BETA
This is a BETA experience. You may opt-out by clicking here

More From Forbes

Edit Story

9 Best Practices To Secure Your Microsoft Active Directory

Forbes Business Development Council

Raj Parameswaran, MS (Computer Science), MBA, (Ph.D.) EVP and Chief Growth Officer Fulcrum Digital, NJ.

It's impossible to fully guarantee the safety of IT infrastructure against cyberattacks. Still, leaders can take initiative to prevent security breaches from occurring via the implementation of the right rules, procedures and security controls.

In this article, I will outline some guidelines which can help organizations optimize the security of their Active Directory. Using these recommendations, organizations can better identify and prioritize security activities, protect key segments of their computing infrastructure and establish controls to reduce the likelihood of successful attacks on critical components of their IT infrastructure.

I hope this article will provide some valuable insights for fellow leaders in its illustration of a few actions I recommend taking to safeguard your Active Directory, especially with regard to privileged users and administrators.

Let's break down some areas of risk.

Many organizations experience compromised security events due to having limited visibility into the most important security risks in their IT infrastructures, which can differ from the "as documented" conditions into which they have greater clarity. In addition, compromised security events by their nature can introduce new vulnerabilities, which not only increase risk but can also bring about a situation in which the attackers can leverage greater control over the environment. Here are nine ways to mitigate these occurrences.

1. Secure member servers and domain controllers.

For some companies, the applications and utilities deployed on member servers and installed on domain controllers operate simultaneously on both types of servers.

These applications are sometimes not necessary for the functionality of the domain controllers. This increases the attack surface because it requires configuration settings that open ports, often requiring highly privileged service accounts or the granting of access to the system by users who are not required to connect to a domain controller for any reason other than authentication.

Sometimes, attackers utilize tools previously accessible on installation as malware on domain controllers. These tools can enable access to the domain controllers and change the Active Directory database.

2. Optimize antivirus and antimalware configurations.

An antivirus program protects a computer's operating system against malicious software, including viruses, trojan horses and other forms of malware. If the software is not installed correctly, however, it can become misconfigured or even deactivated.

For some setups, antivirus software may be deactivated by administrative staff. In other instances, attackers are sometimes able to halt or disable a program after successfully seizing control of a server by exploiting weaknesses in the system. In the absence of security, attackers can place malware on the server, and their immediate attention will enable its rapid spread across other servers.

3. Implement strong patch and vulnerability management.

With an efficient patch management system in place for all operating systems and apps, most of your vulnerabilities can be repaired, resulting in a decrease in attack surface.

Patches for Microsoft's operating systems are typically available for download on the second Tuesday of every month. However, in exceptional circumstances, essential security updates may be made available at other times.

4. Assess Active Directory setups.

The accounts of users who are members of highly privileged groups, such as those who are members of the Domain Admins, Enterprise Admins or Administrator groups in AD, are the ones that malicious users most often target during an attack. Because of this, membership in these default groups needs to be scaled down to the fewest possible individuals to minimize the groups' potential points of vulnerability. If it is at all feasible, you should steer clear of permanent participation in these organizations. Instead, users should be recruited on a demand basis for a short period of time.

5. Restrict domain controllers' access to the internet.

The installation and setup of Internet Explorer or any other browser on domain controllers are one of the most important tests that must be performed. On domain controllers, web browsers can be either installed or configured so as to enable access to the internet. Restriction here can be crucial.

6. Implement least-privilege administrative models.

I advise configuring the administrator users with the fewest possible rights to reduce the potential for danger. Every person who logs in should only be granted the rights to do the tasks assigned to them. This can greatly reduce the likelihood of systems being compromised.

7. Educate your workers.

Employees that have access to Active Directory constitute a security risk to the companies that they work for. They might inadvertently click on phishing links or fall victim to scam emails, both of which can lead to the disclosure of sensitive corporate information. Therefore, it is essential to educate your IT staff as well as other users on how to recognize malware, phishing attacks and other forms of cybersecurity threats—and to provide them with the required security tools to guarantee that the systems are secured.

8. Consolidate the management and reporting of security incidents.

Install monitoring tools for Active Directory in order to centralize administration, monitoring and reporting. Establish specialized teams whose only responsibility will be the protection of Active Directory. These teams are able to gain technical knowledge and react more quickly to cyberattacks.

9. Implement Group Policy settings to deter security breaches.

By utilizing Group Policy settings, you are able to restrict user access to particular resources, execute scripts and carry out straightforward operations. These operations include compulsion of a specific home page to open for each user in the network, modification of the desktop and control over the access to administrative tools and the control panel. When properly implemented, Group Policy can be leveraged to prevent users from installing unwanted software and adjusting their operating systems to unacceptable levels.

Is your Active Directory efffectively secured?

Active Directory is an extremely important tool for businesses who wish to maintain the safety of their IT environment and discover any security breaches or attempts at infiltration before they can cause harm to the network. Defining the structure of the Active Directory and ensuring that everything operates as it should can be a difficult and time-consuming process but a crucial investment in your company's security.


Forbes Business Development Council is an invitation-only community for sales and biz dev executives. Do I qualify?


Follow me on LinkedInCheck out my website