SlideShare a Scribd company logo
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
The Night is Dark and full of
Hackers: Security Tips & Tricks
from Beyond the Wall
AKA: ”Security affordable – this is how I do it!”
2
Sami Laiho
Senior Technical Fellow
adminize.com
• IT Admin since 1996
• MVP in Windows OS since 2011
• Specializes in and trains:
• Troubleshooting
• Security
• Windows Internals
• Trophies:
• Best and 3rd session at MCT Summit 2018
• Best two Sessions at IGNITE 2018! (out of 1708 session in total)
• Best Session at AppManagEvent 2017 and 2018, Utrecht
• Best External Speaker at Ignite 2017
• Best Sessions (#1 and #2) at TechTalks 2017, Helsinki
• TechDays Sweden 2016 – Best Speaker
• NIC 2016, 2017 - Best Speaker
• Ignite 2015 – Best male presenter ;) (#2 out of 1000 speakers)
• TechEd Europe and North America 2014 - Best session, Best
speaker
I got Certs
1,2 kilos of
them
• Established in 1983
• Just Me, Myself and I
• We deliver:
• Training!
• Private classes anywhere in the World!
• Around 1000€/1200$ per head for 4 days
• Security Audit for Windows environments
• Two days onsite/online
• Two days of reporting/documenting offsite
• 10000€/12000$
• AppLocker/Whitelisting implementation
• 10000€/12000$ + t&e
• Takes around 4 days
• VoD Training
• https://win-fu.com/dojo
• Best at a very cheap price!
• I deliver training through PluralSight as well but not the
same content
Adminize.com
Windows XP Deep Dive in 2001
• sami@adminize.com
• Twitter: @samilaiho
• Blog: http://blog.win-fu.com/
• Free newsletter:
http://eepurl.com/F-GOj
Contact
@samilaiho
If you are not on Twitter – get on Twitter!
9
Security is a compromise
Secure
Most Important Rules in Windows Security
• You have no security in Windows unless
• You have Full Disk Encryption
• You follow the Principle of Least Privilege
Gartner, NIST and others
• Say that the most important security feature to implement in 2018 is
Whitelisting
• #2 is Principle of Least Privilege
• #3 is Hard Disk Encryption
12
Choosing the correct hardware
13
Choosing Harware
• 64-bit
• UEFI with SecureBoot
• Virtualization support: Intel VT or
AMD-V
• SLAT: Intel EPT or AMD RVI
• TPM
• 1.2 ok for Windows 7
• 2.0 for Windows 10 is better
• DMA-ports?
• No on Windows 7
• TB3 on Windows 10 is OK
• Nice to have:
• IO-MMU
• Intel VT-d or AMD-Vi
• I would require:
• PXE boot available and ON
• Virtualization and TPM ON
• For Windows 7 SecureBoot OFF
14
Operating System
• I would go for Windows 10 Enterprise if I can choose
• SecureKernel stuff like Credential Guard, Device Guard
• Windows Defender Application Guard
• AppLocker
• Windows 7 Enteprise is fine as well
• General rule: get the hell away from Windows 8 and 8.1
15
Network Infrastructure
• Managed network devices that are easy to manage and monitor
• Meraki (Awesome if money is no object)
• Unifi (I’m in love with these because of the price)
• I prefer my devices to connect to corporate network with Direct
Access
• BUT…
16
AD-infrastructure
• Domain names
• No company name
• TLD to be .local or .ds
• Always build two DFS-roots
• One for shares used by users
• One for IT’s needs and AD’s use
• If you have insecure remote locations use RODC
• Use Redircmp and Redirusr
17
Applying Principle of Least
Privilege
18
Admin Access
• No end user get admin access to their device
• Not the Boss, not the girlfriend and not the devs
• No IT-admin interactively logs on to their box with an administrative
account
• They use Runas-solutions like UAC
19
Avecto DefendPoint
• You can
• Auto elevate
• Auto elevate with a warning
• Auto elevate with a question for reason
• Elevate with a managers approval
• Elevate with a challenge code
20
Examples
• Applications that require admin rights
• Updating things you don’t have to time manage
• IP-addresses and Networking
• Joining the domain
• Hyper-V Management
• Visual Studio
21
Extra from Avecto
• Whitelisting is better than AppLocker
• Better pinpointing at a task
• Grey list
• Better messaging
• Sandboxing for browsers
• Neat but not without some problems
• No admin + good whitelisting = very little need for this…
22
Administering local admin
accounts
23
Randomizing Passwords
• LAPS is fine
• Randomizes passwords
• AD-Domains only
• Needs online access to AD
• Doesn’t change password based on usage
• This is a good thing for some people
• I use Adminizer ;)
• Randomizes passwords
• Workgroups, Azure AD, BYOD etc.
• Totally Offline and self-sufficient
• Changes password both based on usage and based on time
24
Other stuff
• I let the local Administrator be named Administrator as it will anyway
have the same SID
• I don’t intentionally disable them either
• Guest I disable but don’t rename
25
Using AD administrative accounts
(Domain, Enterprise, Schema)
26
Enterprise and Schema Admins
• These group are and stay empty
• Only added a domain admin user when needed
• If you doubt yourself or colleagues just create a scheduled task on a
DC to clear them
• Schema Admins are only needed when changing the schema
• Enterprise Admins are needed mainly for
• DHCP authorize
• Adding or removing domains
• Site applied GPOs
27
Domain Admins
• Only used for administering DC’s or AD
• Remember to administer from an administration Work Station or Server –
NOT BY LOGGING ON TO A DC!!
• Are denied from logging on to anywhere else but Domain Controllers
– By Policy!
28
Mitigating PtH?
• Split your environment into three layers
• Never allow higher layer admins to logon to lower layers
Power
(DCs)
Data (Servers and
Apps)
Access (Endpoints)
Domain Admins
Server Admins Workstation Admins
Recommended settings for
BitLocker
30
BitLocker
• BitLocker on all machines that are outside of the server rooms
• Unless you can’t trust your admins → Include Servers
• Aim for TPM only
• Make sure your recovery keys are stored in AD
• Increase encryption to 256 with a diffuser
31
BitLocker FlowChart by me
• http://win-fu.com/files/TPM-FlowchartV3.pdf
32
Recommended settings for UAC
33
Normal UAC
• No changes to security needed but I always disable UAC Virtualization
34
High Secure UAC
• Change the prompt for UAC to ask for credentials for admins
• Kills all BadUSB and Rubber Ducky –attacks
• Also disable UAC virtualization
35
Recommended settings for
AppLocker, SRP or other
whitelisting
36
My own device
• Relies on the knowledge of the user
37
My customer devices
• Basic rules + AccessChk revealed exceptions
• Use certificates if you can (and trust the company)
• Then add required network locations with
• UNC
• IP
• FQDN
• Then add local applications outside of the default folders with Certs,
Folders (if they can be blocked from writing to by limited users)
• Problematic ones
• Self-updating, not signed and stored in users profile
38
Recommended settings for Share
permissions
39
Share settings are easy
• Always change two things
1. Block Offline use by default
2. EVERYONE – FULL CONTROL
• NTFS-ACL’s are always more granular and better
• I won’t kill you if you want to set different for user redirected folders
• EVERYONE – CHANGE
• Blocks users from sharing their files with other as they will by default get Full
Control to these
40
Recommended settings for builtin
certificates
41
EFS
• Remember to replace the default Administrator certificate from your
CA
42
Recommended settings for AV
and Firewalls
43
Things to note about Defender
• Only things that Defender can’t do
• Centralized Reporting
• Centralized Management
• Talk to the Firewall
• We can say that the engine of Defender is just fine
• 1% more found malware in tests currently means 10000 malware samples that were
not detected → Basically useless!
• I choose by
• The size of the wallet
• Burden on the OS
• Honestly:
• If you have System Center use SCEP
• Take a look at ATP!
44
Recommended settings for IPsec
45
How I use IPsec
• Require Inbound, Request Outbound
• Kerberos for users and computers
• Exclude DC’s and hard cases – You don’t need to get to 100%!
• Buy printers (etc) that can have a certificate if possible
46
Common recommendations for
Windows Security
47
Group Policies and Security
Policies
48
My Policies
• Document with the Group Policy Settings Reference
• Many policies are not needed anymore for most, like:
• Always wait for the network on startup and logon
• Disable System Restore
• I nowadays try to avoid GPUPDATE /FORCE by changing group policy
CSE’s to process even if the policy has not changed
• For troubleshooting I always change a few things as well:
49
Detailed error messages
50
Ability to read RSOP data
51
Password Policies
52
End User Training on Good Passwords
• For everyone
• Minimum length of 8 characters (but don’t advertise this)
• Complexity required
• Numbers
• at the beginning and end
OR
• in the middle
• For important users like admins it’s
• Minimum length of 15 characters
53
End User Training on Good Passwords
• Show people http://haveibeenpwned.com/ and teach to use different
passwords on every site
• Like
• Flower10SkypeGrows!
• Flower10DropbGrows!
• Massively10HardIL
• Massively10HardPO
• Massively10HardBM
54
Implement PAWs
55
https://www.cisecurity.org/controls/
• Block 97% of threats
Contact
• sami@adminize.com
• Twitter: @samilaiho
• Blog: http://blog.win-fu.com/
• Free newsletter:
http://eepurl.com/F-GOj
• Video-based training:
• http://www.pluralsight.com/
• Want free codes? Email me!
• NOW: http://win-fu.com/dojo
•Trial2018

More Related Content

PDF
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
PDF
Iaas paas saas
PPTX
C10k and beyond - Uri Shamay, Akamai
PPTX
Docker Container Security
PPT
Ansible presentation
PDF
Introducing Saga Pattern in Microservices with Spring Statemachine
PDF
PPTX
Stability Patterns for Microservices
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Iaas paas saas
C10k and beyond - Uri Shamay, Akamai
Docker Container Security
Ansible presentation
Introducing Saga Pattern in Microservices with Spring Statemachine
Stability Patterns for Microservices

What's hot (20)

PDF
Docker 101 - Getting started
PPTX
What's new in Oracle 19c & 18c Recovery Manager (RMAN)
PDF
Ansible
PPTX
Big Data Platform at Pinterest
PDF
codecentric AG: CQRS and Event Sourcing Applications with Cassandra
PPTX
Docker Basics
PDF
Grokking Techtalk #39: How to build an event driven architecture with Kafka ...
PDF
Von A bis Z-itrix: Installieren Sie den stabilsten und schnellsten HCL Notes-...
PPTX
Understand oracle real application cluster
PDF
Dockerfile Tutorial with Example | Creating your First Dockerfile | Docker Tr...
ODP
Low level java programming
PPTX
Containerization & Docker - Under the Hood
PDF
Partitioning tables and indexing them
PDF
Leveraging Docker for Hadoop build automation and Big Data stack provisioning
PDF
Service discovery with Eureka and Spring Cloud
PPTX
Monitor Cloud Resources using Alerts & Insights
PDF
Azure sql database limitations
PPTX
Demystifying flink memory allocation and tuning - Roshan Naik, Uber
PDF
GCP - GCE, Cloud SQL, Cloud Storage, BigQuery Basic Training
PPTX
Kubernetes Architecture v1.x
Docker 101 - Getting started
What's new in Oracle 19c & 18c Recovery Manager (RMAN)
Ansible
Big Data Platform at Pinterest
codecentric AG: CQRS and Event Sourcing Applications with Cassandra
Docker Basics
Grokking Techtalk #39: How to build an event driven architecture with Kafka ...
Von A bis Z-itrix: Installieren Sie den stabilsten und schnellsten HCL Notes-...
Understand oracle real application cluster
Dockerfile Tutorial with Example | Creating your First Dockerfile | Docker Tr...
Low level java programming
Containerization & Docker - Under the Hood
Partitioning tables and indexing them
Leveraging Docker for Hadoop build automation and Big Data stack provisioning
Service discovery with Eureka and Spring Cloud
Monitor Cloud Resources using Alerts & Insights
Azure sql database limitations
Demystifying flink memory allocation and tuning - Roshan Naik, Uber
GCP - GCE, Cloud SQL, Cloud Storage, BigQuery Basic Training
Kubernetes Architecture v1.x

Similar to CSF18 - The Night is Dark and Full of Hackers - Sami Laiho (20)

PDF
Dakotacon 2017
PPT
1 - Introduction.ppt
PDF
CSF18 - GDPR - Sami Laiho
PDF
CSF18 - BitLocker Deep Dive - Sami Laiho
PPTX
Lecture 12 monitoring the network
PPTX
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
PPTX
Заполучили права администратора домена? Игра еще не окончена
PDF
Deploying Privileged Access Workstations (PAWs)
PPTX
Securing Windows with Group Policy
PPT
W982 05092004
PPTX
Pentest Apocalypse - SANSFIRE 2016 Edition
PPTX
Windows 7 professional Vs Windows 7 enterprise
PPTX
Securing the cloud and your assets
PPTX
Soccnx10: Best and worst practices deploying IBM Connections
PPTX
IBM Lotus Notes Client Management Done Right – Beginning to End
PDF
IBM Connect 2017: Back from the Dead: When Bad Code Kills a Good Server
PPTX
Domain Controller.pptx
PDF
Frokost seminar windows 8 februar 2013
PPTX
Cisco umbrella youtube
PPTX
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
Dakotacon 2017
1 - Introduction.ppt
CSF18 - GDPR - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
Lecture 12 monitoring the network
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Заполучили права администратора домена? Игра еще не окончена
Deploying Privileged Access Workstations (PAWs)
Securing Windows with Group Policy
W982 05092004
Pentest Apocalypse - SANSFIRE 2016 Edition
Windows 7 professional Vs Windows 7 enterprise
Securing the cloud and your assets
Soccnx10: Best and worst practices deploying IBM Connections
IBM Lotus Notes Client Management Done Right – Beginning to End
IBM Connect 2017: Back from the Dead: When Bad Code Kills a Good Server
Domain Controller.pptx
Frokost seminar windows 8 februar 2013
Cisco umbrella youtube
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup

More from NCCOMMS (20)

PDF
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
PDF
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
PDF
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
PDF
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
PDF
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
PDF
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
PDF
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
PDF
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
PDF
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
PDF
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
PDF
O365Con19 - Azure Blackbelt - Jussi Roine
PDF
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
PDF
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
PDF
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
PDF
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
PDF
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
PDF
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
PDF
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
PDF
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
PDF
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Modernizing your data center with Dell and AMD
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Modernizing your data center with Dell and AMD
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Monthly Chronicles - July 2025
Big Data Technologies - Introduction.pptx

CSF18 - The Night is Dark and Full of Hackers - Sami Laiho

  • 2. The Night is Dark and full of Hackers: Security Tips & Tricks from Beyond the Wall AKA: ”Security affordable – this is how I do it!” 2
  • 3. Sami Laiho Senior Technical Fellow adminize.com • IT Admin since 1996 • MVP in Windows OS since 2011 • Specializes in and trains: • Troubleshooting • Security • Windows Internals • Trophies: • Best and 3rd session at MCT Summit 2018 • Best two Sessions at IGNITE 2018! (out of 1708 session in total) • Best Session at AppManagEvent 2017 and 2018, Utrecht • Best External Speaker at Ignite 2017 • Best Sessions (#1 and #2) at TechTalks 2017, Helsinki • TechDays Sweden 2016 – Best Speaker • NIC 2016, 2017 - Best Speaker • Ignite 2015 – Best male presenter ;) (#2 out of 1000 speakers) • TechEd Europe and North America 2014 - Best session, Best speaker
  • 6. • Established in 1983 • Just Me, Myself and I • We deliver: • Training! • Private classes anywhere in the World! • Around 1000€/1200$ per head for 4 days • Security Audit for Windows environments • Two days onsite/online • Two days of reporting/documenting offsite • 10000€/12000$ • AppLocker/Whitelisting implementation • 10000€/12000$ + t&e • Takes around 4 days • VoD Training • https://win-fu.com/dojo • Best at a very cheap price! • I deliver training through PluralSight as well but not the same content Adminize.com
  • 7. Windows XP Deep Dive in 2001
  • 8. • sami@adminize.com • Twitter: @samilaiho • Blog: http://blog.win-fu.com/ • Free newsletter: http://eepurl.com/F-GOj Contact
  • 9. @samilaiho If you are not on Twitter – get on Twitter! 9
  • 10. Security is a compromise Secure
  • 11. Most Important Rules in Windows Security • You have no security in Windows unless • You have Full Disk Encryption • You follow the Principle of Least Privilege
  • 12. Gartner, NIST and others • Say that the most important security feature to implement in 2018 is Whitelisting • #2 is Principle of Least Privilege • #3 is Hard Disk Encryption 12
  • 13. Choosing the correct hardware 13
  • 14. Choosing Harware • 64-bit • UEFI with SecureBoot • Virtualization support: Intel VT or AMD-V • SLAT: Intel EPT or AMD RVI • TPM • 1.2 ok for Windows 7 • 2.0 for Windows 10 is better • DMA-ports? • No on Windows 7 • TB3 on Windows 10 is OK • Nice to have: • IO-MMU • Intel VT-d or AMD-Vi • I would require: • PXE boot available and ON • Virtualization and TPM ON • For Windows 7 SecureBoot OFF 14
  • 15. Operating System • I would go for Windows 10 Enterprise if I can choose • SecureKernel stuff like Credential Guard, Device Guard • Windows Defender Application Guard • AppLocker • Windows 7 Enteprise is fine as well • General rule: get the hell away from Windows 8 and 8.1 15
  • 16. Network Infrastructure • Managed network devices that are easy to manage and monitor • Meraki (Awesome if money is no object) • Unifi (I’m in love with these because of the price) • I prefer my devices to connect to corporate network with Direct Access • BUT… 16
  • 17. AD-infrastructure • Domain names • No company name • TLD to be .local or .ds • Always build two DFS-roots • One for shares used by users • One for IT’s needs and AD’s use • If you have insecure remote locations use RODC • Use Redircmp and Redirusr 17
  • 18. Applying Principle of Least Privilege 18
  • 19. Admin Access • No end user get admin access to their device • Not the Boss, not the girlfriend and not the devs • No IT-admin interactively logs on to their box with an administrative account • They use Runas-solutions like UAC 19
  • 20. Avecto DefendPoint • You can • Auto elevate • Auto elevate with a warning • Auto elevate with a question for reason • Elevate with a managers approval • Elevate with a challenge code 20
  • 21. Examples • Applications that require admin rights • Updating things you don’t have to time manage • IP-addresses and Networking • Joining the domain • Hyper-V Management • Visual Studio 21
  • 22. Extra from Avecto • Whitelisting is better than AppLocker • Better pinpointing at a task • Grey list • Better messaging • Sandboxing for browsers • Neat but not without some problems • No admin + good whitelisting = very little need for this… 22
  • 24. Randomizing Passwords • LAPS is fine • Randomizes passwords • AD-Domains only • Needs online access to AD • Doesn’t change password based on usage • This is a good thing for some people • I use Adminizer ;) • Randomizes passwords • Workgroups, Azure AD, BYOD etc. • Totally Offline and self-sufficient • Changes password both based on usage and based on time 24
  • 25. Other stuff • I let the local Administrator be named Administrator as it will anyway have the same SID • I don’t intentionally disable them either • Guest I disable but don’t rename 25
  • 26. Using AD administrative accounts (Domain, Enterprise, Schema) 26
  • 27. Enterprise and Schema Admins • These group are and stay empty • Only added a domain admin user when needed • If you doubt yourself or colleagues just create a scheduled task on a DC to clear them • Schema Admins are only needed when changing the schema • Enterprise Admins are needed mainly for • DHCP authorize • Adding or removing domains • Site applied GPOs 27
  • 28. Domain Admins • Only used for administering DC’s or AD • Remember to administer from an administration Work Station or Server – NOT BY LOGGING ON TO A DC!! • Are denied from logging on to anywhere else but Domain Controllers – By Policy! 28
  • 29. Mitigating PtH? • Split your environment into three layers • Never allow higher layer admins to logon to lower layers Power (DCs) Data (Servers and Apps) Access (Endpoints) Domain Admins Server Admins Workstation Admins
  • 31. BitLocker • BitLocker on all machines that are outside of the server rooms • Unless you can’t trust your admins → Include Servers • Aim for TPM only • Make sure your recovery keys are stored in AD • Increase encryption to 256 with a diffuser 31
  • 32. BitLocker FlowChart by me • http://win-fu.com/files/TPM-FlowchartV3.pdf 32
  • 34. Normal UAC • No changes to security needed but I always disable UAC Virtualization 34
  • 35. High Secure UAC • Change the prompt for UAC to ask for credentials for admins • Kills all BadUSB and Rubber Ducky –attacks • Also disable UAC virtualization 35
  • 36. Recommended settings for AppLocker, SRP or other whitelisting 36
  • 37. My own device • Relies on the knowledge of the user 37
  • 38. My customer devices • Basic rules + AccessChk revealed exceptions • Use certificates if you can (and trust the company) • Then add required network locations with • UNC • IP • FQDN • Then add local applications outside of the default folders with Certs, Folders (if they can be blocked from writing to by limited users) • Problematic ones • Self-updating, not signed and stored in users profile 38
  • 39. Recommended settings for Share permissions 39
  • 40. Share settings are easy • Always change two things 1. Block Offline use by default 2. EVERYONE – FULL CONTROL • NTFS-ACL’s are always more granular and better • I won’t kill you if you want to set different for user redirected folders • EVERYONE – CHANGE • Blocks users from sharing their files with other as they will by default get Full Control to these 40
  • 41. Recommended settings for builtin certificates 41
  • 42. EFS • Remember to replace the default Administrator certificate from your CA 42
  • 43. Recommended settings for AV and Firewalls 43
  • 44. Things to note about Defender • Only things that Defender can’t do • Centralized Reporting • Centralized Management • Talk to the Firewall • We can say that the engine of Defender is just fine • 1% more found malware in tests currently means 10000 malware samples that were not detected → Basically useless! • I choose by • The size of the wallet • Burden on the OS • Honestly: • If you have System Center use SCEP • Take a look at ATP! 44
  • 46. How I use IPsec • Require Inbound, Request Outbound • Kerberos for users and computers • Exclude DC’s and hard cases – You don’t need to get to 100%! • Buy printers (etc) that can have a certificate if possible 46
  • 48. Group Policies and Security Policies 48
  • 49. My Policies • Document with the Group Policy Settings Reference • Many policies are not needed anymore for most, like: • Always wait for the network on startup and logon • Disable System Restore • I nowadays try to avoid GPUPDATE /FORCE by changing group policy CSE’s to process even if the policy has not changed • For troubleshooting I always change a few things as well: 49
  • 51. Ability to read RSOP data 51
  • 53. End User Training on Good Passwords • For everyone • Minimum length of 8 characters (but don’t advertise this) • Complexity required • Numbers • at the beginning and end OR • in the middle • For important users like admins it’s • Minimum length of 15 characters 53
  • 54. End User Training on Good Passwords • Show people http://haveibeenpwned.com/ and teach to use different passwords on every site • Like • Flower10SkypeGrows! • Flower10DropbGrows! • Massively10HardIL • Massively10HardPO • Massively10HardBM 54
  • 57. Contact • sami@adminize.com • Twitter: @samilaiho • Blog: http://blog.win-fu.com/ • Free newsletter: http://eepurl.com/F-GOj • Video-based training: • http://www.pluralsight.com/ • Want free codes? Email me! • NOW: http://win-fu.com/dojo •Trial2018