SlideShare a Scribd company logo
Click to edit Master title style
Protecting Windows Passwords
2
• Derek Melber, MCSE & MVP (Group Policy and AD)
• derek@manageengine.com
• www.auditingwindowsexpert.com
• Online Resources
• ManageEngine Active Directory Blog
• Group Policy Resource Kit – MSPress
• Windows Security Audit Package Consulting
• Active Directory/Windows Audit Program
• Training for efficient auditing
• Administration Consultant
• Active Directory and Server Design/Security
• Active Directory and Group Policy Design
About Your Speaker
3
• Malicious applications
• Viruses
• Worms
• Malware
• Phishing attacks
• Ransomware attacks
• Password attacks
• Brute Force
• Rainbow Tables
• Pass the Hash
Windows Computer Attacks
4
• Deleting SAM
• Dual Boot Scenarios
• Social Engineering
• Impersonate another person or company
• Barter
• Guessing
• Cracking
• Captured challenge-response pairs
• Locally-stored hashes
Password Attacks
5
Access:
Users and
Workstations
Power:
Domain
Controllers
Data:
Servers and
Applications
Pass The Hash (PtH) Attack
1. Bad guy targets workstations en
masse
2. User running as local admin
compromised, Bad guy harvests
credentials.
3. Bad guy starts “credentials
crabwalk”
4. Bad guy finds host with domain
privileged credentials, steals, and
elevates privileges
5. Bad guy owns network, can harvest
what he wants.
6
• Attacker must gain local admin privileges
• Attacker must have a connection to the computer
• The attack can’t be 100% prohibited!
PtH Attack
7
• Restrict and protect high privileged domain accounts
• Configure with long, strong, complex password
• Use dual accounts
• Restrict User Rights
• Restrict where these accounts can logon
• Configure “Sensitive and cannot be delegated”
• Do not use as service accounts or scheduled tasks
Mitigation #1
8
• Remove standard users from the local Administrators
group
• Ensure all applications run as standard user
• Deploy new software and updates without administrative
rights
• Obtain software to allow apps/features to run, even though
user is standard user (Viewfinity)
Mitigation #2
9
• Restrict and protect local accounts with administrative
privileges
• Disable the local Administrator account
• Do not use the same password on multiple computers
• Configure User Rights
• Restrict from remote administration
• Restrict from network access
Mitigation #3
10
• Don’t use the same password on workstations, servers,
domain
• Don’t allow every workstation to use the same local admin
password
• Reset passwords often (even Admins)
• Don’t use the same password for workstations and servers
• Use password vault and change passwords often for domain
admin behavior
Mitigation #4
11
• Restrict inbound traffic using the Windows Firewall
• Restrict all inbound connections to all workstations except for
those with expected traffic
• Configure trusted sources
• Help desk
• Workstations
• Scanners
• Management servers
Mitigation #5
12
• Do not allow browsing the Internet with highly
privileged accounts
• Configure User Account Control at highest level
• Configure outbound proxies to deny Internet access to
privileged accounts
• Ensure administrative accounts do not have email accounts or
mailboxes associated with them
Mitigation #6
13
• Update applications and operating systems
• Use Microsoft WSUS
• Use Microsoft SCCM
• Obtain software to verify current vulnerabilities
Mitigation #7
14
• Limit the number of privileged domain accounts
• Restrict access to default groups with elevated privileges
• Enterprise Admins
• Schema Admins
• Domain Admins
• Administrators
• DNS Admins
• DHCP Admins
• Group Policy Creator Owners
• Backup Operators
• Account Operators
Mitigation #8
15
• Secure Domain Controllers
• Reduce number of applications installed
• Physical security
• Ensure User Rights are configured properly
• Restrict Anonymous access
Mitigation #9
16
• Remove LM Hashes
• Will not store LM hash with user account
• Local SAM
• Active Directory
• If user DB is compromised, LM hash is not there
Mitigation #10
17
• Disabled LM and NTLM
• Will deny these authentication protocols from being used
• Will deny interception of the LM and NTLM hashes
Mitigation #11
18
• Workstations Setting Configured for Service Accounts
• Limits which computers user can logon to
• Restricts from logging on to any other computer
• Set in user account properties
Mitigation #12
19
• Don’t Allow Service Accounts to Reset Own Password
• Only an administrator can reset the password
• Denies the user (or attacker) from resetting password
• Set in user account properties
Mitigation #13
20
• Reset Passwords for ALL User Accounts
• Normal users should change password every 60 to 180 days
• Depends on compliance regulations
• Depends on password structure
• Administrators should change password every 60 to 180 days
• Service Accounts should have password changed every 180 to
360 days
Mitigation #14
Click to edit Master title style
Questions?
Thank you!

More Related Content

PPTX
Decrypting the security mystery with SIEM (Part 1) ​
PPTX
7 tips to simplify Active Directory Management ​
PPTX
Overcoming the challenges of Office 365 user management in hybrid environments​
PPTX
Active Directory security and compliance: Comprehensive reporting for key sec...
PPTX
Change Monitoring of Active Directory
PPTX
Self-service password management and single sign-on for on-premises AD and cl...
PPTX
Controlling Delegation of Windows Servers and Active Directory
PDF
Bright talk mapping the right aut solution for you 2014 final (1)
Decrypting the security mystery with SIEM (Part 1) ​
7 tips to simplify Active Directory Management ​
Overcoming the challenges of Office 365 user management in hybrid environments​
Active Directory security and compliance: Comprehensive reporting for key sec...
Change Monitoring of Active Directory
Self-service password management and single sign-on for on-premises AD and cl...
Controlling Delegation of Windows Servers and Active Directory
Bright talk mapping the right aut solution for you 2014 final (1)

What's hot (18)

PPTX
The Future of integrated Identity and Access Management
PPTX
Geek Sync | Handling HIPAA Compliance with Your Data Access
PPTX
Brian Desmond - Quickly and easily protect your applications and services wit...
PPTX
Office Track: SharePoint Apps for the IT Pro - Thomas Vochten
PPTX
Azure SQL DB V12 at your service by Pieter Vanhove
PPTX
Jsm computer solutions
PDF
Data Architecture not Just for Microservices
PDF
SCUGBE_Lowlands_Unite_2017_1E tachyon
PPTX
Discover365 Integration Presentation
PDF
Password Express - Data Sheet
PPTX
gkkCloudtechnologyassociate(cta)day 2
PDF
Cache Security- Adding Security to Non-Secure Applications
PDF
Office 365 cloud principles
PPTX
Dell Password Manager Introduction
PDF
Nicolas destor pres_f5agility2018
PPTX
Azure conditional access
PPTX
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
PPTX
CIS bench marks for public clouds
The Future of integrated Identity and Access Management
Geek Sync | Handling HIPAA Compliance with Your Data Access
Brian Desmond - Quickly and easily protect your applications and services wit...
Office Track: SharePoint Apps for the IT Pro - Thomas Vochten
Azure SQL DB V12 at your service by Pieter Vanhove
Jsm computer solutions
Data Architecture not Just for Microservices
SCUGBE_Lowlands_Unite_2017_1E tachyon
Discover365 Integration Presentation
Password Express - Data Sheet
gkkCloudtechnologyassociate(cta)day 2
Cache Security- Adding Security to Non-Secure Applications
Office 365 cloud principles
Dell Password Manager Introduction
Nicolas destor pres_f5agility2018
Azure conditional access
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
CIS bench marks for public clouds
Ad

Viewers also liked (8)

PPTX
Decrypting the security mystery with SIEM (Part 2) ​
PDF
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
PDF
Effective User Life Cycle Management in Active Directory
PPTX
CTU June 2011 - Guided Hands on Lab on GPO - GPP
 
PPTX
12 Crucial Windows Security Skills for 2017
PDF
Cyber Security 2017 Challenges
PPTX
You've Been Breached: How To Mitigate The Incident
PDF
Digital transformation in 50 soundbites
Decrypting the security mystery with SIEM (Part 2) ​
1200+ sighs of relief for the IT department at City of Grand Rapids - ADSelfS...
Effective User Life Cycle Management in Active Directory
CTU June 2011 - Guided Hands on Lab on GPO - GPP
 
12 Crucial Windows Security Skills for 2017
Cyber Security 2017 Challenges
You've Been Breached: How To Mitigate The Incident
Digital transformation in 50 soundbites
Ad

Similar to Protecting Windows Passwords and Preventing Windows Computer / Password Attacks (20)

PPTX
Naked and Vulnerable - A Cybersecurity Starter Kit from Camp IT Dec 2016
PPT
Windows network
PPTX
AZ-801T00A Configuring Windows Server Hybrid Advanced Services.pptx
PDF
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
PPT
Windows network security
PDF
The Infosec Revival
PPTX
A.Group Policy and group policy obj.pptx
PPTX
HARDENING OF WINDOWS 10 OS.pptx
PPTX
Securing Windows with Group Policy
PPT
Windows Security in Operating System
PPTX
Creating a fortress in your active directory environment
DOCX
Windows10Security
PDF
3 windowssecurity
PDF
OS-Anatomy-Article
PPTX
Secure Active Directory in one Day Without Spending a Single Dollar
PDF
Windows Security Crash Course
PDF
10 Steps to Better Windows Privileged Access Management
PDF
Gartner Security & Risk Management Summit 2018
PPTX
Presentation for information security & hacking
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
Naked and Vulnerable - A Cybersecurity Starter Kit from Camp IT Dec 2016
Windows network
AZ-801T00A Configuring Windows Server Hybrid Advanced Services.pptx
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
Windows network security
The Infosec Revival
A.Group Policy and group policy obj.pptx
HARDENING OF WINDOWS 10 OS.pptx
Securing Windows with Group Policy
Windows Security in Operating System
Creating a fortress in your active directory environment
Windows10Security
3 windowssecurity
OS-Anatomy-Article
Secure Active Directory in one Day Without Spending a Single Dollar
Windows Security Crash Course
10 Steps to Better Windows Privileged Access Management
Gartner Security & Risk Management Summit 2018
Presentation for information security & hacking
The hacker playbook: How to think and act like a cybercriminal to reduce risk...

More from Zoho Corporation (19)

PPTX
One portal for all your login needs - ADSelfService Plus Single sign-on.
PDF
Using indicators to deal with security attacks
PPTX
Ensuring security and consistency of users' self-service actions in Active Di...
PPTX
Empowering ServiceNow help desk for Active Directory management
PPTX
WannaCry Ransomware
PPTX
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
PDF
ALIGN Technology timely alerts its employees of their password expiry using A...
PDF
Unisource Worldwide Inc - An ADSelfservice Plus Case study
PDF
Case study-self-password-management-camh
PDF
Case study-administrative-office-schwarzwald-baar-kreis
PDF
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
PDF
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
PDF
Indispensable tool to help with Password Reset Issues
PDF
ADManager Plus Makes Admissions A CakeWalk For College Montmorency
PDF
Helpdesk delegation
PDF
How ADManager Plus helped a local govt. wipe out stale accounts from its AD
PDF
HomeBanc trusts ManageEngine ADSelfService Plus to resolve its Password expir...
PDF
Password Reset Issues Effectively Solved
PDF
ADManager Plus helps City of Warsaw with comprehensive management of active d...
One portal for all your login needs - ADSelfService Plus Single sign-on.
Using indicators to deal with security attacks
Ensuring security and consistency of users' self-service actions in Active Di...
Empowering ServiceNow help desk for Active Directory management
WannaCry Ransomware
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
ALIGN Technology timely alerts its employees of their password expiry using A...
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Case study-self-password-management-camh
Case study-administrative-office-schwarzwald-baar-kreis
Skorpion Zinc's loves 'Password Self-Service' & 'Profile Update' features of ...
Hampshire Collegiate Schools uses ManageEngine ADSelfService Plus password ma...
Indispensable tool to help with Password Reset Issues
ADManager Plus Makes Admissions A CakeWalk For College Montmorency
Helpdesk delegation
How ADManager Plus helped a local govt. wipe out stale accounts from its AD
HomeBanc trusts ManageEngine ADSelfService Plus to resolve its Password expir...
Password Reset Issues Effectively Solved
ADManager Plus helps City of Warsaw with comprehensive management of active d...

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
A Presentation on Artificial Intelligence
PDF
KodekX | Application Modernization Development
 
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Modernizing your data center with Dell and AMD
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
Dropbox Q2 2025 Financial Results & Investor Presentation
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
 
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Monthly Chronicles - July 2025
Empathic Computing: Creating Shared Understanding
Modernizing your data center with Dell and AMD
The Rise and Fall of 3GPP – Time for a Sabbatical?
 

Protecting Windows Passwords and Preventing Windows Computer / Password Attacks

  • 1. Click to edit Master title style Protecting Windows Passwords
  • 2. 2 • Derek Melber, MCSE & MVP (Group Policy and AD) • derek@manageengine.com • www.auditingwindowsexpert.com • Online Resources • ManageEngine Active Directory Blog • Group Policy Resource Kit – MSPress • Windows Security Audit Package Consulting • Active Directory/Windows Audit Program • Training for efficient auditing • Administration Consultant • Active Directory and Server Design/Security • Active Directory and Group Policy Design About Your Speaker
  • 3. 3 • Malicious applications • Viruses • Worms • Malware • Phishing attacks • Ransomware attacks • Password attacks • Brute Force • Rainbow Tables • Pass the Hash Windows Computer Attacks
  • 4. 4 • Deleting SAM • Dual Boot Scenarios • Social Engineering • Impersonate another person or company • Barter • Guessing • Cracking • Captured challenge-response pairs • Locally-stored hashes Password Attacks
  • 5. 5 Access: Users and Workstations Power: Domain Controllers Data: Servers and Applications Pass The Hash (PtH) Attack 1. Bad guy targets workstations en masse 2. User running as local admin compromised, Bad guy harvests credentials. 3. Bad guy starts “credentials crabwalk” 4. Bad guy finds host with domain privileged credentials, steals, and elevates privileges 5. Bad guy owns network, can harvest what he wants.
  • 6. 6 • Attacker must gain local admin privileges • Attacker must have a connection to the computer • The attack can’t be 100% prohibited! PtH Attack
  • 7. 7 • Restrict and protect high privileged domain accounts • Configure with long, strong, complex password • Use dual accounts • Restrict User Rights • Restrict where these accounts can logon • Configure “Sensitive and cannot be delegated” • Do not use as service accounts or scheduled tasks Mitigation #1
  • 8. 8 • Remove standard users from the local Administrators group • Ensure all applications run as standard user • Deploy new software and updates without administrative rights • Obtain software to allow apps/features to run, even though user is standard user (Viewfinity) Mitigation #2
  • 9. 9 • Restrict and protect local accounts with administrative privileges • Disable the local Administrator account • Do not use the same password on multiple computers • Configure User Rights • Restrict from remote administration • Restrict from network access Mitigation #3
  • 10. 10 • Don’t use the same password on workstations, servers, domain • Don’t allow every workstation to use the same local admin password • Reset passwords often (even Admins) • Don’t use the same password for workstations and servers • Use password vault and change passwords often for domain admin behavior Mitigation #4
  • 11. 11 • Restrict inbound traffic using the Windows Firewall • Restrict all inbound connections to all workstations except for those with expected traffic • Configure trusted sources • Help desk • Workstations • Scanners • Management servers Mitigation #5
  • 12. 12 • Do not allow browsing the Internet with highly privileged accounts • Configure User Account Control at highest level • Configure outbound proxies to deny Internet access to privileged accounts • Ensure administrative accounts do not have email accounts or mailboxes associated with them Mitigation #6
  • 13. 13 • Update applications and operating systems • Use Microsoft WSUS • Use Microsoft SCCM • Obtain software to verify current vulnerabilities Mitigation #7
  • 14. 14 • Limit the number of privileged domain accounts • Restrict access to default groups with elevated privileges • Enterprise Admins • Schema Admins • Domain Admins • Administrators • DNS Admins • DHCP Admins • Group Policy Creator Owners • Backup Operators • Account Operators Mitigation #8
  • 15. 15 • Secure Domain Controllers • Reduce number of applications installed • Physical security • Ensure User Rights are configured properly • Restrict Anonymous access Mitigation #9
  • 16. 16 • Remove LM Hashes • Will not store LM hash with user account • Local SAM • Active Directory • If user DB is compromised, LM hash is not there Mitigation #10
  • 17. 17 • Disabled LM and NTLM • Will deny these authentication protocols from being used • Will deny interception of the LM and NTLM hashes Mitigation #11
  • 18. 18 • Workstations Setting Configured for Service Accounts • Limits which computers user can logon to • Restricts from logging on to any other computer • Set in user account properties Mitigation #12
  • 19. 19 • Don’t Allow Service Accounts to Reset Own Password • Only an administrator can reset the password • Denies the user (or attacker) from resetting password • Set in user account properties Mitigation #13
  • 20. 20 • Reset Passwords for ALL User Accounts • Normal users should change password every 60 to 180 days • Depends on compliance regulations • Depends on password structure • Administrators should change password every 60 to 180 days • Service Accounts should have password changed every 180 to 360 days Mitigation #14
  • 21. Click to edit Master title style Questions? Thank you!