- System-wide transcription
- Script-Block logging
- AntiMalware Scan Interface (AMSI)
- Constrained Language Mode (CLM) integrated with AppLocker WDAC (Device Guard)
Trust Tickets
SID Filtering
- Avoid attacks which abuse SID history
- Enabled by default on all inter-forest trusts. Intra-forest trusts are assumed secured by default (MS considers forest and not the domain to be a security boundary).
- But, since SID filtering has potential to break applications and user access, it is often disabled.
Selective Authentication
- In an inter-forest trust, if Selective Authentication is configured, users between the trusts will not be automatically authenticated. Individual access to domains and servers in the trusting domain/forest should be given.
Deception
- Adversary mindset of going for the “lowest hanging fruit” and illusive superiority over defenders.
- We must provide the adversaries what they are looking for, for instance:
- A user with high privileges
- Permissions over other objects
- Poorly configured ACLs
- Misconfigured/dangerous user attributes etc.
- We can use Deploy-Deception
Windows Settings > Security Settings > Advanced Audit Policy Configuration > DS Access > Audit Directory Service Access Group Policyneeds to be configured to enable 4662 logging.
Create-DecoyUser -UserFirstName user -UserLastName manager -Password Pass@123 | Deploy-UserDeception -UserFlag PasswordNeverExpires -GUID d07da11f-8a3d-42b6b0aa-76c962be719a -VerboseThis property is not read by net.exe, WMI classes (like Win32_UserAccount) and ActiveDirectory Module. But LDAP based tools like PowerView and ADExplorer trigger the logging.
Create-DecoyUser -UserFirstName dec -UserLastName da -Password Pass@123 | Deploy-PrivilegedUserDeception -Technique DomainAdminsMembership -Protection DenyLogon -Verbose- If there is any attempt to use the user credentials (password or hashes), a 4768 is logged.
- Any enumeration which reads DACL or all properties for the user will result in 4662 logging.