55:45Z
saccount 2010-11-21 21:35:59Z 2010-11-21 13:35:59Z
pmanager 2010-11-21 21:28:03Z 2010-11-21 13:28:03Z
vmadmin 2016-08-23 21:50:09Z 2016-08-23 14:50:09Z
tle 2010-08-23 15:26:48Z 2012-11-28 15:21:13Z
tpiper 2007-04-19 15:08:14Z 2015-08-07 10:50:09Z
Consultant 2002-09-17 17:27:04Z 2010-11-21 13:30:35Z
devteamvpn 2018-03-09 20:54:37Z 2021-02-07 19:25:13Z
jvaladez 2013-05-20 13:55:31Z 2020-06-17 17:00:36Z
gpotest 2016-10-25 17:51:34Z 2016-10-28 14:29:32Z
ccramer 2014-07-25 20:03:05Z 2020-02-14 06:02:29Z
ejavaid 2010-12-02 14:38:38Z 2011-12-08 16:17:21Z
sharyl 2017-01-16 22:49:14Z 2017-03-01 14:32:43Z
spiceworks 2016-09-22 16:51:38Z 2016-10-11 06:12:25Z
itsupport 2016-09-20 19:02:53Z 2017-01-19 15:58:36Z
bkagent 2002-05-07 14:37:57Z 2002-09-26 15:32:26Z
Arcserve 2001-10-06 18:33:48Z 2001-01-19 11:20:31Z
Administrator 2001-10-06 18:33:47Z 2015-04-08 09:31:00Z
techadmin 2019-05-31 17:04:45Z 2019-05-31 10:04:45Z
sonicwalladmin 2017-07-13 17:08:10Z 2017-07-13 10:08:10Z
mtech 2019-03-19 20:55:34Z 2020-06-15 16:25:19Z
fssa 2016-11-15 18:46:41Z 2016-11-15 10:46:41Z
+ 5 Point(s)

Obsolete Domain Controller (Windows Server 2008)

Rule ID:

S-DC-2008

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2008 as Domain Controller within the domain

Technical explanation:

The OS Windows Server 2008 is not supported anymore by Microsoft (except when migrated to Azure, until January 9, 2024) and any vulnerability found will not be patched.

Advised solution:

To resolve this security risk, the only way is to decommission DCs running Windows Server 2008 OS, in order to use new versions that are more secure and that are still being patched regarding new security threats

Points:

5 points if present

Documentation:

https://support.microsoft.com/en-us/help/4456235/end-of-support-for-windows-server-2008-and-windows-server-2008-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[US]STIG V-8551 - The domain functional level must be at a Windows Server version still supported by Microsoft.
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R12 [subsection.3.1]

Details:

The operating system of domain controllers can be found in Domain controllers

+ 5 Point(s)

Check for certificates using a weak signing algorithm (RSA under 1024 bits)

Rule ID:

A-WeakRSARootCert

Description:

The purpose is to ensure that there is no use of a certificate using a weak RSA key

Technical explanation:

A RSA key certificate with a modulus under 1024 bits is considered unsafe

Advised solution:

To solve the matter, the certificate should be removed from the GPO and if needed, certificates depending on it should be reissued.

Points:

5 points if present

Documentation:

https://www.iad.gov/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/commercial-national-security-algorithm-suite-factsheet.cfm
https://www.ssi.gouv.fr/guide/cryptographie-les-regles-du-rgs/
[MITRE]T1600.001 Weaken Encryption: Reduce Key Space
[US]STIG V-14820 - PKI certificates (server and clients) must be issued by the DoD PKI or an approved External Certificate Authority (ECA).
[FR]ANSSI - Weak or vulnerable certificates (vuln1_certificates_vuln)1

Details:

The detail can be found in Certificates

SourceSubjectModuleExpires
NTLMStore CN=EGIA, OU=IS, O=Electric and Gas Industries Associates, L=San Leandro, S=CA, C=US, E=cert-auth-root@egia.com 512 11/2/2003 2:44:17 PM

To reach Level 3 you need to fix the following rules:

+ 50 Point(s)

Mitigate golden ticket attack via a regular change of the krbtgt password

Rule ID:

A-Krbtgt

Description:

The purpose is to alert when the password for the krbtgt account can be used to compromise the whole domain. This password can be used to sign every Kerberos ticket. Monitoring it closely often mitigates the risk of golden ticket attacks greatly.

Technical explanation:

Kerberos is an authentication protocol. It is using a secret, stored as the password of the krbtgt account, to sign its tickets. If the hash of the password of the krbtgt account is retrieved, it can be used to generate authentication tickets at will.
To mitigate this attack, it is recommended to change the krbtgt password between 40 days and 6 months. If this is not the case, every backup done until the last password change of the krbtgt account can be used to emit Golden tickets, compromising the entire domain.
Retrieval of this secret is one of the highest priority in an attack, as this password is rarely changed and offer a long term backdoor.
Also this attack can be performed using the former password of the krbtgt account. That's why the krbtgt password should be changed twice to invalidate its leak.

Advised solution:

The password of the krbtgt account should be changed twice to invalidate the golden ticket attack.
Beware: two changes of the krbtgt password not replicated to domain controllers can break these domain controllers You should wait at least 10 hours between each krbtgt password change (this is the duration of a ticket life).

There are several possibilities to change the krbtgt password.
First, a Microsoft script can be run in order to guarantee the correct replication of these secrets.
Second, a more manual way is to essentially reset the password manually once, then to wait 3 days (this is a replication safety delay), then to reset it again. This is the safest way as it ensures the password is no longer usable by the Golden ticket attack.

Points:

50 points if the occurence is greater than or equals than 1464
then 40 points if the occurence is greater than or equals than 1098
then 30 points if the occurence is greater than or equals than 732
then 20 points if the occurence is greater than or equals than 366

Documentation:

https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/faqs-from-the-field-on-krbtgt-reset/ba-p/2367838
https://github.com/microsoft/New-KrbtgtKeys.ps1
https://github.com/PSSecTools/Krbtgt
[FR]ANSSI CERTFR-2014-ACT-032
[FR]ANSSI - Krbtgt account password unchanged for more than a year (vuln2_krbtgt)2
[MITRE]T1558.001 Steal or Forge Kerberos Tickets: Golden Ticket

Details:

The detail can be found in Krbtgt

+ 15 Point(s)

Ensure that the NTLMv1 and old LM protocols are banned

Rule ID:

S-OldNtlm

Description:

The purpose is to check if NTLMv1 or LM can be used by DC

Technical explanation:

NTLMv1 is an old protocol which is known to be vulnerable to cryptographic attacks.
It is typically used when a hacker sniffs the network and tries to retrieve NTLM hashes which can then be used to impersonate users.

This attack can be combined with coerced authentication attacks - a hacker forces the DC to connect to a controlled host.
In this case, NTLMv1 can be specified so the hacker can retrieve the NTLM hash of the DC, impersonates it and then take control of the domain.
This attack is still possible with NTLMv2 but this is more difficult.

Windows has default security settings regarding LM/NTLM. Windows XP: Send LM & NTLM responses, Windows Server 2003: Send NTLM response only, Vista/2008: Win7/2008 R2: Send NTLMv2 response only.

However Domain Controllers have relaxed default settings to accept the connection of older operating systems.
That means that by default, NTLMv1 is accepted on domain controllers.
If no GPO defines the LAN Manager Authentication Level, the DC fall back to the non secure default.

Advised solution:

After an audit of NTLMv1 usage (see the links below), you need to raise the LAN Manager Authentication Level to "Send NTLMv2 response only. Refuse LM & NTLM".
This can be done by editing the policy "Network security: LAN Manager authentication level" which can be accessed in Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
The policy will be applied after a computer reboot.

Beware that you may break software which is not compatible with Ntlmv2 such as very old Linux stacks or very old Windows before Windows Vista.
But please note that Ntlmv2 can be activited on all Windows starting Windows 95 and other operating systems.

Points:

15 points if present

Documentation:

https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/audit-domain-controller-ntlmv1
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level
https://learn.microsoft.com/en-us/troubleshoot/windows-client/windows-security/enable-ntlm-2-authentication
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R37 [paragraph.3.6.2.1]

Details:

The detail can be found in Security settings

GPOValue
Windows default without an active GPO 3
+ 15 Point(s)

Check the use of Kerberos with weak encryption (DES algorithm)

Rule ID:

S-DesEnabled

Description:

The purpose is to verify that no weak encryption algorithm such as DES is used for accounts.

Technical explanation:

DES is a very weak algorithm and once assigned to an account, it can be used in Kerberos ticket requests, even though it is easily cracked. If the attacker cracks the Kerberos ticket, they can steal the token and compromise the user account.

Advised solution:

It is recommended to disable DES as an encryption algorithm in the user configuration dialog or in the "msDSSupportedEncryptionTypes" attribute at LDAP level. It has to be disabled in the property of an account by unchecking the box "Use Kerberos DES encryption for this account". You can also detect which accounts support Kerberos DES encryption by running: Get-ADObject -Filter {UserAccountControl -band 0x200000 -or msDs-supportedEncryptionTypes -band 3}.

Points:

15 points if present

Documentation:

https://docs.microsoft.com/en-us/archive/blogs/openspecification/msds-supportedencryptiontypes-episode-1-computer-accounts
https://docs.microsoft.com/en-us/services-hub/health/remediation-steps-ad/remove-the-highly-insecure-des-encryption-from-user-accounts
[FR]ANSSI - Use of Kerberos with weak encryption (vuln2_kerberos_properties_deskey)2
[MITRE]T1558.004 Steal or Forge Kerberos Tickets: AS-REP Roasting

Details:

The detail can be found in User information and Computer information

+ 10 Point(s)

Vulnerable Schema Class check

Rule ID:

S-ADRegistrationSchema

Description:

The purpose is to ensure that no schema class can be used to create arbitrary objects

Technical explanation:

The classes added to the schema provide additional object types. If misconfigured, a class can be used to bypass a security restriction.
For the vulnerability PossSuperiorComputer:
A class has the attribute possSuperiors containing the class "computer" and this class inherits from "container".
That means that every computer can request this class to be added.
Once this class has been added, it can be used as a container to create additional users or computers without restrictions.

For the vulnerability PossSuperiorUser:
It is the same vulnerability as PossSuperiorComputer but with the "user" class instead of the "computer" class.

Advised solution:

For PossSuperiorComputer:
You have to edit the schema to change the value of the attribute possSuperior and remove the "computer" value.
A PowerShell script in the documentation provides a fix.

For PossSuperiorUser:
You have to edit the schema to change the value of the attribute possSuperior and remove the "user" value.
A PowerShell script in the documentation provides a fix.

Also the class msExchStorageGroup is known to have this vulnerability via the CVE-2021-34470.
In this case, the vulnerability is exploitable even if Exchange has been uninstalled.

Points:

10 points if present

Documentation:


https://bugs.chromium.org/p/project-zero/issues/detail?id=2186
https://gist.github.com/IISResetMe/399a75cfccabc1a17d0cc3b5ae29f3aa#file-update-msexchstoragegroupschema-ps1
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34470
[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Schema class allowing dangerous object creation (vuln2_warning_schema_posssuperiors)2

Details:
ClassVulnerability
msExchStorageGroup PossSuperiorComputer
+ 10 Point(s)

Obsolete OS (Windows 10 or Windows 11)

Rule ID:

S-OS-W10

Description:

The purpose is to ensure that there is no use of non-supported version of Windows 10 or Windows 11 within the domain

Technical explanation:

Some versions of Windows 10 and Windows 11 OS are no longer supported, and may be vulnerable to exploits that are not patched anymore.

Advised solution:

In order to solve this security issue, you should upgrade all the Windows 10 or Windows 11 to a more recent version.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows 1*"}

Points:

15 points if the occurence is greater than or equals than 15
then 10 points if the occurence is greater than or equals than 6
then 5 points if present

Documentation:

https://docs.microsoft.com/en-us/windows/release-health/release-information
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

VersionNumberActive
Windows 10 1507 1 0
Windows 10 1703 3 0
Windows 10 1709 4 0
Windows 10 1803 9 0
Windows 10 1809 8 0
Windows 10 1511 1 0
Windows 10 1903 9 0
Windows 10 1909 6 0
Windows 10 2004 9 0
Windows 10 20H2 11 0
Windows 10 21H1 14 0
Windows 10 21H2 16 1
+ 10 Point(s)

Ensure that the Print Spooler service cannot be abused to get the DC credentials

Rule ID:

A-DC-Spooler

Description:

The purpose is to ensure that credentials cannot be extracted from the DC via its Print Spooler service

Technical explanation:

When there's an account with unconstrained delegation configured (which is fairly common) and the Print Spooler service running on a computer, you can get that computers credentials sent to the system with unconstrained delegation as a user. With a domain controller, the TGT of the DC can be extracted allowing an attacker to reuse it with a DCSync attack and obtain all user hashes and impersonate them.

Advised solution:

The Print Spooler service should be deactivated on domain controllers. Please note as a consequence that the Printer Pruning functionality (rarely used) will be unavailable.

Points:

10 points if present

Documentation:

https://adsecurity.org/?p=4056
https://www.slideshare.net/harmj0y/derbycon-the-unintended-risks-of-trusting-active-directory
[MITRE]T1187 Forced Authentication

Details:

The detail can be found in Domain controllers

Domain controller
EGIADC01W
EGIADC01
+ 5 Point(s)

Hardened Paths weakness

Rule ID:

A-HardenedPaths

Description:

The purpose is to ensure that there is no weakness related to hardened paths

Technical explanation:

Two vulnerabilities have been reported in 2015 (MS15-011 and MS15-014) which allows a domain takeover via GPO modifications done with a man-in-the-middle attack.
To mitigate these vulnerabilites, Microsoft has designed a workaround named "Hardened Paths". It forces connection settings to enforce Integrity, Mutual Authentication or Privacy.
By default if this policy is empty, if will enforce Integrity and Mutual Authentication on the SYSVOL or NETLOGON shares.
This rule checks if there have been any overwrite to disable this protection.

Advised solution:

You have to edit the Hardened Path section in the GPO.
This section is located in Computer Configuration/Policies/Administrative Templates/Network/Network Provider.
Check each value reported here and make sure that entries containing SYSVOL or NETLOGON have RequireIntegrity and RequireMutualAuthentication set to 1.
In addition to that, check entries having the pattern \\DCName\* and apply the same solution.

Points:

5 points if present

Documentation:


https://labs.f-secure.com/archive/how-to-own-any-windows-network-with-group-policy-hijacking-attacks/
https://talubu.wordpress.com/2018/02/28/configuring-unc-hardened-access-through-group-policy/
https://adsecurity.org/?p=1405
https://support.microsoft.com/en-us/topic/ms15-011-vulnerability-in-group-policy-could-allow-remote-code-execution-february-10-2015-91b4bda2-945d-455b-ebbb-01d1ec191328
[US]STIG V-63577 - Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Details:

The detail can be found in the Hardened Paths configuration section.

GPOKeyRequireIntegrityRequireMutualAuthenticationRequirePrivacy
No GPO Found NETLOGON Not Set Not Set Not Set
No GPO Found SYSVOL Not Set Not Set Not Set
+ 5 Point(s)

Check for Windows 2000 compatibility which allows access to the domain without any account

Rule ID:

A-PreWin2000Anonymous

Description:

The purpose is to identify domains which allow access without any account because of a Pre-Windows 2000 compatibility

Technical explanation:

When a Windows Server 2003 DC is promoted, a pre-Windows 2000 compatibility setting can be enabled through the wizard. If it is enabled, the wizard will add "Everyone" and "Anonymous" to the pre-Windows 2000 compatible access group, and by doing so, it will authorize the domain to be queried without an account (null session)
It is possible to verify the results provided by the PingCastle solution by using a Kali distribution. You should run [rpcclient -U " target_ip_address] and press enter at the password prompt to finally type [enumdomusers].

Advised solution:

Remove the "Everyone" and "Anonymous" from the PreWin2000 group while making sure that the group "Authenticated Users" is present, then reboot each DC.
Note: removing the group "Authenticated Users" (and not keep it like advised here) is an advanced recommendation quoted in the rule A-PreWin2000AuthenticatedUsers

Points:

5 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
[MITRE]T1110.003 Brute Force: Password Spraying
[US]STIG V-8547 - The Anonymous Logon and Everyone groups must not be members of the Pre-Windows 2000 Compatible Access group.
[FR]ANSSI - The "Pre - Windows 2000 Compatible Access" group includes "Anonymous" (vuln2_compatible_2000_anonymous)2

+ 5 Point(s)

Obsolete OS (Windows Server 2008)

Rule ID:

S-OS-2008

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2008 for the workstations within the domain

Technical explanation:

The Windows Server 2008 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.

Advised solution:

In order to solve this security issue, you should upgrade all the servers to a more recent version of Windows, starting from Windows Server 2012.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

15 points if the occurence is greater than or equals than 15
then 10 points if the occurence is greater than or equals than 6
then 5 points if present

Documentation:

https://support.microsoft.com/en-us/help/4456235/end-of-support-for-windows-server-2008-and-windows-server-2008-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

+ 2 Point(s)

Obsolete OS (Windows Server 2012)

Rule ID:

S-OS-2012

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2012 for the workstations within the domain

Technical explanation:

The Windows Server 2012 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.

Advised solution:

In order to solve this security issue, you should upgrade all the servers to a more recent version of Windows, starting from Windows Server 2012.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

10 points if the occurence is greater than or equals than 15
then 5 points if the occurence is greater than or equals than 6
then 2 points if present

Documentation:

https://learn.microsoft.com/fr-fr/lifecycle/products/windows-server-2012-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

+ 1 Point(s)

Obsolete OS (Windows 7)

Rule ID:

S-OS-Win7

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows 7 for the workstations within the domain

Technical explanation:

The Windows 7 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.
PingCastle is trying to guess if Extended Security Support (ESU) has been purchased from Microsoft. Based on the documentation referenced below, the program checks if the script Activate-ProductOnline.ps1 is present.
If the script is detected, Windows 7 is considered as supported and this rule is not triggered.

Advised solution:

In order to solve this security issue, you should upgrade all the workstations to a more recent version of Windows, starting from Windows 10.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

5 points if the occurence is greater than or equals than 15
then 2 points if the occurence is greater than or equals than 6
then 1 points if present

Documentation:

https://techcommunity.microsoft.com/t5/windows-it-pro-blog/activate-windows-7-esus-on-multiple-devices-with-a-mak/ba-p/1167196
[FR]ANSSI CERTFR-2005-INF-003
[MITRE]Mitre Att&ck - Mitigation - Update Software

Details:

The detail can be found in Operating Systems

+ 1 Point(s)

Check that there is no account with never-expiring passwords

Rule ID:

S-PwdNeverExpires

Description:

The purpose is to ensure that every account has a password which is compliant with password expiration policies

Technical explanation:

Some accounts have passwords which never expire. Should an attacker compromise one of these accounts, he would be able to maintain long-term access to the Active Directory domain.

We have noted that some Linux servers, domain joined, are configured with a password which never expires.
This is a misconfiguration because a password change can be configured. It was however not the default on some plateform.
See one of the link below for more information.

Advised solution:

In order to make Active Directory enforce periodic password change, accounts must not have the "Password never expires" flag set in the "Account" tab of the user properties. Their passwords should then be rolled immediately.
For services accounts, Windows provide the "managed service accounts" and "group managed service accounts" features to facilite the automatic change of passwords.
Please note that there is a document in the section below which references solutions for service accounts of well known products.
Also Linux servers should be configured with automatic machine account change.

Points:

1 points if present

Documentation:

https://adsecurity.org/?p=4115
https://access.redhat.com/discussions/1283873
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration
[FR]ANSSI - Accounts with never-expiring passwords (vuln2_dont_expire)2

Details:

The detail can be found in User information

To reach Level 4 you need to fix the following rules:

+ 30 Point(s)

Check for inactive administrator accounts

Rule ID:

P-Inactive

Description:

The purpose is to ensure that all Administrator Accounts in the AD are necessary and used

Technical explanation:

Accounts within the AD have attributes indicating the creation date of the account and the last login of this account. Accounts which haven't have a login since 6 months or created more than 6 months ago without any login are considered inactive. If an Administrator Account is set as inactive, the reason for having Administrator rights should be strongly justified.

Advised solution:

To correct the situation, you should make sure that all your Administrator Account(s) are "Active", meaning that you should remove Administrator rights if an account is set as not "Active"

Points:

30 points if the occurence is greater than or equals than 30
then 20 points if the occurence is greater than or equals than 15

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R36 [subsection.3.6]

+ 30 Point(s)

Inactive computer check

Rule ID:

S-C-Inactive

Description:

The purpose is to ensure that there are as few inactive computers as possible within the domain.

Technical explanation:

Inactive computers often stay in the network because of weaknesses in the decommissioning process. These stale computer accounts can be used as backdoors and therefore represents a possible security breach.

Advised solution:

To mitigate the risk, you should monitor the number of inactive accounts and reduce it as much as possible. A list of all inactive accounts is obtainable through the command: Search-ADAccount –AccountInActive –ComputersOnly –TimeSpan 180:00:00:00 –ResultPageSize 2000 –ResultSetSize $null | ?{$_.Enabled –eq $True} | Select-Object Name, SamAccountName, DistinguishedName.

Points:

30 points if the occurence is greater than or equals than 30
then 10 points if the occurence is greater than or equals than 20
then 5 points if the occurence is greater than or equals than 15

Documentation:

[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R45 [paragraph.3.6.6.2]
[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Inactive servers (vuln3_password_change_inactive_servers)3

+ 20 Point(s)

At least one administrator account can be delegated

Rule ID:

P-Delegated

Description:

The purpose is to ensure that all Administrator Accounts have the configuration flag "this account is sensitive and cannot be delegated" (or are members of the built-in group "Protected Users" when your domain functional level is at least Windows Server 2012 R2).

Technical explanation:

Without the flag "This account is sensitive and cannot be delegated" any account can be impersonated by some service account. It is a best practice to enforce this flag on administrators accounts.

Advised solution:

To correct the situation, you should make sure that all your Administrator Accounts have the check-box "This account is sensitive and cannot be delegated" active or add your Administrator Accounts to the built-in group "Protected Users" if your domain functional level is at least Windows Server 2012 R2 (some functionalities may not work properly afterwards, you should check the official documentation).
If you want to enable the check-box "This account is sensitive and cannot be delegated" but this is not possible because the box is not present (typically for GMSA accounts), you can add the flag manually by adding the number 1048576 to the attribute useraccountcontrol of the account.
Please note that there is a section below in this report named "Admin Groups" which gives more information.

Points:

20 points if present

Documentation:

[US]STIG V-36435 - Delegation of privileged accounts must be prohibited.
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in Admin Groups

+ 15 Point(s)

Check for hidden group membership for user accounts

Rule ID:

S-PrimaryGroup

Description:

The purpose is to check for unusual values in the primarygroupid attribute used to store group memberships

Technical explanation:

In Active Directory, group membership is stored on the "members" attribute and on the "primarygroupid" attribute. The default primary group value is "Domain Users" for the users, "Domain Computers" for the computers and "Domain Controllers" for the domain controllers. The primarygroupid contains the RID (last digits of a SID) of the group targeted. It can be used to store hidden membership as this attribute is not often analyzed.

Advised solution:

Unless strongly justified, change the primary group id to its default: 513 or 514 for users, 516 or 521 for domain controllers, 514 or 515 for computers. The primary group can be edited in a friendly manner by editing the account with the "Active Directory Users and Computers" and after selecting the "Member Of" tab, "set primary group".
You can use the following script to list Users with a primary group id different from domain users:
$DomainUsersSid = New-Object System.Security.Principal.SecurityIdentifier ([System.Security.Principal.WellKnownSidType]::AccountDomainUsersSid,(Get-ADDomain).DomainSID)

Get-ADUser -Filter * -Properties PrimaryGroup | Where-Object { $_.PrimaryGroup -ne (Get-ADGroup -Filter {SID -eq $DomainUsersSid} ).DistinguishedName } | Select-Object UserPrincipalName,PrimaryGroup

Points:

15 points if present

Documentation:

[FR]ANSSI - Accounts with modified PrimaryGroupID (vuln3_primary_group_id_nochange)3
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in User information and Computer information

+ 15 Point(s)

Check for suspicious account(s) used in administrator activities

Rule ID:

A-AdminSDHolder

Description:

The purpose is to ensure that there are no rogue admin accounts in the Active Directory

Technical explanation:

A check is performed on non-admin accounts in order to identify if they have an attribute admincount set. If they have this attribute, it means that this account, which is not supposed to be admin, has been granted administrator rights in the past. This typically happens when an administrator gives temporary rights to a normal account, off process.

Advised solution:

These accounts should be reviewed, especially in regards with their past activities and have the admincount attribute removed. In order to identify which accounts are detected by this rule, we advise to run a PowerShell command that will show you all users having this flag set: get-adobject -ldapfilter "(admincount=1)"
Do not forget to look at the section AdminSDHolder below.

Points:

50 points if the occurence is greater than or equals than 50
then 45 points if the occurence is greater than or equals than 45
then 40 points if the occurence is greater than or equals than 40
then 35 points if the occurence is greater than or equals than 35
then 30 points if the occurence is greater than or equals than 30
then 25 points if the occurence is greater than or equals than 25
then 20 points if the occurence is greater than or equals than 20
then 15 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/ms675212(v=vs.85).aspx
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R40 [paragraph.3.6.3.1]

Details:

The detail can be found in the AdminSDHolder User List

+ 15 Point(s)

Check if the LAPS tool to handle the native local administrator passwords is installed

Rule ID:

A-LAPS-Not-Installed

Description:

The purpose is to make sure that there is a proper password policy in place for the native local administrator account.

Technical explanation:

LAPS (Local Administrator Password Solution) is the advised solution to handle passwords for the native local administrator account on all workstations, as it is a simple way to handle most of the subject.

Advised solution:

If you don't have any provisioning process or password solution to manage local administrators, you should install the LAPS solution. If you mitigate the risk differently, you should add this rule as an exception, as the risk is covered.

Points:

15 points if present

Documentation:

https://www.microsoft.com/en-us/download/details.aspx?id=46899
[US]STIG V-36438 - Local administrator accounts on domain systems must not share the same password.
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI CERTFR-2015-ACT-046
[MITRE]T1078.003 Valid Accounts: Local Accounts

Details:

The detail can be found in LAPS

+ 15 Point(s)

Check for the last backup date according to Microsoft standard

Rule ID:

A-BackupMetadata

Description:

The purpose is to check if the backups are actually up to date in case they are needed. The alert can be triggered when a domain is backed up using non-recommended methods

Technical explanation:

A verification is done on the backups, ensuring that the backup is performed according to Microsoft standards. Indeed, at each backup the DIT Database Partition Backup Signature is updated. If for any reasons, backups are needed to perform a rollback (rebuild a domain) or to track past changes, the backups will actually be up to date. This check is equivalent to a REPADMIN /showbackup *.

Advised solution:

Plan AD backups based on Microsoft standards. These standards depend on the Operating System. For example with the wbadmin utility: wbadmin start systemstatebackup -backuptarget:d:

Points:

15 points if the occurence is greater than or equals than 7

Documentation:

https://technet.microsoft.com/en-us/library/jj130668(v=ws.10).aspx
[MITRE]Mitre Att&ck - Mitigation - Data Backup
[US]STIG V-25385 - Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.

Details:

The detail can be found in Backup

+ 10 Point(s)

Check if all privileged accounts are in the special group Protected Users.

Rule ID:

P-ProtectedUsers

Description:

The purpose is to ensure that all privileged accounts are in the Protected User security group

Technical explanation:

The Protected User group is a special security group which automatically applies protections to minimize credential exposure. Starting with Windows 8.1. Older Operating System must be updated to take this protection in account such as the Windows 7 KB2871997 patch.
For admins, it:
- Disables NTLM authentication
- Reduces Kerberos ticket lifetime
- Mandates strong encryption algorithms, such as AES
- Prevents password caching on workstations
- Prevents any type of Kerberos delegation

Please also note that a few links (see below) recommends that at least one account is kept outside of the group Protected Users in case there is a permission problem.
That's why this rule is not triggered if only one account is not protected.

Advised solution:

After having reviewed the potential impact on adding users to this group, add the missing privileged accounts to this group.

Points:

10 points if the occurence is greater than or equals than 2

Documentation:

https://docs.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/protected-users-security-group
https://blog.netwrix.com/2015/02/20/add-sensitive-user-accounts-to-active-directory-protected-users-group/
https://dirteam.com/sander/2014/11/25/ten-things-you-need-to-be-aware-of-before-using-the-protected-users-group/
https://blog.andreas-schreiner.de/2018/09/07/active-directory-sicherheit-teil-1-privilegierte-benutzer/
[FR]ANSSI - Privileged accounts outside of the Protected Users group (vuln3_protected_users)3
[MITRE]Mitre Att&ck - Mitigation - Privileged Process Integrity
[US]STIG V-78131 - Accounts with domain level administrative privileges must be members of the Protected Users group in domains with a domain functional level of Windows 2012 R2 or higher.
[FR]ANSSI CERTFR-2017-ALE-012

Details:

The detail can be found in Admin Groups

User
ADSyncAdmin-Local
itsonicwall
BCMBackup
nkahal
rmehra
nsingh
VipreService
saccount
pmanager
vmadmin
tle
tpiper
Consultant
devteamvpn
jvaladez
gpotest
ccramer
slathar
ejavaid
sharyl
spiceworks
itsupport
bkagent
Arcserve
Administrator
mwservice
techadmin
sonicwalladmin
mtech
fssa
+ 10 Point(s)

RPC interfaces potentially vulnerable to Coerce attacks

Rule ID:

A-DC-Coerce

Description:

The objective is to assess the vulnerability of the Domain Controller (DC) to Coerce attacks.

Technical explanation:

Coerce attacks are a category of attacks which aims to forcing domain controllers to authenticate to a device controlled by the attacker for the purpose to relay this authentication to gain privileges.
This category of attacks is usually mitigated by applying patch (PetitPotam), disabling services (Spooler), added RPC filter (EDR or firewall) or ensuring integrity (SMB integrity).
Because each of these protections can be individually bypassed (NTLM integrity is disabled on LDAPS), the aim of this scan is to detect proactively if vulnerable RPC services are exposed.

PingCastle estimates that Coerceable interfaces are protected if:
- the GPO "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers" is applied through a GPO to DC
- or if RPC interfaces are not reachable

Because these interfaces need to be tested from a computer controlled by the attacker, PingCastle cannot do this test with reliability.
Instead, it sends a malformed RPC packet to try to trigger an error such as "Permission denied" or "RPC interface unavailable".
If the error RPC_X_BAD_STUB_DATA (1783) is triggered, PingCastle considers that the interface is available.
A report that a vulnerable interface is online may not be accurate because its full exploitation is not tested.

Also to avoid EDR alerts or to not perform the scan, you can run PingCastle with the flag --skip-dc-rpc

Advised solution:

To effectively mitigate the vulnerability, consider one of the following approaches:

1. Apply Group Policy Object (GPO) - "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers":
Apply this GPO specifically to the Organizational Unit (OU) "Domain Controllers".
Caution: Enabling this GPO might impact services dependent on NTLM such as files copy Backups.
Consider setting the GPO in "Audit mode" initially to identify and assess the impact on affected services.

2. Enable RPC Filters in Windows Firewall:
Configure Windows Firewall to block specific Interface IDs associated with vulnerable RPC interfaces.
This is done using the netsh command. See the documentation links for more information.
Exercise caution: This method filters the entire interface, not specific Operation Numbers (OpNum).
Adjust exceptions for necessary services to ensure critical functionality.

3. Implement External Filters (e.g., EDR, Firewalls):
Leverage third-party solutions, such as Endpoint Detection and Response (EDR) tools or firewalls.
Notable project: rpcfirewall https://github.com/zeronetworks/rpcfirewall, offering logical filtering at the OpNum level.
Be cautious of potential impact and ensure compatibility with existing infrastructure.

Points:

10 points if present

Documentation:

https://github.com/p0dalirius/Coercer
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers
https://blog.nviso.eu/2023/12/08/rpc-or-not-here-we-log-preventing-exploitation-and-abuse-with-rpc-firewall/
[MITRE]T1187 Forced Authentication

Details:

The detail can be found in Domain controllers

DCNameIPInterfaceFunctionOpNum
EGIADC01W 192.168.253.50 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcAddUsersToFile 9
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcAddUsersToFileEx 15
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcDecryptFileSrv 5
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcDuplicateEncryptionInfoFile 12
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcEncryptFileSrv 4
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcFileKeyInfo 12
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcOpenFileRaw 0
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcQueryRecoveryAgents 7
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcQueryUsersOnFile 6
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcRemoveUsersFromFile 8
EGIADC01W 192.168.253.50 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01W 192.168.253.50 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
EGIADC01 fe80::628a:dd65:10bd:20a0%5 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01 fe80::628a:dd65:10bd:20a0%5 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01 fe80::628a:dd65:10bd:20a0%5 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
EGIADC01 192.168.253.52 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01 192.168.253.52 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01 192.168.253.52 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
+ 10 Point(s)

DC vulnerability (SMB v1)

Rule ID:

S-SMB-v1

Description:

The purpose is to verify if Domain Controller(s) are vulnerable to the SMB v1 vulnerability

Technical explanation:

The SMB downgrade attack is used to obtain credentials or executing commands on behalf of a user by using SMB v1 as protocol. Indeed, because SMB v1 supports old authentication protocol, the integrity can be bypassed

Advised solution:

It is highly recommended by Microsoft to disable SMB v1 whenever it is possible on both client and server-side. Do note that if you are still not following best practices regarding the usage of deprecated OS (Windows 2000, 2003, XP, CE), regarding Network printer using SMBv1 scan2shares functionalities, or regarding software accessing Windows share with a custom implementation relying on SMB v1, you should consider fixing these issues before disabling SMB v1, as it will generate additional errors.

Points:

10 points if present

Documentation:

https://github.com/lgandx/Responder-Windows
https://blogs.technet.microsoft.com/josebda/2015/04/21/the-deprecation-of-smb1-you-should-be-planning-to-get-rid-of-this-old-smb-dialect
https://docs.microsoft.com/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3
[FR]ANSSI CERTFR-2017-ACT-019
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
[FR]ANSSI CERTFR-2016-ACT-039

Details:

The detail can be found in Domain controllers

Domain controller
EGIADC01W
+ 10 Point(s)

Avoid unexpected schema modifications which could result in domain rebuild

Rule ID:

P-SchemaAdmin

Description:

The purpose is to ensure that no account can make unexpected modifications to the schema

Technical explanation:

The group "Schema Admins" is used to give permissions to alter the schema. Once a modification is performed on the schema such as new objects, it cannot be undone. This can result in a rebuild of the domain. The best practice is to have this group empty and to add an administrator when a schema update is required, then remove this group membership.

Advised solution:

Remove the accounts or groups belonging to the "schema administrators" group.

Points:

10 points if present

Documentation:

[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R13 [subsection.3.2]
[US]STIG V-72835 - Membership to the Schema Admins group must be limited
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:

The detail can be found in Admin Groups

+ 10 Point(s)

Check if there is the expected audit policy on domain controllers.

Rule ID:

A-AuditDC

Description:

The purpose is to ensure that the audit policy on domain controllers collects the right set of events.

Technical explanation:

To detect and mitigate an attack, the right set of events need to be collected.
The audit policy is a compromise between too much and too few events to collect.
To solve this problem, the suggested audit policy from adsecurity.org is checked against the audit policy in place.

Advised solution:

Identify the Audit settings to apply and fix them.
Be aware that there are two places for audit settings.
For "Simple" audit configuration:
in Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Audit Policies
For "Advanced" audit configuration:
in Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration
Also be sure that the audit GPO is applied to all domain controllers, as the underlying object may be in a OU where the GPO is not applied.

Points:

10 points if present

Documentation:

https://adsecurity.org/?p=3299
https://adsecurity.org/?p=3377
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Audit settings
The table below shows the settings that were not found as configured in a GPO for a given domain controller.

TypeAuditProblemRationaleDomain controller
Advanced Detailed Tracking / DPAPI Activity No GPO check for audit success Collect event 4692 to track the export of DPAPI backup key EGIADC01W
Advanced Account Logon / Kerberos Service Ticket Operations No GPO check for audit success Collect events 4769 for kerberos authentication EGIADC01W
Advanced System / Security System Extension No GPO check for audit success Collect events 4610, 4697 to track lsass security packages and services EGIADC01W
Advanced Privilege Use / Sensitive Privilege Use No GPO check for audit success Collect events 4672, 4673, 4674 for privileges tracking such as the debug one EGIADC01W
Advanced Logon/Logoff / Special Logon No GPO check for audit success Collect event 4964 for special group attributed at logon EGIADC01W
Advanced Detailed Tracking / DPAPI Activity No GPO check for audit success Collect event 4692 to track the export of DPAPI backup key EGIADC01
Advanced Account Logon / Kerberos Service Ticket Operations No GPO check for audit success Collect events 4769 for kerberos authentication EGIADC01
Advanced System / Security System Extension No GPO check for audit success Collect events 4610, 4697 to track lsass security packages and services EGIADC01
Advanced Privilege Use / Sensitive Privilege Use No GPO check for audit success Collect events 4672, 4673, 4674 for privileges tracking such as the debug one EGIADC01
Advanced Logon/Logoff / Special Logon No GPO check for audit success Collect event 4964 for special group attributed at logon EGIADC01
+ 10 Point(s)

Ensure that the Recycle Bin feature is enabled

Rule ID:

P-RecycleBin

Description:

The purpose is to ensure that the Recycle Bin feature is enabled

Technical explanation:

The Recycle Bin avoids immediate deletion of objects (which can still be partially recovered by its tombstone). This lowers the administration work needed to restore. It also extends the period where traces are available when an investigation is needed.

Advised solution:

First, be sure that the forest level is at least Windows Server 2008 R2.
You can check it with Get-ADForest or in the Domain Information section.
Then you can enable it using the PowerShell command:
Enable-ADOptionalFeature -Identity 'Recycle Bin Feature' -Scope ForestOrConfigurationSet -Target 'test.mysmartlogon.com'

Points:

10 points if present

Documentation:

https://enterinit.com/powershell-enable-active-directory-recycle-bin
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Domain Information

+ 5 Point(s)

Check if signing is really required for LDAP

Rule ID:

A-DCLdapSign

Description:

The purpose is to check if signing is really required for LDAP

Technical explanation:

If the the request for signing of each LDAP request is not enforced, a man in the middle can be performed on an LDAP connection.
For example to add a user to the admin group.

This test is made by ignoring the local computer security policies.
Signature enforcement is done by setting the flag ISC_REQ_INTEGRITY when initializig the Negotiate / NTLM / Kerberos authentication.
The opposite test is made with the flag ISC_REQ_NO_INTEGRITY set.

PingCastle is testing if this setting is in place by performing a LDAP authentication with and without signature enforcement.
False positives may exists if the PingCastle program is run on the server tested. That's why, if PingCastle is run on a DC, the DC will not be tested.

Advised solution:

You have to make sure that ALL LDAP clients are compatible with LDAP signature.
All versions of Windows since XP support this and also most of the Unix clients.

You have to follow the Microsoft article quoted in reference to enable LDAP signing.
This includes auditing the clients which are not compatible and instructions on how to enforce this policy.

Points:

5 points if present

Documentation:

https://docs.microsoft.com/en-US/troubleshoot/windows-server/identity/enable-ldap-signing-in-windows-server
https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/ldap-channel-binding-and-ldap-signing-requirements-march-2020/ba-p/921536/page/4
https://github.com/zyn3rgy/LdapRelayScan
[MITRE]T1557 Man-in-the-Middle

Details:
Domain controller
EGIADC01W
+ 2 Point(s)

Check that the "Pre-Windows 2000 Compatible Access" group has not been modified from its default

Rule ID:

A-PreWin2000Other

Description:

The purpose is checking that no additional account has been added to the "Pre-Windows 2000 Compatible Access" group

Technical explanation:

The pre-Windows 2000 compatible access group grants access to some RPC calls which should not be available to users or computers.

Advised solution:

Remove the members from the PreWin2000 group while making sure that the group "Authenticated Users" is present. Then reboot each DC.

Points:

2 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
[FR]ANSSI - Use of the "Pre-Windows 2000 Compatible Access" group (vuln3_compatible_2000_not_default)3
[MITRE]T1110.003 Brute Force: Password Spraying

Informative rule

Check if the mitigation for CVE-2021-42291 has been enabled

Rule ID:

A-DsHeuristicsLDAPSecurity

Description:

The purpose is to identify domains having mitigation for CVE-2021-42291 not set to enabled

Technical explanation:

The way an Active Directory behaves can be controlled via the attribute DsHeuristics of CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration.
A parameter stored in its attribute and whose value is LDAPAddAutZVerifications and LDAPOwnerModify can be set to modify the mitigatation of CVE-2021-42291.
The KB5008383 has introduced changes to default security descriptor of Computer containers to add audit and limit computer creation without being admin.
Indeed, it is recommended to not let anyone create computer accounts as they can be used to abuse Kerberos or to perform relay attacks.

Mitigations in CVE-2021-42291 consist of 3 choices to be set on 2 settings.
They are named LDAPAddAutZVerifications and LDAPOwnerModify and are respectively the 28th and 29th character of this string.
For the expected values:
- With the value 0 (the default), it enables an additional audit mechanism
- With the value 1 (recommended), it enforces new security permissions, especially to require an action of the domain admin when unusual actions are performed
- With the value 2 (not recommended), it disables the audit mechanism that has been added by default and do not enable the new security permissions

Advised solution:

The easiest and fastest way to correct this issue is to replace the 28th and 29th character of the DsHeuristics attribute.
The value of LDAPAddAutZVerifications and LDAPOwnerModify should be set to 1.

Open the procedure embedded into the KB5008383 to apply this mitigation and change the DsHeuristics value.

Note: You have to pay attention that there are control characters at the 10th and 20th position to avoid undesired changes of the DsHeuristics attribute.
Typically if the DsHeuristics is empty, the expected new value is 00000000010000000002000000011

Points:

Informative rule (0 point)

Documentation:

https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/e5899be4-862e-496f-9a38-33950617d2c5
https://support.microsoft.com/en-au/topic/kb5008383-active-directory-permissions-updates-cve-2021-42291-536d5555-ffba-4248-a60e-d6cbc849cde1
[MITRE]T1187 Forced Authentication
[FR]ANSSI - Dangerous dsHeuristics settings (vuln3_dsheuristics_bad)3

Details:
SettingPositionValue
LDAPAddAuthZVerifications 28th Not Set
LDAPOwnerModify 29th Not Set
Informative rule

Check that the operator groups are empty

Rule ID:

P-OperatorsEmpty

Description:

The purpose is to ensure that the operator groups, which can have indirect control to the domain, are empty

Technical explanation:

Operator groups (Account Operators, Server Operators, ...) can take indirect control of the domain. Indeed, these groups have write access to critical resources of the domain.

Advised solution:

It is recommended to have these groups empty. Assign administrators into administrators group. Other accounts should have proper delegation rights in an OU or in the scope they are managing.

Points:

Informative rule (0 point)

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R27 [subsection.3.5]

Details:

The detail can be found in Admin Groups

GroupMembers
Server Operators 2
Informative rule

Check if LLMNR can be used to steal credentials

Rule ID:

A-NoGPOLLMNR

Description:

The purpose is to ensure that local name resolution protocol (LLMNR) cannot be used to collect credentials by performing a network attack

Technical explanation:

LLMNR is a protocol which translates names such as foo.bar.com into an ip address. LLMNR has been designed to translate name locally in case the default protocol DNS is not available.
Regarding Active Directory, DNS is mandatory which makes LLMNR useless.
LLMNR exploits typo mistakes or faster response time to redirect users to a specially designed share, server or website.
Being trusted, this service will trigger the single sign on procedure which can be abused to retrieve the user credentials.

LLMNR is enabled by default on all OS except starting from Windows 10 v1903 and Windows Server v1903 where it is disabled.

Advised solution:

Enable the GPO Turn off multicast name resolution and check that no GPO overrides this setting.
(if it is the case, the policy involved will be displayed below)

Points:

Informative rule (0 point)

Documentation:

https://youtu.be/Fg2gvk0qgjM
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Details:

The detail can be found in Security settings

Informative rule

Check if administrator accounts are email enabled.

Rule ID:

P-AdminEmailOn

Description:

The purpose is to ensure proper isolation of administrative activities and to prevent any admin from having an email address configured in the domain.

Technical explanation:

The recommended approach for secure administration is to implement a Tier Zero model.
In this model, low privileged actions cannot be made by highly privileged accounts such as admins.
This means that, in practice, administrators should have two separate Windows accounts: one for regular activities and one for performing privileged actions.

Advised solution:

Ensure that administrators do not use the privileged account for browsing the internet or receiving emails.
We highly recommend that you implement this practice to lower the risk of an admin compromise.

To remove this alert, you have to edit the properties of the user account and clear the email attribute.
Keep in mind that this action will silence the alert, but the risk may still be present.

Points:

Informative rule (0 point)

Documentation:

https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/securing-privileged-access-for-the-ad-admin-part-1/ba-p/259166
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:
AccountEmail
nkahal nkahal@egia.org
rmehra rmehra@egia.org
nsingh navdeep.singh@nvish.com
tle tle@egia.com
tpiper tpiper@egia.com
bkagent bkagent@egia.com
Administrator Administrator@egia.com
Informative rule

Check if PowerShell logging is enabled.

Rule ID:

A-AuditPowershell

Description:

The purpose is to ensure that PowerShell logging is enabled.

Technical explanation:

PowerShell is a powerful language, also used by hackers because of this quality. Hackers are able to run programs such as mimikatz in memory using obfuscated commands such as Invoke–Mimikatz.
Because there is no artefact on the disk, the incident response task is difficult for the forensic analysts.
For this reason, we recommend to enable PowerShell logging via a group policy, despite the fact that these security settings may be part of the workstation or server images.

Advised solution:

Go to Computer Configuration -> Administrative Templates -> Windows Components -> Windows PowerShell
And enable "Turn on Module logging" and "Turn on PowerShell Script Block logging"
We recommend to set "*" as the module list.

Points:

Informative rule (0 point)

Documentation:

https://adsecurity.org/?p=2604
https://docs.microsoft.com/en-us/powershell/scripting/wmf/whats-new/script-logging?view=powershell-6
[US]STIG V-68819 - PowerShell script block logging must be enabled
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Security settings

Informative rule

Ensure that the functional level of the domain and the forest are up to date to use the latest security features

Rule ID:

S-FunctionalLevel3

Description:

The purpose is checking the functional level of the domain and the forest, and ensure it is set to the latest secure version

Technical explanation:


Each functional level brings new security features:
* functional level Windows Server 2003: brings forest trusts and read-only domain controller (RODC) support;
* functional level Windows Server 2008: brings support for modern cryptographic algorithms such as AES and DFS for SYSVOL share replication;
* functional level Windows Server 2008R2: brings support for Active Directory Recycle Bin (protects objects against accidental deletion);
* functional level Windows Server 2012: brings advanced Kerberos features, such as compound authentication and claims support;
* functional level Windows Server 2012R2: brings numerous new security features such as authentication policies, authentication policy silos and the Protected users group;
* functional level Windows Server 2016 / 2019 / 2022: brings an upgraded smart card logon security and Privileged Identity Management (PIM) trust relationships between forests.

Advised solution:

You have to raise the functional level of the domain or the forest (see the details to know if the domain and/or forest is concerned).
The recommended level is the functional level 7 (Windows Server 2016 / 2019 / 2022)

To upgrade the functional level, a requirement is that all domain controllers are running the right version.
Also, functional level needs to be upgraded level by level.

Points:

Informative rule (0 point)

Documentation:

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-functional-levels
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/identifying-your-functional-level-upgrade
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/raise-active-directory-domain-forest-functional-levels
[FR]ANSSI - Insufficient forest and domains functional levels (vuln3_vuln_functional_level)3
[MITRE]Mitre Att&ck - Mitigation - Update Software

Details:

The functional levels are indicated in Domain Information

TypeLevel
Domain Windows Server 2008 R2
Forest Windows Server 2008 R2
Informative rule

Check for Root Certificates using unsafe hashing algorithm (SHA1)

Rule ID:

A-SHA1RootCert

Description:

The purpose is to ensure that no Root Certificates use the deprecated SHA-1 hashing algorithm

Technical explanation:

The SHA1 hashing algorithm is not considered as safe. There are design flaws inherent to the algorithm that allow an attacker to generate a hash collision in less than a brute-force time

Advised solution:

To solve the matter, the certificate should be removed from the GPO and if needed, certificates depending on it should be reissued.

Points:

Informative rule (0 point)

Documentation:

https://tools.ietf.org/html/rfc6194
[FR]ANSSI - Weak or vulnerable certificates (vuln3_certificates_vuln)3
[MITRE]T1600.001 Weaken Encryption: Reduce Key Space
[US]STIG V-14820 - PKI certificates (server and clients) must be issued by the DoD PKI or an approved External Certificate Authority (ECA).

Details:

The detail can be found in Certificates

GPOSubject
NTLMStore CN=EGIA, OU=IS, O=Electric and Gas Industries Associates, L=San Leandro, S=CA, C=US, E=cert-auth-root@egia.com

To reach Level 5 you need to fix the following rules:

+ 5 Point(s)

Duplicate account check

Rule ID:

S-Duplicate

Description:

The purpose is to check if there are duplicate accounts within the domain. A duplicate account is essentially a duplicate of two objects having the same attributes.

Technical explanation:

To identify a duplicate account, a check is performed on the "DN" and the "sAMAccountName". When a DC detects a conflict, there is a replacement performed on the second object.

Advised solution:

Duplicate accounts being present often means there are process failures, and they should be identified and removed. To identify all duplicate accounts, you can use the following PowerShell commands: get-adobject -ldapfilter "(cn=*cnf:*)" ; get-adobject -ldapfilter "(sAMAccountName=$duplicate)"

Points:

5 points if present

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in User information and Computer information

Informative rule

Check if NetCease has been put in place to mitigate Bloodhound

Rule ID:

A-NoNetSessionHardening

Description:

The purpose is to ensure that mitigations are in place against the Bloodhound tool

Technical explanation:

By default, Windows computers allow any authenticated user to enumerate network sessions to it.
This means an attacker could enumerate network sessions to a file share hosting home directories or a Domain Controller to see who's connected to SYSVOL (to apply Group Policy) and determine which workstations each user and admin account is logged into.
Bloodhound uses this capability extensively to map out credentials in the network.

Disabling Net Session Enumeration removes the capability for any user to enumerate net session info (Recon).

Advised solution:

If this mitigation is not part of the computer image, apply the following recommendations:
Run the NetCease PowerShell script (referenced below) on a reference workstation.
Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit .
In the console tree under Computer Configuration, expand the Preferences folder, and then expand the Windows Settings folder.
Right-click the Registry node, point to New, and select Registry Wizard.
Select the reference workstation on which the desired registry settings exist, then click Next .
Browse to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\DefaultSecurity\
and select the check box for “SrvsvcSessionInfo” from which you want to create a Registry preference item. Select the check box for a key only if you want to create a Registry item for the key rather than for a value within the key.
Click Finish.
The settings that you selected appear as preference items in the Registry Wizard Values collection

Points:

Informative rule (0 point)

Documentation:

https://github.com/p0w3rsh3ll/NetCease
https://adsecurity.org/?p=3299
[MITRE]T1087.001 Account Discovery: Local Account

Details:

The detail can be found in Security settings

Informative rule

Check if OUs and Containers are protected from accidental deletion.

Rule ID:

P-UnprotectedOU

Description:

The purpose is to ensure that Organizational Units (OUs) and Containers in Active Directory are protected to prevent accidental deletion, which could lead to data loss and disruptions in the network infrastructure.

Technical explanation:

In Active Directory, Organizational Units can be protected from accidental deletion (reads: using the del key in the wrong place at the wrong time).
This way these objects cannot be deleted, unless the protection is removed. This Active Directory feature was first introduced in Windows Server 2008.

This protection consists of a Deny ACE added to the NTSecurityDescriptor attribute applied to Everyone with the flag set to Delete and DeleteTree.

Advised solution:

To safeguard against accidental deletions, it is essential to enable the "Protect object from accidental deletion" option for critical OUs and Containers.
When this option is enabled, it adds an additional layer of security, preventing unintended deletions.
To implement this protection:

* Open the Active Directory Users and Computers management console.
* Locate the OU or Container that requires protection.
* Right-click on the OU or Container, select "Properties."
* In the "Object" tab, check the "Protect object from accidental deletion" option.
* Click "Apply" and then "OK" to save the changes.

You can list unprotected OU using the PowerShell command:
Get-ADOrganizationalUnit -filter {name -like "*"} -Properties ProtectedFromAccidentalDeletion | format-table Name,ProtectedFromAccidentalDeletion
and protect them using the command:
Get-ADOrganizationalUnit -filter {name -like "*"} -Properties ProtectedFromAccidentalDeletion | where {$_.ProtectedFromAccidentalDeletion -eq $false} | Set-ADOrganizationalUnit -ProtectedFromAccidentalDeletion $true

Note: only 10 will be listed below. Checkout the Delegations section for the complete list.

Points:

Informative rule (0 point)

Documentation:

https://dirteam.com/sander/2011/07/13/preventing-ous-and-containers-from-accidental-deletion/
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in Delegations

OU
OU=Dell,DC=egia,DC=com
Informative rule

Check if the Dns Admins group is not empty

Rule ID:

P-DNSAdmin

Description:

The purpose is to ensure that the Dns Admins group is not used

Technical explanation:

Administrators of the DNS Service have the possibility to inject a DLL in this service.
However this service is hosted most of the time in the domain controller and is running as SYSTEM.
That means that DNS admins are potentially domain admins.

The security descriptor used to grant admin rights is located on the nTSecurityDescriptor attribute of the object CN=MicrosoftDNS,CN=System.
The "Write All Prop" access right induces the vulnerability.

In this case, the DnsAdmins group is not empty and grant to its user the possibility to interact with the DNS Service.

Advised solution:

Rule update:
The Patch Tuesday of October 2021 fixed this vulnerability and assigned it the identifier CVE-2021-40469.
If the patch has been applied, there is no additional mitigation to perform.

This rule is transformed into an informative rule in PingCastle 2.10.1 and will be removed in future versions of PingCastle.

You should remove the members of the Dns Admins group and do a proper delegation to the specific DNS Zones.

First, grant only "Read Property", "List", "List object" and "Read permssions" to CN=MicrosoftDNS,CN=System to enable access to the RPC service.

Then on each zone (the object in the tree below with the class dnsZone), grant "Read Property", "List", "List object", "Read permissions", "Create Child", "Delete Child", "Delete", "Delete Tree".

Points:

Informative rule (0 point)

Documentation:

https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dnsp/007efcd2-2955-46dd-a59e-f83ae88f4678
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - DnsAdmins group members (vuln4_dnsadmins)4

Details:

The detail can be found in Admin Groups

Informative rule

Check if default OU location has been changed within the domain.

Rule ID:

S-DefaultOUChanged

Description:

The purpose is to ensure that the default location of computers and user OU has not been changed.

Technical explanation:

Default OU such as CN=Computers or CN=Users are stored within the wellKnownObjects attribute of the Domain object.
There are 12 default locations officialy defined.
They can be changed using the program redircmp.
Changing these default can alter the behavior of programs (such as security audit programs) as they may not check the modified objects.

Advised solution:

You have to use redircmp to set the value back to normal. See documentation for more details

Points:

Informative rule (0 point)

Documentation:

https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5a00c890-6be5-4575-93c4-8bf8be0ca8d8
https://rickardnobel.se/verify-redirected-computers-container-in-active-directory/
[MITRE]Mitre Att&ck - Mitigation - User Account Management

Details:
ExpectedFound
CN=Computers,DC=egia,DC=com OU=Computers,OU=MS365EGIA,DC=egia,DC=com
Informative rule

Check if Authenticated Users can create DNS records

Rule ID:

A-DnsZoneAUCreateChild

Description:

The purpose is to check if Authenticated Users has the right to create DNS records

Technical explanation:

When a computer is joined to a domain, a DNS record is created in the DnsZone to allow the computer to update its DNS settings.
By design, Microsoft choose to grant to the group Authenticated Users (aka every computers and users) the right to create DNS records.
Once created, only the owner keeps the right to edit the new object.

The vulnerability is that specific DNS records can be created to perform man-in-the-middle attacks.
One example is to create a wildcard record (a record with the name "*"), a failover DNS record or anticipating the creation of a DNS record with the right permissions.

Advised solution:

As of today, this rule is considered "informative" because the default configuration where Authenticated Users can create DNS records is considered safe.
The reason for this classification is that no exploitation of that vulnerability has been reported.

The proposed enhancement is to replace the identity who has been granted the right to create DNS Records (permission CreateChild) from Authenticated Users to Domain Computers.
To perform this change, you have to edit the permission of the DNSZone whose object is located in the container CN=MicrosoftDNS,DC=DomainDnsZones.

It should be noticed that if there is a privilege escalation on a computer, an attacker can impersonate the computer account and bypass this mitigation.

The best mitigation is to create the DNS records manually as part as the domain join process and to revoke the permission granted to Authenticated Users.

Points:

Informative rule (0 point)

Documentation:

https://www.ws-its.de/gegenmassnahme-zum-angriff-dns-wildcard/
https://www.netspi.com/blog/technical/network-penetration-testing/exploiting-adidns/
[MITRE]T1557 Man-in-the-Middle

Details:
DNSZone
20.168.192.in-addr.arpa
147.56.50.in-addr.arpa
147.56.50.in-addr.arpa CNF:08160273-defb-4859-aa24-150122611381
tradesandtools.com CNF:1ef04c1f-7515-4ef4-bdc7-d8893d08e62b
253.168.192.in-addr.arpa
252.168.192.in-addr.arpa
10.168.192.in-addr.arpa
11.168.192.in-addr.arpa
12.168.192.in-addr.arpa
Informative rule

Check the Password Policy for Service Accounts (Information)

Rule ID:

A-NoServicePolicy

Description:

The purpose is to give information regarding a best practice for the Service Account password policy. Indeed, having a 20+ characters password for this account greatly helps reducing the risk of Kerberoasting attacks (offline cracking of the TGS tickets)
Note: PSO (Password Settings Objects) will be visible only if the user, which collected the information, has the permission to view it.

Technical explanation:

The rule is purely informative, as it gives insights regarding a best practice. It verifies if there is a GPO or PSO enforcing a 20+ characters password for the Service Accounts.

Advised solution:

The recommended way to handle service accounts is to use "Managed service accounts" introduced since Windows Server 2008 R2 (search for "msDS-ManagedServiceAccount").
To solve the anomaly, you should implement a PSO or GPO password guarantying a 20+ length password.

Points:

Informative rule (0 point)

Documentation:

https://www.microsoft.com/en-us/research/publication/password-guidance/
[MITRE]T1201 Password Policy Discovery

Details:

The detail can be found in Password Policies

To reach the maximum level you need to fix the following rules:

Informative rule

Check that the "Pre-Windows 2000 Compatible Access" group does not contain "Authenticated Users"

Rule ID:

A-PreWin2000AuthenticatedUsers

Description:

The purpose is checking if the "Pre-Windows 2000 Compatible Access" group contains "Authenticated Users"

Technical explanation:

The pre-Windows 2000 compatible access group grants access to some RPC calls.
Its default and secure value is the "Authenticated Users" group which allows users to perform group look-up using legacy protocols.

If this group contains "Authenticated Users", it increases the impact of the exploitation of vulnerabilities in legacy protocols such as the Print Spooler service.
Indeed, in the #PrintNightmare attack, it enables a patch bypass on domain controllers because the property Elevated Token is on when establishing a session to the DC.
Removing the group can have side impacts and as a consequence, this is reported here as a special hardening measure.

Advised solution:

Remove "Authenticated Users" from the PreWin2000 group.

Points:

Informative rule (0 point)

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
https://www.gradenegger.eu/?p=1132
[MITRE]T1210 Exploitation of Remote Services

This section represents an evaluation of the techniques available in the MITRE ATT&CK®

Techniques

Initial Access

1 technique(s) matched

Execution

No technique matched

Privilege Escalation

No technique matched

Defense Evasion

1 technique(s) matched

Credential Access

8 technique(s) matched

Discovery

2 technique(s) matched

Lateral Movement

1 technique(s) matched

Initial Access

T1078.003 Valid Accounts: Local Accounts [1]

+ 15 Point(s)

Check if the LAPS tool to handle the native local administrator passwords is installed

Rule ID:

A-LAPS-Not-Installed

Description:

The purpose is to make sure that there is a proper password policy in place for the native local administrator account.

Technical explanation:

LAPS (Local Administrator Password Solution) is the advised solution to handle passwords for the native local administrator account on all workstations, as it is a simple way to handle most of the subject.

Advised solution:

If you don't have any provisioning process or password solution to manage local administrators, you should install the LAPS solution. If you mitigate the risk differently, you should add this rule as an exception, as the risk is covered.

Points:

15 points if present

Documentation:

https://www.microsoft.com/en-us/download/details.aspx?id=46899
[US]STIG V-36438 - Local administrator accounts on domain systems must not share the same password.
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI CERTFR-2015-ACT-046
[MITRE]T1078.003 Valid Accounts: Local Accounts

Details:

The detail can be found in LAPS

Defense Evasion

T1600.001 Weaken Encryption: Reduce Key Space [2]

+ 5 Point(s)

Check for certificates using a weak signing algorithm (RSA under 1024 bits)

Rule ID:

A-WeakRSARootCert

Description:

The purpose is to ensure that there is no use of a certificate using a weak RSA key

Technical explanation:

A RSA key certificate with a modulus under 1024 bits is considered unsafe

Advised solution:

To solve the matter, the certificate should be removed from the GPO and if needed, certificates depending on it should be reissued.

Points:

5 points if present

Documentation:

https://www.iad.gov/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/commercial-national-security-algorithm-suite-factsheet.cfm
https://www.ssi.gouv.fr/guide/cryptographie-les-regles-du-rgs/
[MITRE]T1600.001 Weaken Encryption: Reduce Key Space
[US]STIG V-14820 - PKI certificates (server and clients) must be issued by the DoD PKI or an approved External Certificate Authority (ECA).
[FR]ANSSI - Weak or vulnerable certificates (vuln1_certificates_vuln)1

Details:

The detail can be found in Certificates

SourceSubjectModuleExpires
NTLMStore CN=EGIA, OU=IS, O=Electric and Gas Industries Associates, L=San Leandro, S=CA, C=US, E=cert-auth-root@egia.com 512 11/2/2003 2:44:17 PM
Informative rule

Check for Root Certificates using unsafe hashing algorithm (SHA1)

Rule ID:

A-SHA1RootCert

Description:

The purpose is to ensure that no Root Certificates use the deprecated SHA-1 hashing algorithm

Technical explanation:

The SHA1 hashing algorithm is not considered as safe. There are design flaws inherent to the algorithm that allow an attacker to generate a hash collision in less than a brute-force time

Advised solution:

To solve the matter, the certificate should be removed from the GPO and if needed, certificates depending on it should be reissued.

Points:

Informative rule (0 point)

Documentation:

https://tools.ietf.org/html/rfc6194
[FR]ANSSI - Weak or vulnerable certificates (vuln3_certificates_vuln)3
[MITRE]T1600.001 Weaken Encryption: Reduce Key Space
[US]STIG V-14820 - PKI certificates (server and clients) must be issued by the DoD PKI or an approved External Certificate Authority (ECA).

Details:

The detail can be found in Certificates

GPOSubject
NTLMStore CN=EGIA, OU=IS, O=Electric and Gas Industries Associates, L=San Leandro, S=CA, C=US, E=cert-auth-root@egia.com

Credential Access

T1003.004 OS Credential Dumping: LSA Secrets [1]

+ 15 Point(s)

Check if Service Accounts (aka accounts with never expiring password) are domain administrators

Rule ID:

P-ServiceDomainAdmin

Description:

The purpose is to check for accounts with non-expiring passwords in the "Domain Administrator" group

Technical explanation:

PingCastle is checking accounts with never expiring password, that are mostly used as service accounts.
"Service Accounts" can imply a high security risk as their password are stored in clear text in the LSA database, which can then be easily exploited using Mimikatz or Cain&Abel for instance. In addition, their passwords don't change and can be used in Kerberoast attacks.

Advised solution:

Accounts with never expiring passwords are mostly service accounts.
To mitigate the security risk, it is strongly advised to lower the privileges of the "Service Accounts", meaning that they should be removed from the "Domain Administrator" group, while ensuring that the password of each and every "Service Account" is longer than 20 characters

Points:

15 points if the occurence is greater than or equals than 2

Documentation:

[FR]ANSSI - Privileged accounts with never-expiring passwords (vuln1_dont_expire_priv)1
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R11 [subsection.2.5]
[US]STIG V-36432 - Membership to the Domain Admins group must be restricted to accounts used only to manage the Active Directory domain and domain controllers.
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[MITRE]T1003.004 OS Credential Dumping: LSA Secrets

Details:

The detail can be found in Admin Groups

T1110.003 Brute Force: Password Spraying [2]

+ 5 Point(s)

Check for Windows 2000 compatibility which allows access to the domain without any account

Rule ID:

A-PreWin2000Anonymous

Description:

The purpose is to identify domains which allow access without any account because of a Pre-Windows 2000 compatibility

Technical explanation:

When a Windows Server 2003 DC is promoted, a pre-Windows 2000 compatibility setting can be enabled through the wizard. If it is enabled, the wizard will add "Everyone" and "Anonymous" to the pre-Windows 2000 compatible access group, and by doing so, it will authorize the domain to be queried without an account (null session)
It is possible to verify the results provided by the PingCastle solution by using a Kali distribution. You should run [rpcclient -U " target_ip_address] and press enter at the password prompt to finally type [enumdomusers].

Advised solution:

Remove the "Everyone" and "Anonymous" from the PreWin2000 group while making sure that the group "Authenticated Users" is present, then reboot each DC.
Note: removing the group "Authenticated Users" (and not keep it like advised here) is an advanced recommendation quoted in the rule A-PreWin2000AuthenticatedUsers

Points:

5 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
[MITRE]T1110.003 Brute Force: Password Spraying
[US]STIG V-8547 - The Anonymous Logon and Everyone groups must not be members of the Pre-Windows 2000 Compatible Access group.
[FR]ANSSI - The "Pre - Windows 2000 Compatible Access" group includes "Anonymous" (vuln2_compatible_2000_anonymous)2

+ 2 Point(s)

Check that the "Pre-Windows 2000 Compatible Access" group has not been modified from its default

Rule ID:

A-PreWin2000Other

Description:

The purpose is checking that no additional account has been added to the "Pre-Windows 2000 Compatible Access" group

Technical explanation:

The pre-Windows 2000 compatible access group grants access to some RPC calls which should not be available to users or computers.

Advised solution:

Remove the members from the PreWin2000 group while making sure that the group "Authenticated Users" is present. Then reboot each DC.

Points:

2 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
[FR]ANSSI - Use of the "Pre-Windows 2000 Compatible Access" group (vuln3_compatible_2000_not_default)3
[MITRE]T1110.003 Brute Force: Password Spraying

T1187 Forced Authentication [3]

+ 10 Point(s)

RPC interfaces potentially vulnerable to Coerce attacks

Rule ID:

A-DC-Coerce

Description:

The objective is to assess the vulnerability of the Domain Controller (DC) to Coerce attacks.

Technical explanation:

Coerce attacks are a category of attacks which aims to forcing domain controllers to authenticate to a device controlled by the attacker for the purpose to relay this authentication to gain privileges.
This category of attacks is usually mitigated by applying patch (PetitPotam), disabling services (Spooler), added RPC filter (EDR or firewall) or ensuring integrity (SMB integrity).
Because each of these protections can be individually bypassed (NTLM integrity is disabled on LDAPS), the aim of this scan is to detect proactively if vulnerable RPC services are exposed.

PingCastle estimates that Coerceable interfaces are protected if:
- the GPO "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers" is applied through a GPO to DC
- or if RPC interfaces are not reachable

Because these interfaces need to be tested from a computer controlled by the attacker, PingCastle cannot do this test with reliability.
Instead, it sends a malformed RPC packet to try to trigger an error such as "Permission denied" or "RPC interface unavailable".
If the error RPC_X_BAD_STUB_DATA (1783) is triggered, PingCastle considers that the interface is available.
A report that a vulnerable interface is online may not be accurate because its full exploitation is not tested.

Also to avoid EDR alerts or to not perform the scan, you can run PingCastle with the flag --skip-dc-rpc

Advised solution:

To effectively mitigate the vulnerability, consider one of the following approaches:

1. Apply Group Policy Object (GPO) - "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers":
Apply this GPO specifically to the Organizational Unit (OU) "Domain Controllers".
Caution: Enabling this GPO might impact services dependent on NTLM such as files copy Backups.
Consider setting the GPO in "Audit mode" initially to identify and assess the impact on affected services.

2. Enable RPC Filters in Windows Firewall:
Configure Windows Firewall to block specific Interface IDs associated with vulnerable RPC interfaces.
This is done using the netsh command. See the documentation links for more information.
Exercise caution: This method filters the entire interface, not specific Operation Numbers (OpNum).
Adjust exceptions for necessary services to ensure critical functionality.

3. Implement External Filters (e.g., EDR, Firewalls):
Leverage third-party solutions, such as Endpoint Detection and Response (EDR) tools or firewalls.
Notable project: rpcfirewall https://github.com/zeronetworks/rpcfirewall, offering logical filtering at the OpNum level.
Be cautious of potential impact and ensure compatibility with existing infrastructure.

Points:

10 points if present

Documentation:

https://github.com/p0dalirius/Coercer
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers
https://blog.nviso.eu/2023/12/08/rpc-or-not-here-we-log-preventing-exploitation-and-abuse-with-rpc-firewall/
[MITRE]T1187 Forced Authentication

Details:

The detail can be found in Domain controllers

DCNameIPInterfaceFunctionOpNum
EGIADC01W 192.168.253.50 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcAddUsersToFile 9
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcAddUsersToFileEx 15
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcDecryptFileSrv 5
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcDuplicateEncryptionInfoFile 12
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcEncryptFileSrv 4
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcFileKeyInfo 12
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcOpenFileRaw 0
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcQueryRecoveryAgents 7
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcQueryUsersOnFile 6
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcRemoveUsersFromFile 8
EGIADC01W 192.168.253.50 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01W 192.168.253.50 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
EGIADC01 fe80::628a:dd65:10bd:20a0%5 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01 fe80::628a:dd65:10bd:20a0%5 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01 fe80::628a:dd65:10bd:20a0%5 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
EGIADC01 192.168.253.52 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01 192.168.253.52 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01 192.168.253.52 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
+ 10 Point(s)

Ensure that the Print Spooler service cannot be abused to get the DC credentials

Rule ID:

A-DC-Spooler

Description:

The purpose is to ensure that credentials cannot be extracted from the DC via its Print Spooler service

Technical explanation:

When there's an account with unconstrained delegation configured (which is fairly common) and the Print Spooler service running on a computer, you can get that computers credentials sent to the system with unconstrained delegation as a user. With a domain controller, the TGT of the DC can be extracted allowing an attacker to reuse it with a DCSync attack and obtain all user hashes and impersonate them.

Advised solution:

The Print Spooler service should be deactivated on domain controllers. Please note as a consequence that the Printer Pruning functionality (rarely used) will be unavailable.

Points:

10 points if present

Documentation:

https://adsecurity.org/?p=4056
https://www.slideshare.net/harmj0y/derbycon-the-unintended-risks-of-trusting-active-directory
[MITRE]T1187 Forced Authentication

Details:

The detail can be found in Domain controllers

Domain controller
EGIADC01W
EGIADC01
Informative rule

Check if the mitigation for CVE-2021-42291 has been enabled

Rule ID:

A-DsHeuristicsLDAPSecurity

Description:

The purpose is to identify domains having mitigation for CVE-2021-42291 not set to enabled

Technical explanation:

The way an Active Directory behaves can be controlled via the attribute DsHeuristics of CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration.
A parameter stored in its attribute and whose value is LDAPAddAutZVerifications and LDAPOwnerModify can be set to modify the mitigatation of CVE-2021-42291.
The KB5008383 has introduced changes to default security descriptor of Computer containers to add audit and limit computer creation without being admin.
Indeed, it is recommended to not let anyone create computer accounts as they can be used to abuse Kerberos or to perform relay attacks.

Mitigations in CVE-2021-42291 consist of 3 choices to be set on 2 settings.
They are named LDAPAddAutZVerifications and LDAPOwnerModify and are respectively the 28th and 29th character of this string.
For the expected values:
- With the value 0 (the default), it enables an additional audit mechanism
- With the value 1 (recommended), it enforces new security permissions, especially to require an action of the domain admin when unusual actions are performed
- With the value 2 (not recommended), it disables the audit mechanism that has been added by default and do not enable the new security permissions

Advised solution:

The easiest and fastest way to correct this issue is to replace the 28th and 29th character of the DsHeuristics attribute.
The value of LDAPAddAutZVerifications and LDAPOwnerModify should be set to 1.

Open the procedure embedded into the KB5008383 to apply this mitigation and change the DsHeuristics value.

Note: You have to pay attention that there are control characters at the 10th and 20th position to avoid undesired changes of the DsHeuristics attribute.
Typically if the DsHeuristics is empty, the expected new value is 00000000010000000002000000011

Points:

Informative rule (0 point)

Documentation:

https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/e5899be4-862e-496f-9a38-33950617d2c5
https://support.microsoft.com/en-au/topic/kb5008383-active-directory-permissions-updates-cve-2021-42291-536d5555-ffba-4248-a60e-d6cbc849cde1
[MITRE]T1187 Forced Authentication
[FR]ANSSI - Dangerous dsHeuristics settings (vuln3_dsheuristics_bad)3

Details:
SettingPositionValue
LDAPAddAuthZVerifications 28th Not Set
LDAPOwnerModify 29th Not Set

T1557 Man-in-the-Middle [2]

+ 5 Point(s)

Check if signing is really required for LDAP

Rule ID:

A-DCLdapSign

Description:

The purpose is to check if signing is really required for LDAP

Technical explanation:

If the the request for signing of each LDAP request is not enforced, a man in the middle can be performed on an LDAP connection.
For example to add a user to the admin group.

This test is made by ignoring the local computer security policies.
Signature enforcement is done by setting the flag ISC_REQ_INTEGRITY when initializig the Negotiate / NTLM / Kerberos authentication.
The opposite test is made with the flag ISC_REQ_NO_INTEGRITY set.

PingCastle is testing if this setting is in place by performing a LDAP authentication with and without signature enforcement.
False positives may exists if the PingCastle program is run on the server tested. That's why, if PingCastle is run on a DC, the DC will not be tested.

Advised solution:

You have to make sure that ALL LDAP clients are compatible with LDAP signature.
All versions of Windows since XP support this and also most of the Unix clients.

You have to follow the Microsoft article quoted in reference to enable LDAP signing.
This includes auditing the clients which are not compatible and instructions on how to enforce this policy.

Points:

5 points if present

Documentation:

https://docs.microsoft.com/en-US/troubleshoot/windows-server/identity/enable-ldap-signing-in-windows-server
https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/ldap-channel-binding-and-ldap-signing-requirements-march-2020/ba-p/921536/page/4
https://github.com/zyn3rgy/LdapRelayScan
[MITRE]T1557 Man-in-the-Middle

Details:
Domain controller
EGIADC01W
Informative rule

Check if Authenticated Users can create DNS records

Rule ID:

A-DnsZoneAUCreateChild

Description:

The purpose is to check if Authenticated Users has the right to create DNS records

Technical explanation:

When a computer is joined to a domain, a DNS record is created in the DnsZone to allow the computer to update its DNS settings.
By design, Microsoft choose to grant to the group Authenticated Users (aka every computers and users) the right to create DNS records.
Once created, only the owner keeps the right to edit the new object.

The vulnerability is that specific DNS records can be created to perform man-in-the-middle attacks.
One example is to create a wildcard record (a record with the name "*"), a failover DNS record or anticipating the creation of a DNS record with the right permissions.

Advised solution:

As of today, this rule is considered "informative" because the default configuration where Authenticated Users can create DNS records is considered safe.
The reason for this classification is that no exploitation of that vulnerability has been reported.

The proposed enhancement is to replace the identity who has been granted the right to create DNS Records (permission CreateChild) from Authenticated Users to Domain Computers.
To perform this change, you have to edit the permission of the DNSZone whose object is located in the container CN=MicrosoftDNS,DC=DomainDnsZones.

It should be noticed that if there is a privilege escalation on a computer, an attacker can impersonate the computer account and bypass this mitigation.

The best mitigation is to create the DNS records manually as part as the domain join process and to revoke the permission granted to Authenticated Users.

Points:

Informative rule (0 point)

Documentation:

https://www.ws-its.de/gegenmassnahme-zum-angriff-dns-wildcard/
https://www.netspi.com/blog/technical/network-penetration-testing/exploiting-adidns/
[MITRE]T1557 Man-in-the-Middle

Details:
DNSZone
20.168.192.in-addr.arpa
147.56.50.in-addr.arpa
147.56.50.in-addr.arpa CNF:08160273-defb-4859-aa24-150122611381
tradesandtools.com CNF:1ef04c1f-7515-4ef4-bdc7-d8893d08e62b
253.168.192.in-addr.arpa
252.168.192.in-addr.arpa
10.168.192.in-addr.arpa
11.168.192.in-addr.arpa
12.168.192.in-addr.arpa

T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay [4]

+ 15 Point(s)

Ensure that the NTLMv1 and old LM protocols are banned

Rule ID:

S-OldNtlm

Description:

The purpose is to check if NTLMv1 or LM can be used by DC

Technical explanation:

NTLMv1 is an old protocol which is known to be vulnerable to cryptographic attacks.
It is typically used when a hacker sniffs the network and tries to retrieve NTLM hashes which can then be used to impersonate users.

This attack can be combined with coerced authentication attacks - a hacker forces the DC to connect to a controlled host.
In this case, NTLMv1 can be specified so the hacker can retrieve the NTLM hash of the DC, impersonates it and then take control of the domain.
This attack is still possible with NTLMv2 but this is more difficult.

Windows has default security settings regarding LM/NTLM. Windows XP: Send LM & NTLM responses, Windows Server 2003: Send NTLM response only, Vista/2008: Win7/2008 R2: Send NTLMv2 response only.

However Domain Controllers have relaxed default settings to accept the connection of older operating systems.
That means that by default, NTLMv1 is accepted on domain controllers.
If no GPO defines the LAN Manager Authentication Level, the DC fall back to the non secure default.

Advised solution:

After an audit of NTLMv1 usage (see the links below), you need to raise the LAN Manager Authentication Level to "Send NTLMv2 response only. Refuse LM & NTLM".
This can be done by editing the policy "Network security: LAN Manager authentication level" which can be accessed in Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
The policy will be applied after a computer reboot.

Beware that you may break software which is not compatible with Ntlmv2 such as very old Linux stacks or very old Windows before Windows Vista.
But please note that Ntlmv2 can be activited on all Windows starting Windows 95 and other operating systems.

Points:

15 points if present

Documentation:

https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/audit-domain-controller-ntlmv1
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level
https://learn.microsoft.com/en-us/troubleshoot/windows-client/windows-security/enable-ntlm-2-authentication
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R37 [paragraph.3.6.2.1]

Details:

The detail can be found in Security settings

GPOValue
Windows default without an active GPO 3
+ 10 Point(s)

DC vulnerability (SMB v1)

Rule ID:

S-SMB-v1

Description:

The purpose is to verify if Domain Controller(s) are vulnerable to the SMB v1 vulnerability

Technical explanation:

The SMB downgrade attack is used to obtain credentials or executing commands on behalf of a user by using SMB v1 as protocol. Indeed, because SMB v1 supports old authentication protocol, the integrity can be bypassed

Advised solution:

It is highly recommended by Microsoft to disable SMB v1 whenever it is possible on both client and server-side. Do note that if you are still not following best practices regarding the usage of deprecated OS (Windows 2000, 2003, XP, CE), regarding Network printer using SMBv1 scan2shares functionalities, or regarding software accessing Windows share with a custom implementation relying on SMB v1, you should consider fixing these issues before disabling SMB v1, as it will generate additional errors.

Points:

10 points if present

Documentation:

https://github.com/lgandx/Responder-Windows
https://blogs.technet.microsoft.com/josebda/2015/04/21/the-deprecation-of-smb1-you-should-be-planning-to-get-rid-of-this-old-smb-dialect
https://docs.microsoft.com/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3
[FR]ANSSI CERTFR-2017-ACT-019
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
[FR]ANSSI CERTFR-2016-ACT-039

Details:

The detail can be found in Domain controllers

Domain controller
EGIADC01W
+ 5 Point(s)

Hardened Paths weakness

Rule ID:

A-HardenedPaths

Description:

The purpose is to ensure that there is no weakness related to hardened paths

Technical explanation:

Two vulnerabilities have been reported in 2015 (MS15-011 and MS15-014) which allows a domain takeover via GPO modifications done with a man-in-the-middle attack.
To mitigate these vulnerabilites, Microsoft has designed a workaround named "Hardened Paths". It forces connection settings to enforce Integrity, Mutual Authentication or Privacy.
By default if this policy is empty, if will enforce Integrity and Mutual Authentication on the SYSVOL or NETLOGON shares.
This rule checks if there have been any overwrite to disable this protection.

Advised solution:

You have to edit the Hardened Path section in the GPO.
This section is located in Computer Configuration/Policies/Administrative Templates/Network/Network Provider.
Check each value reported here and make sure that entries containing SYSVOL or NETLOGON have RequireIntegrity and RequireMutualAuthentication set to 1.
In addition to that, check entries having the pattern \\DCName\* and apply the same solution.

Points:

5 points if present

Documentation:


https://labs.f-secure.com/archive/how-to-own-any-windows-network-with-group-policy-hijacking-attacks/
https://talubu.wordpress.com/2018/02/28/configuring-unc-hardened-access-through-group-policy/
https://adsecurity.org/?p=1405
https://support.microsoft.com/en-us/topic/ms15-011-vulnerability-in-group-policy-could-allow-remote-code-execution-february-10-2015-91b4bda2-945d-455b-ebbb-01d1ec191328
[US]STIG V-63577 - Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Details:

The detail can be found in the Hardened Paths configuration section.

GPOKeyRequireIntegrityRequireMutualAuthenticationRequirePrivacy
No GPO Found NETLOGON Not Set Not Set Not Set
No GPO Found SYSVOL Not Set Not Set Not Set
Informative rule

Check if LLMNR can be used to steal credentials

Rule ID:

A-NoGPOLLMNR

Description:

The purpose is to ensure that local name resolution protocol (LLMNR) cannot be used to collect credentials by performing a network attack

Technical explanation:

LLMNR is a protocol which translates names such as foo.bar.com into an ip address. LLMNR has been designed to translate name locally in case the default protocol DNS is not available.
Regarding Active Directory, DNS is mandatory which makes LLMNR useless.
LLMNR exploits typo mistakes or faster response time to redirect users to a specially designed share, server or website.
Being trusted, this service will trigger the single sign on procedure which can be abused to retrieve the user credentials.

LLMNR is enabled by default on all OS except starting from Windows 10 v1903 and Windows Server v1903 where it is disabled.

Advised solution:

Enable the GPO Turn off multicast name resolution and check that no GPO overrides this setting.
(if it is the case, the policy involved will be displayed below)

Points:

Informative rule (0 point)

Documentation:

https://youtu.be/Fg2gvk0qgjM
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Details:

The detail can be found in Security settings

T1558.001 Steal or Forge Kerberos Tickets: Golden Ticket [1]

+ 50 Point(s)

Mitigate golden ticket attack via a regular change of the krbtgt password

Rule ID:

A-Krbtgt

Description:

The purpose is to alert when the password for the krbtgt account can be used to compromise the whole domain. This password can be used to sign every Kerberos ticket. Monitoring it closely often mitigates the risk of golden ticket attacks greatly.

Technical explanation:

Kerberos is an authentication protocol. It is using a secret, stored as the password of the krbtgt account, to sign its tickets. If the hash of the password of the krbtgt account is retrieved, it can be used to generate authentication tickets at will.
To mitigate this attack, it is recommended to change the krbtgt password between 40 days and 6 months. If this is not the case, every backup done until the last password change of the krbtgt account can be used to emit Golden tickets, compromising the entire domain.
Retrieval of this secret is one of the highest priority in an attack, as this password is rarely changed and offer a long term backdoor.
Also this attack can be performed using the former password of the krbtgt account. That's why the krbtgt password should be changed twice to invalidate its leak.

Advised solution:

The password of the krbtgt account should be changed twice to invalidate the golden ticket attack.
Beware: two changes of the krbtgt password not replicated to domain controllers can break these domain controllers You should wait at least 10 hours between each krbtgt password change (this is the duration of a ticket life).

There are several possibilities to change the krbtgt password.
First, a Microsoft script can be run in order to guarantee the correct replication of these secrets.
Second, a more manual way is to essentially reset the password manually once, then to wait 3 days (this is a replication safety delay), then to reset it again. This is the safest way as it ensures the password is no longer usable by the Golden ticket attack.

Points:

50 points if the occurence is greater than or equals than 1464
then 40 points if the occurence is greater than or equals than 1098
then 30 points if the occurence is greater than or equals than 732
then 20 points if the occurence is greater than or equals than 366

Documentation:

https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/faqs-from-the-field-on-krbtgt-reset/ba-p/2367838
https://github.com/microsoft/New-KrbtgtKeys.ps1
https://github.com/PSSecTools/Krbtgt
[FR]ANSSI CERTFR-2014-ACT-032
[FR]ANSSI - Krbtgt account password unchanged for more than a year (vuln2_krbtgt)2
[MITRE]T1558.001 Steal or Forge Kerberos Tickets: Golden Ticket

Details:

The detail can be found in Krbtgt

T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting [1]

+ 20 Point(s)

Check if admin accounts are vulnerable to the Kerberoast attack.

Rule ID:

P-Kerberoasting

Description:

The purpose is to ensure that the password of admin accounts cannot be retrieved using the Kerberoast attack.

Technical explanation:

To access a service using Kerberos, a user requests a ticket (named TGS) to the DC specific to the service.
This ticket is encrypted using a derivative of the service password, but can be brute-forced to retrieve the original password.
Any account having the attribute SPN populated is considered as a service account.
Given that any user can request a ticket for a service account, these accounts can have their password retrieved.
In addition, services are known to have their password not changed at a regular basis and to use well-known words.

Please note that this program ignores service accounts that had their password changed in the last 40 days ago to support using password rotation as a mitigation.

Advised solution:

If the account is a service account, the service should be removed from the privileged group or have a process to change its password at a regular basis.
If the user is a person, the SPN attribute of the account should be removed.

Points:

5 points per discovery

Documentation:

https://adsecurity.org/?p=3466
[FR]ANSSI - Privileged accounts with SPN (vuln1_spn_priv)1
[MITRE]T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting

Details:

The detail can be found in Admin Groups

GroupUser
Administrators Administrator
Domain Administrators Administrator
Enterprise Administrators Administrator
Schema Administrators Administrator

T1558.004 Steal or Forge Kerberos Tickets: AS-REP Roasting [1]

+ 15 Point(s)

Check the use of Kerberos with weak encryption (DES algorithm)

Rule ID:

S-DesEnabled

Description:

The purpose is to verify that no weak encryption algorithm such as DES is used for accounts.

Technical explanation:

DES is a very weak algorithm and once assigned to an account, it can be used in Kerberos ticket requests, even though it is easily cracked. If the attacker cracks the Kerberos ticket, they can steal the token and compromise the user account.

Advised solution:

It is recommended to disable DES as an encryption algorithm in the user configuration dialog or in the "msDSSupportedEncryptionTypes" attribute at LDAP level. It has to be disabled in the property of an account by unchecking the box "Use Kerberos DES encryption for this account". You can also detect which accounts support Kerberos DES encryption by running: Get-ADObject -Filter {UserAccountControl -band 0x200000 -or msDs-supportedEncryptionTypes -band 3}.

Points:

15 points if present

Documentation:

https://docs.microsoft.com/en-us/archive/blogs/openspecification/msds-supportedencryptiontypes-episode-1-computer-accounts
https://docs.microsoft.com/en-us/services-hub/health/remediation-steps-ad/remove-the-highly-insecure-des-encryption-from-user-accounts
[FR]ANSSI - Use of Kerberos with weak encryption (vuln2_kerberos_properties_deskey)2
[MITRE]T1558.004 Steal or Forge Kerberos Tickets: AS-REP Roasting

Details:

The detail can be found in User information and Computer information

Discovery

T1087.001 Account Discovery: Local Account [1]

Informative rule

Check if NetCease has been put in place to mitigate Bloodhound

Rule ID:

A-NoNetSessionHardening

Description:

The purpose is to ensure that mitigations are in place against the Bloodhound tool

Technical explanation:

By default, Windows computers allow any authenticated user to enumerate network sessions to it.
This means an attacker could enumerate network sessions to a file share hosting home directories or a Domain Controller to see who's connected to SYSVOL (to apply Group Policy) and determine which workstations each user and admin account is logged into.
Bloodhound uses this capability extensively to map out credentials in the network.

Disabling Net Session Enumeration removes the capability for any user to enumerate net session info (Recon).

Advised solution:

If this mitigation is not part of the computer image, apply the following recommendations:
Run the NetCease PowerShell script (referenced below) on a reference workstation.
Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit .
In the console tree under Computer Configuration, expand the Preferences folder, and then expand the Windows Settings folder.
Right-click the Registry node, point to New, and select Registry Wizard.
Select the reference workstation on which the desired registry settings exist, then click Next .
Browse to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\DefaultSecurity\
and select the check box for “SrvsvcSessionInfo” from which you want to create a Registry preference item. Select the check box for a key only if you want to create a Registry item for the key rather than for a value within the key.
Click Finish.
The settings that you selected appear as preference items in the Registry Wizard Values collection

Points:

Informative rule (0 point)

Documentation:

https://github.com/p0w3rsh3ll/NetCease
https://adsecurity.org/?p=3299
[MITRE]T1087.001 Account Discovery: Local Account

Details:

The detail can be found in Security settings

T1201 Password Policy Discovery [1]

Informative rule

Check the Password Policy for Service Accounts (Information)

Rule ID:

A-NoServicePolicy

Description:

The purpose is to give information regarding a best practice for the Service Account password policy. Indeed, having a 20+ characters password for this account greatly helps reducing the risk of Kerberoasting attacks (offline cracking of the TGS tickets)
Note: PSO (Password Settings Objects) will be visible only if the user, which collected the information, has the permission to view it.

Technical explanation:

The rule is purely informative, as it gives insights regarding a best practice. It verifies if there is a GPO or PSO enforcing a 20+ characters password for the Service Accounts.

Advised solution:

The recommended way to handle service accounts is to use "Managed service accounts" introduced since Windows Server 2008 R2 (search for "msDS-ManagedServiceAccount").
To solve the anomaly, you should implement a PSO or GPO password guarantying a 20+ length password.

Points:

Informative rule (0 point)

Documentation:

https://www.microsoft.com/en-us/research/publication/password-guidance/
[MITRE]T1201 Password Policy Discovery

Details:

The detail can be found in Password Policies

Lateral Movement

T1210 Exploitation of Remote Services [1]

Informative rule

Check that the "Pre-Windows 2000 Compatible Access" group does not contain "Authenticated Users"

Rule ID:

A-PreWin2000AuthenticatedUsers

Description:

The purpose is checking if the "Pre-Windows 2000 Compatible Access" group contains "Authenticated Users"

Technical explanation:

The pre-Windows 2000 compatible access group grants access to some RPC calls.
Its default and secure value is the "Authenticated Users" group which allows users to perform group look-up using legacy protocols.

If this group contains "Authenticated Users", it increases the impact of the exploitation of vulnerabilities in legacy protocols such as the Print Spooler service.
Indeed, in the #PrintNightmare attack, it enables a patch bypass on domain controllers because the property Elevated Token is on when establishing a session to the DC.
Removing the group can have side impacts and as a consequence, this is reported here as a special hardening measure.

Advised solution:

Remove "Authenticated Users" from the PreWin2000 group.

Points:

Informative rule (0 point)

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
https://www.gradenegger.eu/?p=1132
[MITRE]T1210 Exploitation of Remote Services


Mitigations

Audit

Mitigation did matched

Active Directory Configuration

Mitigation did matched

Data Backup

Mitigation did matched

Privileged Account Management

Mitigation did matched

Privileged Process Integrity

Mitigation did matched

Update Software

Mitigation did matched

User Account Management

Mitigation did matched

Audit

Mitre Att&ck - Mitigation - Audit [3]

+ 10 Point(s)

Ensure that the Recycle Bin feature is enabled

Rule ID:

P-RecycleBin

Description:

The purpose is to ensure that the Recycle Bin feature is enabled

Technical explanation:

The Recycle Bin avoids immediate deletion of objects (which can still be partially recovered by its tombstone). This lowers the administration work needed to restore. It also extends the period where traces are available when an investigation is needed.

Advised solution:

First, be sure that the forest level is at least Windows Server 2008 R2.
You can check it with Get-ADForest or in the Domain Information section.
Then you can enable it using the PowerShell command:
Enable-ADOptionalFeature -Identity 'Recycle Bin Feature' -Scope ForestOrConfigurationSet -Target 'test.mysmartlogon.com'

Points:

10 points if present

Documentation:

https://enterinit.com/powershell-enable-active-directory-recycle-bin
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Domain Information

+ 10 Point(s)

Check if there is the expected audit policy on domain controllers.

Rule ID:

A-AuditDC

Description:

The purpose is to ensure that the audit policy on domain controllers collects the right set of events.

Technical explanation:

To detect and mitigate an attack, the right set of events need to be collected.
The audit policy is a compromise between too much and too few events to collect.
To solve this problem, the suggested audit policy from adsecurity.org is checked against the audit policy in place.

Advised solution:

Identify the Audit settings to apply and fix them.
Be aware that there are two places for audit settings.
For "Simple" audit configuration:
in Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Audit Policies
For "Advanced" audit configuration:
in Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration
Also be sure that the audit GPO is applied to all domain controllers, as the underlying object may be in a OU where the GPO is not applied.

Points:

10 points if present

Documentation:

https://adsecurity.org/?p=3299
https://adsecurity.org/?p=3377
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Audit settings
The table below shows the settings that were not found as configured in a GPO for a given domain controller.

TypeAuditProblemRationaleDomain controller
Advanced Detailed Tracking / DPAPI Activity No GPO check for audit success Collect event 4692 to track the export of DPAPI backup key EGIADC01W
Advanced Account Logon / Kerberos Service Ticket Operations No GPO check for audit success Collect events 4769 for kerberos authentication EGIADC01W
Advanced System / Security System Extension No GPO check for audit success Collect events 4610, 4697 to track lsass security packages and services EGIADC01W
Advanced Privilege Use / Sensitive Privilege Use No GPO check for audit success Collect events 4672, 4673, 4674 for privileges tracking such as the debug one EGIADC01W
Advanced Logon/Logoff / Special Logon No GPO check for audit success Collect event 4964 for special group attributed at logon EGIADC01W
Advanced Detailed Tracking / DPAPI Activity No GPO check for audit success Collect event 4692 to track the export of DPAPI backup key EGIADC01
Advanced Account Logon / Kerberos Service Ticket Operations No GPO check for audit success Collect events 4769 for kerberos authentication EGIADC01
Advanced System / Security System Extension No GPO check for audit success Collect events 4610, 4697 to track lsass security packages and services EGIADC01
Advanced Privilege Use / Sensitive Privilege Use No GPO check for audit success Collect events 4672, 4673, 4674 for privileges tracking such as the debug one EGIADC01
Advanced Logon/Logoff / Special Logon No GPO check for audit success Collect event 4964 for special group attributed at logon EGIADC01
Informative rule

Check if PowerShell logging is enabled.

Rule ID:

A-AuditPowershell

Description:

The purpose is to ensure that PowerShell logging is enabled.

Technical explanation:

PowerShell is a powerful language, also used by hackers because of this quality. Hackers are able to run programs such as mimikatz in memory using obfuscated commands such as Invoke–Mimikatz.
Because there is no artefact on the disk, the incident response task is difficult for the forensic analysts.
For this reason, we recommend to enable PowerShell logging via a group policy, despite the fact that these security settings may be part of the workstation or server images.

Advised solution:

Go to Computer Configuration -> Administrative Templates -> Windows Components -> Windows PowerShell
And enable "Turn on Module logging" and "Turn on PowerShell Script Block logging"
We recommend to set "*" as the module list.

Points:

Informative rule (0 point)

Documentation:

https://adsecurity.org/?p=2604
https://docs.microsoft.com/en-us/powershell/scripting/wmf/whats-new/script-logging?view=powershell-6
[US]STIG V-68819 - PowerShell script block logging must be enabled
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Security settings

Active Directory Configuration

Mitre Att&ck - Mitigation - Active Directory Configuration [5]

+ 20 Point(s)

At least one administrator account can be delegated

Rule ID:

P-Delegated

Description:

The purpose is to ensure that all Administrator Accounts have the configuration flag "this account is sensitive and cannot be delegated" (or are members of the built-in group "Protected Users" when your domain functional level is at least Windows Server 2012 R2).

Technical explanation:

Without the flag "This account is sensitive and cannot be delegated" any account can be impersonated by some service account. It is a best practice to enforce this flag on administrators accounts.

Advised solution:

To correct the situation, you should make sure that all your Administrator Accounts have the check-box "This account is sensitive and cannot be delegated" active or add your Administrator Accounts to the built-in group "Protected Users" if your domain functional level is at least Windows Server 2012 R2 (some functionalities may not work properly afterwards, you should check the official documentation).
If you want to enable the check-box "This account is sensitive and cannot be delegated" but this is not possible because the box is not present (typically for GMSA accounts), you can add the flag manually by adding the number 1048576 to the attribute useraccountcontrol of the account.
Please note that there is a section below in this report named "Admin Groups" which gives more information.

Points:

20 points if present

Documentation:

[US]STIG V-36435 - Delegation of privileged accounts must be prohibited.
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in Admin Groups

+ 15 Point(s)

Check for hidden group membership for user accounts

Rule ID:

S-PrimaryGroup

Description:

The purpose is to check for unusual values in the primarygroupid attribute used to store group memberships

Technical explanation:

In Active Directory, group membership is stored on the "members" attribute and on the "primarygroupid" attribute. The default primary group value is "Domain Users" for the users, "Domain Computers" for the computers and "Domain Controllers" for the domain controllers. The primarygroupid contains the RID (last digits of a SID) of the group targeted. It can be used to store hidden membership as this attribute is not often analyzed.

Advised solution:

Unless strongly justified, change the primary group id to its default: 513 or 514 for users, 516 or 521 for domain controllers, 514 or 515 for computers. The primary group can be edited in a friendly manner by editing the account with the "Active Directory Users and Computers" and after selecting the "Member Of" tab, "set primary group".
You can use the following script to list Users with a primary group id different from domain users:
$DomainUsersSid = New-Object System.Security.Principal.SecurityIdentifier ([System.Security.Principal.WellKnownSidType]::AccountDomainUsersSid,(Get-ADDomain).DomainSID)

Get-ADUser -Filter * -Properties PrimaryGroup | Where-Object { $_.PrimaryGroup -ne (Get-ADGroup -Filter {SID -eq $DomainUsersSid} ).DistinguishedName } | Select-Object UserPrincipalName,PrimaryGroup

Points:

15 points if present

Documentation:

[FR]ANSSI - Accounts with modified PrimaryGroupID (vuln3_primary_group_id_nochange)3
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in User information and Computer information

+ 5 Point(s)

Duplicate account check

Rule ID:

S-Duplicate

Description:

The purpose is to check if there are duplicate accounts within the domain. A duplicate account is essentially a duplicate of two objects having the same attributes.

Technical explanation:

To identify a duplicate account, a check is performed on the "DN" and the "sAMAccountName". When a DC detects a conflict, there is a replacement performed on the second object.

Advised solution:

Duplicate accounts being present often means there are process failures, and they should be identified and removed. To identify all duplicate accounts, you can use the following PowerShell commands: get-adobject -ldapfilter "(cn=*cnf:*)" ; get-adobject -ldapfilter "(sAMAccountName=$duplicate)"

Points:

5 points if present

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in User information and Computer information

+ 1 Point(s)

Check that there is no account with never-expiring passwords

Rule ID:

S-PwdNeverExpires

Description:

The purpose is to ensure that every account has a password which is compliant with password expiration policies

Technical explanation:

Some accounts have passwords which never expire. Should an attacker compromise one of these accounts, he would be able to maintain long-term access to the Active Directory domain.

We have noted that some Linux servers, domain joined, are configured with a password which never expires.
This is a misconfiguration because a password change can be configured. It was however not the default on some plateform.
See one of the link below for more information.

Advised solution:

In order to make Active Directory enforce periodic password change, accounts must not have the "Password never expires" flag set in the "Account" tab of the user properties. Their passwords should then be rolled immediately.
For services accounts, Windows provide the "managed service accounts" and "group managed service accounts" features to facilite the automatic change of passwords.
Please note that there is a document in the section below which references solutions for service accounts of well known products.
Also Linux servers should be configured with automatic machine account change.

Points:

1 points if present

Documentation:

https://adsecurity.org/?p=4115
https://access.redhat.com/discussions/1283873
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration
[FR]ANSSI - Accounts with never-expiring passwords (vuln2_dont_expire)2

Details:

The detail can be found in User information

Informative rule

Check if OUs and Containers are protected from accidental deletion.

Rule ID:

P-UnprotectedOU

Description:

The purpose is to ensure that Organizational Units (OUs) and Containers in Active Directory are protected to prevent accidental deletion, which could lead to data loss and disruptions in the network infrastructure.

Technical explanation:

In Active Directory, Organizational Units can be protected from accidental deletion (reads: using the del key in the wrong place at the wrong time).
This way these objects cannot be deleted, unless the protection is removed. This Active Directory feature was first introduced in Windows Server 2008.

This protection consists of a Deny ACE added to the NTSecurityDescriptor attribute applied to Everyone with the flag set to Delete and DeleteTree.

Advised solution:

To safeguard against accidental deletions, it is essential to enable the "Protect object from accidental deletion" option for critical OUs and Containers.
When this option is enabled, it adds an additional layer of security, preventing unintended deletions.
To implement this protection:

* Open the Active Directory Users and Computers management console.
* Locate the OU or Container that requires protection.
* Right-click on the OU or Container, select "Properties."
* In the "Object" tab, check the "Protect object from accidental deletion" option.
* Click "Apply" and then "OK" to save the changes.

You can list unprotected OU using the PowerShell command:
Get-ADOrganizationalUnit -filter {name -like "*"} -Properties ProtectedFromAccidentalDeletion | format-table Name,ProtectedFromAccidentalDeletion
and protect them using the command:
Get-ADOrganizationalUnit -filter {name -like "*"} -Properties ProtectedFromAccidentalDeletion | where {$_.ProtectedFromAccidentalDeletion -eq $false} | Set-ADOrganizationalUnit -ProtectedFromAccidentalDeletion $true

Note: only 10 will be listed below. Checkout the Delegations section for the complete list.

Points:

Informative rule (0 point)

Documentation:

https://dirteam.com/sander/2011/07/13/preventing-ous-and-containers-from-accidental-deletion/
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in Delegations

OU
OU=Dell,DC=egia,DC=com

Data Backup

Mitre Att&ck - Mitigation - Data Backup [1]

+ 15 Point(s)

Check for the last backup date according to Microsoft standard

Rule ID:

A-BackupMetadata

Description:

The purpose is to check if the backups are actually up to date in case they are needed. The alert can be triggered when a domain is backed up using non-recommended methods

Technical explanation:

A verification is done on the backups, ensuring that the backup is performed according to Microsoft standards. Indeed, at each backup the DIT Database Partition Backup Signature is updated. If for any reasons, backups are needed to perform a rollback (rebuild a domain) or to track past changes, the backups will actually be up to date. This check is equivalent to a REPADMIN /showbackup *.

Advised solution:

Plan AD backups based on Microsoft standards. These standards depend on the Operating System. For example with the wbadmin utility: wbadmin start systemstatebackup -backuptarget:d:

Points:

15 points if the occurence is greater than or equals than 7

Documentation:

https://technet.microsoft.com/en-us/library/jj130668(v=ws.10).aspx
[MITRE]Mitre Att&ck - Mitigation - Data Backup
[US]STIG V-25385 - Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.

Details:

The detail can be found in Backup

Privileged Account Management

Mitre Att&ck - Mitigation - Privileged Account Management [9]

+ 30 Point(s)

Check for inactive administrator accounts

Rule ID:

P-Inactive

Description:

The purpose is to ensure that all Administrator Accounts in the AD are necessary and used

Technical explanation:

Accounts within the AD have attributes indicating the creation date of the account and the last login of this account. Accounts which haven't have a login since 6 months or created more than 6 months ago without any login are considered inactive. If an Administrator Account is set as inactive, the reason for having Administrator rights should be strongly justified.

Advised solution:

To correct the situation, you should make sure that all your Administrator Account(s) are "Active", meaning that you should remove Administrator rights if an account is set as not "Active"

Points:

30 points if the occurence is greater than or equals than 30
then 20 points if the occurence is greater than or equals than 15

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R36 [subsection.3.6]

+ 15 Point(s)

Check if Service Accounts (aka accounts with never expiring password) are domain administrators

Rule ID:

P-ServiceDomainAdmin

Description:

The purpose is to check for accounts with non-expiring passwords in the "Domain Administrator" group

Technical explanation:

PingCastle is checking accounts with never expiring password, that are mostly used as service accounts.
"Service Accounts" can imply a high security risk as their password are stored in clear text in the LSA database, which can then be easily exploited using Mimikatz or Cain&Abel for instance. In addition, their passwords don't change and can be used in Kerberoast attacks.

Advised solution:

Accounts with never expiring passwords are mostly service accounts.
To mitigate the security risk, it is strongly advised to lower the privileges of the "Service Accounts", meaning that they should be removed from the "Domain Administrator" group, while ensuring that the password of each and every "Service Account" is longer than 20 characters

Points:

15 points if the occurence is greater than or equals than 2

Documentation:

[FR]ANSSI - Privileged accounts with never-expiring passwords (vuln1_dont_expire_priv)1
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R11 [subsection.2.5]
[US]STIG V-36432 - Membership to the Domain Admins group must be restricted to accounts used only to manage the Active Directory domain and domain controllers.
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[MITRE]T1003.004 OS Credential Dumping: LSA Secrets

Details:

The detail can be found in Admin Groups

+ 15 Point(s)

Check for suspicious account(s) used in administrator activities

Rule ID:

A-AdminSDHolder

Description:

The purpose is to ensure that there are no rogue admin accounts in the Active Directory

Technical explanation:

A check is performed on non-admin accounts in order to identify if they have an attribute admincount set. If they have this attribute, it means that this account, which is not supposed to be admin, has been granted administrator rights in the past. This typically happens when an administrator gives temporary rights to a normal account, off process.

Advised solution:

These accounts should be reviewed, especially in regards with their past activities and have the admincount attribute removed. In order to identify which accounts are detected by this rule, we advise to run a PowerShell command that will show you all users having this flag set: get-adobject -ldapfilter "(admincount=1)"
Do not forget to look at the section AdminSDHolder below.

Points:

50 points if the occurence is greater than or equals than 50
then 45 points if the occurence is greater than or equals than 45
then 40 points if the occurence is greater than or equals than 40
then 35 points if the occurence is greater than or equals than 35
then 30 points if the occurence is greater than or equals than 30
then 25 points if the occurence is greater than or equals than 25
then 20 points if the occurence is greater than or equals than 20
then 15 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/ms675212(v=vs.85).aspx
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R40 [paragraph.3.6.3.1]

Details:

The detail can be found in the AdminSDHolder User List

+ 15 Point(s)

Check if the LAPS tool to handle the native local administrator passwords is installed

Rule ID:

A-LAPS-Not-Installed

Description:

The purpose is to make sure that there is a proper password policy in place for the native local administrator account.

Technical explanation:

LAPS (Local Administrator Password Solution) is the advised solution to handle passwords for the native local administrator account on all workstations, as it is a simple way to handle most of the subject.

Advised solution:

If you don't have any provisioning process or password solution to manage local administrators, you should install the LAPS solution. If you mitigate the risk differently, you should add this rule as an exception, as the risk is covered.

Points:

15 points if present

Documentation:

https://www.microsoft.com/en-us/download/details.aspx?id=46899
[US]STIG V-36438 - Local administrator accounts on domain systems must not share the same password.
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI CERTFR-2015-ACT-046
[MITRE]T1078.003 Valid Accounts: Local Accounts

Details:

The detail can be found in LAPS

+ 10 Point(s)

Avoid unexpected schema modifications which could result in domain rebuild

Rule ID:

P-SchemaAdmin

Description:

The purpose is to ensure that no account can make unexpected modifications to the schema

Technical explanation:

The group "Schema Admins" is used to give permissions to alter the schema. Once a modification is performed on the schema such as new objects, it cannot be undone. This can result in a rebuild of the domain. The best practice is to have this group empty and to add an administrator when a schema update is required, then remove this group membership.

Advised solution:

Remove the accounts or groups belonging to the "schema administrators" group.

Points:

10 points if present

Documentation:

[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R13 [subsection.3.2]
[US]STIG V-72835 - Membership to the Schema Admins group must be limited
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:

The detail can be found in Admin Groups

+ 10 Point(s)

Check if all admin passwords are changed on the field.

Rule ID:

P-AdminPwdTooOld

Description:

The purpose is to ensure that all admins are changing their passwords at least every 3 years

Technical explanation:

This rule ensure that passwords of administrator are well managed.

Advised solution:

We advised to read the ANSSI guidelines about this, which is quoted in the documentation section below.

Points:

10 points if present

Documentation:

[FR]ANSSI - Privileged account passwords age too old (vuln1_password_change_priv)1
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:

The detail can be found in Admin Groups

AccountCreationLastChanged
itsonicwall 2019-08-01 23:45:55Z 2019-08-01 16:45:55Z
BCMBackup 2012-11-27 22:16:25Z 2012-11-27 14:16:25Z
nkahal 2010-12-20 04:57:36Z 2011-12-26 12:25:15Z
rmehra 2012-07-11 06:02:30Z 2013-01-17 21:51:15Z
VipreService 2011-01-20 19:58:42Z 2011-06-27 23:55:45Z
saccount 2010-11-21 21:35:59Z 2010-11-21 13:35:59Z
pmanager 2010-11-21 21:28:03Z 2010-11-21 13:28:03Z
vmadmin 2016-08-23 21:50:09Z 2016-08-23 14:50:09Z
tle 2010-08-23 15:26:48Z 2012-11-28 15:21:13Z
tpiper 2007-04-19 15:08:14Z 2015-08-07 10:50:09Z
Consultant 2002-09-17 17:27:04Z 2010-11-21 13:30:35Z
devteamvpn 2018-03-09 20:54:37Z 2021-02-07 19:25:13Z
jvaladez 2013-05-20 13:55:31Z 2020-06-17 17:00:36Z
gpotest 2016-10-25 17:51:34Z 2016-10-28 14:29:32Z
ccramer 2014-07-25 20:03:05Z 2020-02-14 06:02:29Z
ejavaid 2010-12-02 14:38:38Z 2011-12-08 16:17:21Z
sharyl 2017-01-16 22:49:14Z 2017-03-01 14:32:43Z
spiceworks 2016-09-22 16:51:38Z 2016-10-11 06:12:25Z
itsupport 2016-09-20 19:02:53Z 2017-01-19 15:58:36Z
bkagent 2002-05-07 14:37:57Z 2002-09-26 15:32:26Z
Arcserve 2001-10-06 18:33:48Z 2001-01-19 11:20:31Z
Administrator 2001-10-06 18:33:47Z 2015-04-08 09:31:00Z
techadmin 2019-05-31 17:04:45Z 2019-05-31 10:04:45Z
sonicwalladmin 2017-07-13 17:08:10Z 2017-07-13 10:08:10Z
mtech 2019-03-19 20:55:34Z 2020-06-15 16:25:19Z
fssa 2016-11-15 18:46:41Z 2016-11-15 10:46:41Z
Informative rule

Check that the operator groups are empty

Rule ID:

P-OperatorsEmpty

Description:

The purpose is to ensure that the operator groups, which can have indirect control to the domain, are empty

Technical explanation:

Operator groups (Account Operators, Server Operators, ...) can take indirect control of the domain. Indeed, these groups have write access to critical resources of the domain.

Advised solution:

It is recommended to have these groups empty. Assign administrators into administrators group. Other accounts should have proper delegation rights in an OU or in the scope they are managing.

Points:

Informative rule (0 point)

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R27 [subsection.3.5]

Details:

The detail can be found in Admin Groups

GroupMembers
Server Operators 2
Informative rule

Check if the Dns Admins group is not empty

Rule ID:

P-DNSAdmin

Description:

The purpose is to ensure that the Dns Admins group is not used

Technical explanation:

Administrators of the DNS Service have the possibility to inject a DLL in this service.
However this service is hosted most of the time in the domain controller and is running as SYSTEM.
That means that DNS admins are potentially domain admins.

The security descriptor used to grant admin rights is located on the nTSecurityDescriptor attribute of the object CN=MicrosoftDNS,CN=System.
The "Write All Prop" access right induces the vulnerability.

In this case, the DnsAdmins group is not empty and grant to its user the possibility to interact with the DNS Service.

Advised solution:

Rule update:
The Patch Tuesday of October 2021 fixed this vulnerability and assigned it the identifier CVE-2021-40469.
If the patch has been applied, there is no additional mitigation to perform.

This rule is transformed into an informative rule in PingCastle 2.10.1 and will be removed in future versions of PingCastle.

You should remove the members of the Dns Admins group and do a proper delegation to the specific DNS Zones.

First, grant only "Read Property", "List", "List object" and "Read permssions" to CN=MicrosoftDNS,CN=System to enable access to the RPC service.

Then on each zone (the object in the tree below with the class dnsZone), grant "Read Property", "List", "List object", "Read permissions", "Create Child", "Delete Child", "Delete", "Delete Tree".

Points:

Informative rule (0 point)

Documentation:

https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dnsp/007efcd2-2955-46dd-a59e-f83ae88f4678
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - DnsAdmins group members (vuln4_dnsadmins)4

Details:

The detail can be found in Admin Groups

Informative rule

Check if administrator accounts are email enabled.

Rule ID:

P-AdminEmailOn

Description:

The purpose is to ensure proper isolation of administrative activities and to prevent any admin from having an email address configured in the domain.

Technical explanation:

The recommended approach for secure administration is to implement a Tier Zero model.
In this model, low privileged actions cannot be made by highly privileged accounts such as admins.
This means that, in practice, administrators should have two separate Windows accounts: one for regular activities and one for performing privileged actions.

Advised solution:

Ensure that administrators do not use the privileged account for browsing the internet or receiving emails.
We highly recommend that you implement this practice to lower the risk of an admin compromise.

To remove this alert, you have to edit the properties of the user account and clear the email attribute.
Keep in mind that this action will silence the alert, but the risk may still be present.

Points:

Informative rule (0 point)

Documentation:

https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/securing-privileged-access-for-the-ad-admin-part-1/ba-p/259166
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:
AccountEmail
nkahal nkahal@egia.org
rmehra rmehra@egia.org
nsingh navdeep.singh@nvish.com
tle tle@egia.com
tpiper tpiper@egia.com
bkagent bkagent@egia.com
Administrator Administrator@egia.com

Privileged Process Integrity

Mitre Att&ck - Mitigation - Privileged Process Integrity [1]

+ 10 Point(s)

Check if all privileged accounts are in the special group Protected Users.

Rule ID:

P-ProtectedUsers

Description:

The purpose is to ensure that all privileged accounts are in the Protected User security group

Technical explanation:

The Protected User group is a special security group which automatically applies protections to minimize credential exposure. Starting with Windows 8.1. Older Operating System must be updated to take this protection in account such as the Windows 7 KB2871997 patch.
For admins, it:
- Disables NTLM authentication
- Reduces Kerberos ticket lifetime
- Mandates strong encryption algorithms, such as AES
- Prevents password caching on workstations
- Prevents any type of Kerberos delegation

Please also note that a few links (see below) recommends that at least one account is kept outside of the group Protected Users in case there is a permission problem.
That's why this rule is not triggered if only one account is not protected.

Advised solution:

After having reviewed the potential impact on adding users to this group, add the missing privileged accounts to this group.

Points:

10 points if the occurence is greater than or equals than 2

Documentation:

https://docs.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/protected-users-security-group
https://blog.netwrix.com/2015/02/20/add-sensitive-user-accounts-to-active-directory-protected-users-group/
https://dirteam.com/sander/2014/11/25/ten-things-you-need-to-be-aware-of-before-using-the-protected-users-group/
https://blog.andreas-schreiner.de/2018/09/07/active-directory-sicherheit-teil-1-privilegierte-benutzer/
[FR]ANSSI - Privileged accounts outside of the Protected Users group (vuln3_protected_users)3
[MITRE]Mitre Att&ck - Mitigation - Privileged Process Integrity
[US]STIG V-78131 - Accounts with domain level administrative privileges must be members of the Protected Users group in domains with a domain functional level of Windows 2012 R2 or higher.
[FR]ANSSI CERTFR-2017-ALE-012

Details:

The detail can be found in Admin Groups

User
ADSyncAdmin-Local
itsonicwall
BCMBackup
nkahal
rmehra
nsingh
VipreService
saccount
pmanager
vmadmin
tle
tpiper
Consultant
devteamvpn
jvaladez
gpotest
ccramer
slathar
ejavaid
sharyl
spiceworks
itsupport
bkagent
Arcserve
Administrator
mwservice
techadmin
sonicwalladmin
mtech
fssa

Update Software

Mitre Att&ck - Mitigation - Update Software [6]

+ 10 Point(s)

Obsolete OS (Windows 10 or Windows 11)

Rule ID:

S-OS-W10

Description:

The purpose is to ensure that there is no use of non-supported version of Windows 10 or Windows 11 within the domain

Technical explanation:

Some versions of Windows 10 and Windows 11 OS are no longer supported, and may be vulnerable to exploits that are not patched anymore.

Advised solution:

In order to solve this security issue, you should upgrade all the Windows 10 or Windows 11 to a more recent version.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows 1*"}

Points:

15 points if the occurence is greater than or equals than 15
then 10 points if the occurence is greater than or equals than 6
then 5 points if present

Documentation:

https://docs.microsoft.com/en-us/windows/release-health/release-information
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

VersionNumberActive
Windows 10 1507 1 0
Windows 10 1703 3 0
Windows 10 1709 4 0
Windows 10 1803 9 0
Windows 10 1809 8 0
Windows 10 1511 1 0
Windows 10 1903 9 0
Windows 10 1909 6 0
Windows 10 2004 9 0
Windows 10 20H2 11 0
Windows 10 21H1 14 0
Windows 10 21H2 16 1
+ 5 Point(s)

Obsolete OS (Windows Server 2008)

Rule ID:

S-OS-2008

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2008 for the workstations within the domain

Technical explanation:

The Windows Server 2008 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.

Advised solution:

In order to solve this security issue, you should upgrade all the servers to a more recent version of Windows, starting from Windows Server 2012.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

15 points if the occurence is greater than or equals than 15
then 10 points if the occurence is greater than or equals than 6
then 5 points if present

Documentation:

https://support.microsoft.com/en-us/help/4456235/end-of-support-for-windows-server-2008-and-windows-server-2008-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

+ 5 Point(s)

Obsolete Domain Controller (Windows Server 2008)

Rule ID:

S-DC-2008

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2008 as Domain Controller within the domain

Technical explanation:

The OS Windows Server 2008 is not supported anymore by Microsoft (except when migrated to Azure, until January 9, 2024) and any vulnerability found will not be patched.

Advised solution:

To resolve this security risk, the only way is to decommission DCs running Windows Server 2008 OS, in order to use new versions that are more secure and that are still being patched regarding new security threats

Points:

5 points if present

Documentation:

https://support.microsoft.com/en-us/help/4456235/end-of-support-for-windows-server-2008-and-windows-server-2008-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[US]STIG V-8551 - The domain functional level must be at a Windows Server version still supported by Microsoft.
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R12 [subsection.3.1]

Details:

The operating system of domain controllers can be found in Domain controllers

+ 2 Point(s)

Obsolete OS (Windows Server 2012)

Rule ID:

S-OS-2012

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2012 for the workstations within the domain

Technical explanation:

The Windows Server 2012 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.

Advised solution:

In order to solve this security issue, you should upgrade all the servers to a more recent version of Windows, starting from Windows Server 2012.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

10 points if the occurence is greater than or equals than 15
then 5 points if the occurence is greater than or equals than 6
then 2 points if present

Documentation:

https://learn.microsoft.com/fr-fr/lifecycle/products/windows-server-2012-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

+ 1 Point(s)

Obsolete OS (Windows 7)

Rule ID:

S-OS-Win7

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows 7 for the workstations within the domain

Technical explanation:

The Windows 7 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.
PingCastle is trying to guess if Extended Security Support (ESU) has been purchased from Microsoft. Based on the documentation referenced below, the program checks if the script Activate-ProductOnline.ps1 is present.
If the script is detected, Windows 7 is considered as supported and this rule is not triggered.

Advised solution:

In order to solve this security issue, you should upgrade all the workstations to a more recent version of Windows, starting from Windows 10.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

5 points if the occurence is greater than or equals than 15
then 2 points if the occurence is greater than or equals than 6
then 1 points if present

Documentation:

https://techcommunity.microsoft.com/t5/windows-it-pro-blog/activate-windows-7-esus-on-multiple-devices-with-a-mak/ba-p/1167196
[FR]ANSSI CERTFR-2005-INF-003
[MITRE]Mitre Att&ck - Mitigation - Update Software

Details:

The detail can be found in Operating Systems

Informative rule

Ensure that the functional level of the domain and the forest are up to date to use the latest security features

Rule ID:

S-FunctionalLevel3

Description:

The purpose is checking the functional level of the domain and the forest, and ensure it is set to the latest secure version

Technical explanation:


Each functional level brings new security features:
* functional level Windows Server 2003: brings forest trusts and read-only domain controller (RODC) support;
* functional level Windows Server 2008: brings support for modern cryptographic algorithms such as AES and DFS for SYSVOL share replication;
* functional level Windows Server 2008R2: brings support for Active Directory Recycle Bin (protects objects against accidental deletion);
* functional level Windows Server 2012: brings advanced Kerberos features, such as compound authentication and claims support;
* functional level Windows Server 2012R2: brings numerous new security features such as authentication policies, authentication policy silos and the Protected users group;
* functional level Windows Server 2016 / 2019 / 2022: brings an upgraded smart card logon security and Privileged Identity Management (PIM) trust relationships between forests.

Advised solution:

You have to raise the functional level of the domain or the forest (see the details to know if the domain and/or forest is concerned).
The recommended level is the functional level 7 (Windows Server 2016 / 2019 / 2022)

To upgrade the functional level, a requirement is that all domain controllers are running the right version.
Also, functional level needs to be upgraded level by level.

Points:

Informative rule (0 point)

Documentation:

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-functional-levels
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/identifying-your-functional-level-upgrade
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/raise-active-directory-domain-forest-functional-levels
[FR]ANSSI - Insufficient forest and domains functional levels (vuln3_vuln_functional_level)3
[MITRE]Mitre Att&ck - Mitigation - Update Software

Details:

The functional levels are indicated in Domain Information

TypeLevel
Domain Windows Server 2008 R2
Forest Windows Server 2008 R2

User Account Management

Mitre Att&ck - Mitigation - User Account Management [4]

+ 30 Point(s)

Inactive computer check

Rule ID:

S-C-Inactive

Description:

The purpose is to ensure that there are as few inactive computers as possible within the domain.

Technical explanation:

Inactive computers often stay in the network because of weaknesses in the decommissioning process. These stale computer accounts can be used as backdoors and therefore represents a possible security breach.

Advised solution:

To mitigate the risk, you should monitor the number of inactive accounts and reduce it as much as possible. A list of all inactive accounts is obtainable through the command: Search-ADAccount –AccountInActive –ComputersOnly –TimeSpan 180:00:00:00 –ResultPageSize 2000 –ResultSetSize $null | ?{$_.Enabled –eq $True} | Select-Object Name, SamAccountName, DistinguishedName.

Points:

30 points if the occurence is greater than or equals than 30
then 10 points if the occurence is greater than or equals than 20
then 5 points if the occurence is greater than or equals than 15

Documentation:

[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R45 [paragraph.3.6.6.2]
[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Inactive servers (vuln3_password_change_inactive_servers)3

+ 10 Point(s)

Vulnerable Schema Class check

Rule ID:

S-ADRegistrationSchema

Description:

The purpose is to ensure that no schema class can be used to create arbitrary objects

Technical explanation:

The classes added to the schema provide additional object types. If misconfigured, a class can be used to bypass a security restriction.
For the vulnerability PossSuperiorComputer:
A class has the attribute possSuperiors containing the class "computer" and this class inherits from "container".
That means that every computer can request this class to be added.
Once this class has been added, it can be used as a container to create additional users or computers without restrictions.

For the vulnerability PossSuperiorUser:
It is the same vulnerability as PossSuperiorComputer but with the "user" class instead of the "computer" class.

Advised solution:

For PossSuperiorComputer:
You have to edit the schema to change the value of the attribute possSuperior and remove the "computer" value.
A PowerShell script in the documentation provides a fix.

For PossSuperiorUser:
You have to edit the schema to change the value of the attribute possSuperior and remove the "user" value.
A PowerShell script in the documentation provides a fix.

Also the class msExchStorageGroup is known to have this vulnerability via the CVE-2021-34470.
In this case, the vulnerability is exploitable even if Exchange has been uninstalled.

Points:

10 points if present

Documentation:


https://bugs.chromium.org/p/project-zero/issues/detail?id=2186
https://gist.github.com/IISResetMe/399a75cfccabc1a17d0cc3b5ae29f3aa#file-update-msexchstoragegroupschema-ps1
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34470
[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Schema class allowing dangerous object creation (vuln2_warning_schema_posssuperiors)2

Details:
ClassVulnerability
msExchStorageGroup PossSuperiorComputer
+ 10 Point(s)

Inactive account check

Rule ID:

S-Inactive

Description:

The purpose is to ensure that there are as few inactive accounts as possible within the domain. Stale user accounts are a significant security issue, as former employees and external attackers could use those accounts to attack the organization.

Technical explanation:

Inactive accounts often stay in the network because of weaknesses in the decommissioning process. These stale computer accounts can be used as backdoors and therefore represents a possible security breach.

Advised solution:

To mitigate the risk, you should monitor the number of inactive accounts and reduce it as much as possible. A list of all inactive accounts is obtainable through the command: Search-ADAccount –AccountInActive –UsersOnly –TimeSpan 180:00:00:00 –ResultPageSize 2000 –ResultSetSize $null | ?{$_.Enabled –eq $True} | Select-Object Name, SamAccountName, DistinguishedName.

Points:

10 points if the occurence is greater than or equals than 25

Documentation:

[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R45 [paragraph.3.6.6.2]
[FR]ANSSI - Dormant accounts (vuln1_user_accounts_dormant)1

Details:

The detail can be found in User information and Computer information

Informative rule

Check if default OU location has been changed within the domain.

Rule ID:

S-DefaultOUChanged

Description:

The purpose is to ensure that the default location of computers and user OU has not been changed.

Technical explanation:

Default OU such as CN=Computers or CN=Users are stored within the wellKnownObjects attribute of the Domain object.
There are 12 default locations officialy defined.
They can be changed using the program redircmp.
Changing these default can alter the behavior of programs (such as security audit programs) as they may not check the modified objects.

Advised solution:

You have to use redircmp to set the value back to normal. See documentation for more details

Points:

Informative rule (0 point)

Documentation:

https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5a00c890-6be5-4575-93c4-8bf8be0ca8d8
https://rickardnobel.se/verify-redirected-computers-container-in-active-directory/
[MITRE]Mitre Att&ck - Mitigation - User Account Management

Details:
ExpectedFound
CN=Computers,DC=egia,DC=com OU=Computers,OU=MS365EGIA,DC=egia,DC=com
050100

Stale Objects : 100 /100

It is about operations related to user or computer objects

+ 30 Point(s)

Inactive computer check

Rule ID:

S-C-Inactive

Description:

The purpose is to ensure that there are as few inactive computers as possible within the domain.

Technical explanation:

Inactive computers often stay in the network because of weaknesses in the decommissioning process. These stale computer accounts can be used as backdoors and therefore represents a possible security breach.

Advised solution:

To mitigate the risk, you should monitor the number of inactive accounts and reduce it as much as possible. A list of all inactive accounts is obtainable through the command: Search-ADAccount –AccountInActive –ComputersOnly –TimeSpan 180:00:00:00 –ResultPageSize 2000 –ResultSetSize $null | ?{$_.Enabled –eq $True} | Select-Object Name, SamAccountName, DistinguishedName.

Points:

30 points if the occurence is greater than or equals than 30
then 10 points if the occurence is greater than or equals than 20
then 5 points if the occurence is greater than or equals than 15

Documentation:

[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R45 [paragraph.3.6.6.2]
[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Inactive servers (vuln3_password_change_inactive_servers)3

+ 15 Point(s)

Ensure that the NTLMv1 and old LM protocols are banned

Rule ID:

S-OldNtlm

Description:

The purpose is to check if NTLMv1 or LM can be used by DC

Technical explanation:

NTLMv1 is an old protocol which is known to be vulnerable to cryptographic attacks.
It is typically used when a hacker sniffs the network and tries to retrieve NTLM hashes which can then be used to impersonate users.

This attack can be combined with coerced authentication attacks - a hacker forces the DC to connect to a controlled host.
In this case, NTLMv1 can be specified so the hacker can retrieve the NTLM hash of the DC, impersonates it and then take control of the domain.
This attack is still possible with NTLMv2 but this is more difficult.

Windows has default security settings regarding LM/NTLM. Windows XP: Send LM & NTLM responses, Windows Server 2003: Send NTLM response only, Vista/2008: Win7/2008 R2: Send NTLMv2 response only.

However Domain Controllers have relaxed default settings to accept the connection of older operating systems.
That means that by default, NTLMv1 is accepted on domain controllers.
If no GPO defines the LAN Manager Authentication Level, the DC fall back to the non secure default.

Advised solution:

After an audit of NTLMv1 usage (see the links below), you need to raise the LAN Manager Authentication Level to "Send NTLMv2 response only. Refuse LM & NTLM".
This can be done by editing the policy "Network security: LAN Manager authentication level" which can be accessed in Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
The policy will be applied after a computer reboot.

Beware that you may break software which is not compatible with Ntlmv2 such as very old Linux stacks or very old Windows before Windows Vista.
But please note that Ntlmv2 can be activited on all Windows starting Windows 95 and other operating systems.

Points:

15 points if present

Documentation:

https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/audit-domain-controller-ntlmv1
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-lan-manager-authentication-level
https://learn.microsoft.com/en-us/troubleshoot/windows-client/windows-security/enable-ntlm-2-authentication
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R37 [paragraph.3.6.2.1]

Details:

The detail can be found in Security settings

GPOValue
Windows default without an active GPO 3
+ 15 Point(s)

Check the use of Kerberos with weak encryption (DES algorithm)

Rule ID:

S-DesEnabled

Description:

The purpose is to verify that no weak encryption algorithm such as DES is used for accounts.

Technical explanation:

DES is a very weak algorithm and once assigned to an account, it can be used in Kerberos ticket requests, even though it is easily cracked. If the attacker cracks the Kerberos ticket, they can steal the token and compromise the user account.

Advised solution:

It is recommended to disable DES as an encryption algorithm in the user configuration dialog or in the "msDSSupportedEncryptionTypes" attribute at LDAP level. It has to be disabled in the property of an account by unchecking the box "Use Kerberos DES encryption for this account". You can also detect which accounts support Kerberos DES encryption by running: Get-ADObject -Filter {UserAccountControl -band 0x200000 -or msDs-supportedEncryptionTypes -band 3}.

Points:

15 points if present

Documentation:

https://docs.microsoft.com/en-us/archive/blogs/openspecification/msds-supportedencryptiontypes-episode-1-computer-accounts
https://docs.microsoft.com/en-us/services-hub/health/remediation-steps-ad/remove-the-highly-insecure-des-encryption-from-user-accounts
[FR]ANSSI - Use of Kerberos with weak encryption (vuln2_kerberos_properties_deskey)2
[MITRE]T1558.004 Steal or Forge Kerberos Tickets: AS-REP Roasting

Details:

The detail can be found in User information and Computer information

+ 15 Point(s)

Check for hidden group membership for user accounts

Rule ID:

S-PrimaryGroup

Description:

The purpose is to check for unusual values in the primarygroupid attribute used to store group memberships

Technical explanation:

In Active Directory, group membership is stored on the "members" attribute and on the "primarygroupid" attribute. The default primary group value is "Domain Users" for the users, "Domain Computers" for the computers and "Domain Controllers" for the domain controllers. The primarygroupid contains the RID (last digits of a SID) of the group targeted. It can be used to store hidden membership as this attribute is not often analyzed.

Advised solution:

Unless strongly justified, change the primary group id to its default: 513 or 514 for users, 516 or 521 for domain controllers, 514 or 515 for computers. The primary group can be edited in a friendly manner by editing the account with the "Active Directory Users and Computers" and after selecting the "Member Of" tab, "set primary group".
You can use the following script to list Users with a primary group id different from domain users:
$DomainUsersSid = New-Object System.Security.Principal.SecurityIdentifier ([System.Security.Principal.WellKnownSidType]::AccountDomainUsersSid,(Get-ADDomain).DomainSID)

Get-ADUser -Filter * -Properties PrimaryGroup | Where-Object { $_.PrimaryGroup -ne (Get-ADGroup -Filter {SID -eq $DomainUsersSid} ).DistinguishedName } | Select-Object UserPrincipalName,PrimaryGroup

Points:

15 points if present

Documentation:

[FR]ANSSI - Accounts with modified PrimaryGroupID (vuln3_primary_group_id_nochange)3
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in User information and Computer information

+ 10 Point(s)

Obsolete OS (Windows 10 or Windows 11)

Rule ID:

S-OS-W10

Description:

The purpose is to ensure that there is no use of non-supported version of Windows 10 or Windows 11 within the domain

Technical explanation:

Some versions of Windows 10 and Windows 11 OS are no longer supported, and may be vulnerable to exploits that are not patched anymore.

Advised solution:

In order to solve this security issue, you should upgrade all the Windows 10 or Windows 11 to a more recent version.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows 1*"}

Points:

15 points if the occurence is greater than or equals than 15
then 10 points if the occurence is greater than or equals than 6
then 5 points if present

Documentation:

https://docs.microsoft.com/en-us/windows/release-health/release-information
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

VersionNumberActive
Windows 10 1507 1 0
Windows 10 1703 3 0
Windows 10 1709 4 0
Windows 10 1803 9 0
Windows 10 1809 8 0
Windows 10 1511 1 0
Windows 10 1903 9 0
Windows 10 1909 6 0
Windows 10 2004 9 0
Windows 10 20H2 11 0
Windows 10 21H1 14 0
Windows 10 21H2 16 1
+ 10 Point(s)

Inactive account check

Rule ID:

S-Inactive

Description:

The purpose is to ensure that there are as few inactive accounts as possible within the domain. Stale user accounts are a significant security issue, as former employees and external attackers could use those accounts to attack the organization.

Technical explanation:

Inactive accounts often stay in the network because of weaknesses in the decommissioning process. These stale computer accounts can be used as backdoors and therefore represents a possible security breach.

Advised solution:

To mitigate the risk, you should monitor the number of inactive accounts and reduce it as much as possible. A list of all inactive accounts is obtainable through the command: Search-ADAccount –AccountInActive –UsersOnly –TimeSpan 180:00:00:00 –ResultPageSize 2000 –ResultSetSize $null | ?{$_.Enabled –eq $True} | Select-Object Name, SamAccountName, DistinguishedName.

Points:

10 points if the occurence is greater than or equals than 25

Documentation:

[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R45 [paragraph.3.6.6.2]
[FR]ANSSI - Dormant accounts (vuln1_user_accounts_dormant)1

Details:

The detail can be found in User information and Computer information

+ 10 Point(s)

Vulnerable Schema Class check

Rule ID:

S-ADRegistrationSchema

Description:

The purpose is to ensure that no schema class can be used to create arbitrary objects

Technical explanation:

The classes added to the schema provide additional object types. If misconfigured, a class can be used to bypass a security restriction.
For the vulnerability PossSuperiorComputer:
A class has the attribute possSuperiors containing the class "computer" and this class inherits from "container".
That means that every computer can request this class to be added.
Once this class has been added, it can be used as a container to create additional users or computers without restrictions.

For the vulnerability PossSuperiorUser:
It is the same vulnerability as PossSuperiorComputer but with the "user" class instead of the "computer" class.

Advised solution:

For PossSuperiorComputer:
You have to edit the schema to change the value of the attribute possSuperior and remove the "computer" value.
A PowerShell script in the documentation provides a fix.

For PossSuperiorUser:
You have to edit the schema to change the value of the attribute possSuperior and remove the "user" value.
A PowerShell script in the documentation provides a fix.

Also the class msExchStorageGroup is known to have this vulnerability via the CVE-2021-34470.
In this case, the vulnerability is exploitable even if Exchange has been uninstalled.

Points:

10 points if present

Documentation:


https://bugs.chromium.org/p/project-zero/issues/detail?id=2186
https://gist.github.com/IISResetMe/399a75cfccabc1a17d0cc3b5ae29f3aa#file-update-msexchstoragegroupschema-ps1
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34470
[MITRE]Mitre Att&ck - Mitigation - User Account Management
[FR]ANSSI - Schema class allowing dangerous object creation (vuln2_warning_schema_posssuperiors)2

Details:
ClassVulnerability
msExchStorageGroup PossSuperiorComputer
+ 10 Point(s)

DC vulnerability (SMB v1)

Rule ID:

S-SMB-v1

Description:

The purpose is to verify if Domain Controller(s) are vulnerable to the SMB v1 vulnerability

Technical explanation:

The SMB downgrade attack is used to obtain credentials or executing commands on behalf of a user by using SMB v1 as protocol. Indeed, because SMB v1 supports old authentication protocol, the integrity can be bypassed

Advised solution:

It is highly recommended by Microsoft to disable SMB v1 whenever it is possible on both client and server-side. Do note that if you are still not following best practices regarding the usage of deprecated OS (Windows 2000, 2003, XP, CE), regarding Network printer using SMBv1 scan2shares functionalities, or regarding software accessing Windows share with a custom implementation relying on SMB v1, you should consider fixing these issues before disabling SMB v1, as it will generate additional errors.

Points:

10 points if present

Documentation:

https://github.com/lgandx/Responder-Windows
https://blogs.technet.microsoft.com/josebda/2015/04/21/the-deprecation-of-smb1-you-should-be-planning-to-get-rid-of-this-old-smb-dialect
https://docs.microsoft.com/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3
[FR]ANSSI CERTFR-2017-ACT-019
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
[FR]ANSSI CERTFR-2016-ACT-039

Details:

The detail can be found in Domain controllers

Domain controller
EGIADC01W
+ 5 Point(s)

Obsolete OS (Windows Server 2008)

Rule ID:

S-OS-2008

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2008 for the workstations within the domain

Technical explanation:

The Windows Server 2008 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.

Advised solution:

In order to solve this security issue, you should upgrade all the servers to a more recent version of Windows, starting from Windows Server 2012.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

15 points if the occurence is greater than or equals than 15
then 10 points if the occurence is greater than or equals than 6
then 5 points if present

Documentation:

https://support.microsoft.com/en-us/help/4456235/end-of-support-for-windows-server-2008-and-windows-server-2008-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

+ 5 Point(s)

Obsolete Domain Controller (Windows Server 2008)

Rule ID:

S-DC-2008

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2008 as Domain Controller within the domain

Technical explanation:

The OS Windows Server 2008 is not supported anymore by Microsoft (except when migrated to Azure, until January 9, 2024) and any vulnerability found will not be patched.

Advised solution:

To resolve this security risk, the only way is to decommission DCs running Windows Server 2008 OS, in order to use new versions that are more secure and that are still being patched regarding new security threats

Points:

5 points if present

Documentation:

https://support.microsoft.com/en-us/help/4456235/end-of-support-for-windows-server-2008-and-windows-server-2008-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[US]STIG V-8551 - The domain functional level must be at a Windows Server version still supported by Microsoft.
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R12 [subsection.3.1]

Details:

The operating system of domain controllers can be found in Domain controllers

+ 5 Point(s)

Duplicate account check

Rule ID:

S-Duplicate

Description:

The purpose is to check if there are duplicate accounts within the domain. A duplicate account is essentially a duplicate of two objects having the same attributes.

Technical explanation:

To identify a duplicate account, a check is performed on the "DN" and the "sAMAccountName". When a DC detects a conflict, there is a replacement performed on the second object.

Advised solution:

Duplicate accounts being present often means there are process failures, and they should be identified and removed. To identify all duplicate accounts, you can use the following PowerShell commands: get-adobject -ldapfilter "(cn=*cnf:*)" ; get-adobject -ldapfilter "(sAMAccountName=$duplicate)"

Points:

5 points if present

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in User information and Computer information

+ 2 Point(s)

Obsolete OS (Windows Server 2012)

Rule ID:

S-OS-2012

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows Server 2012 for the workstations within the domain

Technical explanation:

The Windows Server 2012 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.

Advised solution:

In order to solve this security issue, you should upgrade all the servers to a more recent version of Windows, starting from Windows Server 2012.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

10 points if the occurence is greater than or equals than 15
then 5 points if the occurence is greater than or equals than 6
then 2 points if present

Documentation:

https://learn.microsoft.com/fr-fr/lifecycle/products/windows-server-2012-r2
[MITRE]Mitre Att&ck - Mitigation - Update Software
[FR]ANSSI CERTFR-2005-INF-003

Details:

The detail can be found in Operating Systems

+ 1 Point(s)

Obsolete OS (Windows 7)

Rule ID:

S-OS-Win7

Description:

The purpose is to ensure that there is no use of the obsolete and vulnerable OS Windows 7 for the workstations within the domain

Technical explanation:

The Windows 7 OS is no longer supported, as it is vulnerable to many publicly known exploits: Administrator's credentials can be captured, security protocols are weak, etc.
PingCastle is trying to guess if Extended Security Support (ESU) has been purchased from Microsoft. Based on the documentation referenced below, the program checks if the script Activate-ProductOnline.ps1 is present.
If the script is detected, Windows 7 is considered as supported and this rule is not triggered.

Advised solution:

In order to solve this security issue, you should upgrade all the workstations to a more recent version of Windows, starting from Windows 10.
Use PingCastle.exe and select export on the main menu. Then choose to export computers. PingCastle will produce a list of all your computers with the OS version in a csv file. You can then use Excel to filter them.
Do note that you can get the full details regarding the OS used with the following PowerShell command: Get-ADComputer -Filter * -Property * | Format-Table Name,OperatingSystem,OperatingSystemServicePack,OperatingSystemVersion -Wrap -Auto | where {$_.enabled -eq $true}
You can replace -Filter * with -Filter {OperatingSystem -Like "Windows Server*"}

Points:

5 points if the occurence is greater than or equals than 15
then 2 points if the occurence is greater than or equals than 6
then 1 points if present

Documentation:

https://techcommunity.microsoft.com/t5/windows-it-pro-blog/activate-windows-7-esus-on-multiple-devices-with-a-mak/ba-p/1167196
[FR]ANSSI CERTFR-2005-INF-003
[MITRE]Mitre Att&ck - Mitigation - Update Software

Details:

The detail can be found in Operating Systems

+ 1 Point(s)

Check that there is no account with never-expiring passwords

Rule ID:

S-PwdNeverExpires

Description:

The purpose is to ensure that every account has a password which is compliant with password expiration policies

Technical explanation:

Some accounts have passwords which never expire. Should an attacker compromise one of these accounts, he would be able to maintain long-term access to the Active Directory domain.

We have noted that some Linux servers, domain joined, are configured with a password which never expires.
This is a misconfiguration because a password change can be configured. It was however not the default on some plateform.
See one of the link below for more information.

Advised solution:

In order to make Active Directory enforce periodic password change, accounts must not have the "Password never expires" flag set in the "Account" tab of the user properties. Their passwords should then be rolled immediately.
For services accounts, Windows provide the "managed service accounts" and "group managed service accounts" features to facilite the automatic change of passwords.
Please note that there is a document in the section below which references solutions for service accounts of well known products.
Also Linux servers should be configured with automatic machine account change.

Points:

1 points if present

Documentation:

https://adsecurity.org/?p=4115
https://access.redhat.com/discussions/1283873
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration
[FR]ANSSI - Accounts with never-expiring passwords (vuln2_dont_expire)2

Details:

The detail can be found in User information

Informative rule

Check if default OU location has been changed within the domain.

Rule ID:

S-DefaultOUChanged

Description:

The purpose is to ensure that the default location of computers and user OU has not been changed.

Technical explanation:

Default OU such as CN=Computers or CN=Users are stored within the wellKnownObjects attribute of the Domain object.
There are 12 default locations officialy defined.
They can be changed using the program redircmp.
Changing these default can alter the behavior of programs (such as security audit programs) as they may not check the modified objects.

Advised solution:

You have to use redircmp to set the value back to normal. See documentation for more details

Points:

Informative rule (0 point)

Documentation:

https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5a00c890-6be5-4575-93c4-8bf8be0ca8d8
https://rickardnobel.se/verify-redirected-computers-container-in-active-directory/
[MITRE]Mitre Att&ck - Mitigation - User Account Management

Details:
ExpectedFound
CN=Computers,DC=egia,DC=com OU=Computers,OU=MS365EGIA,DC=egia,DC=com
Informative rule

Ensure that the functional level of the domain and the forest are up to date to use the latest security features

Rule ID:

S-FunctionalLevel3

Description:

The purpose is checking the functional level of the domain and the forest, and ensure it is set to the latest secure version

Technical explanation:


Each functional level brings new security features:
* functional level Windows Server 2003: brings forest trusts and read-only domain controller (RODC) support;
* functional level Windows Server 2008: brings support for modern cryptographic algorithms such as AES and DFS for SYSVOL share replication;
* functional level Windows Server 2008R2: brings support for Active Directory Recycle Bin (protects objects against accidental deletion);
* functional level Windows Server 2012: brings advanced Kerberos features, such as compound authentication and claims support;
* functional level Windows Server 2012R2: brings numerous new security features such as authentication policies, authentication policy silos and the Protected users group;
* functional level Windows Server 2016 / 2019 / 2022: brings an upgraded smart card logon security and Privileged Identity Management (PIM) trust relationships between forests.

Advised solution:

You have to raise the functional level of the domain or the forest (see the details to know if the domain and/or forest is concerned).
The recommended level is the functional level 7 (Windows Server 2016 / 2019 / 2022)

To upgrade the functional level, a requirement is that all domain controllers are running the right version.
Also, functional level needs to be upgraded level by level.

Points:

Informative rule (0 point)

Documentation:

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-functional-levels
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/identifying-your-functional-level-upgrade
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/raise-active-directory-domain-forest-functional-levels
[FR]ANSSI - Insufficient forest and domains functional levels (vuln3_vuln_functional_level)3
[MITRE]Mitre Att&ck - Mitigation - Update Software

Details:

The functional levels are indicated in Domain Information

TypeLevel
Domain Windows Server 2008 R2
Forest Windows Server 2008 R2
050100

Privileged Accounts : 100 /100

It is about administrators of the Active Directory

+ 30 Point(s)

Check for inactive administrator accounts

Rule ID:

P-Inactive

Description:

The purpose is to ensure that all Administrator Accounts in the AD are necessary and used

Technical explanation:

Accounts within the AD have attributes indicating the creation date of the account and the last login of this account. Accounts which haven't have a login since 6 months or created more than 6 months ago without any login are considered inactive. If an Administrator Account is set as inactive, the reason for having Administrator rights should be strongly justified.

Advised solution:

To correct the situation, you should make sure that all your Administrator Account(s) are "Active", meaning that you should remove Administrator rights if an account is set as not "Active"

Points:

30 points if the occurence is greater than or equals than 30
then 20 points if the occurence is greater than or equals than 15

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R36 [subsection.3.6]

+ 20 Point(s)

At least one administrator account can be delegated

Rule ID:

P-Delegated

Description:

The purpose is to ensure that all Administrator Accounts have the configuration flag "this account is sensitive and cannot be delegated" (or are members of the built-in group "Protected Users" when your domain functional level is at least Windows Server 2012 R2).

Technical explanation:

Without the flag "This account is sensitive and cannot be delegated" any account can be impersonated by some service account. It is a best practice to enforce this flag on administrators accounts.

Advised solution:

To correct the situation, you should make sure that all your Administrator Accounts have the check-box "This account is sensitive and cannot be delegated" active or add your Administrator Accounts to the built-in group "Protected Users" if your domain functional level is at least Windows Server 2012 R2 (some functionalities may not work properly afterwards, you should check the official documentation).
If you want to enable the check-box "This account is sensitive and cannot be delegated" but this is not possible because the box is not present (typically for GMSA accounts), you can add the flag manually by adding the number 1048576 to the attribute useraccountcontrol of the account.
Please note that there is a section below in this report named "Admin Groups" which gives more information.

Points:

20 points if present

Documentation:

[US]STIG V-36435 - Delegation of privileged accounts must be prohibited.
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in Admin Groups

+ 20 Point(s)

Check if admin accounts are vulnerable to the Kerberoast attack.

Rule ID:

P-Kerberoasting

Description:

The purpose is to ensure that the password of admin accounts cannot be retrieved using the Kerberoast attack.

Technical explanation:

To access a service using Kerberos, a user requests a ticket (named TGS) to the DC specific to the service.
This ticket is encrypted using a derivative of the service password, but can be brute-forced to retrieve the original password.
Any account having the attribute SPN populated is considered as a service account.
Given that any user can request a ticket for a service account, these accounts can have their password retrieved.
In addition, services are known to have their password not changed at a regular basis and to use well-known words.

Please note that this program ignores service accounts that had their password changed in the last 40 days ago to support using password rotation as a mitigation.

Advised solution:

If the account is a service account, the service should be removed from the privileged group or have a process to change its password at a regular basis.
If the user is a person, the SPN attribute of the account should be removed.

Points:

5 points per discovery

Documentation:

https://adsecurity.org/?p=3466
[FR]ANSSI - Privileged accounts with SPN (vuln1_spn_priv)1
[MITRE]T1558.003 Steal or Forge Kerberos Tickets: Kerberoasting

Details:

The detail can be found in Admin Groups

GroupUser
Administrators Administrator
Domain Administrators Administrator
Enterprise Administrators Administrator
Schema Administrators Administrator
+ 15 Point(s)

Check if Service Accounts (aka accounts with never expiring password) are domain administrators

Rule ID:

P-ServiceDomainAdmin

Description:

The purpose is to check for accounts with non-expiring passwords in the "Domain Administrator" group

Technical explanation:

PingCastle is checking accounts with never expiring password, that are mostly used as service accounts.
"Service Accounts" can imply a high security risk as their password are stored in clear text in the LSA database, which can then be easily exploited using Mimikatz or Cain&Abel for instance. In addition, their passwords don't change and can be used in Kerberoast attacks.

Advised solution:

Accounts with never expiring passwords are mostly service accounts.
To mitigate the security risk, it is strongly advised to lower the privileges of the "Service Accounts", meaning that they should be removed from the "Domain Administrator" group, while ensuring that the password of each and every "Service Account" is longer than 20 characters

Points:

15 points if the occurence is greater than or equals than 2

Documentation:

[FR]ANSSI - Privileged accounts with never-expiring passwords (vuln1_dont_expire_priv)1
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R11 [subsection.2.5]
[US]STIG V-36432 - Membership to the Domain Admins group must be restricted to accounts used only to manage the Active Directory domain and domain controllers.
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[MITRE]T1003.004 OS Credential Dumping: LSA Secrets

Details:

The detail can be found in Admin Groups

+ 10 Point(s)

Ensure that the Recycle Bin feature is enabled

Rule ID:

P-RecycleBin

Description:

The purpose is to ensure that the Recycle Bin feature is enabled

Technical explanation:

The Recycle Bin avoids immediate deletion of objects (which can still be partially recovered by its tombstone). This lowers the administration work needed to restore. It also extends the period where traces are available when an investigation is needed.

Advised solution:

First, be sure that the forest level is at least Windows Server 2008 R2.
You can check it with Get-ADForest or in the Domain Information section.
Then you can enable it using the PowerShell command:
Enable-ADOptionalFeature -Identity 'Recycle Bin Feature' -Scope ForestOrConfigurationSet -Target 'test.mysmartlogon.com'

Points:

10 points if present

Documentation:

https://enterinit.com/powershell-enable-active-directory-recycle-bin
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Domain Information

+ 10 Point(s)

Avoid unexpected schema modifications which could result in domain rebuild

Rule ID:

P-SchemaAdmin

Description:

The purpose is to ensure that no account can make unexpected modifications to the schema

Technical explanation:

The group "Schema Admins" is used to give permissions to alter the schema. Once a modification is performed on the schema such as new objects, it cannot be undone. This can result in a rebuild of the domain. The best practice is to have this group empty and to add an administrator when a schema update is required, then remove this group membership.

Advised solution:

Remove the accounts or groups belonging to the "schema administrators" group.

Points:

10 points if present

Documentation:

[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R13 [subsection.3.2]
[US]STIG V-72835 - Membership to the Schema Admins group must be limited
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:

The detail can be found in Admin Groups

+ 10 Point(s)

Check if all privileged accounts are in the special group Protected Users.

Rule ID:

P-ProtectedUsers

Description:

The purpose is to ensure that all privileged accounts are in the Protected User security group

Technical explanation:

The Protected User group is a special security group which automatically applies protections to minimize credential exposure. Starting with Windows 8.1. Older Operating System must be updated to take this protection in account such as the Windows 7 KB2871997 patch.
For admins, it:
- Disables NTLM authentication
- Reduces Kerberos ticket lifetime
- Mandates strong encryption algorithms, such as AES
- Prevents password caching on workstations
- Prevents any type of Kerberos delegation

Please also note that a few links (see below) recommends that at least one account is kept outside of the group Protected Users in case there is a permission problem.
That's why this rule is not triggered if only one account is not protected.

Advised solution:

After having reviewed the potential impact on adding users to this group, add the missing privileged accounts to this group.

Points:

10 points if the occurence is greater than or equals than 2

Documentation:

https://docs.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/protected-users-security-group
https://blog.netwrix.com/2015/02/20/add-sensitive-user-accounts-to-active-directory-protected-users-group/
https://dirteam.com/sander/2014/11/25/ten-things-you-need-to-be-aware-of-before-using-the-protected-users-group/
https://blog.andreas-schreiner.de/2018/09/07/active-directory-sicherheit-teil-1-privilegierte-benutzer/
[FR]ANSSI - Privileged accounts outside of the Protected Users group (vuln3_protected_users)3
[MITRE]Mitre Att&ck - Mitigation - Privileged Process Integrity
[US]STIG V-78131 - Accounts with domain level administrative privileges must be members of the Protected Users group in domains with a domain functional level of Windows 2012 R2 or higher.
[FR]ANSSI CERTFR-2017-ALE-012

Details:

The detail can be found in Admin Groups

User
ADSyncAdmin-Local
itsonicwall
BCMBackup
nkahal
rmehra
nsingh
VipreService
saccount
pmanager
vmadmin
tle
tpiper
Consultant
devteamvpn
jvaladez
gpotest
ccramer
slathar
ejavaid
sharyl
spiceworks
itsupport
bkagent
Arcserve
Administrator
mwservice
techadmin
sonicwalladmin
mtech
fssa
+ 10 Point(s)

Check if all admin passwords are changed on the field.

Rule ID:

P-AdminPwdTooOld

Description:

The purpose is to ensure that all admins are changing their passwords at least every 3 years

Technical explanation:

This rule ensure that passwords of administrator are well managed.

Advised solution:

We advised to read the ANSSI guidelines about this, which is quoted in the documentation section below.

Points:

10 points if present

Documentation:

[FR]ANSSI - Privileged account passwords age too old (vuln1_password_change_priv)1
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:

The detail can be found in Admin Groups

AccountCreationLastChanged
itsonicwall 2019-08-01 23:45:55Z 2019-08-01 16:45:55Z
BCMBackup 2012-11-27 22:16:25Z 2012-11-27 14:16:25Z
nkahal 2010-12-20 04:57:36Z 2011-12-26 12:25:15Z
rmehra 2012-07-11 06:02:30Z 2013-01-17 21:51:15Z
VipreService 2011-01-20 19:58:42Z 2011-06-27 23:55:45Z
saccount 2010-11-21 21:35:59Z 2010-11-21 13:35:59Z
pmanager 2010-11-21 21:28:03Z 2010-11-21 13:28:03Z
vmadmin 2016-08-23 21:50:09Z 2016-08-23 14:50:09Z
tle 2010-08-23 15:26:48Z 2012-11-28 15:21:13Z
tpiper 2007-04-19 15:08:14Z 2015-08-07 10:50:09Z
Consultant 2002-09-17 17:27:04Z 2010-11-21 13:30:35Z
devteamvpn 2018-03-09 20:54:37Z 2021-02-07 19:25:13Z
jvaladez 2013-05-20 13:55:31Z 2020-06-17 17:00:36Z
gpotest 2016-10-25 17:51:34Z 2016-10-28 14:29:32Z
ccramer 2014-07-25 20:03:05Z 2020-02-14 06:02:29Z
ejavaid 2010-12-02 14:38:38Z 2011-12-08 16:17:21Z
sharyl 2017-01-16 22:49:14Z 2017-03-01 14:32:43Z
spiceworks 2016-09-22 16:51:38Z 2016-10-11 06:12:25Z
itsupport 2016-09-20 19:02:53Z 2017-01-19 15:58:36Z
bkagent 2002-05-07 14:37:57Z 2002-09-26 15:32:26Z
Arcserve 2001-10-06 18:33:48Z 2001-01-19 11:20:31Z
Administrator 2001-10-06 18:33:47Z 2015-04-08 09:31:00Z
techadmin 2019-05-31 17:04:45Z 2019-05-31 10:04:45Z
sonicwalladmin 2017-07-13 17:08:10Z 2017-07-13 10:08:10Z
mtech 2019-03-19 20:55:34Z 2020-06-15 16:25:19Z
fssa 2016-11-15 18:46:41Z 2016-11-15 10:46:41Z
Informative rule

Check if administrator accounts are email enabled.

Rule ID:

P-AdminEmailOn

Description:

The purpose is to ensure proper isolation of administrative activities and to prevent any admin from having an email address configured in the domain.

Technical explanation:

The recommended approach for secure administration is to implement a Tier Zero model.
In this model, low privileged actions cannot be made by highly privileged accounts such as admins.
This means that, in practice, administrators should have two separate Windows accounts: one for regular activities and one for performing privileged actions.

Advised solution:

Ensure that administrators do not use the privileged account for browsing the internet or receiving emails.
We highly recommend that you implement this practice to lower the risk of an admin compromise.

To remove this alert, you have to edit the properties of the user account and clear the email attribute.
Keep in mind that this action will silence the alert, but the risk may still be present.

Points:

Informative rule (0 point)

Documentation:

https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/securing-privileged-access-for-the-ad-admin-part-1/ba-p/259166
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management

Details:
AccountEmail
nkahal nkahal@egia.org
rmehra rmehra@egia.org
nsingh navdeep.singh@nvish.com
tle tle@egia.com
tpiper tpiper@egia.com
bkagent bkagent@egia.com
Administrator Administrator@egia.com
Informative rule

Check that the operator groups are empty

Rule ID:

P-OperatorsEmpty

Description:

The purpose is to ensure that the operator groups, which can have indirect control to the domain, are empty

Technical explanation:

Operator groups (Account Operators, Server Operators, ...) can take indirect control of the domain. Indeed, these groups have write access to critical resources of the domain.

Advised solution:

It is recommended to have these groups empty. Assign administrators into administrators group. Other accounts should have proper delegation rights in an OU or in the scope they are managing.

Points:

Informative rule (0 point)

Documentation:

[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R27 [subsection.3.5]

Details:

The detail can be found in Admin Groups

GroupMembers
Server Operators 2
Informative rule

Check if OUs and Containers are protected from accidental deletion.

Rule ID:

P-UnprotectedOU

Description:

The purpose is to ensure that Organizational Units (OUs) and Containers in Active Directory are protected to prevent accidental deletion, which could lead to data loss and disruptions in the network infrastructure.

Technical explanation:

In Active Directory, Organizational Units can be protected from accidental deletion (reads: using the del key in the wrong place at the wrong time).
This way these objects cannot be deleted, unless the protection is removed. This Active Directory feature was first introduced in Windows Server 2008.

This protection consists of a Deny ACE added to the NTSecurityDescriptor attribute applied to Everyone with the flag set to Delete and DeleteTree.

Advised solution:

To safeguard against accidental deletions, it is essential to enable the "Protect object from accidental deletion" option for critical OUs and Containers.
When this option is enabled, it adds an additional layer of security, preventing unintended deletions.
To implement this protection:

* Open the Active Directory Users and Computers management console.
* Locate the OU or Container that requires protection.
* Right-click on the OU or Container, select "Properties."
* In the "Object" tab, check the "Protect object from accidental deletion" option.
* Click "Apply" and then "OK" to save the changes.

You can list unprotected OU using the PowerShell command:
Get-ADOrganizationalUnit -filter {name -like "*"} -Properties ProtectedFromAccidentalDeletion | format-table Name,ProtectedFromAccidentalDeletion
and protect them using the command:
Get-ADOrganizationalUnit -filter {name -like "*"} -Properties ProtectedFromAccidentalDeletion | where {$_.ProtectedFromAccidentalDeletion -eq $false} | Set-ADOrganizationalUnit -ProtectedFromAccidentalDeletion $true

Note: only 10 will be listed below. Checkout the Delegations section for the complete list.

Points:

Informative rule (0 point)

Documentation:

https://dirteam.com/sander/2011/07/13/preventing-ous-and-containers-from-accidental-deletion/
[MITRE]Mitre Att&ck - Mitigation - Active Directory Configuration

Details:

The detail can be found in Delegations

OU
OU=Dell,DC=egia,DC=com
Informative rule

Check if the Dns Admins group is not empty

Rule ID:

P-DNSAdmin

Description:

The purpose is to ensure that the Dns Admins group is not used

Technical explanation:

Administrators of the DNS Service have the possibility to inject a DLL in this service.
However this service is hosted most of the time in the domain controller and is running as SYSTEM.
That means that DNS admins are potentially domain admins.

The security descriptor used to grant admin rights is located on the nTSecurityDescriptor attribute of the object CN=MicrosoftDNS,CN=System.
The "Write All Prop" access right induces the vulnerability.

In this case, the DnsAdmins group is not empty and grant to its user the possibility to interact with the DNS Service.

Advised solution:

Rule update:
The Patch Tuesday of October 2021 fixed this vulnerability and assigned it the identifier CVE-2021-40469.
If the patch has been applied, there is no additional mitigation to perform.

This rule is transformed into an informative rule in PingCastle 2.10.1 and will be removed in future versions of PingCastle.

You should remove the members of the Dns Admins group and do a proper delegation to the specific DNS Zones.

First, grant only "Read Property", "List", "List object" and "Read permssions" to CN=MicrosoftDNS,CN=System to enable access to the RPC service.

Then on each zone (the object in the tree below with the class dnsZone), grant "Read Property", "List", "List object", "Read permissions", "Create Child", "Delete Child", "Delete", "Delete Tree".

Points:

Informative rule (0 point)

Documentation:

https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dnsp/007efcd2-2955-46dd-a59e-f83ae88f4678
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - DnsAdmins group members (vuln4_dnsadmins)4

Details:

The detail can be found in Admin Groups

050100

Trusts : 0 /100

It is about links between two Active Directories

No rule matched

050100

Anomalies : 100 /100

It is about specific security control points

+ 50 Point(s)

Mitigate golden ticket attack via a regular change of the krbtgt password

Rule ID:

A-Krbtgt

Description:

The purpose is to alert when the password for the krbtgt account can be used to compromise the whole domain. This password can be used to sign every Kerberos ticket. Monitoring it closely often mitigates the risk of golden ticket attacks greatly.

Technical explanation:

Kerberos is an authentication protocol. It is using a secret, stored as the password of the krbtgt account, to sign its tickets. If the hash of the password of the krbtgt account is retrieved, it can be used to generate authentication tickets at will.
To mitigate this attack, it is recommended to change the krbtgt password between 40 days and 6 months. If this is not the case, every backup done until the last password change of the krbtgt account can be used to emit Golden tickets, compromising the entire domain.
Retrieval of this secret is one of the highest priority in an attack, as this password is rarely changed and offer a long term backdoor.
Also this attack can be performed using the former password of the krbtgt account. That's why the krbtgt password should be changed twice to invalidate its leak.

Advised solution:

The password of the krbtgt account should be changed twice to invalidate the golden ticket attack.
Beware: two changes of the krbtgt password not replicated to domain controllers can break these domain controllers You should wait at least 10 hours between each krbtgt password change (this is the duration of a ticket life).

There are several possibilities to change the krbtgt password.
First, a Microsoft script can be run in order to guarantee the correct replication of these secrets.
Second, a more manual way is to essentially reset the password manually once, then to wait 3 days (this is a replication safety delay), then to reset it again. This is the safest way as it ensures the password is no longer usable by the Golden ticket attack.

Points:

50 points if the occurence is greater than or equals than 1464
then 40 points if the occurence is greater than or equals than 1098
then 30 points if the occurence is greater than or equals than 732
then 20 points if the occurence is greater than or equals than 366

Documentation:

https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/faqs-from-the-field-on-krbtgt-reset/ba-p/2367838
https://github.com/microsoft/New-KrbtgtKeys.ps1
https://github.com/PSSecTools/Krbtgt
[FR]ANSSI CERTFR-2014-ACT-032
[FR]ANSSI - Krbtgt account password unchanged for more than a year (vuln2_krbtgt)2
[MITRE]T1558.001 Steal or Forge Kerberos Tickets: Golden Ticket

Details:

The detail can be found in Krbtgt

+ 15 Point(s)

Check for the last backup date according to Microsoft standard

Rule ID:

A-BackupMetadata

Description:

The purpose is to check if the backups are actually up to date in case they are needed. The alert can be triggered when a domain is backed up using non-recommended methods

Technical explanation:

A verification is done on the backups, ensuring that the backup is performed according to Microsoft standards. Indeed, at each backup the DIT Database Partition Backup Signature is updated. If for any reasons, backups are needed to perform a rollback (rebuild a domain) or to track past changes, the backups will actually be up to date. This check is equivalent to a REPADMIN /showbackup *.

Advised solution:

Plan AD backups based on Microsoft standards. These standards depend on the Operating System. For example with the wbadmin utility: wbadmin start systemstatebackup -backuptarget:d:

Points:

15 points if the occurence is greater than or equals than 7

Documentation:

https://technet.microsoft.com/en-us/library/jj130668(v=ws.10).aspx
[MITRE]Mitre Att&ck - Mitigation - Data Backup
[US]STIG V-25385 - Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.

Details:

The detail can be found in Backup

+ 15 Point(s)

Check if the LAPS tool to handle the native local administrator passwords is installed

Rule ID:

A-LAPS-Not-Installed

Description:

The purpose is to make sure that there is a proper password policy in place for the native local administrator account.

Technical explanation:

LAPS (Local Administrator Password Solution) is the advised solution to handle passwords for the native local administrator account on all workstations, as it is a simple way to handle most of the subject.

Advised solution:

If you don't have any provisioning process or password solution to manage local administrators, you should install the LAPS solution. If you mitigate the risk differently, you should add this rule as an exception, as the risk is covered.

Points:

15 points if present

Documentation:

https://www.microsoft.com/en-us/download/details.aspx?id=46899
[US]STIG V-36438 - Local administrator accounts on domain systems must not share the same password.
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI CERTFR-2015-ACT-046
[MITRE]T1078.003 Valid Accounts: Local Accounts

Details:

The detail can be found in LAPS

+ 15 Point(s)

Check for suspicious account(s) used in administrator activities

Rule ID:

A-AdminSDHolder

Description:

The purpose is to ensure that there are no rogue admin accounts in the Active Directory

Technical explanation:

A check is performed on non-admin accounts in order to identify if they have an attribute admincount set. If they have this attribute, it means that this account, which is not supposed to be admin, has been granted administrator rights in the past. This typically happens when an administrator gives temporary rights to a normal account, off process.

Advised solution:

These accounts should be reviewed, especially in regards with their past activities and have the admincount attribute removed. In order to identify which accounts are detected by this rule, we advise to run a PowerShell command that will show you all users having this flag set: get-adobject -ldapfilter "(admincount=1)"
Do not forget to look at the section AdminSDHolder below.

Points:

50 points if the occurence is greater than or equals than 50
then 45 points if the occurence is greater than or equals than 45
then 40 points if the occurence is greater than or equals than 40
then 35 points if the occurence is greater than or equals than 35
then 30 points if the occurence is greater than or equals than 30
then 25 points if the occurence is greater than or equals than 25
then 20 points if the occurence is greater than or equals than 20
then 15 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/ms675212(v=vs.85).aspx
[MITRE]Mitre Att&ck - Mitigation - Privileged Account Management
[FR]ANSSI - Recommandations de sécurité relatives à Active Directory - R40 [paragraph.3.6.3.1]

Details:

The detail can be found in the AdminSDHolder User List

+ 10 Point(s)

Check if there is the expected audit policy on domain controllers.

Rule ID:

A-AuditDC

Description:

The purpose is to ensure that the audit policy on domain controllers collects the right set of events.

Technical explanation:

To detect and mitigate an attack, the right set of events need to be collected.
The audit policy is a compromise between too much and too few events to collect.
To solve this problem, the suggested audit policy from adsecurity.org is checked against the audit policy in place.

Advised solution:

Identify the Audit settings to apply and fix them.
Be aware that there are two places for audit settings.
For "Simple" audit configuration:
in Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Audit Policies
For "Advanced" audit configuration:
in Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration
Also be sure that the audit GPO is applied to all domain controllers, as the underlying object may be in a OU where the GPO is not applied.

Points:

10 points if present

Documentation:

https://adsecurity.org/?p=3299
https://adsecurity.org/?p=3377
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Audit settings
The table below shows the settings that were not found as configured in a GPO for a given domain controller.

TypeAuditProblemRationaleDomain controller
Advanced Detailed Tracking / DPAPI Activity No GPO check for audit success Collect event 4692 to track the export of DPAPI backup key EGIADC01W
Advanced Account Logon / Kerberos Service Ticket Operations No GPO check for audit success Collect events 4769 for kerberos authentication EGIADC01W
Advanced System / Security System Extension No GPO check for audit success Collect events 4610, 4697 to track lsass security packages and services EGIADC01W
Advanced Privilege Use / Sensitive Privilege Use No GPO check for audit success Collect events 4672, 4673, 4674 for privileges tracking such as the debug one EGIADC01W
Advanced Logon/Logoff / Special Logon No GPO check for audit success Collect event 4964 for special group attributed at logon EGIADC01W
Advanced Detailed Tracking / DPAPI Activity No GPO check for audit success Collect event 4692 to track the export of DPAPI backup key EGIADC01
Advanced Account Logon / Kerberos Service Ticket Operations No GPO check for audit success Collect events 4769 for kerberos authentication EGIADC01
Advanced System / Security System Extension No GPO check for audit success Collect events 4610, 4697 to track lsass security packages and services EGIADC01
Advanced Privilege Use / Sensitive Privilege Use No GPO check for audit success Collect events 4672, 4673, 4674 for privileges tracking such as the debug one EGIADC01
Advanced Logon/Logoff / Special Logon No GPO check for audit success Collect event 4964 for special group attributed at logon EGIADC01
+ 10 Point(s)

Ensure that the Print Spooler service cannot be abused to get the DC credentials

Rule ID:

A-DC-Spooler

Description:

The purpose is to ensure that credentials cannot be extracted from the DC via its Print Spooler service

Technical explanation:

When there's an account with unconstrained delegation configured (which is fairly common) and the Print Spooler service running on a computer, you can get that computers credentials sent to the system with unconstrained delegation as a user. With a domain controller, the TGT of the DC can be extracted allowing an attacker to reuse it with a DCSync attack and obtain all user hashes and impersonate them.

Advised solution:

The Print Spooler service should be deactivated on domain controllers. Please note as a consequence that the Printer Pruning functionality (rarely used) will be unavailable.

Points:

10 points if present

Documentation:

https://adsecurity.org/?p=4056
https://www.slideshare.net/harmj0y/derbycon-the-unintended-risks-of-trusting-active-directory
[MITRE]T1187 Forced Authentication

Details:

The detail can be found in Domain controllers

Domain controller
EGIADC01W
EGIADC01
+ 10 Point(s)

RPC interfaces potentially vulnerable to Coerce attacks

Rule ID:

A-DC-Coerce

Description:

The objective is to assess the vulnerability of the Domain Controller (DC) to Coerce attacks.

Technical explanation:

Coerce attacks are a category of attacks which aims to forcing domain controllers to authenticate to a device controlled by the attacker for the purpose to relay this authentication to gain privileges.
This category of attacks is usually mitigated by applying patch (PetitPotam), disabling services (Spooler), added RPC filter (EDR or firewall) or ensuring integrity (SMB integrity).
Because each of these protections can be individually bypassed (NTLM integrity is disabled on LDAPS), the aim of this scan is to detect proactively if vulnerable RPC services are exposed.

PingCastle estimates that Coerceable interfaces are protected if:
- the GPO "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers" is applied through a GPO to DC
- or if RPC interfaces are not reachable

Because these interfaces need to be tested from a computer controlled by the attacker, PingCastle cannot do this test with reliability.
Instead, it sends a malformed RPC packet to try to trigger an error such as "Permission denied" or "RPC interface unavailable".
If the error RPC_X_BAD_STUB_DATA (1783) is triggered, PingCastle considers that the interface is available.
A report that a vulnerable interface is online may not be accurate because its full exploitation is not tested.

Also to avoid EDR alerts or to not perform the scan, you can run PingCastle with the flag --skip-dc-rpc

Advised solution:

To effectively mitigate the vulnerability, consider one of the following approaches:

1. Apply Group Policy Object (GPO) - "Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers":
Apply this GPO specifically to the Organizational Unit (OU) "Domain Controllers".
Caution: Enabling this GPO might impact services dependent on NTLM such as files copy Backups.
Consider setting the GPO in "Audit mode" initially to identify and assess the impact on affected services.

2. Enable RPC Filters in Windows Firewall:
Configure Windows Firewall to block specific Interface IDs associated with vulnerable RPC interfaces.
This is done using the netsh command. See the documentation links for more information.
Exercise caution: This method filters the entire interface, not specific Operation Numbers (OpNum).
Adjust exceptions for necessary services to ensure critical functionality.

3. Implement External Filters (e.g., EDR, Firewalls):
Leverage third-party solutions, such as Endpoint Detection and Response (EDR) tools or firewalls.
Notable project: rpcfirewall https://github.com/zeronetworks/rpcfirewall, offering logical filtering at the OpNum level.
Be cautious of potential impact and ensure compatibility with existing infrastructure.

Points:

10 points if present

Documentation:

https://github.com/p0dalirius/Coercer
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers
https://blog.nviso.eu/2023/12/08/rpc-or-not-here-we-log-preventing-exploitation-and-abuse-with-rpc-firewall/
[MITRE]T1187 Forced Authentication

Details:

The detail can be found in Domain controllers

DCNameIPInterfaceFunctionOpNum
EGIADC01W 192.168.253.50 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcAddUsersToFile 9
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcAddUsersToFileEx 15
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcDecryptFileSrv 5
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcDuplicateEncryptionInfoFile 12
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcEncryptFileSrv 4
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcFileKeyInfo 12
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcOpenFileRaw 0
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcQueryRecoveryAgents 7
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcQueryUsersOnFile 6
EGIADC01W 192.168.253.50 c681d488-d850-11d0-8c52-00c04fd90f7e EfsRpcRemoveUsersFromFile 8
EGIADC01W 192.168.253.50 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01W 192.168.253.50 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
EGIADC01 fe80::628a:dd65:10bd:20a0%5 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01 fe80::628a:dd65:10bd:20a0%5 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01 fe80::628a:dd65:10bd:20a0%5 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
EGIADC01 192.168.253.52 82273fdc-e32a-18c3-3f78-827929dc23ea ElfrOpenBELW 9
EGIADC01 192.168.253.52 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotification 62
EGIADC01 192.168.253.52 12345678-1234-abcd-ef00-0123456789ab RpcRemoteFindFirstPrinterChangeNotificationEx 65
+ 5 Point(s)

Check if signing is really required for LDAP

Rule ID:

A-DCLdapSign

Description:

The purpose is to check if signing is really required for LDAP

Technical explanation:

If the the request for signing of each LDAP request is not enforced, a man in the middle can be performed on an LDAP connection.
For example to add a user to the admin group.

This test is made by ignoring the local computer security policies.
Signature enforcement is done by setting the flag ISC_REQ_INTEGRITY when initializig the Negotiate / NTLM / Kerberos authentication.
The opposite test is made with the flag ISC_REQ_NO_INTEGRITY set.

PingCastle is testing if this setting is in place by performing a LDAP authentication with and without signature enforcement.
False positives may exists if the PingCastle program is run on the server tested. That's why, if PingCastle is run on a DC, the DC will not be tested.

Advised solution:

You have to make sure that ALL LDAP clients are compatible with LDAP signature.
All versions of Windows since XP support this and also most of the Unix clients.

You have to follow the Microsoft article quoted in reference to enable LDAP signing.
This includes auditing the clients which are not compatible and instructions on how to enforce this policy.

Points:

5 points if present

Documentation:

https://docs.microsoft.com/en-US/troubleshoot/windows-server/identity/enable-ldap-signing-in-windows-server
https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/ldap-channel-binding-and-ldap-signing-requirements-march-2020/ba-p/921536/page/4
https://github.com/zyn3rgy/LdapRelayScan
[MITRE]T1557 Man-in-the-Middle

Details:
Domain controller
EGIADC01W
+ 5 Point(s)

Check for Windows 2000 compatibility which allows access to the domain without any account

Rule ID:

A-PreWin2000Anonymous

Description:

The purpose is to identify domains which allow access without any account because of a Pre-Windows 2000 compatibility

Technical explanation:

When a Windows Server 2003 DC is promoted, a pre-Windows 2000 compatibility setting can be enabled through the wizard. If it is enabled, the wizard will add "Everyone" and "Anonymous" to the pre-Windows 2000 compatible access group, and by doing so, it will authorize the domain to be queried without an account (null session)
It is possible to verify the results provided by the PingCastle solution by using a Kali distribution. You should run [rpcclient -U " target_ip_address] and press enter at the password prompt to finally type [enumdomusers].

Advised solution:

Remove the "Everyone" and "Anonymous" from the PreWin2000 group while making sure that the group "Authenticated Users" is present, then reboot each DC.
Note: removing the group "Authenticated Users" (and not keep it like advised here) is an advanced recommendation quoted in the rule A-PreWin2000AuthenticatedUsers

Points:

5 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
[MITRE]T1110.003 Brute Force: Password Spraying
[US]STIG V-8547 - The Anonymous Logon and Everyone groups must not be members of the Pre-Windows 2000 Compatible Access group.
[FR]ANSSI - The "Pre - Windows 2000 Compatible Access" group includes "Anonymous" (vuln2_compatible_2000_anonymous)2

+ 5 Point(s)

Check for certificates using a weak signing algorithm (RSA under 1024 bits)

Rule ID:

A-WeakRSARootCert

Description:

The purpose is to ensure that there is no use of a certificate using a weak RSA key

Technical explanation:

A RSA key certificate with a modulus under 1024 bits is considered unsafe

Advised solution:

To solve the matter, the certificate should be removed from the GPO and if needed, certificates depending on it should be reissued.

Points:

5 points if present

Documentation:

https://www.iad.gov/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/commercial-national-security-algorithm-suite-factsheet.cfm
https://www.ssi.gouv.fr/guide/cryptographie-les-regles-du-rgs/
[MITRE]T1600.001 Weaken Encryption: Reduce Key Space
[US]STIG V-14820 - PKI certificates (server and clients) must be issued by the DoD PKI or an approved External Certificate Authority (ECA).
[FR]ANSSI - Weak or vulnerable certificates (vuln1_certificates_vuln)1

Details:

The detail can be found in Certificates

SourceSubjectModuleExpires
NTLMStore CN=EGIA, OU=IS, O=Electric and Gas Industries Associates, L=San Leandro, S=CA, C=US, E=cert-auth-root@egia.com 512 11/2/2003 2:44:17 PM
+ 5 Point(s)

Hardened Paths weakness

Rule ID:

A-HardenedPaths

Description:

The purpose is to ensure that there is no weakness related to hardened paths

Technical explanation:

Two vulnerabilities have been reported in 2015 (MS15-011 and MS15-014) which allows a domain takeover via GPO modifications done with a man-in-the-middle attack.
To mitigate these vulnerabilites, Microsoft has designed a workaround named "Hardened Paths". It forces connection settings to enforce Integrity, Mutual Authentication or Privacy.
By default if this policy is empty, if will enforce Integrity and Mutual Authentication on the SYSVOL or NETLOGON shares.
This rule checks if there have been any overwrite to disable this protection.

Advised solution:

You have to edit the Hardened Path section in the GPO.
This section is located in Computer Configuration/Policies/Administrative Templates/Network/Network Provider.
Check each value reported here and make sure that entries containing SYSVOL or NETLOGON have RequireIntegrity and RequireMutualAuthentication set to 1.
In addition to that, check entries having the pattern \\DCName\* and apply the same solution.

Points:

5 points if present

Documentation:


https://labs.f-secure.com/archive/how-to-own-any-windows-network-with-group-policy-hijacking-attacks/
https://talubu.wordpress.com/2018/02/28/configuring-unc-hardened-access-through-group-policy/
https://adsecurity.org/?p=1405
https://support.microsoft.com/en-us/topic/ms15-011-vulnerability-in-group-policy-could-allow-remote-code-execution-february-10-2015-91b4bda2-945d-455b-ebbb-01d1ec191328
[US]STIG V-63577 - Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Details:

The detail can be found in the Hardened Paths configuration section.

GPOKeyRequireIntegrityRequireMutualAuthenticationRequirePrivacy
No GPO Found NETLOGON Not Set Not Set Not Set
No GPO Found SYSVOL Not Set Not Set Not Set
+ 2 Point(s)

Check that the "Pre-Windows 2000 Compatible Access" group has not been modified from its default

Rule ID:

A-PreWin2000Other

Description:

The purpose is checking that no additional account has been added to the "Pre-Windows 2000 Compatible Access" group

Technical explanation:

The pre-Windows 2000 compatible access group grants access to some RPC calls which should not be available to users or computers.

Advised solution:

Remove the members from the PreWin2000 group while making sure that the group "Authenticated Users" is present. Then reboot each DC.

Points:

2 points if present

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
[FR]ANSSI - Use of the "Pre-Windows 2000 Compatible Access" group (vuln3_compatible_2000_not_default)3
[MITRE]T1110.003 Brute Force: Password Spraying

Informative rule

Check if LLMNR can be used to steal credentials

Rule ID:

A-NoGPOLLMNR

Description:

The purpose is to ensure that local name resolution protocol (LLMNR) cannot be used to collect credentials by performing a network attack

Technical explanation:

LLMNR is a protocol which translates names such as foo.bar.com into an ip address. LLMNR has been designed to translate name locally in case the default protocol DNS is not available.
Regarding Active Directory, DNS is mandatory which makes LLMNR useless.
LLMNR exploits typo mistakes or faster response time to redirect users to a specially designed share, server or website.
Being trusted, this service will trigger the single sign on procedure which can be abused to retrieve the user credentials.

LLMNR is enabled by default on all OS except starting from Windows 10 v1903 and Windows Server v1903 where it is disabled.

Advised solution:

Enable the GPO Turn off multicast name resolution and check that no GPO overrides this setting.
(if it is the case, the policy involved will be displayed below)

Points:

Informative rule (0 point)

Documentation:

https://youtu.be/Fg2gvk0qgjM
[MITRE]T1557.001 Man-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay

Details:

The detail can be found in Security settings

Informative rule

Check the Password Policy for Service Accounts (Information)

Rule ID:

A-NoServicePolicy

Description:

The purpose is to give information regarding a best practice for the Service Account password policy. Indeed, having a 20+ characters password for this account greatly helps reducing the risk of Kerberoasting attacks (offline cracking of the TGS tickets)
Note: PSO (Password Settings Objects) will be visible only if the user, which collected the information, has the permission to view it.

Technical explanation:

The rule is purely informative, as it gives insights regarding a best practice. It verifies if there is a GPO or PSO enforcing a 20+ characters password for the Service Accounts.

Advised solution:

The recommended way to handle service accounts is to use "Managed service accounts" introduced since Windows Server 2008 R2 (search for "msDS-ManagedServiceAccount").
To solve the anomaly, you should implement a PSO or GPO password guarantying a 20+ length password.

Points:

Informative rule (0 point)

Documentation:

https://www.microsoft.com/en-us/research/publication/password-guidance/
[MITRE]T1201 Password Policy Discovery

Details:

The detail can be found in Password Policies

Informative rule

Check if NetCease has been put in place to mitigate Bloodhound

Rule ID:

A-NoNetSessionHardening

Description:

The purpose is to ensure that mitigations are in place against the Bloodhound tool

Technical explanation:

By default, Windows computers allow any authenticated user to enumerate network sessions to it.
This means an attacker could enumerate network sessions to a file share hosting home directories or a Domain Controller to see who's connected to SYSVOL (to apply Group Policy) and determine which workstations each user and admin account is logged into.
Bloodhound uses this capability extensively to map out credentials in the network.

Disabling Net Session Enumeration removes the capability for any user to enumerate net session info (Recon).

Advised solution:

If this mitigation is not part of the computer image, apply the following recommendations:
Run the NetCease PowerShell script (referenced below) on a reference workstation.
Open the Group Policy Management Console. Right-click the Group Policy object (GPO) that should contain the new preference item, and then click Edit .
In the console tree under Computer Configuration, expand the Preferences folder, and then expand the Windows Settings folder.
Right-click the Registry node, point to New, and select Registry Wizard.
Select the reference workstation on which the desired registry settings exist, then click Next .
Browse to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\DefaultSecurity\
and select the check box for “SrvsvcSessionInfo” from which you want to create a Registry preference item. Select the check box for a key only if you want to create a Registry item for the key rather than for a value within the key.
Click Finish.
The settings that you selected appear as preference items in the Registry Wizard Values collection

Points:

Informative rule (0 point)

Documentation:

https://github.com/p0w3rsh3ll/NetCease
https://adsecurity.org/?p=3299
[MITRE]T1087.001 Account Discovery: Local Account

Details:

The detail can be found in Security settings

Informative rule

Check if PowerShell logging is enabled.

Rule ID:

A-AuditPowershell

Description:

The purpose is to ensure that PowerShell logging is enabled.

Technical explanation:

PowerShell is a powerful language, also used by hackers because of this quality. Hackers are able to run programs such as mimikatz in memory using obfuscated commands such as Invoke–Mimikatz.
Because there is no artefact on the disk, the incident response task is difficult for the forensic analysts.
For this reason, we recommend to enable PowerShell logging via a group policy, despite the fact that these security settings may be part of the workstation or server images.

Advised solution:

Go to Computer Configuration -> Administrative Templates -> Windows Components -> Windows PowerShell
And enable "Turn on Module logging" and "Turn on PowerShell Script Block logging"
We recommend to set "*" as the module list.

Points:

Informative rule (0 point)

Documentation:

https://adsecurity.org/?p=2604
https://docs.microsoft.com/en-us/powershell/scripting/wmf/whats-new/script-logging?view=powershell-6
[US]STIG V-68819 - PowerShell script block logging must be enabled
[MITRE]Mitre Att&ck - Mitigation - Audit

Details:

The detail can be found in Security settings

Informative rule

Check if the mitigation for CVE-2021-42291 has been enabled

Rule ID:

A-DsHeuristicsLDAPSecurity

Description:

The purpose is to identify domains having mitigation for CVE-2021-42291 not set to enabled

Technical explanation:

The way an Active Directory behaves can be controlled via the attribute DsHeuristics of CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration.
A parameter stored in its attribute and whose value is LDAPAddAutZVerifications and LDAPOwnerModify can be set to modify the mitigatation of CVE-2021-42291.
The KB5008383 has introduced changes to default security descriptor of Computer containers to add audit and limit computer creation without being admin.
Indeed, it is recommended to not let anyone create computer accounts as they can be used to abuse Kerberos or to perform relay attacks.

Mitigations in CVE-2021-42291 consist of 3 choices to be set on 2 settings.
They are named LDAPAddAutZVerifications and LDAPOwnerModify and are respectively the 28th and 29th character of this string.
For the expected values:
- With the value 0 (the default), it enables an additional audit mechanism
- With the value 1 (recommended), it enforces new security permissions, especially to require an action of the domain admin when unusual actions are performed
- With the value 2 (not recommended), it disables the audit mechanism that has been added by default and do not enable the new security permissions

Advised solution:

The easiest and fastest way to correct this issue is to replace the 28th and 29th character of the DsHeuristics attribute.
The value of LDAPAddAutZVerifications and LDAPOwnerModify should be set to 1.

Open the procedure embedded into the KB5008383 to apply this mitigation and change the DsHeuristics value.

Note: You have to pay attention that there are control characters at the 10th and 20th position to avoid undesired changes of the DsHeuristics attribute.
Typically if the DsHeuristics is empty, the expected new value is 00000000010000000002000000011

Points:

Informative rule (0 point)

Documentation:

https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/e5899be4-862e-496f-9a38-33950617d2c5
https://support.microsoft.com/en-au/topic/kb5008383-active-directory-permissions-updates-cve-2021-42291-536d5555-ffba-4248-a60e-d6cbc849cde1
[MITRE]T1187 Forced Authentication
[FR]ANSSI - Dangerous dsHeuristics settings (vuln3_dsheuristics_bad)3

Details:
SettingPositionValue
LDAPAddAuthZVerifications 28th Not Set
LDAPOwnerModify 29th Not Set
Informative rule

Check if Authenticated Users can create DNS records

Rule ID:

A-DnsZoneAUCreateChild

Description:

The purpose is to check if Authenticated Users has the right to create DNS records

Technical explanation:

When a computer is joined to a domain, a DNS record is created in the DnsZone to allow the computer to update its DNS settings.
By design, Microsoft choose to grant to the group Authenticated Users (aka every computers and users) the right to create DNS records.
Once created, only the owner keeps the right to edit the new object.

The vulnerability is that specific DNS records can be created to perform man-in-the-middle attacks.
One example is to create a wildcard record (a record with the name "*"), a failover DNS record or anticipating the creation of a DNS record with the right permissions.

Advised solution:

As of today, this rule is considered "informative" because the default configuration where Authenticated Users can create DNS records is considered safe.
The reason for this classification is that no exploitation of that vulnerability has been reported.

The proposed enhancement is to replace the identity who has been granted the right to create DNS Records (permission CreateChild) from Authenticated Users to Domain Computers.
To perform this change, you have to edit the permission of the DNSZone whose object is located in the container CN=MicrosoftDNS,DC=DomainDnsZones.

It should be noticed that if there is a privilege escalation on a computer, an attacker can impersonate the computer account and bypass this mitigation.

The best mitigation is to create the DNS records manually as part as the domain join process and to revoke the permission granted to Authenticated Users.

Points:

Informative rule (0 point)

Documentation:

https://www.ws-its.de/gegenmassnahme-zum-angriff-dns-wildcard/
https://www.netspi.com/blog/technical/network-penetration-testing/exploiting-adidns/
[MITRE]T1557 Man-in-the-Middle

Details:
DNSZone
20.168.192.in-addr.arpa
147.56.50.in-addr.arpa
147.56.50.in-addr.arpa CNF:08160273-defb-4859-aa24-150122611381
tradesandtools.com CNF:1ef04c1f-7515-4ef4-bdc7-d8893d08e62b
253.168.192.in-addr.arpa
252.168.192.in-addr.arpa
10.168.192.in-addr.arpa
11.168.192.in-addr.arpa
12.168.192.in-addr.arpa
Informative rule

Check that the "Pre-Windows 2000 Compatible Access" group does not contain "Authenticated Users"

Rule ID:

A-PreWin2000AuthenticatedUsers

Description:

The purpose is checking if the "Pre-Windows 2000 Compatible Access" group contains "Authenticated Users"

Technical explanation:

The pre-Windows 2000 compatible access group grants access to some RPC calls.
Its default and secure value is the "Authenticated Users" group which allows users to perform group look-up using legacy protocols.

If this group contains "Authenticated Users", it increases the impact of the exploitation of vulnerabilities in legacy protocols such as the Print Spooler service.
Indeed, in the #PrintNightmare attack, it enables a patch bypass on domain controllers because the property Elevated Token is on when establishing a session to the DC.
Removing the group can have side impacts and as a consequence, this is reported here as a special hardening measure.

Advised solution:

Remove "Authenticated Users" from the PreWin2000 group.

Points:

Informative rule (0 point)

Documentation:

https://msdn.microsoft.com/en-us/library/cc223672.aspx
https://www.gradenegger.eu/?p=1132
[MITRE]T1210 Exploitation of Remote Services

Informative rule

Check for Root Certificates using unsafe hashing algorithm (SHA1)

Rule ID:

A-SHA1RootCert

Description:

The purpose is to ensure that no Root Certificates use the deprecated SHA-1 hashing algorithm

Technical explanation:

The SHA1 hashing algorithm is not considered as safe. There are design flaws inherent to the algorithm that allow an attacker to generate a hash collision in less than a brute-force time

Advised solution:

To solve the matter, the certificate should be removed from the GPO and if needed, certificates depending on it should be reissued.

Points:

Informative rule (0 point)

Documentation:

https://tools.ietf.org/html/rfc6194
[FR]ANSSI - Weak or vulnerable certificates (vuln3_certificates_vuln)3
[MITRE]T1600.001 Weaken Encryption: Reduce Key Space
[US]STIG V-14820 - PKI certificates (server and clients) must be issued by the DoD PKI or an approved External Certificate Authority (ECA).

Details:

The detail can be found in Certificates

GPOSubject
NTLMStore CN=EGIA, OU=IS, O=Electric and Gas Industries Associates, L=San Leandro, S=CA, C=US, E=cert-auth-root@egia.com

This section shows the main technical characteristics of the domain.

DomainNetbios NameDomain Functional LevelForest Functional LevelCreation dateDC countSchema versionRecycle Bin enabled
egia.comEGIAWindows Server 2008 R2Windows Server 2008 R22001-10-06 18:33:39Z2Windows Server 2019FALSE

Azure AD Configuration

Here is the Azure AD configuration that has been found in the domain

Tenant nameTenant idKerberos Enabled
EGIA563.onmicrosoft.com ?482e9867-0585-418e-bb72-953ca4dc0306FALSE

This section gives information about the user accounts stored in the Active Directory

Account analysis

Nb User AccountsNb Enabled ?Nb Disabled ?Nb Active ?Nb Inactive ?Nb Locked ?Nb pwd never Expire ?Nb SidHistory ?Nb Bad PrimaryGroup ?Nb Password not Req. ?Nb Des enabled. ?Nb unconstrained delegations ?Nb Reversible password ?
362179183571220146020000
[122]
NameCreationLast logonPwd Last SetDistinguished name
$DUPLICATE-6b142017-01-16 22:10:46Z2017-01-16 14:51:34Z2017-01-16 14:41:24ZCN=sharyl\0ACNF:cff5105e-507b-4e10-8483-74f6d1e18af1,OU=Sacramento,DC=egia,DC=com
accountinguser2015-10-12 14:34:13ZNever2015-10-12 07:34:14ZCN=Accountinguser,OU=Sacramento,DC=egia,DC=com
Admin2002-09-13 23:34:50Z2019-08-13 05:22:33Z2002-09-13 16:34:51ZCN=Admin,OU=ofsdirect.com,DC=egia,DC=com
Administrator2001-10-06 18:33:47Z2021-07-19 23:25:17Z2015-04-08 09:31:00ZCN=Administrator,OU=Groups,DC=egia,DC=com
AlamedaMP2010-04-22 22:13:52ZNever2010-04-22 15:13:52ZCN=Alameda MP,OU=Rebates,DC=egia,DC=com
Arcserve2001-10-06 18:33:48ZNever2001-01-19 11:20:31ZCN=Arcserve,CN=Users,DC=egia,DC=com
asanders2017-08-11 19:51:20Z2017-08-11 12:53:55Z2017-08-11 12:51:20ZCN=Andrea Sanders,OU=Sacramento,DC=egia,DC=com
aschuette2017-08-03 17:13:19Z2017-08-03 14:02:40Z2017-08-03 10:13:19ZCN=Andrew Schuette,OU=Sacramento,DC=egia,DC=com
bbackup2010-11-28 16:01:14Z2019-03-23 20:57:54Z2010-11-28 08:01:14ZCN=Barracuda Backup,CN=Users,DC=egia,DC=com
BCMBackup2012-11-27 22:16:25ZNever2012-11-27 14:16:25ZCN=BCM Backup,OU=Sacramento,DC=egia,DC=com
bjohnson2019-04-23 18:17:02Z2019-04-23 14:24:39Z2019-04-23 11:17:02ZCN=Bill Johnson,CN=Users,DC=egia,DC=com
bkagent2002-05-07 14:37:57Z2020-08-07 09:45:13Z2002-09-26 15:32:26ZCN=Backup Agent,CN=Users,DC=egia,DC=com
bwhite2017-12-26 18:34:30Z2018-03-14 00:14:05Z2018-02-12 08:34:09ZCN=Brionna White,CN=Users,DC=egia,DC=com
CallReportingAdmin2010-04-13 19:40:57ZNever2015-06-04 09:30:12ZCN=Call Reporting Admin,CN=Users,DC=egia,DC=com
ChicagoLand2008-12-15 20:34:56ZNever2008-12-15 12:34:56ZCN=ChicagoLand,OU=Rebates,DC=egia,DC=com
conference2015-01-14 18:34:20Z2023-01-04 07:52:51Z2017-01-20 06:45:40ZCN=Conference,OU=Sacramento,DC=egia,DC=com
Consultant2002-09-17 17:27:04Z2020-09-08 09:31:41Z2010-11-21 13:30:35ZCN=Consultant,OU=Retired,DC=egia,DC=com
contractorapp12016-05-10 17:26:18ZNever2016-05-10 10:26:19ZCN=ContractorApp1,OU=Sacramento,DC=egia,DC=com
contractorapp22016-05-10 17:26:58ZNever2016-05-10 10:26:58ZCN=ContractorApp2,OU=Sacramento,DC=egia,DC=com
ContractorServices2007-12-01 00:08:06ZNever2007-11-30 16:08:06ZCN=ContractorServices,CN=Users,DC=egia,DC=com
ctodd2019-02-25 23:16:57ZNever2019-02-25 15:16:57ZCN=CJ Todd,OU=Sacramento,DC=egia,DC=com
ddelgado2020-01-13 18:57:00Z2020-01-14 10:30:29Z2020-01-14 10:29:57ZCN=David Delgado,OU=Sacramento,DC=egia,DC=com
ddoyle2017-08-23 19:06:42Z2017-08-25 15:30:00Z2017-08-23 12:06:42ZCN=Dan Doyle,OU=Sacramento,DC=egia,DC=com
devteamvpn2018-03-09 20:54:37Z2021-02-07 19:25:14Z2021-02-07 19:25:13ZCN=Dev Teamvpn,CN=Users,DC=egia,DC=com
dmunoz2019-07-10 21:47:00Z2019-07-10 14:57:47Z2019-07-10 14:57:35ZCN=David Munoz,OU=Sacramento,DC=egia,DC=com
drentschler2016-10-18 19:15:38Z2021-06-15 09:35:25Z2016-12-22 10:40:11ZCN=Danny Rentschler,OU=Sacramento,DC=egia,DC=com
efax2007-08-03 16:26:52ZNever2007-08-03 09:26:52ZCN=e Fax,CN=Users,DC=egia,DC=com
EGIAServices2007-08-07 18:59:18ZNever2007-08-07 11:59:18ZCN=EGIA Services,CN=Users,DC=egia,DC=com
egude2019-09-16 21:25:37Z2022-03-04 05:44:33Z2022-03-04 05:44:33ZCN=Eric Gude,OU=Sacramento,DC=egia,DC=com
ehatton2023-10-12 16:29:29Z2023-10-12 09:32:43Z2023-10-12 09:29:29ZCN=Eric Hatton,OU=Sacramento,DC=egia,DC=com
EMC2016-10-20 16:43:39Z2020-07-31 16:57:06Z2016-10-20 09:43:49ZCN=EMC,OU=Sacramento,DC=egia,DC=com
epic2018-09-11 21:29:59Z2018-09-11 15:12:14Z2018-09-11 14:29:59ZCN=epic event,CN=Users,DC=egia,DC=com
excessisout2009-02-12 19:42:14ZNever2009-02-12 11:42:14ZCN=Excess Is Out,OU=Rebates,DC=egia,DC=com
fssa2016-11-15 18:46:41Z2021-09-05 06:18:02Z2016-11-15 10:46:41ZCN=File Share Service Account,OU=Service Accounts,DC=egia,DC=com
gpotest2016-10-25 17:51:34ZNever2016-10-28 14:29:32ZCN=gpotest,OU=GPO Testing,DC=egia,DC=com
hemc2008-05-14 19:05:59ZNever2008-05-14 12:05:59ZCN=EGIA Home Energy Makeover,CN=Users,DC=egia,DC=com
hlopez2023-08-17 17:11:47Z2023-08-18 12:57:03Z2023-08-18 12:52:41ZCN=Henry Lopez,OU=Sacramento,DC=egia,DC=com
homemakeovercontest2010-09-16 16:08:39ZNever2010-09-16 09:08:39ZCN=HomeMakeoverContest,CN=Users,DC=egia,DC=com
HomeownerServices2008-05-09 21:01:03ZNever2008-05-09 14:01:03ZCN=Homeowner Services,CN=Users,DC=egia,DC=com
ILS_ANONYMOUS_USER2001-10-24 20:31:48ZNever2001-10-24 13:31:48ZCN=ILS_ANONYMOUS_USER,CN=Users,DC=egia,DC=com
ILSRebates2010-02-23 01:54:37ZNever2010-02-22 17:54:37ZCN=ILS Rebates,OU=Rebates,DC=egia,DC=com
Info2010-08-23 20:57:49ZNever2010-08-23 13:57:59ZCN=Info,CN=Users,DC=egia,DC=com
IS-REQUESTS2002-01-03 18:47:31ZNever2002-01-03 10:47:31ZCN=IS-REQUESTS,CN=Users,DC=egia,DC=com
itcsr2019-07-10 17:44:11Z2019-07-20 14:59:52Z2019-07-10 10:44:11ZCN=IT csr,CN=Users,DC=egia,DC=com
itsupport2016-09-20 19:02:53Z2016-11-15 09:05:21Z2017-01-19 15:58:36ZCN=IT Support,OU=Sacramento,DC=egia,DC=com
itvpnusr98W2018-07-18 21:28:28Z2022-02-24 15:35:16Z2022-02-03 14:16:00ZCN=it vpn,CN=Users,DC=egia,DC=com
IUSER2010-08-31 18:37:47Z2021-07-20 04:59:01Z2010-08-31 11:37:47ZCN=Internet User,CN=Users,DC=egia,DC=com
IUSR_BLUE2001-11-19 17:54:31ZNever2010-07-16 09:08:26ZCN=IUSR_BLUE,CN=Users,DC=egia,DC=com
IUSR_DEV2001-10-12 23:55:53ZNever2001-10-12 16:55:53ZCN=IUSR_DEV,CN=Users,DC=egia,DC=com
IUSR_NT-SERVER2001-10-06 18:33:48ZNever2001-10-06 11:09:06ZCN=IUSR_NT-SERVER,CN=Users,DC=egia,DC=com
IWAM_DEV2001-10-12 23:55:49ZNever2001-10-12 16:55:49ZCN=IWAM_DEV,CN=Users,DC=egia,DC=com
IWAM_NT-SERVER2001-10-06 18:33:48ZNever2001-10-06 11:08:14ZCN=IWAM_NT-SERVER,CN=Users,DC=egia,DC=com
jgalapon2019-04-23 18:15:05Z2019-04-23 14:24:17Z2019-04-23 11:15:05ZCN=Juston Galapon,OU=Sacramento,DC=egia,DC=com
jmatulich2004-06-21 16:33:52Z2023-12-12 09:38:28Z2023-10-17 12:40:28ZCN=Jeff Matulich,OU=Sacramento,DC=egia,DC=com
Jobs2010-07-07 23:32:20ZNever2010-07-07 16:32:20ZCN=Jobs,CN=Users,DC=egia,DC=com
lamador2020-02-24 22:29:55Z2021-03-18 14:25:48Z2020-02-24 14:29:55ZCN=Leilani Amador,OU=Sacramento,DC=egia,DC=com
lehrbar2016-06-16 20:41:43Z2018-03-01 09:48:52Z2018-01-11 14:33:51ZCN=Lucas Ehrbar,OU=Sacramento,DC=egia,DC=com
loaner2019-03-11 18:56:04Z2020-02-13 11:05:45Z2020-02-13 11:05:45ZCN=loaner loaner,CN=Users,DC=egia,DC=com
malatorre2014-12-17 18:09:55Z2022-11-22 10:04:40Z2020-03-31 06:07:00ZCN=Maria Alatorre,OU=Sacramento,DC=egia,DC=com
mayang2019-01-18 16:42:36Z2019-07-01 08:03:09Z2019-02-04 13:33:53ZCN=Mai Yang2,CN=Users,DC=egia,DC=com
mbratsis2017-03-08 21:16:22Z2023-09-29 10:02:50Z2023-09-28 20:07:02ZCN=Matthew Bratsis,OU=Sacramento,DC=egia,DC=com
mbratsis22020-01-17 16:28:52Z2021-04-29 16:28:28Z2020-01-17 08:28:52ZCN=Matthew Bratsis2,OU=Sacramento,DC=egia,DC=com
mferreira2020-02-20 18:33:17Z2022-03-29 09:50:55Z2020-02-21 07:59:29ZCN=Miguel Ferreira,OU=Sacramento,DC=egia,DC=com
mtech2019-03-19 20:55:34Z2022-12-13 18:52:49Z2020-06-15 16:25:19ZCN=Martin tech,CN=Users,DC=egia,DC=com
mvitanza2023-08-17 17:16:02Z2023-08-18 08:03:47Z2023-08-17 10:16:02ZCN=Marisa Vitanza,OU=Sacramento,DC=egia,DC=com
MWDRebates2008-06-17 21:36:06ZNever2008-06-17 14:36:06ZCN=MWD Rebates,OU=Rebates,DC=egia,DC=com
myang2018-04-13 21:16:35Z2020-06-29 12:39:44Z2020-02-10 07:54:36ZCN=Mai Yang,CN=Users,DC=egia,DC=com
mzan2017-08-07 17:00:09Z2018-01-04 11:43:39Z2018-01-04 11:43:21ZCN=Matthew Zan,OU=Sacramento,DC=egia,DC=com
NicorRebates2010-05-04 00:41:55ZNever2010-05-03 17:41:55ZCN=Nicor Rebates,OU=Rebates,DC=egia,DC=com
nkahal2010-12-20 04:57:36ZNever2011-12-26 12:25:15ZCN=Niraj Kahal,OU=Sacramento,DC=egia,DC=com
nsingh2011-07-07 04:15:59ZNever2023-06-07 14:29:43ZCN=Navdeep Singh,OU=Sacramento,DC=egia,DC=com
nvaladez2023-08-17 18:23:24Z2023-11-01 12:49:03Z2023-08-17 11:23:24ZCN=Nayeli Valadez,OU=Users,OU=MS365EGIA,DC=egia,DC=com
paheatingrebates2010-04-20 22:27:56ZNever2010-04-20 15:27:56ZCN=PAHeating Rebates,OU=Rebates,DC=egia,DC=com
PAQ2010-09-02 20:37:13ZNever2010-09-02 13:37:23ZCN=PAQ,OU=Rebates,DC=egia,DC=com
pbrokaw2023-11-22 02:07:37ZNever2023-11-21 18:07:37ZCN=Pat Brokaw,OU=Sacramento,DC=egia,DC=com
pmanager2010-11-21 21:28:03ZNever2010-11-21 13:28:03ZCN=Print Manager,CN=Users,DC=egia,DC=com
Rebate012003-04-03 21:47:09ZNever2010-06-23 17:27:53ZCN=Rebate01,OU=Rebates,DC=egia,DC=com
Rebates2001-10-06 18:33:48ZNever1600-12-31 16:00:00ZCN=Rebate Process,OU=Rebates,DC=egia,DC=com
registrations2010-08-30 23:46:33ZNever2010-08-30 16:46:33ZCN=Registrations,CN=Users,DC=egia,DC=com
rerebates2004-10-15 20:23:26ZNever2004-10-15 13:23:26ZCN=Roseville Electric Rebates,OU=Rebates,DC=egia,DC=com
rfaust2019-05-30 21:15:48Z2020-03-09 10:43:53Z2020-02-10 07:53:37ZCN=Robin Faust,OU=Sacramento,DC=egia,DC=com
Ricoh2011-10-21 20:55:51Z2022-05-12 11:03:55Z2011-10-21 13:56:48ZCN=Ricoh,CN=Users,DC=egia,DC=com
rmehra2012-07-11 06:02:30ZNever2013-01-17 21:51:15ZCN=Rishab Mehra,OU=Sacramento,DC=egia,DC=com
rmong2018-08-24 15:58:20Z2022-01-31 11:39:55Z2020-05-14 09:35:35ZCN=Ricky Mong,CN=Users,DC=egia,DC=com
rpender2019-06-25 20:47:54Z2020-03-09 16:24:28Z2020-03-02 08:15:56ZCN=Roger Pender,OU=Sacramento,DC=egia,DC=com
saccount2010-11-21 21:35:59ZNever2010-11-21 13:35:59ZCN=Service Account,CN=Users,DC=egia,DC=com
SalesMarketing2009-06-11 21:35:56ZNever2009-06-11 14:35:56ZCN=SalesMarketing,CN=Users,DC=egia,DC=com
sangeles2018-08-09 20:55:13Z2023-08-01 09:41:03Z2020-02-11 10:58:01ZCN=Stephanie Angeles,OU=Sacramento,DC=egia,DC=com
SaveEnergy2009-12-03 19:47:49ZNever2009-12-03 11:47:49ZCN=SaveEnergy,CN=Users,DC=egia,DC=com
ScanRouter2002-10-30 21:34:13ZNever2002-10-30 13:34:13ZCN=ScanRouter,CN=Users,DC=egia,DC=com
ScanRouterMail2002-10-30 23:16:24ZNever2002-10-30 15:16:24ZCN=ScanRouterMail,CN=Users,DC=egia,DC=com
ScanRouterService2011-01-20 20:04:57ZNever2011-01-20 12:14:44ZCN=ScanRouterService,CN=Users,DC=egia,DC=com
SCVRebates2009-08-17 16:50:54ZNever2009-08-17 09:50:54ZCN=SCV Rebates,OU=Rebates,DC=egia,DC=com
sharyl2017-01-16 22:49:14Z2017-03-01 14:34:10Z2017-03-01 14:32:43ZCN=sharyl,OU=Sacramento,DC=egia,DC=com
skillian2015-12-16 16:20:23Z2020-03-17 07:42:31Z2015-12-16 08:20:24ZCN=Scott Killian,OU=Sacramento,DC=egia,DC=com
slathar2011-01-04 18:12:28Z2021-07-17 11:55:18Z2023-06-07 14:35:01ZCN=Sunil Lather,OU=Sacramento,DC=egia,DC=com
smercado2018-08-15 17:12:46Z2022-06-19 21:10:52Z2020-04-10 07:30:44ZCN=Samara Mercado,CN=Users,DC=egia,DC=com
socalwatersmart2011-08-16 04:00:46ZNever2011-08-15 21:00:46ZCN=SoCalWaterSmart,CN=Users,DC=egia,DC=com
SolanoRebates2007-02-28 18:25:46ZNever2007-02-28 10:25:46ZCN=Solano Rebates,OU=Rebates,DC=egia,DC=com
sonicwalladmin2017-07-13 17:08:10Z2017-07-13 13:57:32Z2017-07-13 10:08:10ZCN=sonicwall admin,CN=Users,DC=egia,DC=com
spam2007-10-28 17:12:29ZNever2007-10-28 10:12:29ZCN=Spam Box,CN=Users,DC=egia,DC=com
spiceworks2016-09-22 16:51:38Z2020-05-13 03:41:47Z2016-10-11 06:12:25ZCN=SpiceWorks,OU=Service Accounts,DC=egia,DC=com
SQLJobs2011-03-10 01:08:39Z2021-07-22 16:01:16Z2011-03-09 17:08:39ZCN=SQLJobs,CN=Users,DC=egia,DC=com
sqlserveralert2001-11-14 22:23:36ZNever2001-11-14 15:09:20ZCN=SQLServer Alert,CN=Users,DC=egia,DC=com
SSRS2010-08-24 23:56:48Z2020-06-16 09:12:07Z2010-08-24 16:56:48ZCN=SQL Server Reporting Services,CN=Users,DC=egia,DC=com
ssymons2017-08-23 19:05:31Z2017-08-23 12:29:36Z2017-08-23 12:05:31ZCN=Shelby Symons,OU=Sacramento,DC=egia,DC=com
support2003-11-19 22:37:59ZNever2003-11-19 14:38:00ZCN=Support,CN=Users,DC=egia,DC=com
suser2010-05-05 02:13:31ZNever2010-05-04 19:13:31ZCN=SQL User,OU=Sacramento,DC=egia,DC=com
svc_prod_sql2014-08-12 03:15:59ZNever2014-08-11 20:15:59ZCN=Production SQL Service,OU=Service Accounts,DC=egia,DC=com
svcDevSQLServer2010-12-30 05:20:06Z2021-07-12 06:46:36Z2010-12-29 21:20:06ZCN=DEV SQL Service,CN=Users,DC=egia,DC=com
SWGRebates2008-01-25 22:04:44ZNever2008-01-25 14:05:04ZCN=SWG Rebates,OU=Rebates,DC=egia,DC=com
tech2007-05-08 15:37:42ZNever2012-02-03 14:51:52ZCN=Tech,CN=Users,DC=egia,DC=com
techadmin2019-05-31 17:04:45ZNever2019-05-31 10:04:45ZCN=tecch admin,CN=Users,DC=egia,DC=com
test2013-04-15 18:54:26Z2022-11-07 11:42:04Z2017-01-20 06:45:04ZCN=Test,OU=Sacramento,DC=egia,DC=com
tpiper2007-04-19 15:08:14Z2021-07-24 22:55:15Z2015-08-07 10:50:09ZCN=Todd Piper,OU=Sacramento,DC=egia,DC=com
tpollack2015-08-24 17:23:40Z2023-03-10 11:32:41Z2020-02-04 08:24:45ZCN=Toviah Pollack,OU=Sacramento,DC=egia,DC=com
tsluser2010-05-07 20:12:03ZNever2010-05-07 13:12:04ZCN=tsluser,CN=Users,DC=egia,DC=com
VipreService2011-01-20 19:58:42ZNever2011-06-27 23:55:45ZCN=VipreService,CN=Users,DC=egia,DC=com
vmadmin2016-08-23 21:50:09Z2020-06-26 05:15:08Z2016-08-23 14:50:09ZCN=VM Ware Admin,OU=Sacramento,DC=egia,DC=com
vpntest22016-09-30 16:13:35ZNever2016-09-30 09:13:36ZCN=vpntest2,CN=Users,DC=egia,DC=com
webmaster2001-11-14 22:23:36ZNever2010-12-06 13:52:35ZCN=Webmaster,CN=Users,DC=egia,DC=com
WyomingRebates2010-04-01 16:25:45ZNever2010-04-01 09:25:45ZCN=Wyoming Rebates,OU=Rebates,DC=egia,DC=com
[146]
NameCreationLast logonPwd Last SetDistinguished name
aarevalo2013-05-22 15:23:55Z2024-06-10 10:00:22Z2024-03-21 10:20:36ZCN=Adriana Arevalo,OU=Users,OU=MS365EGIA,DC=egia,DC=com
AccountingTemp2012-08-14 16:54:44Z2024-07-08 23:01:55Z2017-01-24 08:43:23ZCN=Accounting Temp,OU=Sacramento,DC=egia,DC=com
acowden2024-04-16 18:09:25ZNever2024-06-06 08:33:55ZCN=Ashley Cowden,OU=Users,OU=MS365EGIA,DC=egia,DC=com
Admin2002-09-13 23:34:50Z2019-08-13 05:22:33Z2002-09-13 16:34:51ZCN=Admin,OU=ofsdirect.com,DC=egia,DC=com
Administrator2001-10-06 18:33:47Z2021-07-19 23:25:17Z2015-04-08 09:31:00ZCN=Administrator,OU=Groups,DC=egia,DC=com
ADSyncAdmin-Local2024-02-21 20:56:43Z2024-02-21 12:57:48Z2024-02-21 12:56:43ZCN=ADSyncAdmin-Local,OU=Service Accounts,DC=egia,DC=com
ahuerta2024-03-08 04:00:46Z2024-07-15 07:17:04Z2024-03-27 11:20:41ZCN=Arturo Huerta,OU=Users,OU=MS365EGIA,DC=egia,DC=com
AlamedaMP2010-04-22 22:13:52ZNever2010-04-22 15:13:52ZCN=Alameda MP,OU=Rebates,DC=egia,DC=com
Arcserve2001-10-06 18:33:48ZNever2001-01-19 11:20:31ZCN=Arcserve,CN=Users,DC=egia,DC=com
aschindler2024-05-02 21:06:23ZNever2024-07-10 11:55:41ZCN=Angela Schindler,OU=Users,OU=MS365EGIA,DC=egia,DC=com
bbackup2010-11-28 16:01:14Z2019-03-23 20:57:54Z2010-11-28 08:01:14ZCN=Barracuda Backup,CN=Users,DC=egia,DC=com
BCMBackup2012-11-27 22:16:25ZNever2012-11-27 14:16:25ZCN=BCM Backup,OU=Sacramento,DC=egia,DC=com
bfernandez2014-07-11 16:10:54Z2020-04-02 13:10:54Z2024-04-18 11:52:02ZCN=Breanna Fernandez,OU=Users,OU=MS365EGIA,DC=egia,DC=com
bhollandsworth2010-04-14 17:14:15Z2023-09-28 09:56:25Z2024-04-29 11:02:25ZCN=Brenda Hollandsworth,OU=Users,OU=MS365EGIA,DC=egia,DC=com
bkagent2002-05-07 14:37:57Z2020-08-07 09:45:13Z2002-09-26 15:32:26ZCN=Backup Agent,CN=Users,DC=egia,DC=com
blyle2024-02-09 18:34:18Z2024-02-09 14:12:22Z2024-02-09 10:34:18ZCN=Brianna Lyle,OU=Sacramento,DC=egia,DC=com
bmatulich2003-08-19 21:08:08Z2024-07-15 07:45:30Z2022-10-18 17:59:03ZCN=Bruce Matulich,OU=Sacramento,DC=egia,DC=com
CallReportingAdmin2010-04-13 19:40:57ZNever2015-06-04 09:30:12ZCN=Call Reporting Admin,CN=Users,DC=egia,DC=com
cbuege2019-03-07 20:24:09Z2022-04-28 14:56:28Z2024-05-21 13:19:00ZCN=Carrie Buege,OU=Users,OU=MS365EGIA,DC=egia,DC=com
ccramer2014-07-25 20:03:05Z2024-07-10 11:43:12Z2020-02-14 06:02:29ZCN=Clinton Cramer,OU=Users,OU=MS365EGIA,DC=egia,DC=com
ChicagoLand2008-12-15 20:34:56ZNever2008-12-15 12:34:56ZCN=ChicagoLand,OU=Rebates,DC=egia,DC=com
conference2015-01-14 18:34:20Z2023-01-04 07:52:51Z2017-01-20 06:45:40ZCN=Conference,OU=Sacramento,DC=egia,DC=com
Consultant2002-09-17 17:27:04Z2020-09-08 09:31:41Z2010-11-21 13:30:35ZCN=Consultant,OU=Retired,DC=egia,DC=com
contractorapp12016-05-10 17:26:18ZNever2016-05-10 10:26:19ZCN=ContractorApp1,OU=Sacramento,DC=egia,DC=com
contractorapp22016-05-10 17:26:58ZNever2016-05-10 10:26:58ZCN=ContractorApp2,OU=Sacramento,DC=egia,DC=com
ContractorServices2007-12-01 00:08:06ZNever2007-11-30 16:08:06ZCN=ContractorServices,CN=Users,DC=egia,DC=com
crolbiecki2024-03-21 22:19:36ZNever2024-04-15 15:13:11ZCN=Clinton Rolbiecki,OU=Users,OU=MS365EGIA,DC=egia,DC=com
ctodd2019-02-25 23:16:57ZNever2019-02-25 15:16:57ZCN=CJ Todd,OU=Sacramento,DC=egia,DC=com
ddecoster2024-05-15 20:36:52ZNever2024-05-15 13:41:01ZCN=Donna Decoster,OU=Users,OU=MS365EGIA,DC=egia,DC=com
ddelgado2020-01-13 18:57:00Z2020-01-14 10:30:29Z2020-01-14 10:29:57ZCN=David Delgado,OU=Sacramento,DC=egia,DC=com
drentschler2016-10-18 19:15:38Z2021-06-15 09:35:25Z2016-12-22 10:40:11ZCN=Danny Rentschler,OU=Sacramento,DC=egia,DC=com
dthao2014-07-11 20:28:48Z2022-12-25 23:44:22Z2024-04-11 12:18:53ZCN=Darlene Thao,OU=Users,OU=MS365EGIA,DC=egia,DC=com
dvinokurov2024-06-28 15:06:56ZNever2024-06-28 08:06:56ZCN=David Vinokurov,OU=Users,OU=MS365EGIA,DC=egia,DC=com
dwilson2012-08-16 23:49:49Z2024-01-29 08:27:28Z2020-01-31 06:42:35ZCN=Donica Wilson,OU=Sacramento,DC=egia,DC=com
dyashinsky2019-03-25 20:11:57Z2024-02-09 10:35:19Z2024-02-09 10:32:23ZCN=Darrel Yashinsky,OU=Sacramento,DC=egia,DC=com
efax2007-08-03 16:26:52ZNever2007-08-03 09:26:52ZCN=e Fax,CN=Users,DC=egia,DC=com
EGIAServices2007-08-07 18:59:18ZNever2007-08-07 11:59:18ZCN=EGIA Services,CN=Users,DC=egia,DC=com
egonzalez2024-04-23 18:12:17ZNever2024-04-23 11:12:17ZCN=Edgar Gonzalez,OU=Users,OU=MS365EGIA,DC=egia,DC=com
ehatton2023-10-12 16:29:29Z2023-10-12 09:32:43Z2023-10-12 09:29:29ZCN=Eric Hatton,OU=Sacramento,DC=egia,DC=com
ejavaid2010-12-02 14:38:38Z2024-05-21 11:33:55Z2011-12-08 16:17:21ZCN=Eddie Javaid,OU=Sacramento,DC=egia,DC=com
emarquez2024-05-28 19:19:45Z2024-05-28 12:24:42Z2024-07-11 12:02:11ZCN=Elena Marquez,OU=Users,OU=MS365EGIA,DC=egia,DC=com
EMC2016-10-20 16:43:39Z2020-07-31 16:57:06Z2016-10-20 09:43:49ZCN=EMC,OU=Sacramento,DC=egia,DC=com
epic2018-09-11 21:29:59Z2018-09-11 15:12:14Z2018-09-11 14:29:59ZCN=epic event,CN=Users,DC=egia,DC=com
excessisout2009-02-12 19:42:14ZNever2009-02-12 11:42:14ZCN=Excess Is Out,OU=Rebates,DC=egia,DC=com
fssa2016-11-15 18:46:41Z2021-09-05 06:18:02Z2016-11-15 10:46:41ZCN=File Share Service Account,OU=Service Accounts,DC=egia,DC=com
hemc2008-05-14 19:05:59ZNever2008-05-14 12:05:59ZCN=EGIA Home Energy Makeover,CN=Users,DC=egia,DC=com
hlopez2023-08-17 17:11:47Z2023-08-18 12:57:03Z2023-08-18 12:52:41ZCN=Henry Lopez,OU=Sacramento,DC=egia,DC=com
homemakeovercontest2010-09-16 16:08:39ZNever2010-09-16 09:08:39ZCN=HomeMakeoverContest,CN=Users,DC=egia,DC=com
HomeownerServices2008-05-09 21:01:03ZNever2008-05-09 14:01:03ZCN=Homeowner Services,CN=Users,DC=egia,DC=com
ILS_ANONYMOUS_USER2001-10-24 20:31:48ZNever2001-10-24 13:31:48ZCN=ILS_ANONYMOUS_USER,CN=Users,DC=egia,DC=com
ILSRebates2010-02-23 01:54:37ZNever2010-02-22 17:54:37ZCN=ILS Rebates,OU=Rebates,DC=egia,DC=com
Info2010-08-23 20:57:49ZNever2010-08-23 13:57:59ZCN=Info,CN=Users,DC=egia,DC=com
IS-REQUESTS2002-01-03 18:47:31ZNever2002-01-03 10:47:31ZCN=IS-REQUESTS,CN=Users,DC=egia,DC=com
itsonicwall2019-08-01 23:45:55Z2024-07-14 16:48:10Z2019-08-01 16:45:55ZCN=IT SonicWall,OU=Service Accounts,DC=egia,DC=com
itvpnusr98W2018-07-18 21:28:28Z2022-02-24 15:35:16Z2022-02-03 14:16:00ZCN=it vpn,CN=Users,DC=egia,DC=com
IUSER2010-08-31 18:37:47Z2021-07-20 04:59:01Z2010-08-31 11:37:47ZCN=Internet User,CN=Users,DC=egia,DC=com
IUSR_BLUE2001-11-19 17:54:31ZNever2010-07-16 09:08:26ZCN=IUSR_BLUE,CN=Users,DC=egia,DC=com
IUSR_DEV2001-10-12 23:55:53ZNever2001-10-12 16:55:53ZCN=IUSR_DEV,CN=Users,DC=egia,DC=com
IUSR_NT-SERVER2001-10-06 18:33:48ZNever2001-10-06 11:09:06ZCN=IUSR_NT-SERVER,CN=Users,DC=egia,DC=com
IWAM_DEV2001-10-12 23:55:49ZNever2001-10-12 16:55:49ZCN=IWAM_DEV,CN=Users,DC=egia,DC=com
IWAM_NT-SERVER2001-10-06 18:33:48ZNever2001-10-06 11:08:14ZCN=IWAM_NT-SERVER,CN=Users,DC=egia,DC=com
jchandler2003-11-17 17:07:04Z2024-05-15 12:03:52Z2018-02-09 13:43:17ZCN=Jeremy Chandler,OU=Sacramento,DC=egia,DC=com
jmadrigal2014-12-29 17:39:09Z2024-07-08 13:52:22Z2024-03-07 14:14:18ZCN=Jessica Madrigal,OU=Users,OU=MS365EGIA,DC=egia,DC=com
jmiller2016-06-30 20:56:47Z2024-07-16 08:03:27Z2024-03-07 14:13:30ZCN=Justine Miller,OU=Users,OU=MS365EGIA,DC=egia,DC=com
jmorris2024-07-03 19:03:02ZNever2024-07-03 12:03:02ZCN=Jen Morris,OU=Users,OU=MS365EGIA,DC=egia,DC=com
Jobs2010-07-07 23:32:20ZNever2010-07-07 16:32:20ZCN=Jobs,CN=Users,DC=egia,DC=com
jvaladez2013-05-20 13:55:31Z2024-03-19 09:00:55Z2020-06-17 17:00:36ZCN=Jose Valadez,OU=Sacramento,DC=egia,DC=com
kguerrero2015-04-20 13:34:27Z2022-12-28 15:34:54Z2024-04-05 08:01:36ZCN=Karla Guerrero,OU=Users,OU=MS365EGIA,DC=egia,DC=com
kong2024-07-02 22:06:40ZNever2024-07-02 15:06:41ZCN=Katrina Ong,OU=Users,OU=MS365EGIA,DC=egia,DC=com
ksatterwhite2015-02-06 19:58:58Z2022-09-16 09:19:28Z2024-05-03 14:14:33ZCN=Kimberley Satterwhite,OU=Users,OU=MS365EGIA,DC=egia,DC=com
lamador2020-02-24 22:29:55Z2021-03-18 14:25:48Z2020-02-24 14:29:55ZCN=Leilani Amador,OU=Sacramento,DC=egia,DC=com
ldisney2013-03-25 15:44:51Z2024-07-15 07:57:11Z2024-06-19 14:44:38ZCN=Laurie Disney,OU=Users,OU=MS365EGIA,DC=egia,DC=com
lgopa22024-04-08 20:40:21Z2024-07-16 09:13:39Z2024-04-08 13:40:21ZCN=Larisa Gopa2,OU=Users,OU=MS365EGIA,DC=egia,DC=com
madisondisney2024-03-14 18:03:52Z2024-07-09 07:44:28Z2024-03-14 11:34:38ZCN=Madison Disney,OU=Users,OU=MS365EGIA,DC=egia,DC=com
malatorre2014-12-17 18:09:55Z2022-11-22 10:04:40Z2020-03-31 06:07:00ZCN=Maria Alatorre,OU=Sacramento,DC=egia,DC=com
mayang2019-01-18 16:42:36Z2019-07-01 08:03:09Z2019-02-04 13:33:53ZCN=Mai Yang2,CN=Users,DC=egia,DC=com
mbratsis2017-03-08 21:16:22Z2023-09-29 10:02:50Z2023-09-28 20:07:02ZCN=Matthew Bratsis,OU=Sacramento,DC=egia,DC=com
mbratsis22020-01-17 16:28:52Z2021-04-29 16:28:28Z2020-01-17 08:28:52ZCN=Matthew Bratsis2,OU=Sacramento,DC=egia,DC=com
mbryant2024-05-09 21:01:37ZNever2024-05-09 14:01:37ZCN=Molly Bryant,OU=Users,OU=MS365EGIA,DC=egia,DC=com
mdegenhardt2023-09-15 20:21:59Z2023-09-15 13:26:36Z2024-07-02 12:27:00ZCN=Matthew Degenhardt,OU=Users,OU=MS365EGIA,DC=egia,DC=com
mferreira2020-02-20 18:33:17Z2022-03-29 09:50:55Z2020-02-21 07:59:29ZCN=Miguel Ferreira,OU=Sacramento,DC=egia,DC=com
mkelley2024-03-08 04:17:12Z2024-05-17 13:17:36Z2024-05-21 10:25:42ZCN=Martha Kelley,OU=Users,OU=MS365EGIA,DC=egia,DC=com
MSOL_bd60f9d632d02024-02-08 14:14:29Z2024-07-10 15:21:59Z2024-02-21 14:26:27ZCN=MSOL_bd60f9d632d0,CN=Users,DC=egia,DC=com
mtech2019-03-19 20:55:34Z2022-12-13 18:52:49Z2020-06-15 16:25:19ZCN=Martin tech,CN=Users,DC=egia,DC=com
mvitanza2023-08-17 17:16:02Z2023-08-18 08:03:47Z2023-08-17 10:16:02ZCN=Marisa Vitanza,OU=Sacramento,DC=egia,DC=com
mwalker2024-03-21 22:22:43Z2024-03-21 15:30:02Z2024-03-21 15:22:43ZCN=Mary Walker,OU=Users,OU=MS365EGIA,DC=egia,DC=com
MWDRebates2008-06-17 21:36:06ZNever2008-06-17 14:36:06ZCN=MWD Rebates,OU=Rebates,DC=egia,DC=com
myang2018-04-13 21:16:35Z2020-06-29 12:39:44Z2020-02-10 07:54:36ZCN=Mai Yang,CN=Users,DC=egia,DC=com
NicorRebates2010-05-04 00:41:55ZNever2010-05-03 17:41:55ZCN=Nicor Rebates,OU=Rebates,DC=egia,DC=com
nodom2015-06-22 14:19:08Z2024-07-16 06:38:26Z2024-02-29 13:08:42ZCN=Nathaniel Odom,OU=Users,OU=MS365EGIA,DC=egia,DC=com
nsingh2011-07-07 04:15:59ZNever2023-06-07 14:29:43ZCN=Navdeep Singh,OU=Sacramento,DC=egia,DC=com
nvaladez2023-08-17 18:23:24Z2023-11-01 12:49:03Z2023-08-17 11:23:24ZCN=Nayeli Valadez,OU=Users,OU=MS365EGIA,DC=egia,DC=com
paheatingrebates2010-04-20 22:27:56ZNever2010-04-20 15:27:56ZCN=PAHeating Rebates,OU=Rebates,DC=egia,DC=com
PAQ2010-09-02 20:37:13ZNever2010-09-02 13:37:23ZCN=PAQ,OU=Rebates,DC=egia,DC=com
pbrokaw2023-11-22 02:07:37ZNever2023-11-21 18:07:37ZCN=Pat Brokaw,OU=Sacramento,DC=egia,DC=com
pkeating2024-05-23 19:44:45ZNever2024-05-29 13:56:52ZCN=PJ Keating,OU=Users,OU=MS365EGIA,DC=egia,DC=com
pmanager2010-11-21 21:28:03ZNever2010-11-21 13:28:03ZCN=Print Manager,CN=Users,DC=egia,DC=com
pwhite2024-05-01 16:44:43ZNever2024-05-01 09:44:43ZCN=Paris White,OU=Users,OU=MS365EGIA,DC=egia,DC=com
Rebate012003-04-03 21:47:09ZNever2010-06-23 17:27:53ZCN=Rebate01,OU=Rebates,DC=egia,DC=com
registrations2010-08-30 23:46:33ZNever2010-08-30 16:46:33ZCN=Registrations,CN=Users,DC=egia,DC=com
rerebates2004-10-15 20:23:26ZNever2004-10-15 13:23:26ZCN=Roseville Electric Rebates,OU=Rebates,DC=egia,DC=com
rfaust2019-05-30 21:15:48Z2020-03-09 10:43:53Z2020-02-10 07:53:37ZCN=Robin Faust,OU=Sacramento,DC=egia,DC=com
Ricoh2011-10-21 20:55:51Z2022-05-12 11:03:55Z2011-10-21 13:56:48ZCN=Ricoh,CN=Users,DC=egia,DC=com
rmong2018-08-24 15:58:20Z2022-01-31 11:39:55Z2020-05-14 09:35:35ZCN=Ricky Mong,CN=Users,DC=egia,DC=com
rwilliams2018-08-02 21:29:05Z2024-07-02 15:44:46Z2024-05-02 11:33:24ZCN=Rhonda Williams,OU=Users,OU=MS365EGIA,DC=egia,DC=com
saccount2010-11-21 21:35:59ZNever2010-11-21 13:35:59ZCN=Service Account,CN=Users,DC=egia,DC=com
SalesMarketing2009-06-11 21:35:56ZNever2009-06-11 14:35:56ZCN=SalesMarketing,CN=Users,DC=egia,DC=com
sangeles2018-08-09 20:55:13Z2023-08-01 09:41:03Z2020-02-11 10:58:01ZCN=Stephanie Angeles,OU=Sacramento,DC=egia,DC=com
SaveEnergy2009-12-03 19:47:49ZNever2009-12-03 11:47:49ZCN=SaveEnergy,CN=Users,DC=egia,DC=com
ScanRouter2002-10-30 21:34:13ZNever2002-10-30 13:34:13ZCN=ScanRouter,CN=Users,DC=egia,DC=com
ScanRouterMail2002-10-30 23:16:24ZNever2002-10-30 15:16:24ZCN=ScanRouterMail,CN=Users,DC=egia,DC=com
ScanRouterService2011-01-20 20:04:57ZNever2011-01-20 12:14:44ZCN=ScanRouterService,CN=Users,DC=egia,DC=com
SCVRebates2009-08-17 16:50:54ZNever2009-08-17 09:50:54ZCN=SCV Rebates,OU=Rebates,DC=egia,DC=com
sfenger2024-01-16 18:01:36Z2024-01-22 07:53:37Z2024-01-16 10:01:36ZCN=Samantha Fenger,OU=Sacramento,DC=egia,DC=com
skillian2015-12-16 16:20:23Z2020-03-17 07:42:31Z2015-12-16 08:20:24ZCN=Scott Killian,OU=Sacramento,DC=egia,DC=com
slee2018-08-08 21:31:38Z2021-06-20 07:32:12Z2024-04-05 05:32:33ZCN=Somaey Lee,OU=Users,OU=MS365EGIA,DC=egia,DC=com
smccrary2020-03-09 20:10:33Z2023-08-31 08:40:22Z2024-06-13 13:25:09ZCN=Sharon McCrary,OU=Users,OU=MS365EGIA,DC=egia,DC=com
smercado2018-08-15 17:12:46Z2022-06-19 21:10:52Z2020-04-10 07:30:44ZCN=Samara Mercado,CN=Users,DC=egia,DC=com
smiller2024-05-09 19:22:18ZNever2024-05-09 12:22:18ZCN=Sarnai Miller,OU=Users,OU=MS365EGIA,DC=egia,DC=com
socalwatersmart2011-08-16 04:00:46ZNever2011-08-15 21:00:46ZCN=SoCalWaterSmart,CN=Users,DC=egia,DC=com
SolanoRebates2007-02-28 18:25:46ZNever2007-02-28 10:25:46ZCN=Solano Rebates,OU=Rebates,DC=egia,DC=com
sonicwalladmin2017-07-13 17:08:10Z2017-07-13 13:57:32Z2017-07-13 10:08:10ZCN=sonicwall admin,CN=Users,DC=egia,DC=com
spam2007-10-28 17:12:29ZNever2007-10-28 10:12:29ZCN=Spam Box,CN=Users,DC=egia,DC=com
spiceworks2016-09-22 16:51:38Z2020-05-13 03:41:47Z2016-10-11 06:12:25ZCN=SpiceWorks,OU=Service Accounts,DC=egia,DC=com
SQLJobs2011-03-10 01:08:39Z2021-07-22 16:01:16Z2011-03-09 17:08:39ZCN=SQLJobs,CN=Users,DC=egia,DC=com
sspray2024-05-08 21:40:54ZNever2024-05-08 14:40:54ZCN=Stephanie Spray,OU=Users,OU=MS365EGIA,DC=egia,DC=com
SSRS2010-08-24 23:56:48Z2020-06-16 09:12:07Z2010-08-24 16:56:48ZCN=SQL Server Reporting Services,CN=Users,DC=egia,DC=com
suser2010-05-05 02:13:31ZNever2010-05-04 19:13:31ZCN=SQL User,OU=Sacramento,DC=egia,DC=com
svc_prod_sql2014-08-12 03:15:59ZNever2014-08-11 20:15:59ZCN=Production SQL Service,OU=Service Accounts,DC=egia,DC=com
svcDevSQLServer2010-12-30 05:20:06Z2021-07-12 06:46:36Z2010-12-29 21:20:06ZCN=DEV SQL Service,CN=Users,DC=egia,DC=com
SWGRebates2008-01-25 22:04:44ZNever2008-01-25 14:05:04ZCN=SWG Rebates,OU=Rebates,DC=egia,DC=com
tech2007-05-08 15:37:42ZNever2012-02-03 14:51:52ZCN=Tech,CN=Users,DC=egia,DC=com
techadmin2019-05-31 17:04:45ZNever2019-05-31 10:04:45ZCN=tecch admin,CN=Users,DC=egia,DC=com
test2013-04-15 18:54:26Z2022-11-07 11:42:04Z2017-01-20 06:45:04ZCN=Test,OU=Sacramento,DC=egia,DC=com
tfelczak2023-08-17 17:07:56Z2023-08-17 12:27:59Z2024-05-20 06:19:01ZCN=Tiffany Felczak,OU=Users,OU=MS365EGIA,DC=egia,DC=com
tgibson2003-09-22 15:49:18Z2024-03-07 14:25:41Z2024-03-07 14:15:01ZCN=Teresa Gibson,OU=Users,OU=MS365EGIA,DC=egia,DC=com
tle2010-08-23 15:26:48Z2024-06-06 13:35:43Z2012-11-28 15:21:13ZCN=Tuan Le,OU=Sacramento,DC=egia,DC=com
tpiper2007-04-19 15:08:14Z2021-07-24 22:55:15Z2015-08-07 10:50:09ZCN=Todd Piper,OU=Sacramento,DC=egia,DC=com
tpollack2015-08-24 17:23:40Z2023-03-10 11:32:41Z2020-02-04 08:24:45ZCN=Toviah Pollack,OU=Sacramento,DC=egia,DC=com
tsluser2010-05-07 20:12:03ZNever2010-05-07 13:12:04ZCN=tsluser,CN=Users,DC=egia,DC=com
ttrybul2023-09-21 20:25:11Z2023-09-22 12:43:30Z2024-07-10 17:33:25ZCN=Tammy Trybul,OU=Users,OU=MS365EGIA,DC=egia,DC=com
twilliamson2024-05-03 19:46:29ZNever2024-05-09 06:36:44ZCN=Tim Williamson,OU=Users,OU=MS365EGIA,DC=egia,DC=com
VipreService2011-01-20 19:58:42ZNever2011-06-27 23:55:45ZCN=VipreService,CN=Users,DC=egia,DC=com
vmadmin2016-08-23 21:50:09Z2020-06-26 05:15:08Z2016-08-23 14:50:09ZCN=VM Ware Admin,OU=Sacramento,DC=egia,DC=com
vperrault2024-02-09 18:39:05Z2024-07-04 23:34:58Z2024-03-15 14:03:43ZCN=Veronica Perrault,OU=Users,OU=MS365EGIA,DC=egia,DC=com
WyomingRebates2010-04-01 16:25:45ZNever2010-04-01 09:25:45ZCN=Wyoming Rebates,OU=Rebates,DC=egia,DC=com
[2]
NameCreationLast logonPwd Last SetDistinguished name
Arcserve2001-10-06 18:33:48ZNever2001-01-19 11:20:31ZCN=Arcserve,CN=Users,DC=egia,DC=com
bkagent2002-05-07 14:37:57Z2020-08-07 09:45:13Z2002-09-26 15:32:26ZCN=Backup Agent,CN=Users,DC=egia,DC=com
[40]
NameCreationLast logonPwd Last SetDistinguished name
Admin2002-09-13 23:34:50Z2019-08-13 05:22:33Z2002-09-13 16:34:51ZCN=Admin,OU=ofsdirect.com,DC=egia,DC=com
Administrator2001-10-06 18:33:47Z2021-07-19 23:25:17Z2015-04-08 09:31:00ZCN=Administrator,OU=Groups,DC=egia,DC=com
AlamedaMP2010-04-22 22:13:52ZNever2010-04-22 15:13:52ZCN=Alameda MP,OU=Rebates,DC=egia,DC=com
Arcserve2001-10-06 18:33:48ZNever2001-01-19 11:20:31ZCN=Arcserve,CN=Users,DC=egia,DC=com
bkagent2002-05-07 14:37:57Z2020-08-07 09:45:13Z2002-09-26 15:32:26ZCN=Backup Agent,CN=Users,DC=egia,DC=com
ChicagoLand2008-12-15 20:34:56ZNever2008-12-15 12:34:56ZCN=ChicagoLand,OU=Rebates,DC=egia,DC=com
ContractorServices2007-12-01 00:08:06ZNever2007-11-30 16:08:06ZCN=ContractorServices,CN=Users,DC=egia,DC=com
efax2007-08-03 16:26:52ZNever2007-08-03 09:26:52ZCN=e Fax,CN=Users,DC=egia,DC=com
EGIAServices2007-08-07 18:59:18ZNever2007-08-07 11:59:18ZCN=EGIA Services,CN=Users,DC=egia,DC=com
excessisout2009-02-12 19:42:14ZNever2009-02-12 11:42:14ZCN=Excess Is Out,OU=Rebates,DC=egia,DC=com
hemc2008-05-14 19:05:59ZNever2008-05-14 12:05:59ZCN=EGIA Home Energy Makeover,CN=Users,DC=egia,DC=com
HomeownerServices2008-05-09 21:01:03ZNever2008-05-09 14:01:03ZCN=Homeowner Services,CN=Users,DC=egia,DC=com
ILS_ANONYMOUS_USER2001-10-24 20:31:48ZNever2001-10-24 13:31:48ZCN=ILS_ANONYMOUS_USER,CN=Users,DC=egia,DC=com
ILSRebates2010-02-23 01:54:37ZNever2010-02-22 17:54:37ZCN=ILS Rebates,OU=Rebates,DC=egia,DC=com
IS-REQUESTS2002-01-03 18:47:31ZNever2002-01-03 10:47:31ZCN=IS-REQUESTS,CN=Users,DC=egia,DC=com
IUSR_BLUE2001-11-19 17:54:31ZNever2010-07-16 09:08:26ZCN=IUSR_BLUE,CN=Users,DC=egia,DC=com
IUSR_DEV2001-10-12 23:55:53ZNever2001-10-12 16:55:53ZCN=IUSR_DEV,CN=Users,DC=egia,DC=com
IUSR_NT-SERVER2001-10-06 18:33:48ZNever2001-10-06 11:09:06ZCN=IUSR_NT-SERVER,CN=Users,DC=egia,DC=com
IWAM_DEV2001-10-12 23:55:49ZNever2001-10-12 16:55:49ZCN=IWAM_DEV,CN=Users,DC=egia,DC=com
IWAM_NT-SERVER2001-10-06 18:33:48ZNever2001-10-06 11:08:14ZCN=IWAM_NT-SERVER,CN=Users,DC=egia,DC=com
Jobs2010-07-07 23:32:20ZNever2010-07-07 16:32:20ZCN=Jobs,CN=Users,DC=egia,DC=com
MWDRebates2008-06-17 21:36:06ZNever2008-06-17 14:36:06ZCN=MWD Rebates,OU=Rebates,DC=egia,DC=com
NicorRebates2010-05-04 00:41:55ZNever2010-05-03 17:41:55ZCN=Nicor Rebates,OU=Rebates,DC=egia,DC=com
paheatingrebates2010-04-20 22:27:56ZNever2010-04-20 15:27:56ZCN=PAHeating Rebates,OU=Rebates,DC=egia,DC=com
Rebate012003-04-03 21:47:09ZNever2010-06-23 17:27:53ZCN=Rebate01,OU=Rebates,DC=egia,DC=com
Rebates2001-10-06 18:33:48ZNever1600-12-31 16:00:00ZCN=Rebate Process,OU=Rebates,DC=egia,DC=com
rerebates2004-10-15 20:23:26ZNever2004-10-15 13:23:26ZCN=Roseville Electric Rebates,OU=Rebates,DC=egia,DC=com
SalesMarketing2009-06-11 21:35:56ZNever2009-06-11 14:35:56ZCN=SalesMarketing,CN=Users,DC=egia,DC=com
SaveEnergy2009-12-03 19:47:49ZNever2009-12-03 11:47:49ZCN=SaveEnergy,CN=Users,DC=egia,DC=com
ScanRouter2002-10-30 21:34:13ZNever2002-10-30 13:34:13ZCN=ScanRouter,CN=Users,DC=egia,DC=com
ScanRouterMail2002-10-30 23:16:24ZNever2002-10-30 15:16:24ZCN=ScanRouterMail,CN=Users,DC=egia,DC=com
SCVRebates2009-08-17 16:50:54ZNever2009-08-17 09:50:54ZCN=SCV Rebates,OU=Rebates,DC=egia,DC=com
SolanoRebates2007-02-28 18:25:46ZNever2007-02-28 10:25:46ZCN=Solano Rebates,OU=Rebates,DC=egia,DC=com
spam2007-10-28 17:12:29ZNever2007-10-28 10:12:29ZCN=Spam Box,CN=Users,DC=egia,DC=com
sqlserveralert2001-11-14 22:23:36ZNever2001-11-14 15:09:20ZCN=SQLServer Alert,CN=Users,DC=egia,DC=com
support2003-11-19 22:37:59ZNever2003-11-19 14:38:00ZCN=Support,CN=Users,DC=egia,DC=com
suser2010-05-05 02:13:31ZNever2010-05-04 19:13:31ZCN=SQL User,OU=Sacramento,DC=egia,DC=com
SWGRebates2008-01-25 22:04:44ZNever2008-01-25 14:05:04ZCN=SWG Rebates,OU=Rebates,DC=egia,DC=com
tsluser2010-05-07 20:12:03ZNever2010-05-07 13:12:04ZCN=tsluser,CN=Users,DC=egia,DC=com
WyomingRebates2010-04-01 16:25:45ZNever2010-04-01 09:25:45ZCN=Wyoming Rebates,OU=Rebates,DC=egia,DC=com
[1]
NameCreationLast logonPwd Last SetDistinguished name
$DUPLICATE-6b142017-01-16 22:10:46Z2017-01-16 14:51:34Z2017-01-16 14:41:24ZCN=sharyl\0ACNF:cff5105e-507b-4e10-8483-74f6d1e18af1,OU=Sacramento,DC=egia,DC=com

Password Age Distribution

Here is the distribution where the password has been changed for the last time. Only enabled user accounts are analyzed (no guest account for example).

0-30 days30-60 days60-90 days90-120 days120-150 days150-180 days180-210 days210-240 days240-270 days270-300 days300-330 days330-360 days360-390 days390-420 days420-450 days450-480 days480-510 days510-540 days540-570 days570-600 days600-630 days630-660 days660-690 days690-720 days720-750 days750-780 days780-810 days810-840 days840-870 days870-900 days900-930 days930-960 days960-990 days990-1020 days1020-1050 days1050-1080 daysOther01020304050

Account analysis

This section gives information about the computer accounts stored in the Active Directory

Nb Computer AccountsNb Enabled ?Nb Disabled ?Nb Active ?Nb Inactive ?Nb SidHistory ?Nb Bad PrimaryGroup ?Nb unconstrained delegations ?Nb Reversible password ?
3703646393250020
[325]
NameCreationLast logonPwd Last SetDistinguished name
BACKUP-PC$2013-04-18 18:03:39ZNever2013-04-18 11:03:39ZCN=BACKUP-PC,CN=Computers,DC=egia,DC=com
BACKUP-PC2$2013-04-18 21:45:30ZNever2014-09-02 08:51:32ZCN=BACKUP-PC2,CN=Computers,DC=egia,DC=com
BACKUP-PC3$2013-05-08 21:28:27ZNever2013-05-08 14:28:27ZCN=BACKUP-PC3,CN=Computers,DC=egia,DC=com
BACKUP-PC4$2013-05-15 20:54:28ZNever2013-07-19 19:23:21ZCN=BACKUP-PC4,CN=Computers,DC=egia,DC=com
BHOWARTH$2007-01-10 02:12:03ZNever2007-03-12 09:56:21ZCN=BHOWARTH,CN=Computers,DC=egia,DC=com
BLACK$2007-10-17 19:50:10ZNever2010-07-16 14:11:09ZCN=BLACK,CN=Computers,DC=egia,DC=com
BMATULICH$2003-10-27 19:54:28ZNever2011-11-07 21:20:10ZCN=BMATULICH,CN=Computers,DC=egia,DC=com
BMATULICH-HOME$2003-08-19 19:47:37ZNever2010-05-23 11:54:31ZCN=BMATULICH-HOME,CN=Computers,DC=egia,DC=com
BMATULICH-PC$2011-11-15 00:37:48ZNever2014-02-28 08:14:59ZCN=BMATULICH-PC,CN=Computers,DC=egia,DC=com
BROWN$2010-08-15 21:56:51ZNever2016-08-23 11:52:40ZCN=BROWN,CN=Computers,DC=egia,DC=com
CALABRESE$2007-06-22 21:15:22ZNever2013-02-27 13:23:44ZCN=CALABRESE,CN=Computers,DC=egia,DC=com
CALLREPORT$2010-07-27 03:39:48ZNever2010-07-26 20:39:48ZCN=CALLREPORT,CN=Computers,DC=egia,DC=com
CALLREPORTING$2010-03-04 17:53:26ZNever2010-07-14 00:19:11ZCN=CALLREPORTING,CN=Computers,DC=egia,DC=com
CALLREPORTS$2010-07-23 22:55:22ZNever2015-01-13 07:56:37ZCN=CALLREPORTS,CN=Computers,DC=egia,DC=com
CDEARMAN$2010-04-16 17:26:04ZNever2012-12-13 09:51:47ZCN=CDEARMAN,CN=Computers,DC=egia,DC=com
CLINTON-WIN10$2019-01-21 19:25:18Z2020-10-29 23:54:28Z2020-10-14 23:26:51ZCN=CLINTON-WIN10,CN=Computers,DC=egia,DC=com
CRLAPTOP$2011-05-20 21:19:56ZNever2014-07-30 08:45:02ZCN=CRLAPTOP,CN=Computers,DC=egia,DC=com
CRYSTALM$2018-07-02 21:21:43Z2020-03-13 07:55:27Z2020-03-11 11:45:48ZCN=CRYSTALM,CN=Computers,DC=egia,DC=com
CSR2$2010-07-19 13:20:01ZNever2011-04-28 06:07:51ZCN=CSR2,CN=Computers,DC=egia,DC=com
DARREL-WIN10$2019-04-03 20:59:26Z2021-12-09 08:27:07Z2021-12-09 08:42:56ZCN=DARREL-WIN10,CN=Computers,DC=egia,DC=com
DAVE-PC$2016-04-05 17:28:34Z2017-07-27 15:08:29Z2017-01-07 06:03:06ZCN=DAVE-PC,CN=Computers,DC=egia,DC=com
DESKTOP-0T5O7HL$2019-11-14 21:26:24Z2022-04-25 13:05:29Z2022-04-25 13:20:10ZCN=DESKTOP-0T5O7HL,CN=Computers,DC=egia,DC=com
DESKTOP-15VAUDB$2021-07-07 22:13:50Z2023-07-26 08:59:21Z2023-07-14 13:23:53ZCN=DESKTOP-15VAUDB,CN=Computers,DC=egia,DC=com
DESKTOP-16EP77J$2020-06-16 17:14:12Z2022-06-07 10:47:59Z2021-10-04 10:29:04ZCN=DESKTOP-16EP77J,CN=Computers,DC=egia,DC=com
DESKTOP-1FNOEHQ$2019-11-16 00:48:21Z2020-07-21 10:01:13Z2020-06-16 08:55:54ZCN=DESKTOP-1FNOEHQ,CN=Computers,DC=egia,DC=com
DESKTOP-1MS7FJ7$2018-08-02 21:27:05Z2019-11-13 12:16:05Z2019-07-09 15:19:47ZCN=DESKTOP-1MS7FJ7,CN=Computers,DC=egia,DC=com
DESKTOP-1N83ODI$2021-04-21 18:24:00Z2022-12-29 12:58:54Z2022-12-07 07:47:58ZCN=DESKTOP-1N83ODI,CN=Computers,DC=egia,DC=com
DESKTOP-1ROLPJI$2018-05-14 21:13:38Z2021-03-10 07:24:53Z2021-03-10 07:24:54ZCN=DESKTOP-1ROLPJI,CN=Computers,DC=egia,DC=com
DESKTOP-3680E7J$2018-09-04 23:02:39Z2018-09-16 08:10:18Z2018-09-04 16:02:39ZCN=DESKTOP-3680E7J,CN=Computers,DC=egia,DC=com
DESKTOP-3RSQUL8$2020-09-29 20:52:35Z2021-04-12 11:21:03Z2021-04-02 10:52:16ZCN=DESKTOP-3RSQUL8,CN=Computers,DC=egia,DC=com
DESKTOP-41N990G$2019-09-17 14:04:45Z2022-09-16 08:44:10Z2022-09-16 08:44:10ZCN=DESKTOP-41N990G,CN=Computers,DC=egia,DC=com
DESKTOP-4FBUQ7K$2020-03-19 17:30:11Z2021-08-31 13:50:27Z2021-08-31 13:53:28ZCN=DESKTOP-4FBUQ7K,CN=Computers,DC=egia,DC=com
DESKTOP-5MQB4BA$2019-09-17 14:02:36Z2021-08-23 09:26:18Z2021-08-23 09:26:18ZCN=DESKTOP-5MQB4BA,CN=Computers,DC=egia,DC=com
DESKTOP-5PGLROL$2021-10-12 16:15:22Z2023-05-02 07:07:59Z2023-05-02 07:08:01ZCN=DESKTOP-5PGLROL,CN=Computers,DC=egia,DC=com
DESKTOP-5R10RF5$2023-09-15 16:49:19Z2023-09-15 09:49:20Z2023-09-15 09:49:19ZCN=DESKTOP-5R10RF5,CN=Computers,DC=egia,DC=com
DESKTOP-67OSU32$2020-03-19 18:07:46Z2021-07-13 10:06:43Z2021-07-13 10:08:46ZCN=DESKTOP-67OSU32,CN=Computers,DC=egia,DC=com
DESKTOP-6H9F33F$2021-08-17 22:17:09Z2021-08-17 15:17:09Z2021-08-17 15:17:09ZCN=DESKTOP-6H9F33F,CN=Computers,DC=egia,DC=com
DESKTOP-6T93L16$2019-11-07 20:31:48Z2020-05-14 11:47:10Z2020-05-13 09:03:36ZCN=DESKTOP-6T93L16,CN=Computers,DC=egia,DC=com
DESKTOP-77RBVD4$2019-10-29 16:05:50Z2021-01-24 12:55:45Z2021-01-24 12:55:47ZCN=DESKTOP-77RBVD4,CN=Computers,DC=egia,DC=com
DESKTOP-7B3AG3A$2020-03-16 23:18:44Z2020-03-16 16:18:44Z2020-03-16 16:19:58ZCN=DESKTOP-7B3AG3A,CN=Computers,DC=egia,DC=com
DESKTOP-7EA5P8T$2019-02-20 17:51:02Z2021-05-07 14:43:36Z2021-05-07 14:59:21ZCN=DESKTOP-7EA5P8T,CN=Computers,DC=egia,DC=com
DESKTOP-81DIHNJ$2019-11-07 22:57:07Z2023-07-21 08:52:09Z2023-07-10 08:26:54ZCN=DESKTOP-81DIHNJ,CN=Computers,DC=egia,DC=com
DESKTOP-8KLEBP4$2022-05-11 15:44:45Z2023-12-20 15:13:06Z2023-05-23 12:32:50ZCN=DESKTOP-8KLEBP4,OU=Computers,OU=MS365EGIA,DC=egia,DC=com
DESKTOP-90810I8$2020-02-05 17:53:42Z2022-06-06 10:06:33Z2022-06-03 07:59:09ZCN=DESKTOP-90810I8,CN=Computers,DC=egia,DC=com
DESKTOP-938E09J$2021-12-02 20:50:19Z2021-12-02 12:50:19Z2021-12-02 12:50:19ZCN=DESKTOP-938E09J,CN=Computers,DC=egia,DC=com
DESKTOP-95N1LDC$2023-08-17 17:49:06Z2023-11-01 12:47:18Z2023-11-01 13:02:13ZCN=DESKTOP-95N1LDC,CN=Computers,DC=egia,DC=com
DESKTOP-9O97NFG$2019-10-04 17:55:21Z2023-01-16 11:53:11Z2023-01-16 11:56:07ZCN=DESKTOP-9O97NFG,CN=Computers,DC=egia,DC=com
DESKTOP-A3LS3HT$2021-07-26 19:50:42Z2023-09-05 14:19:12Z2023-08-18 14:18:32ZCN=DESKTOP-A3LS3HT,CN=Computers,DC=egia,DC=com
DESKTOP-CIEMD1C$2021-07-08 20:48:24Z2021-07-08 13:48:24Z2021-07-08 14:57:08ZCN=DESKTOP-CIEMD1C,CN=Computers,DC=egia,DC=com
DESKTOP-CO6V59D$2020-03-19 19:20:54Z2020-09-15 10:04:04Z2020-08-24 09:37:26ZCN=DESKTOP-CO6V59D,CN=Computers,DC=egia,DC=com
DESKTOP-COG52B9$2019-02-22 17:55:31Z2019-08-23 12:26:14Z2019-08-12 12:56:50ZCN=DESKTOP-COG52B9,CN=Computers,DC=egia,DC=com
DESKTOP-D7C73LJ$2019-09-17 14:06:18Z2022-03-04 05:23:17Z2022-03-04 05:36:56ZCN=DESKTOP-D7C73LJ,CN=Computers,DC=egia,DC=com
DESKTOP-DULLU4G$2020-03-19 14:32:49Z2020-04-12 11:10:17Z2020-03-19 07:32:49ZCN=DESKTOP-DULLU4G,CN=Computers,DC=egia,DC=com
DESKTOP-E1DCM7D$2020-01-16 17:36:12Z2020-01-16 09:36:13Z2020-01-16 09:36:12ZCN=DESKTOP-E1DCM7D,CN=Computers,DC=egia,DC=com
DESKTOP-E4U1NOM$2020-03-19 17:22:36Z2022-09-01 12:45:48Z2022-09-01 12:49:18ZCN=DESKTOP-E4U1NOM,CN=Computers,DC=egia,DC=com
DESKTOP-F8I0LKE$2018-08-21 21:57:36Z2020-01-07 15:26:58Z2019-12-23 22:25:14ZCN=DESKTOP-F8I0LKE,CN=Computers,DC=egia,DC=com
DESKTOP-FIT3S1H$2021-07-08 17:58:32Z2022-11-22 10:04:47Z2022-11-22 10:17:21ZCN=DESKTOP-FIT3S1H,CN=Computers,DC=egia,DC=com
DESKTOP-FU376D4$2019-10-24 17:04:17Z2019-11-08 11:58:48Z2019-10-24 10:04:17ZCN=DESKTOP-FU376D4,CN=Computers,DC=egia,DC=com
DESKTOP-G35K9LK$2019-11-07 20:32:35Z2023-10-23 18:39:19Z2023-10-22 02:05:35ZCN=DESKTOP-G35K9LK,CN=Computers,DC=egia,DC=com
DESKTOP-GCO3070$2019-11-14 21:25:06Z2022-05-20 07:41:45Z2022-05-09 08:24:51ZCN=DESKTOP-GCO3070,CN=Computers,DC=egia,DC=com
DESKTOP-GGFHE49$2019-11-07 20:35:26Z2021-06-20 07:32:18Z2021-06-20 07:33:05ZCN=DESKTOP-GGFHE49,CN=Computers,DC=egia,DC=com
DESKTOP-GNGFIJK$2020-02-05 17:53:29Z2023-06-14 15:03:14Z2023-06-14 15:20:13ZCN=DESKTOP-GNGFIJK,CN=Computers,DC=egia,DC=com
DESKTOP-H4C5MT3$2021-12-28 15:13:07Z2021-12-28 07:13:07Z2021-12-28 07:13:07ZCN=DESKTOP-H4C5MT3,CN=Computers,DC=egia,DC=com
DESKTOP-HEVUINE$2019-07-31 20:32:17Z2022-06-13 14:26:35Z2022-06-03 11:14:28ZCN=DESKTOP-HEVUINE,CN=Computers,DC=egia,DC=com
DESKTOP-J3KF0LB$2020-02-12 16:27:46Z2023-08-17 11:09:59Z2023-08-07 11:08:15ZCN=DESKTOP-J3KF0LB,CN=Computers,DC=egia,DC=com
DESKTOP-JJ4C7N1$2019-10-24 18:16:15Z2021-01-11 10:38:44Z2020-12-23 19:51:25ZCN=DESKTOP-JJ4C7N1,CN=Computers,DC=egia,DC=com
DESKTOP-JNF5P6B$2019-11-07 20:10:08Z2021-02-12 14:00:35Z2021-02-12 14:09:59ZCN=DESKTOP-JNF5P6B,CN=Computers,DC=egia,DC=com
DESKTOP-KHGSECP$2020-06-16 17:14:25Z2023-02-07 12:15:35Z2023-02-07 12:28:24ZCN=DESKTOP-KHGSECP,CN=Computers,DC=egia,DC=com
DESKTOP-L8EA86Q$2023-09-21 22:37:46Z2023-09-21 15:37:50Z2023-09-21 15:37:50ZCN=DESKTOP-L8EA86Q,OU=Computers,OU=MS365EGIA,DC=egia,DC=com
DESKTOP-LED9AGJ$2021-08-17 18:24:25Z2021-08-17 11:24:25Z2021-08-17 11:24:25ZCN=DESKTOP-LED9AGJ,CN=Computers,DC=egia,DC=com
DESKTOP-LEUKS8H$2021-07-12 18:43:46Z2023-05-30 08:24:38Z2023-06-06 08:25:08ZCN=DESKTOP-LEUKS8H,CN=Computers,DC=egia,DC=com
DESKTOP-NSMT5CP$2019-05-30 22:05:30Z2023-06-30 10:46:03Z2023-06-30 11:04:51ZCN=DESKTOP-NSMT5CP,CN=Computers,DC=egia,DC=com
DESKTOP-OBEOBB0$2020-03-18 18:34:32Z2023-06-15 14:07:19Z2023-06-15 14:23:28ZCN=DESKTOP-OBEOBB0,CN=Computers,DC=egia,DC=com
DESKTOP-P3K9L8L$2018-08-27 17:52:48Z2023-06-15 13:35:58Z2023-06-15 13:35:59ZCN=DESKTOP-P3K9L8L,CN=Computers,DC=egia,DC=com
DESKTOP-PLA4DDM$2020-01-17 18:32:59Z2021-04-29 16:28:32Z2020-09-11 14:42:01ZCN=DESKTOP-PLA4DDM,CN=Computers,DC=egia,DC=com
DESKTOP-PPTAJ1A$2020-05-28 16:14:23Z2023-06-15 13:16:57Z2023-06-15 13:31:44ZCN=DESKTOP-PPTAJ1A,CN=Computers,DC=egia,DC=com
DESKTOP-Q62QKF6$2020-03-19 16:41:56Z2022-09-01 12:45:32Z2022-09-01 12:50:27ZCN=DESKTOP-Q62QKF6,CN=Computers,DC=egia,DC=com
DESKTOP-R1MH3PN$2019-10-17 14:18:04Z2021-10-25 11:56:53Z2021-10-25 12:04:00ZCN=DESKTOP-R1MH3PN,CN=Computers,DC=egia,DC=com
DESKTOP-RNB6I8D$2019-09-19 15:04:35Z2023-08-31 10:19:58Z2023-08-31 10:19:58ZCN=DESKTOP-RNB6I8D,CN=Computers,DC=egia,DC=com
DESKTOP-RNIFKH3$2020-10-15 17:48:31Z2021-09-16 09:24:05Z2021-09-16 09:38:43ZCN=DESKTOP-RNIFKH3,CN=Computers,DC=egia,DC=com
DESKTOP-SFC5JM8$2020-03-19 14:24:48Z2020-12-03 10:45:51Z2020-12-03 10:29:57ZCN=DESKTOP-SFC5JM8,CN=Computers,DC=egia,DC=com
DESKTOP-SG7ADIU$2020-10-29 18:32:51Z2023-05-23 12:07:53Z2022-12-19 08:30:54ZCN=DESKTOP-SG7ADIU,CN=Computers,DC=egia,DC=com
DESKTOP-SMT37AV$2019-12-19 20:48:16Z2022-06-08 15:58:35Z2022-05-20 14:12:59ZCN=DESKTOP-SMT37AV,CN=Computers,DC=egia,DC=com
DESKTOP-T9HB8DN$2020-06-02 15:54:53Z2022-06-01 06:42:05Z2022-06-01 06:56:50ZCN=DESKTOP-T9HB8DN,CN=Computers,DC=egia,DC=com
DESKTOP-T9O4UH1$2019-11-07 20:33:15Z2022-11-07 11:04:31Z2022-10-21 14:00:57ZCN=DESKTOP-T9O4UH1,CN=Computers,DC=egia,DC=com
DESKTOP-TEPSFTD$2021-02-12 22:38:00Z2023-08-28 08:02:00Z2023-08-02 08:11:25ZCN=DESKTOP-TEPSFTD,CN=Computers,DC=egia,DC=com
DESKTOP-TLENJSD$2019-12-04 21:10:53Z2021-02-18 13:09:59Z2019-12-04 13:10:53ZCN=DESKTOP-TLENJSD,CN=Computers,DC=egia,DC=com
DESKTOP-TQH2330$2023-08-30 23:15:50Z2023-08-30 16:15:51Z2023-08-30 16:15:50ZCN=DESKTOP-TQH2330,CN=Computers,DC=egia,DC=com
DESKTOP-TSI1525$2018-08-22 17:04:10Z2019-10-10 13:39:35Z2019-10-10 13:41:37ZCN=DESKTOP-TSI1525,CN=Computers,DC=egia,DC=com
DESKTOP-U0S03D9$2022-05-13 21:13:58Z2022-05-13 14:13:58Z2022-05-13 14:13:58ZCN=DESKTOP-U0S03D9,CN=Computers,DC=egia,DC=com
DESKTOP-UAS9U5V$2018-03-08 21:26:38Z2022-03-01 08:33:44Z2022-01-17 15:54:19ZCN=DESKTOP-UAS9U5V,CN=Computers,DC=egia,DC=com
DESKTOP-VBGB4GG$2023-10-12 16:16:27Z2023-10-12 09:16:28Z2023-10-12 09:16:27ZCN=DESKTOP-VBGB4GG,CN=Computers,DC=egia,DC=com
EDDIEJ$2012-10-12 21:48:04Z2018-04-05 19:37:29Z2018-03-27 02:04:15ZCN=EDDIEJ,OU=LocalComputer,DC=egia,DC=com
EDDIE-WIN10$2019-05-02 17:22:21Z2020-06-19 01:39:50Z2020-06-04 15:51:30ZCN=EDDIE-WIN10,OU=LocalComputer,DC=egia,DC=com
EGIA$2023-09-28 16:18:16Z2023-09-28 09:18:17Z2023-09-28 09:18:16ZCN=EGIA,CN=Computers,DC=egia,DC=com
EGIA482$2023-08-11 20:27:37Z2023-08-11 13:27:44Z2023-08-11 13:27:43ZCN=EGIA482,CN=Computers,DC=egia,DC=com
EGIA483$2023-08-29 01:23:56Z2023-10-20 13:18:01Z2023-09-28 07:36:13ZCN=EGIA483,CN=Computers,DC=egia,DC=com
EGIAACCT01$2010-09-27 17:03:29Z2021-02-20 17:22:16Z2021-02-16 10:38:11ZCN=EGIAACCT01,CN=Computers,DC=egia,DC=com
EGIADC03$2007-04-02 16:05:42Z2019-03-10 19:27:11Z2019-03-03 19:54:53ZCN=EGIADC03,CN=Computers,DC=egia,DC=com
EGIADEVSQL01$2010-12-30 05:07:10Z2021-07-20 10:25:51Z2021-07-16 03:23:21ZCN=EGIADEVSQL01,CN=Computers,DC=egia,DC=com
EGIADEVWEB01$2010-12-31 16:25:54Z2020-07-01 16:57:13Z2020-06-12 20:10:49ZCN=EGIADEVWEB01,CN=Computers,DC=egia,DC=com
EGIADW01$2011-02-08 04:14:01ZNever2016-08-18 22:33:15ZCN=EGIADW01,CN=Computers,DC=egia,DC=com
EGIAFS10$2014-08-07 02:25:18Z2022-09-06 09:42:36Z2014-08-06 19:25:18ZCN=egiafs10,OU=Computers,OU=EMC Celerra,DC=egia,DC=com
EGIAFTP2W$2018-04-17 22:30:45Z2018-05-07 23:01:31Z2018-04-17 15:30:45ZCN=EGIAFTP2W,CN=Computers,DC=egia,DC=com
EGIA-LAP-105$2014-08-18 16:15:45Z2020-03-18 06:37:05Z2019-10-28 06:03:36ZCN=EGIA-LAP-105,OU=LocalComputer,DC=egia,DC=com
EGIA-LAP-106$2014-09-08 17:10:10ZNever2016-09-27 09:39:19ZCN=EGIA-LAP-106,CN=Computers,DC=egia,DC=com
EGIA-LAP-107$2014-09-22 19:28:02ZNever2014-09-22 13:34:40ZCN=EGIA-LAP-107,CN=Computers,DC=egia,DC=com
EGIA-LAP-108$2014-09-24 20:01:54Z2018-07-11 10:50:19Z2017-11-15 07:24:12ZCN=EGIA-LAP-108,CN=Computers,DC=egia,DC=com
EGIA-LAP-109$2014-09-26 15:45:26ZNever2016-01-11 07:22:59ZCN=EGIA-LAP-109,CN=Computers,DC=egia,DC=com
EGIA-LAP-110$2015-02-09 18:01:00ZNever2016-09-01 09:11:10ZCN=EGIA-LAP-110,CN=Computers,DC=egia,DC=com
EGIA-LAP-112$2015-06-23 15:58:28ZNever2015-08-05 11:02:48ZCN=EGIA-LAP-112,CN=Computers,DC=egia,DC=com
EGIA-LAP-113$2015-08-26 16:18:38Z2019-02-15 15:59:11Z2019-02-12 16:51:34ZCN=EGIA-LAP-113,OU=LocalComputer,DC=egia,DC=com
EGIA-LAP-114$2015-09-09 19:28:52ZNever2015-12-03 12:41:09ZCN=EGIA-LAP-114,CN=Computers,DC=egia,DC=com
EGIA-LAP-115$2016-02-19 17:41:59Z2021-12-06 06:24:03Z2021-12-06 06:27:28ZCN=EGIA-LAP-115,CN=Computers,DC=egia,DC=com
EGIA-LAP-116$2016-03-02 16:25:34Z2018-03-02 10:04:00Z2018-03-02 10:12:41ZCN=EGIA-LAP-116,CN=Computers,DC=egia,DC=com
EGIA-LAP-117$2016-06-20 21:50:58Z2021-01-25 14:56:03Z2021-01-13 16:00:27ZCN=EGIA-LAP-117,CN=Computers,DC=egia,DC=com
EGIA-LAP-118$2016-08-10 20:48:13Z2016-12-09 08:12:29Z2016-12-09 08:32:04ZCN=EGIA-LAP-118,CN=Computers,DC=egia,DC=com
EGIA-LAP-119$2016-09-12 22:04:42Z2019-07-26 12:38:44Z2019-07-26 12:51:29ZCN=EGIA-LAP-119,CN=Computers,DC=egia,DC=com
EGIA-LAP-120$2016-12-12 20:56:15Z2018-03-01 09:48:57Z2018-03-01 09:51:01ZCN=EGIA-LAP-120,CN=Computers,DC=egia,DC=com
EGIA-LAP-121$2017-09-19 22:22:15Z2022-12-08 09:56:04Z2022-12-08 09:58:51ZCN=EGIA-LAP-121,CN=Computers,DC=egia,DC=com
EGIA-LAP-480$2023-08-01 16:21:13Z2023-08-01 09:21:13Z2023-08-01 09:21:13ZCN=EGIA-LAP-480,CN=Computers,DC=egia,DC=com
EGIA-LAP-481$2023-07-25 21:04:44Z2023-07-25 14:04:45Z2023-07-25 14:04:44ZCN=EGIA-LAP-481,OU=Computers,OU=MS365EGIA,DC=egia,DC=com
EGIA-LAP-484$2023-08-16 21:03:22Z2023-08-16 14:03:23Z2023-08-16 14:03:22ZCN=EGIA-LAP-484,CN=Computers,DC=egia,DC=com
EGIA-LAP-488$2023-09-28 17:19:08Z2023-09-28 10:35:12Z2023-09-28 10:19:08ZCN=EGIA-LAP-488,CN=Computers,DC=egia,DC=com
EGIA-LAP-492$2023-10-18 18:47:40Z2023-10-18 11:47:40Z2023-10-18 11:47:40ZCN=EGIA-LAP-492,CN=Computers,DC=egia,DC=com
EGIA-LAP-EPEREZ$2014-04-22 19:38:58ZNever2014-11-17 13:06:48ZCN=EGIA-LAP-EPEREZ,CN=Computers,DC=egia,DC=com
EGIA-LAP-OT-1$2015-06-19 19:49:03Z2018-04-30 08:59:56Z2018-04-30 09:13:58ZCN=EGIA-LAP-OT-1,CN=Computers,DC=egia,DC=com
EGIA-LAP-OT-2$2015-06-19 21:20:31Z2017-04-11 10:56:56Z2017-04-11 10:56:57ZCN=EGIA-LAP-OT-2,CN=Computers,DC=egia,DC=com
EGIA-LAP-OT-3$2015-06-19 22:02:32Z2019-05-06 22:34:12Z2019-05-04 12:37:40ZCN=EGIA-LAP-OT-3,CN=Computers,DC=egia,DC=com
EGIA-LAP-OT-6$2015-06-25 15:22:36Z2016-12-22 12:12:04Z2016-12-22 12:22:50ZCN=EGIA-LAP-OT-6,CN=Computers,DC=egia,DC=com
EGIA-LAP-OT-7$2015-06-25 17:05:44Z2019-08-14 12:16:48Z2019-08-14 13:36:37ZCN=EGIA-LAP-OT-7,CN=Computers,DC=egia,DC=com
EGIA-LAP-OT-8$2015-06-25 19:27:39Z2016-12-13 11:28:44Z2016-11-29 13:54:58ZCN=EGIA-LAP-OT-8,CN=Computers,DC=egia,DC=com
EGIA-LAPTOP-01$2014-08-05 15:53:37Z2020-03-17 12:28:10Z2020-03-17 12:42:02ZCN=EGIA-LAPTOP-01,CN=Computers,DC=egia,DC=com
egia-mac-100$2014-06-26 19:25:18Z2019-01-09 01:48:56Z2019-01-15 07:37:25ZCN=egia-mac-100,CN=Computers,DC=egia,DC=com
egia-mac-103$2014-06-27 14:54:24Z2017-07-17 14:47:19Z2017-07-07 10:08:09ZCN=egia-mac-103,CN=Computers,DC=egia,DC=com
egia-mac-105$2015-11-13 21:27:24Z2019-01-30 00:26:26Z2019-01-24 11:53:40ZCN=egia-mac-105,CN=Computers,DC=egia,DC=com
EGIA-PC-100$2013-04-26 00:07:21Z2020-06-04 22:50:42Z2020-05-21 22:41:00ZCN=EGIA-PC-100,CN=Computers,DC=egia,DC=com
EGIAPC101$2013-03-21 21:24:12ZNever2015-07-20 10:52:16ZCN=EGIAPC101,CN=Computers,DC=egia,DC=com
EGIAPC102$2013-03-22 20:37:44Z2016-11-05 10:32:19Z2016-10-23 17:32:16ZCN=EGIAPC102,CN=Computers,DC=egia,DC=com
EGIA-PC-102$2013-08-16 15:14:07Z2020-01-31 12:16:42Z2020-01-08 06:41:05ZCN=EGIA-PC-102,CN=Computers,DC=egia,DC=com
EGIA-PC-103$2013-05-02 16:05:54ZNever2015-07-12 15:05:25ZCN=EGIA-PC-103,CN=Computers,DC=egia,DC=com
EGIA-PC-104$2013-08-21 21:13:50ZNever2015-03-18 02:08:24ZCN=EGIA-PC-104,CN=Computers,DC=egia,DC=com
EGIA-PC-105$2013-10-02 21:47:00ZNever2015-06-16 08:18:20ZCN=EGIA-PC-105,CN=Computers,DC=egia,DC=com
EGIA-PC-109$2013-12-19 17:34:48ZNever2016-08-22 08:21:08ZCN=EGIA-PC-109,CN=Computers,DC=egia,DC=com
EGIA-PC-112$2013-12-26 17:45:39ZNever2016-02-17 02:59:40ZCN=EGIA-PC-112,CN=Computers,DC=egia,DC=com
EGIA-PC-113$2014-02-12 21:39:20Z2017-12-11 01:45:01Z2017-11-18 00:38:55ZCN=EGIA-PC-113,CN=Computers,DC=egia,DC=com
EGIA-PC-114$2014-02-27 17:40:47ZNever2015-03-03 12:45:39ZCN=EGIA-PC-114,CN=Computers,DC=egia,DC=com
EGIA-PC-116$2014-03-18 19:04:25ZNever2015-06-01 08:54:50ZCN=EGIA-PC-116,CN=Computers,DC=egia,DC=com
EGIA-PC-117$2014-03-18 21:35:01ZNever2014-05-20 08:50:19ZCN=EGIA-PC-117,CN=Computers,DC=egia,DC=com
EGIA-PC-118$2014-04-01 18:58:21ZNever2014-10-09 06:28:33ZCN=EGIA-PC-118,CN=Computers,DC=egia,DC=com
EGIA-PC-119$2014-04-17 16:04:01Z2017-11-16 19:31:06Z2017-11-15 20:32:28ZCN=EGIA-PC-119,CN=Computers,DC=egia,DC=com
EGIA-PC-121$2014-04-17 21:39:33Z2022-01-14 01:46:28Z2022-01-14 15:08:21ZCN=EGIA-PC-121,CN=Computers,DC=egia,DC=com
EGIA-PC-122$2014-04-18 19:10:41Z2021-01-24 19:58:49Z2020-08-05 21:35:25ZCN=EGIA-PC-122,CN=Computers,DC=egia,DC=com
EGIA-PC-123$2014-06-03 22:19:09ZNever2015-04-16 08:35:00ZCN=EGIA-PC-123,CN=Computers,DC=egia,DC=com
EGIA-PC-125$2014-06-11 20:04:39ZNever2014-08-31 17:47:11ZCN=EGIA-PC-125,CN=Computers,DC=egia,DC=com
EGIA-PC-126$2014-08-07 19:57:02Z2019-08-21 10:37:37Z2019-08-21 10:43:59ZCN=EGIA-PC-126,CN=Computers,DC=egia,DC=com
EGIA-PC-127$2014-08-11 17:25:48ZNever2016-02-01 08:21:27ZCN=EGIA-PC-127,CN=Computers,DC=egia,DC=com
EGIA-PC-128$2014-08-14 14:47:40ZNever2016-09-22 07:26:38ZCN=EGIA-PC-128,CN=Computers,DC=egia,DC=com
EGIA-PC-129$2014-08-15 15:08:36ZNever2015-09-17 03:33:05ZCN=EGIA-PC-129,CN=Computers,DC=egia,DC=com
EGIA-PC-130$2014-08-15 21:29:52Z2020-08-13 13:56:09Z2020-08-13 14:06:33ZCN=EGIA-PC-130,CN=Computers,DC=egia,DC=com
EGIA-PC-131$2014-08-20 19:35:27Z2019-08-19 00:02:38Z2019-08-12 08:39:43ZCN=EGIA-PC-131,CN=Computers,DC=egia,DC=com
EGIA-PC-132$2014-09-11 14:32:51Z2019-07-18 07:36:22Z2019-07-18 07:36:23ZCN=EGIA-PC-132,CN=Computers,DC=egia,DC=com
EGIA-PC-133$2014-09-11 21:04:12ZNever2015-09-24 11:15:36ZCN=EGIA-PC-133,CN=Computers,DC=egia,DC=com
EGIA-PC-134$2014-09-12 19:26:44Z2017-01-23 08:16:50Z2017-01-16 08:02:16ZCN=EGIA-PC-134,CN=Computers,DC=egia,DC=com
EGIA-PC-135$2014-09-18 17:28:42Z2016-11-15 17:23:10Z2016-11-05 04:43:45ZCN=EGIA-PC-135,CN=Computers,DC=egia,DC=com
EGIA-PC-136$2014-09-19 15:18:11Z2017-03-13 10:02:37Z2017-03-06 07:45:23ZCN=EGIA-PC-136,CN=Computers,DC=egia,DC=com
EGIA-PC-137$2014-09-29 20:27:11ZNever2014-09-29 13:27:11ZCN=EGIA-PC-137,CN=Computers,DC=egia,DC=com
EGIA-PC-138$2014-09-30 21:00:05ZNever2015-03-09 06:52:26ZCN=EGIA-PC-138,CN=Computers,DC=egia,DC=com
EGIA-PC-139$2014-10-20 19:33:57ZNever2015-06-30 13:00:35ZCN=EGIA-PC-139,CN=Computers,DC=egia,DC=com
EGIA-PC-140$2014-11-06 19:53:52Z2019-09-24 14:06:05Z2019-09-17 10:02:41ZCN=EGIA-PC-140,CN=Computers,DC=egia,DC=com
EGIA-PC-141$2014-12-08 21:28:37Z2017-09-11 12:56:36Z2017-09-11 13:12:04ZCN=EGIA-PC-141,CN=Computers,DC=egia,DC=com
EGIA-PC-142$2014-12-18 17:24:28ZNever2015-08-25 12:52:29ZCN=EGIA-PC-142,CN=Computers,DC=egia,DC=com
EGIA-PC-143$2014-12-26 19:48:22ZNever2016-10-10 13:18:06ZCN=EGIA-PC-143,CN=Computers,DC=egia,DC=com
EGIA-PC-144$2015-01-09 18:01:32Z2017-04-03 11:24:46Z2017-03-23 15:59:38ZCN=EGIA-PC-144,CN=Computers,DC=egia,DC=com
EGIA-PC-145$2015-01-12 15:15:59ZNever2016-03-21 07:58:54ZCN=EGIA-PC-145,CN=Computers,DC=egia,DC=com
EGIA-PC-146$2015-01-14 20:24:42Z2021-01-21 07:37:56Z2021-01-21 07:37:57ZCN=EGIA-PC-146,CN=Computers,DC=egia,DC=com
EGIA-PC-147$2015-01-16 15:39:21Z2017-10-16 17:35:22Z2017-10-13 03:21:30ZCN=EGIA-PC-147,CN=Computers,DC=egia,DC=com
EGIA-PC-148$2015-01-22 18:05:02Z2019-06-13 06:22:44Z2019-05-22 16:03:39ZCN=EGIA-PC-148,CN=Computers,DC=egia,DC=com
EGIA-PC-149$2015-01-27 16:32:37Z2019-11-04 20:18:43Z2019-11-11 04:12:57ZCN=EGIA-PC-149,CN=Computers,DC=egia,DC=com
EGIA-PC-150$2015-02-06 18:12:36Z2017-05-15 14:01:16Z2017-05-02 10:09:52ZCN=EGIA-PC-150,CN=Computers,DC=egia,DC=com
EGIA-PC-151$2010-08-02 17:09:34ZNever2015-07-23 07:04:17ZCN=EGIA-PC-151,CN=Computers,DC=egia,DC=com
EGIA-PC-152$2015-03-03 22:10:13Z2023-06-16 14:51:08Z2020-07-16 10:58:30ZCN=EGIA-PC-152,OU=LocalComputer,DC=egia,DC=com
EGIA-PC-154$2015-03-25 20:12:03Z2019-10-29 16:18:21Z2019-10-13 22:23:18ZCN=EGIA-PC-154,OU=LocalComputer,DC=egia,DC=com
EGIA-PC-155$2015-04-07 14:49:56Z2017-09-07 08:22:11Z2017-09-07 08:20:05ZCN=EGIA-PC-155,CN=Computers,DC=egia,DC=com
EGIA-PC-157$2015-04-10 16:38:12Z2018-05-10 10:42:41Z2018-04-18 15:10:29ZCN=EGIA-PC-157,CN=Computers,DC=egia,DC=com
EGIA-PC-158$2015-04-13 21:27:24ZNever2015-06-18 12:19:20ZCN=EGIA-PC-158,CN=Computers,DC=egia,DC=com
EGIA-PC-159$2015-04-16 19:11:59Z2017-10-02 16:43:01Z2017-09-21 09:01:54ZCN=EGIA-PC-159,CN=Computers,DC=egia,DC=com
EGIA-PC-160$2015-04-17 16:26:55ZNever2016-05-26 07:25:53ZCN=EGIA-PC-160,CN=Computers,DC=egia,DC=com
EGIA-PC-161$2015-04-20 19:48:00Z2018-08-14 12:23:47Z2018-08-11 00:50:26ZCN=EGIA-PC-161,CN=Computers,DC=egia,DC=com
EGIA-PC-163$2015-05-05 16:59:20ZNever2015-08-10 09:40:59ZCN=EGIA-PC-163,CN=Computers,DC=egia,DC=com
EGIA-PC-164$2015-04-27 14:14:32Z2017-10-08 10:34:39Z2017-10-07 18:09:17ZCN=EGIA-PC-164,CN=Computers,DC=egia,DC=com
EGIA-PC-166$2015-04-22 15:38:36Z2018-11-05 00:52:13Z2018-11-03 23:58:20ZCN=EGIA-PC-166,CN=Computers,DC=egia,DC=com
EGIA-PC-167$2015-05-12 20:40:51Z2019-02-19 19:48:45Z2019-01-29 12:44:08ZCN=EGIA-PC-167,CN=Computers,DC=egia,DC=com
EGIA-PC-168$2015-05-14 20:46:53Z2019-11-08 16:34:13Z2019-11-08 20:19:53ZCN=EGIA-PC-168,CN=Computers,DC=egia,DC=com
EGIA-PC-169$2015-05-22 14:15:15Z2021-01-22 02:38:40Z2021-01-01 15:38:06ZCN=EGIA-PC-169,CN=Computers,DC=egia,DC=com
EGIA-PC-170$2016-03-25 15:02:35ZNever2016-04-04 11:26:46ZCN=EGIA-PC-170,CN=Computers,DC=egia,DC=com
EGIA-PC-171$2015-05-27 15:15:18Z2017-11-09 22:34:28Z2017-11-09 06:01:10ZCN=EGIA-PC-171,CN=Computers,DC=egia,DC=com
EGIA-PC-172$2015-05-27 19:38:30Z2022-07-01 07:16:20Z2022-07-01 07:16:21ZCN=EGIA-PC-172,CN=Computers,DC=egia,DC=com
EGIA-PC-173$2015-06-05 16:10:16Z2017-02-24 12:56:05Z2017-02-24 12:58:07ZCN=EGIA-PC-173,CN=Computers,DC=egia,DC=com
EGIA-PC-174$2015-06-05 19:45:11Z2020-08-11 09:00:15Z2020-08-11 09:00:15ZCN=EGIA-PC-174,CN=Computers,DC=egia,DC=com
EGIA-PC-175$2015-06-10 14:17:25Z2019-06-24 09:55:11Z2019-06-24 09:55:13ZCN=EGIA-PC-175,CN=Computers,DC=egia,DC=com
EGIA-PC-177$2015-06-15 16:02:40ZNever2016-03-24 05:10:28ZCN=EGIA-PC-177,CN=Computers,DC=egia,DC=com
EGIA-PC-178$2015-06-16 15:55:51ZNever2015-09-17 08:34:24ZCN=EGIA-PC-178,CN=Computers,DC=egia,DC=com
EGIA-PC-179$2015-06-18 19:50:44Z2020-03-15 03:33:28Z2020-02-15 14:51:16ZCN=EGIA-PC-179,CN=Computers,DC=egia,DC=com
EGIA-PC-180$2015-06-22 15:16:29Z2020-08-11 08:47:12Z2020-08-11 08:47:13ZCN=EGIA-PC-180,CN=Computers,DC=egia,DC=com
EGIA-PC-181$2015-06-22 20:51:14Z2022-12-28 21:47:45Z2023-01-08 00:15:58ZCN=EGIA-PC-181,CN=Computers,DC=egia,DC=com
EGIA-PC-182$2015-06-23 18:59:50Z2022-02-23 08:01:18Z2022-02-23 08:01:18ZCN=EGIA-PC-182,CN=Computers,DC=egia,DC=com
EGIA-PC-183$2015-06-29 16:21:10Z2019-01-22 11:52:07Z2018-12-26 11:57:50ZCN=EGIA-PC-183,CN=Computers,DC=egia,DC=com
EGIA-PC-185$2015-07-02 16:41:18Z2019-11-13 14:56:13Z2019-11-12 19:08:54ZCN=EGIA-PC-185,CN=Computers,DC=egia,DC=com
EGIA-PC-186$2015-07-02 19:20:09Z2019-07-21 01:06:11Z2019-07-16 03:05:17ZCN=EGIA-PC-186,CN=Computers,DC=egia,DC=com
EGIA-PC-188$2015-07-14 19:31:09Z2019-11-14 10:04:24Z2019-10-29 15:03:06ZCN=EGIA-PC-188,CN=Computers,DC=egia,DC=com
EGIA-PC-189$2015-07-22 17:04:35Z2019-01-17 13:47:08Z2019-01-17 13:47:54ZCN=EGIA-PC-189,CN=Computers,DC=egia,DC=com
EGIA-PC-190$2015-07-23 18:38:28Z2021-08-25 07:54:05Z2021-07-28 13:28:06ZCN=EGIA-PC-190,CN=Computers,DC=egia,DC=com
EGIA-PC-191$2015-07-23 20:38:55Z2019-02-19 08:44:54Z2019-01-24 10:54:10ZCN=EGIA-PC-191,CN=Computers,DC=egia,DC=com
EGIA-PC-192$2015-07-24 16:01:02Z2019-05-29 10:26:39Z2019-05-29 10:42:08ZCN=EGIA-PC-192,CN=Computers,DC=egia,DC=com
EGIA-PC-193$2015-07-28 15:42:52Z2018-08-02 10:26:21Z2018-08-02 10:26:21ZCN=EGIA-PC-193,CN=Computers,DC=egia,DC=com
EGIA-PC-194$2015-07-29 16:45:48Z2018-02-02 19:32:37Z2018-01-17 06:34:27ZCN=EGIA-PC-194,CN=Computers,DC=egia,DC=com
EGIA-PC-195$2015-07-31 17:10:48Z2019-02-14 07:58:38Z2019-02-14 08:13:36ZCN=EGIA-PC-195,CN=Computers,DC=egia,DC=com
EGIA-PC-196$2015-08-04 13:47:19Z2017-08-24 10:48:54Z2017-08-03 14:14:20ZCN=EGIA-PC-196,CN=Computers,DC=egia,DC=com
EGIA-PC-197$2015-08-04 20:08:34Z2019-04-17 13:42:07Z2018-10-22 17:16:07ZCN=EGIA-PC-197,CN=Computers,DC=egia,DC=com
EGIA-PC-198$2015-08-05 17:06:26Z2019-04-06 17:01:39Z2019-04-01 17:16:40ZCN=EGIA-PC-198,CN=Computers,DC=egia,DC=com
EGIA-PC-199$2015-08-06 17:12:43Z2021-05-25 14:37:40Z2021-05-25 14:37:42ZCN=EGIA-PC-199,CN=Computers,DC=egia,DC=com
EGIA-PC-200$2015-08-07 17:52:06Z2019-02-06 09:58:35Z2019-01-16 15:00:02ZCN=EGIA-PC-200,CN=Computers,DC=egia,DC=com
EGIA-PC-201$2015-08-07 20:09:59Z2018-06-01 13:58:06Z2018-06-01 13:58:05ZCN=EGIA-PC-201,CN=Computers,DC=egia,DC=com
EGIA-PC-202$2015-08-10 19:57:42Z2019-04-10 08:33:53Z2019-03-16 12:20:30ZCN=EGIA-PC-202,CN=Computers,DC=egia,DC=com
EGIA-PC-203$2015-08-11 20:14:11ZNever2015-08-11 13:14:12ZCN=EGIA-PC-203,CN=Computers,DC=egia,DC=com
EGIA-PC-204$2015-08-12 16:54:43Z2019-04-02 18:20:36Z2019-04-11 02:14:45ZCN=EGIA-PC-204,CN=Computers,DC=egia,DC=com
EGIA-PC-205$2015-08-13 18:42:47Z2018-08-09 10:21:36Z2018-07-25 10:05:46ZCN=EGIA-PC-205,CN=Computers,DC=egia,DC=com
EGIA-PC-206$2015-08-20 19:38:18ZNever2015-09-21 08:09:53ZCN=EGIA-PC-206,CN=Computers,DC=egia,DC=com
EGIA-PC-207$2015-08-17 18:43:41Z2018-06-01 14:14:36Z2018-06-01 14:14:37ZCN=EGIA-PC-207,CN=Computers,DC=egia,DC=com
EGIA-PC-208$2015-08-21 19:45:24Z2020-08-13 11:59:54Z2020-08-13 12:08:46ZCN=EGIA-PC-208,CN=Computers,DC=egia,DC=com
EGIA-PC-210$2015-08-26 20:28:35Z2019-02-12 10:16:49Z2019-02-12 10:16:50ZCN=EGIA-PC-210,CN=Computers,DC=egia,DC=com
EGIA-PC-211$2015-08-27 20:10:50Z2017-04-15 17:01:53Z2017-03-20 07:18:16ZCN=EGIA-PC-211,CN=Computers,DC=egia,DC=com
EGIA-PC-212$2015-08-28 19:58:55Z2019-08-12 11:45:36Z2019-07-21 02:46:29ZCN=EGIA-PC-212,CN=Computers,DC=egia,DC=com
EGIA-PC-213$2015-08-31 16:54:10Z2018-08-29 10:07:34Z2018-08-29 09:44:29ZCN=EGIA-PC-213,CN=Computers,DC=egia,DC=com
EGIA-PC-215$2015-08-31 21:34:00Z2019-12-11 15:16:00Z2019-12-11 15:15:59ZCN=EGIA-PC-215,CN=Computers,DC=egia,DC=com
EGIA-PC-216$2015-09-03 17:23:57ZNever2015-09-03 10:23:57ZCN=EGIA-PC-216,CN=Computers,DC=egia,DC=com
EGIA-PC-217$2017-11-17 20:03:20Z2020-08-13 16:02:34Z2020-02-24 01:07:05ZCN=EGIA-PC-217,CN=Computers,DC=egia,DC=com
EGIA-PC-218$2015-10-12 14:45:14Z2023-04-25 10:18:21Z2023-04-25 10:34:11ZCN=EGIA-PC-218,CN=Computers,DC=egia,DC=com
EGIA-PC-220$2015-11-04 20:13:25Z2021-02-09 13:41:28Z2021-01-21 08:40:56ZCN=EGIA-PC-220,CN=Computers,DC=egia,DC=com
EGIA-PC-221$2015-12-21 17:56:45Z2017-02-01 10:13:07Z2017-02-01 10:17:15ZCN=EGIA-PC-221,CN=Computers,DC=egia,DC=com
EGIA-PC-222$2015-06-26 15:23:38Z2020-01-31 12:14:43Z2020-01-31 12:31:04ZCN=EGIA-PC-222,CN=Computers,DC=egia,DC=com
EGIA-PC-225$2016-08-09 16:37:47Z2023-07-27 11:05:07Z2023-07-27 11:18:13ZCN=EGIA-PC-225,OU=LocalComputer,DC=egia,DC=com
EGIA-PC-226$2016-08-12 22:19:17Z2020-07-20 17:35:44Z2020-07-09 22:57:31ZCN=EGIA-PC-226,CN=Computers,DC=egia,DC=com
EGIA-PC-227$2017-04-11 19:21:56Z2021-11-23 11:18:43Z2021-11-23 11:20:24ZCN=EGIA-PC-227,CN=Computers,DC=egia,DC=com
EGIA-PC-228$2017-05-03 17:06:21Z2022-01-13 09:57:12Z2021-12-27 12:55:23ZCN=EGIA-PC-228,CN=Computers,DC=egia,DC=com
EGIA-PC-229$2017-09-13 17:40:32Z2021-07-08 15:53:17Z2021-06-15 08:13:22ZCN=EGIA-PC-229,CN=Computers,DC=egia,DC=com
EGIA-PC-CHECKS$2016-03-25 17:46:36Z2019-10-01 17:16:13Z2019-09-04 18:36:09ZCN=EGIA-PC-CHECKS,CN=Computers,DC=egia,DC=com
EGIA-PC-CHECKS2$2017-02-07 20:45:07Z2017-10-13 12:36:14Z2017-09-21 04:41:43ZCN=EGIA-PC-CHECKS2,CN=Computers,DC=egia,DC=com
EGIA-PC-CONF-1$2017-01-16 18:24:42Z2019-02-19 10:47:46Z2019-02-19 10:47:46ZCN=EGIA-PC-CONF-1,CN=Computers,DC=egia,DC=com
EGIA-PC-CONF-2$2015-10-12 18:56:44Z2020-03-12 09:22:35Z2020-03-03 21:02:57ZCN=EGIA-PC-CONF-2,CN=Computers,DC=egia,DC=com
EGIA-PC-DEV$2013-10-04 21:14:48ZNever2014-09-29 07:40:48ZCN=EGIA-PC-DEV,CN=Computers,DC=egia,DC=com
EGIA-PC-OT-5$2015-06-24 21:04:34Z2020-04-13 10:30:23Z2020-04-11 22:13:35ZCN=EGIA-PC-OT-5,CN=Computers,DC=egia,DC=com
EGIAPGESQL01$2011-02-21 03:33:53ZNever2011-02-20 19:33:53ZCN=EGIAPGESQL01,CN=Computers,DC=egia,DC=com
EGIAPRDRBT01$2016-11-29 05:46:28Z2022-09-01 18:48:21Z2022-08-24 02:33:32ZCN=EGIAPRDRBT01,CN=Computers,DC=egia,DC=com
EGIAPRDWEB1$2011-01-26 15:59:24Z2020-08-09 01:15:59Z2020-07-10 18:59:21ZCN=EGIAPRDWEB1,CN=Computers,DC=egia,DC=com
EGIAPRDWEB2$2016-12-02 20:54:55Z2018-04-03 22:20:38Z2018-04-08 18:58:47ZCN=EGIAPRDWEB2,CN=Computers,DC=egia,DC=com
EGIAPRTG01$2016-10-17 23:49:24Z2019-02-09 23:11:00Z2019-02-06 00:33:44ZCN=EGIAPRTG01,OU=GPO Testing,DC=egia,DC=com
EGIASQL10$2014-08-12 03:00:16Z2016-11-05 10:31:54Z2016-10-23 14:30:52ZCN=EGIASQL10,CN=Computers,DC=egia,DC=com
EGIA-SURFACEPRO$2015-03-12 19:59:35ZNever2015-03-12 12:59:35ZCN=EGIA-SURFACEPRO,CN=Computers,DC=egia,DC=com
EGIAVC01$2010-09-05 22:57:36Z2021-03-05 03:56:24Z2021-02-17 21:22:40ZCN=EGIAVC01,CN=Computers,DC=egia,DC=com
EGIAVC02$2011-05-21 16:09:01Z2022-09-03 18:23:06Z2022-08-28 12:55:20ZCN=EGIAVC02,CN=Computers,DC=egia,DC=com
EGIAVPN01$2010-10-06 16:31:42Z2021-02-07 11:56:17Z2021-01-25 05:20:39ZCN=EGIAVPN01,CN=Computers,DC=egia,DC=com
EGIAVPNTEST$2016-10-04 21:50:29Z2016-11-16 01:20:30Z2016-11-04 01:53:49ZCN=EGIAVPNTEST,CN=Computers,DC=egia,DC=com
EGIAVS01$2010-08-07 22:51:30Z2021-07-18 20:26:16Z2021-07-10 23:41:32ZCN=EGIAVS01,CN=Computers,DC=egia,DC=com
EGIAVS02$2012-05-29 01:30:57Z2020-08-11 11:57:35Z2020-07-31 10:14:33ZCN=EGIAVS02,CN=Computers,DC=egia,DC=com
EGIAVS03$2011-03-29 03:00:17Z2020-08-20 12:13:19Z2020-07-24 01:37:49ZCN=EGIAVS03,CN=Computers,DC=egia,DC=com
EGIAVS04$2011-03-29 03:23:51Z2021-07-17 05:02:39Z2021-07-19 01:41:05ZCN=EGIAVS04,CN=Computers,DC=egia,DC=com
EGIAVS05$2016-11-03 15:59:57Z2020-08-13 05:49:04Z2020-07-30 09:06:10ZCN=EGIAVS05,CN=Computers,DC=egia,DC=com
EGIAVS09$2016-10-11 15:54:51ZNever2016-10-11 08:54:52ZCN=EGIAVS09,CN=Computers,DC=egia,DC=com
EGIAWEB01$2010-07-24 01:17:50Z2019-08-19 06:46:33Z2019-07-26 03:33:14ZCN=EGIAWEB01,CN=Computers,DC=egia,DC=com
EGIAWEB02$2010-07-25 19:44:51Z2021-07-20 12:16:39Z2021-07-20 19:13:54ZCN=EGIAWEB02,CN=Computers,DC=egia,DC=com
EHOWARTH$2003-11-14 23:44:54ZNever2004-07-09 12:38:42ZCN=EHOWARTH,CN=Computers,DC=egia,DC=com
EJAVAID-LP$2010-12-14 17:20:09ZNever2012-08-17 10:39:30ZCN=EJAVAID-LP,CN=Computers,DC=egia,DC=com
ERIN-WIN10$2019-04-08 18:18:50Z2021-08-16 10:25:19Z2021-08-18 17:06:51ZCN=ERIN-WIN10,CN=Computers,DC=egia,DC=com
GAVIN-ALIEN$2019-02-05 18:54:18Z2020-03-09 13:18:47Z2020-03-02 08:07:04ZCN=GAVIN-ALIEN,CN=Computers,DC=egia,DC=com
GREEN$2004-04-02 18:03:38ZNever2010-08-07 12:03:42ZCN=GREEN,CN=Computers,DC=egia,DC=com
ITDEV01$2011-03-18 01:21:36ZNever2013-04-18 13:28:57ZCN=ITDEV01,CN=Computers,DC=egia,DC=com
ITDEV02$2012-08-28 18:26:07ZNever2012-08-28 11:26:07ZCN=ITDEV02,CN=Computers,DC=egia,DC=com
ITDEV03$2012-07-31 21:19:39ZNever2013-02-02 08:45:22ZCN=ITDEV03,CN=Computers,DC=egia,DC=com
IT-MAIN$2016-09-01 19:55:26ZNever2016-09-01 12:55:26ZCN=IT-MAIN,CN=Computers,DC=egia,DC=com
JAVAID$2011-12-08 03:31:52ZNever2016-05-12 11:24:15ZCN=JAVAID,CN=Computers,DC=egia,DC=com
JCHANDLER-WIN10$2019-05-21 18:10:37Z2020-06-29 12:24:34Z2020-06-29 12:39:34ZCN=JCHANDLER-WIN10,CN=Computers,DC=egia,DC=com
JCHANDLP$2009-08-24 23:52:44ZNever2011-05-23 10:09:43ZCN=JCHANDLP,CN=Computers,DC=egia,DC=com
JMADRIGAL-WIN10$2019-02-06 18:25:43Z2023-07-27 10:20:57Z2020-09-18 16:33:14ZCN=JMADRIGAL-WIN10,CN=Computers,DC=egia,DC=com
JMATULICH-HP$2011-06-20 17:40:22Z2017-09-18 08:17:13Z2017-09-18 08:31:32ZCN=JMATULICH-HP,CN=Computers,DC=egia,DC=com
JOEPC$2013-02-28 22:05:01ZNever2015-06-03 14:03:28ZCN=JOEPC,CN=Computers,DC=egia,DC=com
JOHN10$2017-08-10 22:47:17Z2020-08-13 14:42:54Z2020-08-13 14:57:57ZCN=JOHN10,OU=LocalComputer,DC=egia,DC=com
JWARREN$2013-04-25 16:19:26Z2021-08-07 21:15:31Z2021-08-12 04:07:18ZCN=JWARREN,CN=Computers,DC=egia,DC=com
K-COLORADOLAP$2019-05-09 17:20:47Z2021-10-12 11:02:19Z2021-08-19 15:59:00ZCN=K-COLORADOLAP,CN=Computers,DC=egia,DC=com
LAPTOP-CABMF11S$2018-06-15 22:44:37Z2019-05-09 11:20:00Z2019-05-09 11:20:45ZCN=LAPTOP-CABMF11S,CN=Computers,DC=egia,DC=com
LAPTOP-S8PGPRCU$2019-06-25 18:50:56Z2020-04-21 14:53:44Z2020-04-21 15:01:41ZCN=LAPTOP-S8PGPRCU,CN=Computers,DC=egia,DC=com
LGOPA$2011-06-24 17:38:18ZNever2015-08-31 08:28:06ZCN=LGOPA,CN=Computers,DC=egia,DC=com
MARTINEZ$2012-01-25 17:59:35ZNever2016-03-21 09:04:03ZCN=MARTINEZ,CN=Computers,DC=egia,DC=com
MCCOLLUM$2011-08-03 16:49:32ZNever2015-01-19 09:26:45ZCN=MCCOLLUM,CN=Computers,DC=egia,DC=com
MMB-PC$2014-07-07 21:33:56ZNever2015-04-17 08:37:09ZCN=MMB-PC,CN=Computers,DC=egia,DC=com
NT-SERVER$2001-10-06 18:33:47ZNever2010-10-09 08:03:54ZCN=NT-SERVER,CN=Computers,DC=egia,DC=com
ORANGE$2002-12-05 02:17:46Z2018-01-25 03:36:01Z2018-01-21 00:06:38ZCN=ORANGE,CN=Computers,DC=egia,DC=com
PINK$2008-08-25 19:42:32ZNever2010-07-24 04:20:05ZCN=PINK,CN=Computers,DC=egia,DC=com
PROJECTOR$2008-01-29 00:44:39ZNever2013-10-01 07:59:41ZCN=PROJECTOR,CN=Computers,DC=egia,DC=com
PURPLE$2008-08-28 17:21:28ZNever2016-03-05 16:31:56ZCN=PURPLE,CN=Computers,DC=egia,DC=com
QTRAN$2013-04-17 18:32:20Z2023-05-12 19:31:34Z2023-05-01 13:57:55ZCN=QTRAN,CN=Computers,DC=egia,DC=com
RHONDA-WIN10$2019-04-15 17:21:12Z2019-08-12 11:41:35Z2019-08-20 12:39:19ZCN=RHONDA-WIN10,CN=Computers,DC=egia,DC=com
RTROIANO-PC$2016-12-07 19:12:22Z2017-03-09 13:36:11Z2017-03-09 16:41:16ZCN=RTROIANO-PC,CN=Computers,DC=egia,DC=com
SCOTT-ALIEN$2019-02-05 22:04:59Z2020-03-12 10:17:45Z2020-02-18 08:19:21ZCN=SCOTT-ALIEN,CN=Computers,DC=egia,DC=com
SILVER$2010-04-28 23:03:52Z2021-07-15 15:02:21Z2018-03-30 05:55:18ZCN=SILVER,CN=Computers,DC=egia,DC=com
SPICEWORKS$2016-09-22 20:29:35Z2022-06-25 18:26:50Z2022-06-21 07:31:56ZCN=SPICEWORKS,CN=Computers,DC=egia,DC=com
SRODOM$2010-08-09 07:32:01ZNever2015-07-08 15:05:52ZCN=SRODOM,CN=Computers,DC=egia,DC=com
TECH1$2010-08-18 21:53:39ZNever2010-09-20 08:11:37ZCN=TECH1,CN=Computers,DC=egia,DC=com
TECHDEV$2009-11-04 00:09:40ZNever2011-11-08 07:53:35ZCN=TECHDEV,CN=Computers,DC=egia,DC=com
TERASTATION$2007-11-15 17:05:58ZNever1600-12-31 16:00:00ZCN=TeraStation,CN=Computers,DC=egia,DC=com
TOVIAH-WIN10$2019-02-22 18:30:59Z2023-03-10 11:32:34Z2023-03-10 11:46:34ZCN=TOVIAH-WIN10,CN=Computers,DC=egia,DC=com
TPIPER$2012-09-19 01:32:20Z2019-03-13 09:06:31Z2019-02-20 10:32:50ZCN=TPIPER,CN=Computers,DC=egia,DC=com
TP-VIRTXP$2012-09-24 22:13:32ZNever2015-09-25 14:20:37ZCN=TP-VIRTXP,CN=Computers,DC=egia,DC=com
TUANLE$2011-11-22 15:12:53Z2023-06-15 13:46:04Z2023-06-15 13:46:05ZCN=TUANLE,CN=Computers,DC=egia,DC=com
TUANLE-PC$2013-06-26 21:32:38Z2017-10-10 05:16:27Z2017-09-22 08:05:52ZCN=TUANLE-PC,CN=Computers,DC=egia,DC=com
webfilter$2010-07-16 07:00:15ZNever2010-07-16 00:00:15ZCN=webfilter,CN=Computers,DC=egia,DC=com
WHITE$2008-05-10 00:04:59Z2017-01-03 05:03:02Z2017-01-07 05:26:07ZCN=WHITE,CN=Computers,DC=egia,DC=com
WIN10-BREANNA$2019-06-21 18:02:59Z2022-03-13 15:14:41Z2022-03-13 15:27:55ZCN=WIN10-BREANNA,CN=Computers,DC=egia,DC=com
WIN10-DTHAO$2019-06-04 17:30:21Z2021-02-05 11:38:01Z2020-06-11 08:05:08ZCN=WIN10-DTHAO,CN=Computers,DC=egia,DC=com
WIN10-JUSTINE$2019-06-25 21:53:19Z2020-11-06 23:14:00Z2020-10-24 09:49:50ZCN=WIN10-JUSTINE,CN=Computers,DC=egia,DC=com
WIN10-RFAUST$2019-06-05 17:26:13Z2020-03-09 10:43:52Z2020-03-12 07:25:14ZCN=WIN10-RFAUST,CN=Computers,DC=egia,DC=com
WIN10-RHONDA$2019-06-25 20:38:53Z2021-05-07 13:46:16Z2021-05-07 13:47:01ZCN=WIN10-RHONDA,CN=Computers,DC=egia,DC=com
YELLOW$2010-04-29 01:24:13Z2020-06-12 17:58:10Z2020-05-19 09:50:03ZCN=YELLOW,CN=Computers,DC=egia,DC=com
YELLOW02$2016-09-26 21:26:27Z2017-03-10 07:48:39Z2017-02-25 22:20:39ZCN=YELLOW02,CN=Computers,DC=egia,DC=com
[2]
NameCreationLast logonPwd Last SetDistinguished name
TERASTATION$2007-11-15 17:05:58ZNever1600-12-31 16:00:00ZCN=TeraStation,CN=Computers,DC=egia,DC=com
webfilter$2010-07-16 07:00:15ZNever2010-07-16 00:00:15ZCN=webfilter,CN=Computers,DC=egia,DC=com
[4]
NameCreationLast logonPwd Last SetDistinguished name
BROWN$2010-08-15 21:56:51ZNever2016-08-23 11:52:40ZCN=BROWN,CN=Computers,DC=egia,DC=com
EGIADC01W$2016-10-20 22:57:09Z2024-07-13 22:49:24Z2024-07-13 23:05:00ZCN=EGIADC01W,OU=Domain Controllers,DC=egia,DC=com
SILVER$2010-04-28 23:03:52Z2021-07-15 15:02:21Z2018-03-30 05:55:18ZCN=SILVER,CN=Computers,DC=egia,DC=com
YELLOW$2010-04-29 01:24:13Z2020-06-12 17:58:10Z2020-05-19 09:50:03ZCN=YELLOW,CN=Computers,DC=egia,DC=com
[39]
NameCreationLast logonPwd Last SetDistinguished name
BACKUP-PC2$2013-04-18 21:45:30ZNever2014-09-02 08:51:32ZCN=BACKUP-PC2,CN=Computers,DC=egia,DC=com
BACKUP-PC4$2013-05-15 20:54:28ZNever2013-07-19 19:23:21ZCN=BACKUP-PC4,CN=Computers,DC=egia,DC=com
BHOWARTH$2007-01-10 02:12:03ZNever2007-03-12 09:56:21ZCN=BHOWARTH,CN=Computers,DC=egia,DC=com
BLACK$2007-10-17 19:50:10ZNever2010-07-16 14:11:09ZCN=BLACK,CN=Computers,DC=egia,DC=com
BMATULICH$2003-10-27 19:54:28ZNever2011-11-07 21:20:10ZCN=BMATULICH,CN=Computers,DC=egia,DC=com
BMATULICH-HOME$2003-08-19 19:47:37ZNever2010-05-23 11:54:31ZCN=BMATULICH-HOME,CN=Computers,DC=egia,DC=com
CALABRESE$2007-06-22 21:15:22ZNever2013-02-27 13:23:44ZCN=CALABRESE,CN=Computers,DC=egia,DC=com
CALLREPORT$2010-07-27 03:39:48ZNever2010-07-26 20:39:48ZCN=CALLREPORT,CN=Computers,DC=egia,DC=com
CALLREPORTING$2010-03-04 17:53:26ZNever2010-07-14 00:19:11ZCN=CALLREPORTING,CN=Computers,DC=egia,DC=com
CDEARMAN$2010-04-16 17:26:04ZNever2012-12-13 09:51:47ZCN=CDEARMAN,CN=Computers,DC=egia,DC=com
CRLAPTOP$2011-05-20 21:19:56ZNever2014-07-30 08:45:02ZCN=CRLAPTOP,CN=Computers,DC=egia,DC=com
CSR2$2010-07-19 13:20:01ZNever2011-04-28 06:07:51ZCN=CSR2,CN=Computers,DC=egia,DC=com
EGIADC03$2007-04-02 16:05:42Z2019-03-10 19:27:11Z2019-03-03 19:54:53ZCN=EGIADC03,CN=Computers,DC=egia,DC=com
EGIAFS10$2014-08-07 02:25:18Z2022-09-06 09:42:36Z2014-08-06 19:25:18ZCN=egiafs10,OU=Computers,OU=EMC Celerra,DC=egia,DC=com
egia-mac-100$2014-06-26 19:25:18Z2019-01-09 01:48:56Z2019-01-15 07:37:25ZCN=egia-mac-100,CN=Computers,DC=egia,DC=com
egia-mac-103$2014-06-27 14:54:24Z2017-07-17 14:47:19Z2017-07-07 10:08:09ZCN=egia-mac-103,CN=Computers,DC=egia,DC=com
egia-mac-105$2015-11-13 21:27:24Z2019-01-30 00:26:26Z2019-01-24 11:53:40ZCN=egia-mac-105,CN=Computers,DC=egia,DC=com
EGIA-PC-DEV$2013-10-04 21:14:48ZNever2014-09-29 07:40:48ZCN=EGIA-PC-DEV,CN=Computers,DC=egia,DC=com
EGIAVS01$2010-08-07 22:51:30Z2021-07-18 20:26:16Z2021-07-10 23:41:32ZCN=EGIAVS01,CN=Computers,DC=egia,DC=com
EGIAVS02$2012-05-29 01:30:57Z2020-08-11 11:57:35Z2020-07-31 10:14:33ZCN=EGIAVS02,CN=Computers,DC=egia,DC=com
EGIAVS03$2011-03-29 03:00:17Z2020-08-20 12:13:19Z2020-07-24 01:37:49ZCN=EGIAVS03,CN=Computers,DC=egia,DC=com
EGIAVS04$2011-03-29 03:23:51Z2021-07-17 05:02:39Z2021-07-19 01:41:05ZCN=EGIAVS04,CN=Computers,DC=egia,DC=com
EGIAVS05$2016-11-03 15:59:57Z2020-08-13 05:49:04Z2020-07-30 09:06:10ZCN=EGIAVS05,CN=Computers,DC=egia,DC=com
EGIAVS09$2016-10-11 15:54:51ZNever2016-10-11 08:54:52ZCN=EGIAVS09,CN=Computers,DC=egia,DC=com
EHOWARTH$2003-11-14 23:44:54ZNever2004-07-09 12:38:42ZCN=EHOWARTH,CN=Computers,DC=egia,DC=com
GREEN$2004-04-02 18:03:38ZNever2010-08-07 12:03:42ZCN=GREEN,CN=Computers,DC=egia,DC=com
ITDEV01$2011-03-18 01:21:36ZNever2013-04-18 13:28:57ZCN=ITDEV01,CN=Computers,DC=egia,DC=com
ITDEV02$2012-08-28 18:26:07ZNever2012-08-28 11:26:07ZCN=ITDEV02,CN=Computers,DC=egia,DC=com
JCHANDLP$2009-08-24 23:52:44ZNever2011-05-23 10:09:43ZCN=JCHANDLP,CN=Computers,DC=egia,DC=com
NT-SERVER$2001-10-06 18:33:47ZNever2010-10-09 08:03:54ZCN=NT-SERVER,CN=Computers,DC=egia,DC=com
ORANGE$2002-12-05 02:17:46Z2018-01-25 03:36:01Z2018-01-21 00:06:38ZCN=ORANGE,CN=Computers,DC=egia,DC=com
PINK$2008-08-25 19:42:32ZNever2010-07-24 04:20:05ZCN=PINK,CN=Computers,DC=egia,DC=com
PROJECTOR$2008-01-29 00:44:39ZNever2013-10-01 07:59:41ZCN=PROJECTOR,CN=Computers,DC=egia,DC=com
PURPLE$2008-08-28 17:21:28ZNever2016-03-05 16:31:56ZCN=PURPLE,CN=Computers,DC=egia,DC=com
TECH1$2010-08-18 21:53:39ZNever2010-09-20 08:11:37ZCN=TECH1,CN=Computers,DC=egia,DC=com
TERASTATION$2007-11-15 17:05:58ZNever1600-12-31 16:00:00ZCN=TeraStation,CN=Computers,DC=egia,DC=com
TP-VIRTXP$2012-09-24 22:13:32ZNever2015-09-25 14:20:37ZCN=TP-VIRTXP,CN=Computers,DC=egia,DC=com
webfilter$2010-07-16 07:00:15ZNever2010-07-16 00:00:15ZCN=webfilter,CN=Computers,DC=egia,DC=com
WHITE$2008-05-10 00:04:59Z2017-01-03 05:03:02Z2017-01-07 05:26:07ZCN=WHITE,CN=Computers,DC=egia,DC=com
[2]
NameCreationLast logonPwd Last SetDistinguished name
EGIADC01$2022-09-02 21:47:01Z2024-07-17 04:17:55Z2024-06-30 07:19:40ZCN=EGIADC01,OU=Domain Controllers,DC=egia,DC=com
EGIADC01W$2016-10-20 22:57:09Z2024-07-13 22:49:24Z2024-07-13 23:05:00ZCN=EGIADC01W,OU=Domain Controllers,DC=egia,DC=com

Operating Systems

If you need to find the computers running a specific OS, we advise to use PingCastle.exe and the export / computers feature available from the main menu. Indeed the computer details are not included in the report for performance issues. Doing this will impact significantly the report size and the time to load the report.

Operating SystemNb OSNb Enabled ?Nb Disabled ?Nb Active ?Nb Inactive ?Nb SidHistory ?Nb Bad PrimaryGroup ?Nb unconstrained delegations ?Nb Reversible password ?
OperatingSystem not set220020000
unknown660060000
Mac OS X330030000
EMC Celerra File Server110010000
Windows Server 2008 R2990180010
Windows Server 2022220200010
Windows Server 2003 SP2440040000
Windows 2000 Server541040000
Windows Server 2008 R2111010100000
Windows XP181800180000
Windows Server 2008330030000
Windows 2000110010000
Windows 7128127131240000
Windows 7330030000
Windows 8.1171700170000
Windows 8220020000
Windows 10 1507110010000
Windows 10 1703312010000
Windows 10 1709440040000
Windows Server 2016 1607110010000
Windows 10 1803990090000
Windows 10 1809871070000
Windows 10 1511110010000
Windows 10 1903990090000
Windows 10 1909660060000
Windows 10 2004990090000
Windows 10 20H2111100110000
Windows 10 21H1141400140000
Windows 10 22H22424010140000
Windows 11 21H2220020000
Windows 10 21H2161601150000
Windows Server 2012 R2220110000
Windows 11 22H2141400140000
Windows 11 23H2212102100000

Domain controllers

Here is a specific zoom related to the Active Directory servers: the domain controllers.

[2]
Domain controllerOperating SystemCreation Date ?Startup TimeUptimeOwner ?Null sessions ?SMB v1 ?Remote spooler ?FSMO role ?WebDAV ?
EGIADC01WWindows 20082016-10-20 22:57:09Z2024-05-12 22:45:42Z065 daysEGIA\Domain AdminsNOYESYESNO
EGIADC01Windows 20222022-09-02 21:47:01Z2024-04-11 20:17:44Z096 daysEGIA\Domain AdminsNONOYESPDC,
RID pool manager,
Infrastructure master,
Schema master,
Domain naming Master
NO

LAPS Analysis

No data is available in the report or no computers are enforcing LAPS.

Groups

This section is focused on the groups which are critical for admin activities. If the report has been saved which the full details, each group can be zoomed with its members. If it is not the case, for privacy reasons, only general statistics are available.

Group NameNb Admins ?Nb Enabled ?Nb Disabled ?Nb Inactive ?Nb PWd never expire ?Nb Smart Card required ?Nb Service accounts ?Nb can be delegated ?Nb external users ?Nb protected users ?
Account Operators0000000000
Administrators313012322013000
Backup Operators6605501600
Certificate Operators0000000000
Certificate Publishers0000000000
Dns Admins4403301400
Domain Administrators272612020012600
Enterprise Administrators181711113011700
Enterprise Key Administrators0000000000
Key Administrators0000000000
Print Operators1101100100
Replicator0000000000
Schema Administrators5413301400
Server Operators2202200200
[31]
SamAccountName ?Enabled ?Active ?Pwd never Expired ?Locked ?Smart Card required ?Service account ?Flag Cannot be delegated present ?Creation date ?Last login ?Password last set ?In Protected Users ?Distinguished name ?
AdministratorYESNOYESNONOYESNO2001-10-06 18:33:47Z2021-07-19 23:25:17Z2015-04-08 09:31:00ZNOCN=Administrator,OU=Groups,DC=egia,DC=com
ADSyncAdmin-LocalYESYESYESNONONONO2024-02-21 20:56:43Z2024-02-21 12:57:48Z2024-02-21 12:56:43ZNOCN=ADSyncAdmin-Local,OU=Service Accounts,DC=egia,DC=com
ArcserveYESNOYESNONONONO2001-10-06 18:33:48ZNot set2001-01-19 11:20:31ZNOCN=Arcserve,CN=Users,DC=egia,DC=com
BCMBackupYESNOYESNONONONO2012-11-27 22:16:25ZNot set2012-11-27 14:16:25ZNOCN=BCM Backup,OU=Sacramento,DC=egia,DC=com
bkagentYESNOYESNONONONO2002-05-07 14:37:57Z2020-08-07 09:45:13Z2002-09-26 15:32:26ZNOCN=Backup Agent,CN=Users,DC=egia,DC=com
ccramerYESYESYESNONONONO2014-07-25 20:03:05Z2024-07-10 11:43:12Z2020-02-14 06:02:29ZNOCN=Clinton Cramer,OU=Users,OU=MS365EGIA,DC=egia,DC=com
ConsultantYESNOYESNONONONO2002-09-17 17:27:04Z2020-09-08 09:31:41Z2010-11-21 13:30:35ZNOCN=Consultant,OU=Retired,DC=egia,DC=com
CybershieldNONONONONONOYES2010-07-16 07:52:02ZNot set2010-07-16 00:52:02ZNOCN=Cybershield,OU=Retired,DC=egia,DC=com
devteamvpnYESNONONONONONO2018-03-09 20:54:37Z2021-02-07 19:25:14Z2021-02-07 19:25:13ZNOCN=Dev Teamvpn,CN=Users,DC=egia,DC=com
ejavaidYESYESYESNONONONO2010-12-02 14:38:38Z2024-05-21 11:33:55Z2011-12-08 16:17:21ZNOCN=Eddie Javaid,OU=Sacramento,DC=egia,DC=com
fssaYESNOYESNONONONO2016-11-15 18:46:41Z2021-09-05 06:18:02Z2016-11-15 10:46:41ZNOCN=File Share Service Account,OU=Service Accounts,DC=egia,DC=com
gpotestYESNONONONONONO2016-10-25 17:51:34ZNot set2016-10-28 14:29:32ZNOCN=gpotest,OU=GPO Testing,DC=egia,DC=com
itsonicwallYESYESYESNONONONO2019-08-01 23:45:55Z2024-07-14 16:48:10Z2019-08-01 16:45:55ZNOCN=IT SonicWall,OU=Service Accounts,DC=egia,DC=com
itsupportYESNONONONONONO2016-09-20 19:02:53Z2016-11-15 09:05:21Z2017-01-19 15:58:36ZNOCN=IT Support,OU=Sacramento,DC=egia,DC=com
jvaladezYESYESYESNONONONO2013-05-20 13:55:31Z2024-03-19 09:00:55Z2020-06-17 17:00:36ZNOCN=Jose Valadez,OU=Sacramento,DC=egia,DC=com
mtechYESNOYESNONONONO2019-03-19 20:55:34Z2022-12-13 18:52:49Z2020-06-15 16:25:19ZNOCN=Martin tech,CN=Users,DC=egia,DC=com
mwserviceYESYESNONONONONO2023-10-16 16:55:28Z2024-07-17 09:25:03Z2024-06-13 09:03:03ZNOCN=MW Service,OU=Service Accounts,DC=egia,DC=com
nkahalYESNONONONONONO2010-12-20 04:57:36ZNot set2011-12-26 12:25:15ZNOCN=Niraj Kahal,OU=Sacramento,DC=egia,DC=com
nsinghYESNOYESNONONONO2011-07-07 04:15:59ZNot set2023-06-07 14:29:43ZNOCN=Navdeep Singh,OU=Sacramento,DC=egia,DC=com
pmanagerYESNOYESNONONONO2010-11-21 21:28:03ZNot set2010-11-21 13:28:03ZNOCN=Print Manager,CN=Users,DC=egia,DC=com
rmehraYESNONONONONONO2012-07-11 06:02:30ZNot set2013-01-17 21:51:15ZNOCN=Rishab Mehra,OU=Sacramento,DC=egia,DC=com
saccountYESNOYESNONONONO2010-11-21 21:35:59ZNot set2010-11-21 13:35:59ZNOCN=Service Account,CN=Users,DC=egia,DC=com
sharylYESNONONONONONO2017-01-16 22:49:14Z2017-03-01 14:34:10Z2017-03-01 14:32:43ZNOCN=sharyl,OU=Sacramento,DC=egia,DC=com
slatharYESNONONONONONO2011-01-04 18:12:28Z2021-07-17 11:55:18Z2023-06-07 14:35:01ZNOCN=Sunil Lather,OU=Sacramento,DC=egia,DC=com
sonicwalladminYESNOYESNONONONO2017-07-13 17:08:10Z2017-07-13 13:57:32Z2017-07-13 10:08:10ZNOCN=sonicwall admin,CN=Users,DC=egia,DC=com
spiceworksYESNOYESNONONONO2016-09-22 16:51:38Z2020-05-13 03:41:47Z2016-10-11 06:12:25ZNOCN=SpiceWorks,OU=Service Accounts,DC=egia,DC=com
techadminYESNOYESNONONONO2019-05-31 17:04:45ZNot set2019-05-31 10:04:45ZNOCN=tecch admin,CN=Users,DC=egia,DC=com
tleYESYESYESNONONONO2010-08-23 15:26:48Z2024-06-06 13:35:43Z2012-11-28 15:21:13ZNOCN=Tuan Le,OU=Sacramento,DC=egia,DC=com
tpiperYESNOYESNONONONO2007-04-19 15:08:14Z2021-07-24 22:55:15Z2015-08-07 10:50:09ZNOCN=Todd Piper,OU=Sacramento,DC=egia,DC=com
VipreServiceYESNOYESNONONONO2011-01-20 19:58:42ZNot set2011-06-27 23:55:45ZNOCN=VipreService,CN=Users,DC=egia,DC=com
vmadminYESNOYESNONONONO2016-08-23 21:50:09Z2020-06-26 05:15:08Z2016-08-23 14:50:09ZNOCN=VM Ware Admin,OU=Sacramento,DC=egia,DC=com

Last Logon Distribution

Here is the distribution of the last logon of privileged users. Only enabled accounts are analyzed.

0-30 days30-60 days60-90 days90-120 days120-150 days150-180 days180-210 days210-240 days240-270 days270-300 days300-330 days330-360 days360-390 days390-420 days420-450 days450-480 days480-510 days510-540 days540-570 days570-600 days600-630 days630-660 days660-690 days690-720 days720-750 days750-780 days780-810 days810-840 days840-870 days870-900 days900-930 days930-960 days960-990 days990-1020 days1020-1050 days1050-1080 daysOther0246810

Password Age Distribution

Here is the distribution of the password age for privileged users. Only enabled accounts are analyzed.

0-30 days30-60 days60-90 days90-120 days120-150 days150-180 days180-210 days210-240 days240-270 days270-300 days300-330 days330-360 days360-390 days390-420 days420-450 days450-480 days480-510 days510-540 days540-570 days570-600 days600-630 days630-660 days660-690 days690-720 days720-750 days750-780 days780-810 days810-840 days840-870 days870-900 days900-930 days930-960 days960-990 days990-1020 days1020-1050 days1050-1080 daysOther0246810

Delegations

Each specific rights defined for Organizational Unit (OU) are listed below.

[10]
DistinguishedNameAccountRight
DC=egiaEGIA\Domain ControllersEXT_RIGHT_REPLICATION_GET_CHANGES_ALL
DC=egiaEGIA\Exchange Enterprise ServersWriteDacl
DC=egiaEGIA\MSOL_bd60f9d632d0EXT_RIGHT_REPLICATION_GET_CHANGES_ALL, EXT_RIGHT_FORCE_CHANGE_PWD
CN=KeysEGIA\Domain ControllersGenericAll, GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=KeysEGIA\Enterprise Key AdminsGenericAll, GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=KeysEGIA\Key AdminsGenericAll, GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=MicrosoftDNS,CN=SystemEGIA\DnsAdminsGenericAll, GenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=RAS and IAS Servers Access Check,CN=SystemEGIA\RAS and IAS ServersGenericWrite, WriteDacl, WriteOwner, All extended right, DSSelf, Write all prop
CN=WMIPolicy,CN=SystemEGIA\Group Policy Creator OwnersGenericWrite, DSSelf, Write all prop
CN=SOM,CN=WMIPolicy,CN=SystemEGIA\Group Policy Creator OwnersGenericWrite, DSSelf, Write all prop

The OU that are listed as not protected are:

[1]
DistinguishedName
OU=Dell

In particular for AD database access (DCSync, AADConnect, ...).

[2]
DistinguishedNameAccountRight
DC=egiaEGIA\Domain ControllersEXT_RIGHT_REPLICATION_GET_CHANGES_ALL
DC=egiaEGIA\MSOL_bd60f9d632d0EXT_RIGHT_REPLICATION_GET_CHANGES_ALL, EXT_RIGHT_FORCE_CHANGE_PWD

This section focuses on permissions issues that can be exploited to take control of the domain.
This is an advanced section that should be examined after having looked at the Admin Groups section.

Foreign domain involved

This analysis focuses on accounts found in control path and located in other domains.

No operative link with other domains has been found.

Indirect links

This part tries to summarize in a single table if major issues have been found.
Focus on finding critical objects such as the Everyone group then try to decrease the number of objects having indirect access.
The detail is displayed below.

Priority to remediate ?Critical Object Found ?Number of objects with Indirect ?Max number of indirect numbers ?Max ratio ?
CriticalNO000
HighNO000
MediumNO150
OtherNO000

Admin groups

If the report has been saved which the full details, each object can be zoomed with its full detail. If it is not the case, for privacy reasons, only general statistics are available.

Group or user account ?Priority ?Users member ?Computer member of the group ?Indirect control ?Unresolved members ?Links ?Detail ?
Account OperatorsHigh0000NoneAnalysis
AdministratorCritical00NoneAnalysis
AdministratorsCritical31 (Details)000NoneAnalysis
Backup OperatorsHigh6 (Details)000NoneAnalysis
Certificate OperatorsMedium0000NoneAnalysis
Certificate PublishersOther03 (Details)00NoneAnalysis
Dns AdminsMedium4 (Details)000NoneAnalysis
Domain AdministratorsCritical27 (Details)000NoneAnalysis
Enterprise AdministratorsCritical18 (Details)000NoneAnalysis
Enterprise Key AdministratorsMedium0000NoneAnalysis
Key AdministratorsMedium0000NoneAnalysis
Print OperatorsMedium1 (Details)000NoneAnalysis
ReplicatorMedium0000NoneAnalysis
Schema AdministratorsCritical5 (Details)000NoneAnalysis
Server OperatorsHigh2 (Details)000NoneAnalysis

Critical Infrastructure

If the report has been saved which the full details, each object can be zoomed with its full detail. If it is not the case, for privacy reasons, only general statistics are available.

Group or user account ?Priority ?Users member ?Computer member of the group ?Indirect control ?Unresolved members ?Links ?Detail ?
Builtin OUMedium00NoneAnalysis
Certificate storeMedium00NoneAnalysis
Computers containerMedium00NoneAnalysis
Domain ControllersCritical02 (Details)00NoneAnalysis
Domain RootMedium5 (Details)0NoneAnalysis
Enterprise Read Only Domain ControllersOther0000NoneAnalysis
Group Policy Creator OwnersMedium3 (Details)000NoneAnalysis
Krbtgt accountMedium00NoneAnalysis
Read Only Domain ControllersMedium0000NoneAnalysis
Users containerMedium00NoneAnalysis

This section focuses on the relations that this domain has with other domains

Discovered Domains

This part displays the direct links that this domain has with other domains.

Trust PartnerTypeAttributDirection ?SID Filtering active ?TGT Delegation ?Creation ?Is Active ? ?Algorithm ?

Reachable Domains

These are the domains that PingCastle was able to detect but which is not releated to direct trusts. It may be children of a forest or bastions.

Reachable domainDiscovered usingNetbiosCreation date
PKI

Certificates

This detects trusted certificates which can be used in man in the middle attacks, or which can issue smart card logon certificates

Number of trusted certificates: 1

[1]
SourceStoreSubjectIssuerNotBeforeNotAfterModule sizeSignature AlgSC Logon
Enterprise NTAuth ?NTLMStoreCN=EGIA, OU=IS, O=Electric and Gas Industries Associates, L=San Leandro, S=CA, C=US, E=cert-auth-root@egia.comCN=EGIA, OU=IS, O=Electric and Gas Industries Associates, L=San Leandro, S=CA, C=US, E=cert-auth-root@egia.com2001-11-02 14:39:27Z2003-11-02 14:44:17Z512sha1RSAFalse

Certificate Templates

This section lists certificate templates which can be used to generate a certificate. A misconfiguration can allow an attacker to create its own certificate and use it to impersonate other users

Number of certificate templates: 11

[11]
NameDestinationManager approval ?Enrollee can supply subject ?Issuance requirements ?Vulnerable ACL ?Everyone can enroll ?Agent template ?Any purpose ?For Authentication ?Flag No Security ?
User ?UserNONONONOYESNONOYESNO
UserSignature ?UserNONONONOYESNONOYESNO
EFS ?UserNONONONOYESNONONONO
Administrator ?UserNONONONONONONOYESNO
EFSRecovery ?UserNONONONONONONONONO
CodeSigning ?UserNONONONONONONONONO
Machine ?ComputerNONONONOYESNONOYESNO
DomainController ?ComputerNONONONONONONOYESNO
WebServer ?ComputerNOYESNONONONONONONO
SubCA ?ComputerNOYESNONONONOYESYESNO
ExchangeUser ?UserNOYESNONONONONONONO

The delegations for certificate templates are listed below.

[5]
DistinguishedNameAccountRight
CN=DomainController,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=ConfigurationEGIA\Domain ControllersEnroll
CN=EFS,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=ConfigurationDomain UsersEnroll
CN=Machine,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=ConfigurationDomain ComputersEnroll
CN=User,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=ConfigurationDomain UsersEnroll
CN=UserSignature,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=ConfigurationDomain UsersEnroll

Azure AD Connect settings

Azure AD Connect help maintaining a synchronization between the Active Directory and Azure AD. Azure AD Connect servers should be considered as Tiers0 as they usually have the right to read the hashes of the user passwords.

Identifier ?Computer ?Tenant ?IsEnabled ?Created ?LastLogon ?PwdLastSet ?Computer object found ?
bd60f9d632d0462e920a96a28db9cee0EGIADC01egia.orgTRUE2024-02-08 14:14:29Z2024-07-10 15:21:59Z2024-02-21 14:26:27ZTRUE

WSUS settings

WSUS settings allow workstations and servers located on the intranet to be updated. The reference documentation is here. Here are the settings found in GPO.

Policy NameWSUS Server ?UseWUServer ?ElevateNonAdmins ?AUOptions ?NoAutoUpdate ?NoAutoRebootWithLoggedOnUsers ?

Exchange settings

Echange is the mail server of Microsoft. Because it is deeply integrated into the Active Directory, it is a component to be monitored

PingCastle is checking objects of type msExchExchangeServer and the schema to provide the information below.

Since recent version, Exchange allows information to be stored in the Active Directory Schema to perform offline configuration. It is a copy of some information stored locally on the servers

Exchange schema installation: 2001-11-14 21:40:40Z

The Exchange schema version is : Exchange 2003 RTM

NameIn service dateVersionProxy
WHITE2008-05-30 22:03:51ZVersion 6.5 (Build 7638.2: Service Pack 2)
RED2001-11-14 21:40:40ZVersion 6.0 (Build 4712.7: Service Pack 1)

SCCM settings

SCCM or its more recent name Microsoft Endpoint Manager is the Microsoft tool to manage the workstations and servers. It is used typically to deploy packages.

PingCastle is checking objects of type mSSMSManagementPoint and the schema to provide the information below.

NameVersionClient operational versionAAD TenantIDAAD TenantName

Service Connection Points

Service Connection Points are a configuration stored in the AD to expose services to all computers.

Service ?Class ?DNS ?Binding Info ?DN ?
BackupExec serverBEMainServiceDC=egia,DC=comBLUECN=BEServer,CN=Computers,DC=egia,DC=com
AD LDSLDAPEGIAVC02.egia.comldaps://EGIAVC02.egia.com:636 ldap://EGIAVC02.egia.com:389CN={3554f926-e5f9-41b5-aaf7-dc22b4cfb969},CN=EGIAVC02,CN=Computers,DC=egia,DC=com
AD LDSLDAPEGIAVC01.egia.comldaps://EGIAVC01.egia.com:636 ldap://EGIAVC01.egia.com:389CN={ea6a59f2-368a-44a4-859c-a40a41032d79},CN=EGIAVC01,CN=Computers,DC=egia,DC=com
RDS GatewayTSGatewayEGIAWeb01.egia.com443CN=TSGateway,CN=EGIAWEB01,CN=Computers,DC=egia,DC=com

Replacement of RC4 by AES in kerberos

This section checks for known pain points in AES activation and RC4 removal for kerberos

This section is here to evaluate the know problems when removing RC4. If you plan to do so, you should check all the items highlighted below and proceed with a small group of test computers.

Please see the following articles:

This program will proceed to know:

  • That the infrastructure is compatible with AES. It will asserts that all client accounts have an AES hash.
  • That all services (trust, ...) can accept AES kerberos tickets. This is done by checking the special attribute msDS-SupportedEncryptionTypes.
  • That the AES algorithm is pushed to the client by GPO. This is done by looking at the setting 'Configure encryption types allowed for Kerberos'.

Infrastructure

This program starts by determining for how long the infrastructure in place is compatible with AES.

This is done by retrieving the creation date of the groupe 'Read-Only Domain Controllers' which is linked to the first DC compatible with AES (Windows Server 2008).

Installation date of the first DC compatible with AES: 2010-08-08 19:43:20Z

All passwords saved after this date have their hash saved with both RC4 and AES.

Krbtgt

To issue Kerberos ticket, the krbtgt account holding the kerberos secret key must have a password changed AFTER the installation of the first DC compatible with AES.

Last krbtgt change: 2016-11-05 12:19:21Z

OK

Domain Controllers

To support AES, all DC must be at least Windows 2008.

Domain ControllerOSAES compatible
EGIADC01WWindows 2008Yes
EGIADC01Windows 2022Yes

OK

Trusts

To be used over trusts, AES requires the trust to support this algorithm. This is done thought the special attribute msDS-SupportedEncryptionTypes.

Be aware that checking 'The other domain supports Kerberos AES Encryption' in the trust property disables RC4. This check is not recommended during the migration phase.

No trust detected

OK

Azure

To be used over Azure, the special AzureSSO account must be setup to support AES.

No AzureAD SSO detected

OK

Service accounts

Kerberos tickets for services are signed by the password hash of the service account. The service account must be declared as compatible to handle AES. This is done through the special attribute named msDS-SupportedEncryptionTypes or by checking 'This account supports Kerberos AES XXX bit encryption' in the account properties.

The service account must also have a password newer than the first DC compatible with AES. If there was no password change, the creation date must be newer than the first DC compatible with AES.

If a service account is not compatible, you will received error messages like 'The encryption type requested is not supported by the KDC'. See the following KB for SharePoint of SCCM errors:

Number of service account found without AES configuration: 79

[79]
NameCreationLast logonPwd Last SetDistinguished name
Admin2002-09-13 23:34:50Z2019-08-13 05:22:33Z2002-09-13 16:34:51ZCN=Admin,OU=ofsdirect.com,DC=egia,DC=com
Administrator2001-10-06 18:33:47Z2021-07-19 23:25:17Z2015-04-08 09:31:00ZCN=Administrator,OU=Groups,DC=egia,DC=com
AlamedaMP2010-04-22 22:13:52ZNever2010-04-22 15:13:52ZCN=Alameda MP,OU=Rebates,DC=egia,DC=com
Arcserve2001-10-06 18:33:48ZNever2001-01-19 11:20:31ZCN=Arcserve,CN=Users,DC=egia,DC=com
BACKUP-PC2$2013-04-18 21:45:30ZNever2014-09-02 08:51:32ZCN=BACKUP-PC2,CN=Computers,DC=egia,DC=com
BACKUP-PC4$2013-05-15 20:54:28ZNever2013-07-19 19:23:21ZCN=BACKUP-PC4,CN=Computers,DC=egia,DC=com
BHOWARTH$2007-01-10 02:12:03ZNever2007-03-12 09:56:21ZCN=BHOWARTH,CN=Computers,DC=egia,DC=com
bkagent2002-05-07 14:37:57Z2020-08-07 09:45:13Z2002-09-26 15:32:26ZCN=Backup Agent,CN=Users,DC=egia,DC=com
BLACK$2007-10-17 19:50:10ZNever2010-07-16 14:11:09ZCN=BLACK,CN=Computers,DC=egia,DC=com
BMATULICH$2003-10-27 19:54:28ZNever2011-11-07 21:20:10ZCN=BMATULICH,CN=Computers,DC=egia,DC=com
BMATULICH-HOME$2003-08-19 19:47:37ZNever2010-05-23 11:54:31ZCN=BMATULICH-HOME,CN=Computers,DC=egia,DC=com
CALABRESE$2007-06-22 21:15:22ZNever2013-02-27 13:23:44ZCN=CALABRESE,CN=Computers,DC=egia,DC=com
CALLREPORT$2010-07-27 03:39:48ZNever2010-07-26 20:39:48ZCN=CALLREPORT,CN=Computers,DC=egia,DC=com
CALLREPORTING$2010-03-04 17:53:26ZNever2010-07-14 00:19:11ZCN=CALLREPORTING,CN=Computers,DC=egia,DC=com
CDEARMAN$2010-04-16 17:26:04ZNever2012-12-13 09:51:47ZCN=CDEARMAN,CN=Computers,DC=egia,DC=com
ChicagoLand2008-12-15 20:34:56ZNever2008-12-15 12:34:56ZCN=ChicagoLand,OU=Rebates,DC=egia,DC=com
ContractorServices2007-12-01 00:08:06ZNever2007-11-30 16:08:06ZCN=ContractorServices,CN=Users,DC=egia,DC=com
CRLAPTOP$2011-05-20 21:19:56ZNever2014-07-30 08:45:02ZCN=CRLAPTOP,CN=Computers,DC=egia,DC=com
CSR2$2010-07-19 13:20:01ZNever2011-04-28 06:07:51ZCN=CSR2,CN=Computers,DC=egia,DC=com
efax2007-08-03 16:26:52ZNever2007-08-03 09:26:52ZCN=e Fax,CN=Users,DC=egia,DC=com
EGIADC03$2007-04-02 16:05:42Z2019-03-10 19:27:11Z2019-03-03 19:54:53ZCN=EGIADC03,CN=Computers,DC=egia,DC=com
EGIAFS10$2014-08-07 02:25:18Z2022-09-06 09:42:36Z2014-08-06 19:25:18ZCN=egiafs10,OU=Computers,OU=EMC Celerra,DC=egia,DC=com
egia-mac-100$2014-06-26 19:25:18Z2019-01-09 01:48:56Z2019-01-15 07:37:25ZCN=egia-mac-100,CN=Computers,DC=egia,DC=com
egia-mac-103$2014-06-27 14:54:24Z2017-07-17 14:47:19Z2017-07-07 10:08:09ZCN=egia-mac-103,CN=Computers,DC=egia,DC=com
egia-mac-105$2015-11-13 21:27:24Z2019-01-30 00:26:26Z2019-01-24 11:53:40ZCN=egia-mac-105,CN=Computers,DC=egia,DC=com
EGIA-PC-DEV$2013-10-04 21:14:48ZNever2014-09-29 07:40:48ZCN=EGIA-PC-DEV,CN=Computers,DC=egia,DC=com
EGIAServices2007-08-07 18:59:18ZNever2007-08-07 11:59:18ZCN=EGIA Services,CN=Users,DC=egia,DC=com
EGIAVS01$2010-08-07 22:51:30Z2021-07-18 20:26:16Z2021-07-10 23:41:32ZCN=EGIAVS01,CN=Computers,DC=egia,DC=com
EGIAVS02$2012-05-29 01:30:57Z2020-08-11 11:57:35Z2020-07-31 10:14:33ZCN=EGIAVS02,CN=Computers,DC=egia,DC=com
EGIAVS03$2011-03-29 03:00:17Z2020-08-20 12:13:19Z2020-07-24 01:37:49ZCN=EGIAVS03,CN=Computers,DC=egia,DC=com
EGIAVS04$2011-03-29 03:23:51Z2021-07-17 05:02:39Z2021-07-19 01:41:05ZCN=EGIAVS04,CN=Computers,DC=egia,DC=com
EGIAVS05$2016-11-03 15:59:57Z2020-08-13 05:49:04Z2020-07-30 09:06:10ZCN=EGIAVS05,CN=Computers,DC=egia,DC=com
EGIAVS09$2016-10-11 15:54:51ZNever2016-10-11 08:54:52ZCN=EGIAVS09,CN=Computers,DC=egia,DC=com
EHOWARTH$2003-11-14 23:44:54ZNever2004-07-09 12:38:42ZCN=EHOWARTH,CN=Computers,DC=egia,DC=com
excessisout2009-02-12 19:42:14ZNever2009-02-12 11:42:14ZCN=Excess Is Out,OU=Rebates,DC=egia,DC=com
GREEN$2004-04-02 18:03:38ZNever2010-08-07 12:03:42ZCN=GREEN,CN=Computers,DC=egia,DC=com
hemc2008-05-14 19:05:59ZNever2008-05-14 12:05:59ZCN=EGIA Home Energy Makeover,CN=Users,DC=egia,DC=com
HomeownerServices2008-05-09 21:01:03ZNever2008-05-09 14:01:03ZCN=Homeowner Services,CN=Users,DC=egia,DC=com
ILS_ANONYMOUS_USER2001-10-24 20:31:48ZNever2001-10-24 13:31:48ZCN=ILS_ANONYMOUS_USER,CN=Users,DC=egia,DC=com
ILSRebates2010-02-23 01:54:37ZNever2010-02-22 17:54:37ZCN=ILS Rebates,OU=Rebates,DC=egia,DC=com
IS-REQUESTS2002-01-03 18:47:31ZNever2002-01-03 10:47:31ZCN=IS-REQUESTS,CN=Users,DC=egia,DC=com
ITDEV01$2011-03-18 01:21:36ZNever2013-04-18 13:28:57ZCN=ITDEV01,CN=Computers,DC=egia,DC=com
ITDEV02$2012-08-28 18:26:07ZNever2012-08-28 11:26:07ZCN=ITDEV02,CN=Computers,DC=egia,DC=com
IUSR_BLUE2001-11-19 17:54:31ZNever2010-07-16 09:08:26ZCN=IUSR_BLUE,CN=Users,DC=egia,DC=com
IUSR_DEV2001-10-12 23:55:53ZNever2001-10-12 16:55:53ZCN=IUSR_DEV,CN=Users,DC=egia,DC=com
IUSR_NT-SERVER2001-10-06 18:33:48ZNever2001-10-06 11:09:06ZCN=IUSR_NT-SERVER,CN=Users,DC=egia,DC=com
IWAM_DEV2001-10-12 23:55:49ZNever2001-10-12 16:55:49ZCN=IWAM_DEV,CN=Users,DC=egia,DC=com
IWAM_NT-SERVER2001-10-06 18:33:48ZNever2001-10-06 11:08:14ZCN=IWAM_NT-SERVER,CN=Users,DC=egia,DC=com
JCHANDLP$2009-08-24 23:52:44ZNever2011-05-23 10:09:43ZCN=JCHANDLP,CN=Computers,DC=egia,DC=com
Jobs2010-07-07 23:32:20ZNever2010-07-07 16:32:20ZCN=Jobs,CN=Users,DC=egia,DC=com
MWDRebates2008-06-17 21:36:06ZNever2008-06-17 14:36:06ZCN=MWD Rebates,OU=Rebates,DC=egia,DC=com
NicorRebates2010-05-04 00:41:55ZNever2010-05-03 17:41:55ZCN=Nicor Rebates,OU=Rebates,DC=egia,DC=com
NT-SERVER$2001-10-06 18:33:47ZNever2010-10-09 08:03:54ZCN=NT-SERVER,CN=Computers,DC=egia,DC=com
ORANGE$2002-12-05 02:17:46Z2018-01-25 03:36:01Z2018-01-21 00:06:38ZCN=ORANGE,CN=Computers,DC=egia,DC=com
paheatingrebates2010-04-20 22:27:56ZNever2010-04-20 15:27:56ZCN=PAHeating Rebates,OU=Rebates,DC=egia,DC=com
PINK$2008-08-25 19:42:32ZNever2010-07-24 04:20:05ZCN=PINK,CN=Computers,DC=egia,DC=com
PROJECTOR$2008-01-29 00:44:39ZNever2013-10-01 07:59:41ZCN=PROJECTOR,CN=Computers,DC=egia,DC=com
PURPLE$2008-08-28 17:21:28ZNever2016-03-05 16:31:56ZCN=PURPLE,CN=Computers,DC=egia,DC=com
Rebate012003-04-03 21:47:09ZNever2010-06-23 17:27:53ZCN=Rebate01,OU=Rebates,DC=egia,DC=com
Rebates2001-10-06 18:33:48ZNever1600-12-31 16:00:00ZCN=Rebate Process,OU=Rebates,DC=egia,DC=com
rerebates2004-10-15 20:23:26ZNever2004-10-15 13:23:26ZCN=Roseville Electric Rebates,OU=Rebates,DC=egia,DC=com
SalesMarketing2009-06-11 21:35:56ZNever2009-06-11 14:35:56ZCN=SalesMarketing,CN=Users,DC=egia,DC=com
SaveEnergy2009-12-03 19:47:49ZNever2009-12-03 11:47:49ZCN=SaveEnergy,CN=Users,DC=egia,DC=com
ScanRouter2002-10-30 21:34:13ZNever2002-10-30 13:34:13ZCN=ScanRouter,CN=Users,DC=egia,DC=com
ScanRouterMail2002-10-30 23:16:24ZNever2002-10-30 15:16:24ZCN=ScanRouterMail,CN=Users,DC=egia,DC=com
SCVRebates2009-08-17 16:50:54ZNever2009-08-17 09:50:54ZCN=SCV Rebates,OU=Rebates,DC=egia,DC=com
SolanoRebates2007-02-28 18:25:46ZNever2007-02-28 10:25:46ZCN=Solano Rebates,OU=Rebates,DC=egia,DC=com
spam2007-10-28 17:12:29ZNever2007-10-28 10:12:29ZCN=Spam Box,CN=Users,DC=egia,DC=com
sqlserveralert2001-11-14 22:23:36ZNever2001-11-14 15:09:20ZCN=SQLServer Alert,CN=Users,DC=egia,DC=com
support2003-11-19 22:37:59ZNever2003-11-19 14:38:00ZCN=Support,CN=Users,DC=egia,DC=com
suser2010-05-05 02:13:31ZNever2010-05-04 19:13:31ZCN=SQL User,OU=Sacramento,DC=egia,DC=com
SWGRebates2008-01-25 22:04:44ZNever2008-01-25 14:05:04ZCN=SWG Rebates,OU=Rebates,DC=egia,DC=com
TECH1$2010-08-18 21:53:39ZNever2010-09-20 08:11:37ZCN=TECH1,CN=Computers,DC=egia,DC=com
TERASTATION$2007-11-15 17:05:58ZNever1600-12-31 16:00:00ZCN=TeraStation,CN=Computers,DC=egia,DC=com
TP-VIRTXP$2012-09-24 22:13:32ZNever2015-09-25 14:20:37ZCN=TP-VIRTXP,CN=Computers,DC=egia,DC=com
tsluser2010-05-07 20:12:03ZNever2010-05-07 13:12:04ZCN=tsluser,CN=Users,DC=egia,DC=com
webfilter$2010-07-16 07:00:15ZNever2010-07-16 00:00:15ZCN=webfilter,CN=Computers,DC=egia,DC=com
WHITE$2008-05-10 00:04:59Z2017-01-03 05:03:02Z2017-01-07 05:26:07ZCN=WHITE,CN=Computers,DC=egia,DC=com
WyomingRebates2010-04-01 16:25:45ZNever2010-04-01 09:25:45ZCN=Wyoming Rebates,OU=Rebates,DC=egia,DC=com

Not OK

GPO to set encryption

The algorithm to use for kerberos request is decided by a local GPO which is overwritten by domain GPO.

Here is the list of domain GPO altering the kerberos algorithms

Policy NameAlgorithm ?AES compatibleRC4 compatible

OK

Beware that no GPO supporting AES / RC4 have been found and if the supported algorithm is not defined in the master, AES will not be enabled by default

This section focuses on security checks specific to the Active Directory environment.

Backup

The program checks the last date of the AD backup. This date is computed using the replication metadata of the attribute dsaSignature (reference).

Last backup date: 2024-03-26 06:01:47Z

LAPS

LAPS is used to have a unique local administrator password on all workstations / servers of the domain. Then this password is changed at a fixed interval. The risk is when a local administrator hash is retrieved and used on other workstation in a pass-the-hash attack. Please note that the LAPS schema is installed on the forest and as a consequence the installation date can be before the domain creation date.

Mitigation: having a process when a new workstation is created or install LAPS and apply it through a GPO

Legacy LAPS installation date: Never

Ms LAPS installation date: Never

Windows Event Forwarding (WEF)

Windows Event Forwarding is a native mechanism used to collect logs on all workstations / servers of the domain. Microsoft recommends to Use Windows Event Forwarding to help with intrusion detection Here is the list of servers configured for WEF found in GPO

Number of WEF configuration found: 0

krbtgt (Used for Golden ticket attacks)

The account password for the krbtgt account should be rotated twice yearly at a minimum. More frequent password rotations are recommended, with 40 days the current recommendation by ANSSI. Additional rotations based on external events, such as departure of an employee who had privileged network access, are also strongly recommended.

You can perform this action using this script

You can use the version gathered using replication metadata from two reports to guess the frequency of the password change or if the two consecutive resets have been done. Version starts at 1.

Kerberos password last changed: 2016-11-05 12:19:21Z version: 3

AdminSDHolder (detect temporary elevated accounts)

This control detects accounts which are former 'unofficial' admins. Indeed when an account belongs to a privileged group, the attribute admincount is set. If the attribute is set without being an official member, this is suspicious. To suppress this warning, the attribute admincount of these accounts should be removed after review.

Number of accounts to review: 1

[1]
NameCreationLast logonPwd Last SetEvent dateDistinguished name
test2013-04-15 18:54:26Z2022-11-07 11:42:04ZNever2013-04-15 12:14:15ZCN=Test,OU=Sacramento,DC=egia,DC=com

Unix Passwords

This control detects if one of the attributes userPassword or unixUserPassword has been set on accounts. Indeed, these attributes are designed to store encrypted secrets for unix (or mainframe) interconnection. However in the large majority, interconnected systems are poorly designed and the user password is stored in these attributes in clear text or poorly encrypted. The userPassword attribute is also used in classic LDAP systems to change the user password by setting its value. But, with Active Directory, it is considered by default as a normal attribute and doesn't trigger a password but shows instead the password in clear text.

Number of accounts to review: 0

Java code reference

This control detects if one of the attributes javaCodebase, javaFactory or javaClassname has been set on accounts. Indeed, these attributes are designed to add custom code to AD object when running java code. However it can be abused to run code on servers having the flag com.sun.jndi.ldap.object.trustURLCodebase set to true. This is a vulnerability similar to the log4shell vulnerability.

Java Schema extension: Not Found

No active user account found with Java code

Logon scripts

You can check here for backdoors or typos in the scriptPath attribute

Script NameCount
None157
admin.vbs9
login.bat4
rebate.vbs4
marketing.vbs3
account.vbs2

Advanced

This section display advanced information, if any has been found

Password policies

Note: PSO (Password Settings Objects) will be visible only if the user, which collected the information, has the permission to view it.
PSO shown in the report will be prefixed by "PSO:"

Policy NameComplexityMax Password AgeMin Password AgeMin Password LengthPassword HistoryReversible EncryptionLockout ThresholdLockout DurationReset account counter locker after
Default Domain Policy (New) ?True60 day(s)0 day82False9991 minute(s)1 minute(s)

Screensaver policies

This is the settings related to screensavers stored in Group Policies. Each non compliant setting is written in red.

Policy NameScreensaver enforcedPassword requestStart after (seconds)Grace Period (seconds)
GPO

This section focuses on security settings stored in the Active Directory technical security policies.

Obfuscated Passwords

The password in GPO are obfuscated, not encrypted. Consider any passwords listed here as compromised and change them immediately.

Restricted Groups

Giving local group membership in a GPO is a way to become administrator.
The local admin of a domain controller can become domain administrator instantly.

GPO NameUser or groupMember of
SQL Servers Group PolicyEGIA\Database AdminsBUILTIN\Administrators
SQL Servers Group PolicyEGIA\Database AdminsBUILTIN\Remote Desktop Users

Security settings

A GPO can be used to deploy security settings to workstations.
The best practice out of the default security baseline is reported in green.
The following settings in red are unsual and may need to be reviewed.
Each setting is accompanied with its value and a link to the GPO explanation.

You will find below the checks where no occurences have been found

Policy NameSettingValue

Audit settings

Audit settings allow the system to generate logs which are useful to detect intrusions. Here are the settings found in GPO.

Simple audit events are described here and Advanced audit events are described here

You can get a list of all audit settings with the command line: auditpol.exe /get /category:* (source)

Simple audit settings are located in: Computer Configuration / Policies / Windows Settings / Security Settings / Local Policies / Audit Policy. Simple audit settings are named [Simple Audit].

Advanced audit settings are located in: Computer Configuration / Policies / Windows Settings / Security Settings / Advanced Audit Policy Configuration. This category is displayed below.

Policy NameCategorySettingValue
Default Domain Controllers Policy ?[Simple Audit]Audit system eventsSuccess and Failure
Default Domain Controllers Policy ?[Simple Audit]Audit logon eventsSuccess and Failure
Default Domain Controllers Policy ?[Simple Audit]Audit object accessUnchanged
Default Domain Controllers Policy ?[Simple Audit]Audit privilege useUnchanged
Default Domain Controllers Policy ?[Simple Audit]Audit policy changeSuccess and Failure
Default Domain Controllers Policy ?[Simple Audit]Audit account managementSuccess and Failure
Default Domain Controllers Policy ?[Simple Audit]Audit process trackingSuccess
Default Domain Controllers Policy ?[Simple Audit]Audit directory service accessSuccess
Default Domain Controllers Policy ?[Simple Audit]Audit account logon eventsSuccess and Failure
Default Domain Controllers Policy ?Account LogonKerberos Authentication ServiceSuccess and Failure
Default Domain Controllers Policy ?Account ManagementComputer Account ManagementSuccess
Default Domain Controllers Policy ?Account ManagementDistribution Group ManagementSuccess
Default Domain Controllers Policy ?Account ManagementUser Account ManagementSuccess and Failure
Default Domain Controllers Policy ?Account ManagementSecurity Group ManagementSuccess
Default Domain Controllers Policy ?Detailed TrackingProcess CreationSuccess
Default Domain Controllers Policy ?Detailed TrackingProcess TerminationSuccess
Default Domain Controllers Policy ?DS AccessDirectory Service ChangesSuccess
Default Domain Controllers Policy ?DS AccessDirectory Service AccessSuccess
Default Domain Controllers Policy ?Logon/LogoffLogonSuccess and Failure
Default Domain Controllers Policy ?Logon/LogoffLogoffSuccess
Default Domain Controllers Policy ?Logon/LogoffNetwork Policy ServerSuccess and Failure
Default Domain Controllers Policy ?Logon/LogoffOther Logon/LogoffSuccess
Default Domain Controllers Policy ?Object AccessOther Object AccessSuccess
Default Domain Controllers Policy ?Policy ChangeAuthorization Policy ChangeSuccess
Default Domain Controllers Policy ?Policy ChangeAuthentication Policy ChangeSuccess
Default Domain Controllers Policy ?SystemSecurity State ChangeSuccess

Privileges

Giving privileges in a GPO is a way to become administrator without being part of a group.
For example, SeTcbPriviledge gives the right to act as SYSTEM, which has more privileges than the administrator account.

GPO NamePrivilegeMembers
Default Domain Controllers Policy ?SeAssignPrimaryTokenPrivilegeEGIA\SQLServer2005MSSQLUser$BLUE$BKUPEXEC
Default Domain Controllers Policy ?SeBackupPrivilegeAdministrators
Default Domain Controllers Policy ?SeBackupPrivilegeBUILTIN\Server Operators
SQL Servers Group Policy ?SeTcbPrivilegeEGIA\svc_prod_sql
Default Domain Controllers Policy ?SeBackupPrivilegeBUILTIN\Backup Operators
SQL Servers Group Policy ?SeAssignPrimaryTokenPrivilegeEGIA\svc_prod_sql
SQL Servers Group Policy ?SeImpersonatePrivilegeAdministrators
SQL Servers Group Policy ?SeImpersonatePrivilegeEGIA\svc_prod_sql
SQL Servers Group Policy ?SeImpersonatePrivilegeNT AUTHORITY\SERVICE
SQL Servers Group Policy ?SeManageVolumePrivilegeEGIA\svc_prod_sql
SQL Servers Group Policy ?SeManageVolumePrivilegeAdministrators
Default Domain Controllers Policy ?SeCreateTokenPrivilegeEGIA\Administrator
Default Domain Controllers Policy ?SeDebugPrivilegeAdministrators
Default Domain Controllers Policy ?SeLoadDriverPrivilegeAdministrators
Default Domain Controllers Policy ?SeRestorePrivilegeEGIA\Administrator
Default Domain Controllers Policy ?SeRestorePrivilegeAdministrators
Default Domain Controllers Policy ?SeRestorePrivilegeBUILTIN\Server Operators
Default Domain Controllers Policy ?SeRestorePrivilegeBUILTIN\Backup Operators
Default Domain Controllers Policy ?SeSecurityPrivilegeAdministrators
Default Domain Controllers Policy ?SeSecurityPrivilegeEGIA\Exchange Enterprise Servers
Default Domain Controllers Policy ?SeTakeOwnershipPrivilegeAdministrators
Default Domain Controllers Policy ?SeTcbPrivilegeEGIA\SQLServer2005MSSQLUser$BLUE$BKUPEXEC
Default Domain Controllers Policy ?SeTcbPrivilegeEGIA\Administrator
Default Domain Controllers Policy ?SeTcbPrivilegeBUILTIN\Backup Operators
Default Domain Controllers Policy ?SeEnableDelegationPrivilegeAdministrators
Default Domain Controllers Policy ?SeMachineAccountPrivilegeAdministrators
Default Domain Controllers Policy ?SeMachineAccountPrivilegeEGIA\Administrator
Default Domain Controllers Policy ?SeMachineAccountPrivilegeDomain Administrators
Default Domain Controllers Policy ?SeSyncAgentPrivilege<empty>

Login

Login authorization and restriction can be set by GPOs. Indeed, by default, everyone is allowed to login on every computer except domain controllers. Defining login restriction is a way to have different isolated tiers. Here are the settings found in GPOs.

GPO NamePrivilegeMembers
SQL Servers Group Policy ?Deny log on locally ?EGIA\svc_prod_sql
SQL Servers Group Policy ?Deny logon through Remote Desktop Services ?EGIA\svc_prod_sql
SQL Servers Group Policy ?Allow logon through Remote Desktop Services ?EGIA\Database Admins
SQL Servers Group Policy ?Log on as a service ?EGIA\svc_prod_sql
Default Domain Controllers Policy ?Log on as a batch job ?BUILTIN\Backup Operators
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\Administrator
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\IUSR_DCC1DW01
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\IUSR_DCH6NP01
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\IUSR_DEV
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\IUSR_NT-SERVER
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\IWAM_DCC1DW01
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\IWAM_DCH6NP01
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\IWAM_DEV
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\IWAM_NT-SERVER
Default Domain Controllers Policy ?Log on as a batch job ?EGIA\SQLServer2005MSSQLUser$BLUE$BKUPEXEC
Default Domain Controllers Policy ?Allow log on locally ?TsInternetUser
Default Domain Controllers Policy ?Allow log on locally ?BUILTIN\Account Operators
Default Domain Controllers Policy ?Allow log on locally ?Administrators
Default Domain Controllers Policy ?Allow log on locally ?BUILTIN\Backup Operators
Default Domain Controllers Policy ?Allow log on locally ?EGIA\Administrator
Default Domain Controllers Policy ?Allow log on locally ?Domain Administrators
Default Domain Controllers Policy ?Allow log on locally ?EGIA\ILS_ANONYMOUS_USER
Default Domain Controllers Policy ?Allow log on locally ?EGIA\IUSR_DCC1DW01
Default Domain Controllers Policy ?Allow log on locally ?EGIA\IUSR_DCH6NP01
Default Domain Controllers Policy ?Allow log on locally ?EGIA\IUSR_DEV
Default Domain Controllers Policy ?Allow log on locally ?EGIA\IUSR_NT-SERVER
Default Domain Controllers Policy ?Allow log on locally ?EGIA\IWAM_NT-SERVER
Default Domain Controllers Policy ?Allow log on locally ?EGIA\Oulook Web
Default Domain Controllers Policy ?Allow log on locally ?EGIA\TsInternetUser
Default Domain Controllers Policy ?Allow log on locally ?BUILTIN\Print Operators
Default Domain Controllers Policy ?Allow log on locally ?BUILTIN\Server Operators
Default Domain Controllers Policy ?Access this computer from the network ?Administrators
Default Domain Controllers Policy ?Access this computer from the network ?Authenticated Users
Default Domain Controllers Policy ?Access this computer from the network ?Everyone
Default Domain Controllers Policy ?Log on as a service ?EGIA\ADSyncMSA93402$
Default Domain Controllers Policy ?Log on as a service ?BUILTIN\Backup Operators
Default Domain Controllers Policy ?Log on as a service ?EGIA\Administrator

GPO Login script

A GPO login script is a way to force the execution of data on behalf of users. Only enabled users are analyzed.

GPO Deployed Files

A GPO can be used to deploy applications or copy files. These files may be controlled by a third party to control the execution of local programs.