S 4.314 Secure policy settings for domains and domain controllers

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

A Windows Server with Active Directory contains default security policy settings for the domain and for the domain controllers. However, it is recommended to change the default policy settings to increase security in the domain and on the domain controllers. The following changes are recommended:

The following safeguards are also recommended to ensure secure policy settings for domain controllers:

User rights should be assigned restrictively so that the users in the domain or on the domain controllers are able to perform the operational or administrative tasks. The access capabilities of users should be restricted in this case so that they do not endanger the security of the domain controllers (see also safeguard S 2.229 Planning Active Directory).

The configuration of policy settings for monitoring the domain controllers makes it possible to verify who is responsible for sensitive administrative operations such as administration or configuration changes. Monitors should be set up to monitor login attempts, account management operations, Active Directory accesses, attempts to access objects, changes to policies, the use of rights, process tracking, and system events.

Important Active Directory objects, such as the directory partitions, for example, must be monitored using suitable policy settings. To accomplish this, monitoring must be enabled for the directory partitions (logical areas of the Active Directory database). The directory partitions affected by these settings are called "schema", "configuration", and "domain".

Implementing the recommendations provided above for the configuration of policy settings will require the default setting for the maximum size of the security log to be increased so that a greater number of events can be monitored and logged. The logs must be evaluated promptly. In addition, there must be a clearly defined procedure for regular and prompt archiving, and the security and system event logs must be backed up regularly so that no events are lost or are overwritten.

If it is also necessary to support co-operation between the domains in different overall structures, for example so they can share the use of applications or for limited co-operation between different overall structures in an organisation, then external trust relationships should be set up. External trust relationships pose a potential security risk, though, because security boundaries are crossed in this case. For this reason, the domain controllers in the trusted domain should filter out the authorisation data of the users and remove security IDs (SIDs) that do not refer to the domain of the user account. A detailed description of how comprehensive rights can be obtained without authorisation using forged SIDs and the corresponding countermeasures using SID filtering is described in articles 289243 and 289246 of the Microsoft Knowledge Base.

The policy settings for the security options for domain controllers have an impact on the security-related configuration settings of the Windows Server operating systems and should therefore be selected with care. This not only applies to the configuration relevant to the Active Directory, but also to other components of the Windows Server operating systems (e.g. to the security configuration settings for the network, file system, and user logins).

Review questions: