Protection against coerced authentication on domain controllers:
Print Spooler:
Disable the service via group policy on all DC's
EFS RPC attack:
Create the two RPC filters by putting this in a text file (source):
rpc
filter
add rule layer=um actiontype=block
add condition field=if_uuid matchtype=equal data=c681d488-d850-11d0-8c52-00c04fd90f7e
add filter
add rule layer=um actiontype=block
add condition field=if_uuid matchtype=equal data=df1941c5-fe89-4e79-bf10-463657acf44d
add filter
quit
Save the file and use "netsh -f filename.txt" to apply it
DFS RPC attack:
Create one RPC filter by putting this in a text file (source)
rpc
filter
add rule layer=um actiontype=block
add condition field=if_uuid matchtype=equal data=4fc742e0-4a10-11cf-8273-00aa004ae673
add filter
quit
Save the file and use "netsh -f filename.txt" to apply it
This dfs filter has some impact on creation of new dfs namespaces. Otherwise it doesn't seem to cause other issues that I can tell.
Certificate Authority hardening:
Follow the MS guidance on hardening the CA against NTLM relay. Essentially you configure the web interfaces to allow kerberos only with extended protection. If possible, disable NTLM auth completely on the server. Beyond that, limiting access to client certificates and not allowing user supplied SAN's on them should be done.
No comments:
Post a Comment