SlideShare a Scribd company logo
Aldo Elam Majiah
Assessing Security of Active
Directory
Weak AD Implementation Relation to
People, Process, and Technology
AD Logical and Physical Structures
Components of Active Directory
AD Risk Assessment Framework
Result Example of AD Risk
Assessment for Company X
 Disable booting from alternative OS
 Upgrade to higher domain and forest functional level
 Create secondary DC
 Create computer-based OU
 Limit & control high privilege domain accounts
 Utilize the use of restricted groups
 Separate account for administrators
 Implement secure password policies
 Implement secure account lockout policies
 Perform regular AD backup
 Automatic patch management system
 Perform regular vulnerability assessment
 Uninstall unnecessary ports and services
 Create AD documentation
 Upgrade to secure protocols
Assessment List for Secure AD

More Related Content

PDF
Active Directory & LDAP | Security for Elasticsearch
PDF
Identity Security - Azure Active Directory
PDF
Access Security - Privileged Identity Management
PDF
Access Security - Hybrid Identity
PDF
Azure Active Directory
PPTX
Windows Azure Active Directory
PPTX
Azure Active Directory - An Introduction
PPTX
Azure Active Directory - An Introduction for Developers
Active Directory & LDAP | Security for Elasticsearch
Identity Security - Azure Active Directory
Access Security - Privileged Identity Management
Access Security - Hybrid Identity
Azure Active Directory
Windows Azure Active Directory
Azure Active Directory - An Introduction
Azure Active Directory - An Introduction for Developers

What's hot (20)

PPTX
Azure active directory
PPTX
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
PDF
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
PDF
Understanding Azure AD
PPTX
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
PDF
Data Security - Storage Security
PPTX
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
PPTX
Azure AD Presentation - @ BITPro - Ajay
PPTX
Global Azure Bootcamp 2017 - Azure Key Vault
PDF
Consolidating Infrastructure with Azure Kubernetes Service
PDF
Microsoft Azure Security Overview
PDF
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting y...
PPTX
Securing sensitive data with Azure Key Vault
PPTX
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
PPTX
Microsoft Azure Active Directory
PPT
Oracle Database Vault
PPTX
Protect Identities and Access to resources with Azure Active Directory
PPTX
Windows Server 2012 Active Directory Rights Management Services
PPTX
Identity Manager Opensource OpenIDM Architecture
PDF
Azure for beginners series session 4
Azure active directory
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...
Understanding Azure AD
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...
Data Security - Storage Security
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD Presentation - @ BITPro - Ajay
Global Azure Bootcamp 2017 - Azure Key Vault
Consolidating Infrastructure with Azure Kubernetes Service
Microsoft Azure Security Overview
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting y...
Securing sensitive data with Azure Key Vault
Microsoft Reactor Toronto 5/5/2020 | Azure Kubernetes In Action - Running and...
Microsoft Azure Active Directory
Oracle Database Vault
Protect Identities and Access to resources with Azure Active Directory
Windows Server 2012 Active Directory Rights Management Services
Identity Manager Opensource OpenIDM Architecture
Azure for beginners series session 4
Ad

Similar to Assessing security of your Active Directory (20)

PPT
200308 Active Directory Security
PPTX
Advancing Cloud Initiatives and Removing Barriers to Adoption
PPSX
KRYSTAL™ Document Management System - Enterprise Edition
PPTX
Introduction to the Microsoft Azure Cloud.pptx
PPTX
Enterprise Management with Microsoft Technologies
PPT
The client defined cloud final clementi
PPT
ISV Integrations
PPT
ISV Integrations
PPT
Qslabs And Ibm Systems
PPTX
Azure Operations Manager Suite
PPT
Eniac – Lotus Consolidation 2009
PDF
Logging and Automated Alerting Webinar.pdf
PPTX
Scalable Service Architectures
PPT
HMSC_AD Event V3
PPTX
CSC AWS re:Invent Enterprise DevOps session
PPT
Kluczowe elementy infrastruktury...
PPTX
Cloud Computing Models, Services, and Security.pptx
PPTX
Trivandrumtechcon20
PDF
Microsoft Azure Cloud Services
PDF
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
200308 Active Directory Security
Advancing Cloud Initiatives and Removing Barriers to Adoption
KRYSTAL™ Document Management System - Enterprise Edition
Introduction to the Microsoft Azure Cloud.pptx
Enterprise Management with Microsoft Technologies
The client defined cloud final clementi
ISV Integrations
ISV Integrations
Qslabs And Ibm Systems
Azure Operations Manager Suite
Eniac – Lotus Consolidation 2009
Logging and Automated Alerting Webinar.pdf
Scalable Service Architectures
HMSC_AD Event V3
CSC AWS re:Invent Enterprise DevOps session
Kluczowe elementy infrastruktury...
Cloud Computing Models, Services, and Security.pptx
Trivandrumtechcon20
Microsoft Azure Cloud Services
VMworld 2013: Moving Enterprise Application Dev/Test to VMware’s Internal Pri...
Ad

Recently uploaded (20)

PDF
Why DevOps Teams Are Dropping Spreadsheets for Real-Time Cloud Hygiene.pdf
PPT
chap9.New Product Development product lifecycle.ppt
PPTX
Daily stand up meeting on the various business
PDF
The Potential for EV Battery Recycling in Europe.pdf
DOC
BHCC毕业证学历认证,埃德蒙学院毕业证毕业证书样本
PPT
Organizational Culture and Management.ppt
PPTX
Transforming Finance with Ratiobox – Oracle NetSuite Bookkeeping & Accounting...
PDF
AI Cloud Sprawl Is Real—Here’s How CXOs Can Regain Control Before It Costs Mi...
PDF
Qloudhost DMACA ignored hosting provider
PPT
Chap8. Product & Service Strategy and branding
PDF
4. Finance for non-financial managers.08.08.2025.pdf
PPTX
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
PPTX
Structure of Organization in Professional Practices.pptx
PDF
india-2024-agrifoodtech-investment-report.pdf
DOC
NGU毕业证学历认证,阿肯色大学史密斯堡分校毕业证国外文凭
PPTX
Spread Maya's Sustainable Product Collection 2025.pptx
PPTX
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
PPTX
Introduction to Computing Profession.pptx
PDF
Captivating LED Visuals, Built to Impress Brightlink.pdf
PDF
Decision trees for high uncertainty decisions
Why DevOps Teams Are Dropping Spreadsheets for Real-Time Cloud Hygiene.pdf
chap9.New Product Development product lifecycle.ppt
Daily stand up meeting on the various business
The Potential for EV Battery Recycling in Europe.pdf
BHCC毕业证学历认证,埃德蒙学院毕业证毕业证书样本
Organizational Culture and Management.ppt
Transforming Finance with Ratiobox – Oracle NetSuite Bookkeeping & Accounting...
AI Cloud Sprawl Is Real—Here’s How CXOs Can Regain Control Before It Costs Mi...
Qloudhost DMACA ignored hosting provider
Chap8. Product & Service Strategy and branding
4. Finance for non-financial managers.08.08.2025.pdf
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
Structure of Organization in Professional Practices.pptx
india-2024-agrifoodtech-investment-report.pdf
NGU毕业证学历认证,阿肯色大学史密斯堡分校毕业证国外文凭
Spread Maya's Sustainable Product Collection 2025.pptx
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
Introduction to Computing Profession.pptx
Captivating LED Visuals, Built to Impress Brightlink.pdf
Decision trees for high uncertainty decisions

Assessing security of your Active Directory

  • 1. Aldo Elam Majiah Assessing Security of Active Directory
  • 2. Weak AD Implementation Relation to People, Process, and Technology
  • 3. AD Logical and Physical Structures
  • 5. AD Risk Assessment Framework
  • 6. Result Example of AD Risk Assessment for Company X  Disable booting from alternative OS  Upgrade to higher domain and forest functional level  Create secondary DC  Create computer-based OU  Limit & control high privilege domain accounts  Utilize the use of restricted groups  Separate account for administrators  Implement secure password policies  Implement secure account lockout policies  Perform regular AD backup  Automatic patch management system  Perform regular vulnerability assessment  Uninstall unnecessary ports and services  Create AD documentation  Upgrade to secure protocols