Active Directory Domain Security Technical Implementation Guide (STIG)
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates ✎ 11
Comparison against the immediately-prior release (V2R6). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Content changes 11
- V-25385 Medium descriptioncheckfix Active Directory data must be backed up daily for systems with a Risk Management Framework categorization for Availability of moderate or high. Systems with a categorization of low must be backed up weekly.
- V-36438 Medium checkfix Local administrator accounts on domain systems must not share the same password.
- V-43712 Medium checkfix Usage of administrative accounts must be monitored for suspicious and anomalous activity.
- V-43713 Medium checkfix Systems must be monitored for attempts to use local accounts to log on remotely from other systems.
- V-43714 Medium checkfix Systems must be monitored for remote desktop logons.
- V-8524 Medium descriptioncheckfix Active Directory must be supported by multiple domain controllers where the Risk Management Framework categorization for Availability is moderate or high.
- V-8525 Low descriptioncheckfix Active Directory implementation information must be added to the organization contingency plan where the Risk Management Framework categorization for Availability is moderate or high.
- V-8530 Low descriptioncheckfix Each cross-directory authentication configuration must be documented.
- V-8540 Medium descriptioncheckfix Selective Authentication must be enabled on outgoing forest trusts.
- V-8547 Medium descriptioncheckfix The Anonymous Logon and Everyone groups must not be members of the Pre-Windows 2000 Compatible Access group.
- V-8553 Medium descriptioncheckfix Inter-site replication must be enabled and configured to occur at least daily.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- AD.0260
- Vuln IDs
-
- V-8521
- Rule IDs
-
- SV-9018r3_rule
Checks: C-7674r2_chk
1. Interview the IAM or site representative and obtain the list of accounts that have been delegated AD object ownership or update permissions and that are not members of Windows built-in administrative groups. (This includes accounts for help desk or support personnel who are not Administrators, but have authority in AD to maintain user accounts or printers.) 2. If accounts with delegated authority are defined and there is no list, then this is a finding. 3. Count the number of accounts on the list. 4. If the number of accounts with delegated authority is greater than 10, review the site documentation that justifies this number. Validate that the IAM explicitly acknowledges the need to have a high number of privileged users. 5. If the number of accounts with delegated authority is greater than 10 and there is no statement in the documentation that justifies the number, then this is a finding.
Fix: F-8049r1_fix
1. Remove user accounts with delegated authority from Windows built-in administrative groups or remove the delegated authority from the accounts. 2. Document all user accounts with delegated AD object ownership or update authority. 3. Annotate the account list with a statement such as, “The high number of privileged accounts is required to address site operational requirements.” 4. Reduce the number of user accounts with delegated AD object ownership or update authority.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- DS00.1140_AD
- Vuln IDs
-
- V-8522
- Rule IDs
-
- SV-30991r3_rule
Checks: C-14102r3_chk
1. Review the site's network diagram(s) to determine if domain controllers for the domain are located in multiple enclaves. The object is to determine if network traffic is traversing enclave network boundaries. 2. Request information about RODC or ADAM instances are installed. In particular, request details of Active Diretory functionality installed or extended into the DMZ or configured/allowed to cross the sites outbound firewall boundary. Ensure communications and replication traffic is encrypted. 3. If domain controllers are not located in multiple enclaves, then this check is not applicable. 4. If domain controllers are located in multiple enclaves, verify that a VPN is used to transport the network traffic (replication, user logon, queries, etc.). 5. If a VPN solution is not used to transport directory network traffic across enclave boundaries, then this is a finding. 6. If the ADAM mode is in use and a migration plan for converting to RODC is not in place, then this is a finding.
Fix: F-15010r2_fix
Implement a VPN or other network protection solution in accordance with the Network Infrastructure STIG that protects AD data in transit across DoD enclave boundaries.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- DS00.4140_AD
- Vuln IDs
-
- V-8523
- Rule IDs
-
- SV-30994r3_rule
Checks: C-14101r2_chk
1. Interview the site representative. Ask about the location of the domain controllers. 2. If domain controllers are not located in multiple enclaves, then this check is not applicable. 3. If domain controllers are located in multiple enclaves and a VPN is not used, then this check is not applicable. 4. If domain controllers are located in multiple enclaves and a VPN is used, review the site network diagram(s) with the SA, NSO, or network reviewer as required to determine if the AD network traffic is visible to a network or host IDS. 5. If the AD network traffic is not visible to a network or host IDS, then this is a finding.
Fix: F-27873r1_fix
Replace the VPN solution or reconfigure it so that directory data is inspected by a network or host-based IDS.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DS00.6140_AD
- Vuln IDs
-
- V-8524
- Rule IDs
-
- SV-30996r3_rule
Checks: C-66391r2_chk
Determine the Availability categorization information for the domain. If the Availability categorization of the domain is low, this is NA. If the Availability categorization of the domain is moderate or high, verify the domain is supported by more than one domain controller. Start "Active Directory Users and Computers" (Available from various menus or run "dsa.msc"). Expand the left pane item that matches the domain being reviewed. Select the Domain Controllers Organizational Unit (OU) in the left pane. If there is only one domain controller in the OU, this is a finding.
Fix: F-71779r1_fix
Implement multiple domain controllers in domains with an Availability categorization of moderate or high.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- DS00.6120_AD
- Vuln IDs
-
- V-8525
- Rule IDs
-
- SV-30995r4_rule
Checks: C-66395r2_chk
Determine the Availability categorization information for the domain. If the Availability categorization of the domain is low, this is NA. If the Availability categorization of the domain is moderate or high, verify the organization's disaster recovery plans includes documentation on the AD hierarchy (forest, tree and domain structure). (A chart showing forest hierarchy and domain names is the minimum suggested.) If the disaster recovery plans do not include directory hierarchy information, this is a finding.
Fix: F-71783r1_fix
Update the disaster recovery plans to include the AD hierarchy structure for domains with an Availability categorization of moderate or high.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- DS00.7100_AD
- Vuln IDs
-
- V-8526
- Rule IDs
-
- SV-31214r2_rule
Checks: C-14104r1_chk
1. Refer to the list of actual manual AD trusts (cross-directory configurations) collected from the site representative. 2. If there are no manual AD trusts (cross-directory configurations) defined, this check is not applicable. For AD, this includes external, forest, or realm trust relationship types. 3. Obtain a copy of the site’s supplemental INFOCON procedures as required by Strategic Command Directive (SD) 527-1. 4. Verify that it has been determined by the IAM whether INFOCON response actions need to include procedures to disable manual AD trusts (cross-directory configurations). The objective is to determine if the need has been explicitly evaluated. 5. If it has been determined that actions to disable manual AD trusts (cross-directory configurations) are not necessary, then this check is not applicable. 6. If it has been determined that actions to disable manual AD trusts (cross-directory configurations) *are* necessary, verify that the policy to implement these actions has been documented. 7. If actions to disable manual AD trusts (cross-directory configurations) *are* needed and no policy has been documented, then this is a finding.
Fix: F-15012r1_fix
Evaluate cross-directory configurations (such as trusts and pass-through authentication) and provide documentation that indicates: 1. That an evaluation was performed. 2. The specific AD trust configurations, if any, that should be disabled during changes in INFOCON status because they could represent increased risk.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- DS00.1120_AD
- Vuln IDs
-
- V-8530
- Rule IDs
-
- SV-30989r3_rule
Checks: C-66399r1_chk
Start "Active Directory Domains and Trusts" (Available from various menus or run "domain.msc"). Select the left pane item that matches the name of the domain being reviewed. Right-click the domain name and select "Properties". Select the "Trusts" tab. For each outbound and inbound external, forest, and realm trust, record the name of the other party (domain name), the trust type, transitivity, and the trust direction. (Keep this trust information for use in subsequent checks.) Compare the list of trusts identified with documentation maintained by the ISSO. For each trust, the documentation must contain the following: Type (external, forest, or realm) Name of the other party Confidentiality, Availability, and Integrity categorization Classification level of the other party Trust direction (inbound and/or outbound) Transitivity Status of the Selective Authentication option Status of the SID filtering option If an identified trust is not listed in the documentation or if any of the required items are not documented, this is a finding.
Fix: F-71787r1_fix
Develop documentation for each AD external, forest, and realm trust configuration. At a minimum this must include: Type (external, forest, or realm) Name of the other party Confidentiality, Availability, and Integrity categorization Classification level of the other party Trust direction (inbound and/or outbound) Transitivity Status of the Selective Authentication option Status of the SID filtering option
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0170
- Vuln IDs
-
- V-8533
- Rule IDs
-
- SV-9030r2_rule
Checks: C-7696r1_chk
1. Before performing this check, perform V-8530 which validates the trusts within the documentation are current within AD. 2. Obtain documentation of the site's approved trusts from the site representative. 3. For each of the identified trusts, verify that the documentation includes a justification or explanation of the need-to-know basis of the trust. 4. If the need for the trust is not documented, then this is a finding.
Fix: F-8062r1_fix
Delete the unneeded trust relationship or document the access requirement or mission need for the trust.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AD.0180
- Vuln IDs
-
- V-8534
- Rule IDs
-
- SV-9031r2_rule
Checks: C-7698r1_chk
1. Refer to the list of identified trusts and the trust documentation provided by the site representative. (Obtained in V-8530) 2. For each of the identified trusts between DoD organizations, compare the classification level (unclassified, confidential, secret, and top secret) of the domain being reviewed with the classification level of the other trust party as noted in the documentation. 3. If the classification level of the domain being reviewed is different than the classification level of any of the entities for which a trust relationship is defined, then this is a finding.
Fix: F-8063r1_fix
Delete the trust relationship that is defined between entities with resources at different DoD classification levels.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AD.0181
- Vuln IDs
-
- V-8536
- Rule IDs
-
- SV-9033r2_rule
Checks: C-7699r1_chk
1. Refer to the list of identified trusts obtained in a previous check (V8530). 2. For each of the identified trusts, determine if the other trust party is a non-DoD entity. For example, if the fully qualified domain name of the other party does not end in “.mil”, the other party is probably not a DoD entity. 3. Review the local documentation approving the external network connection and documentation indicating explicit approval of the trust by the DAA. 4. The external network connection documentation is maintained by the IAO\NSO for compliance with the Network Infrastructure STIG. 5. If any trust is defined with a non-DoD system and there is no documentation indicating approval of the external network connection and explicit DAA approval of the trust, then this is a finding.
Fix: F-28136r1_fix
Obtain DAA approval and document external, forest, or realm trust relationship. Or obtain documentation of the network connection approval and explicit trust approval by the DAA.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- AD.0190
- Vuln IDs
-
- V-8538
- Rule IDs
-
- SV-9035r3_rule
Checks: C-58507r2_chk
Open "Active Directory Domains and Trusts". (Available from various menus or run "domain.msc".) Right click the domain in the left pane and select Properties. Select the Trusts tab. Note any existing trusts and the type. If no trusts exist, this is NA. If the trust type is External, run the following command on the trusting domain: "netdom trust <trusting domain> /d:<trusted domain> /quarantine" If the result does not specify "SID filtering is enabled for this trust. Only SIDs from the trusted domain will be accepted for authorization data returned during authentication. SIDs from other domains will be removed.", this is a finding. If the trust type is Forest, run the following command on the trusting domain: "netdom trust <trusting domain> /d:<trusted domain> /enablesidhistory" If the result does not specify "SID history is disabled for this trust", this is a finding.
Fix: F-62885r2_fix
Ensure SID filtering is enabled on all external trusts. You can enable SID filtering only from the trusting side of the trust. Enter the following line from a command line: netdom trust <TrustingDomainName> /d:<TrustedDomainName> /quarantine:Yes /usero:<DomainAdministratorAcct> /passwordo:<DomainAdminPwd> Ensure SID history is disabled for all forest trusts. You can disable SID history only from the trusting side of the trust. Enter the following line from a command line: netdom trust <TrustingDomainName> /d:<TrustedDomainName> /enablesidhistory:No /usero:<DomainAdministratorAcct> /passwordo:<DomainAdminPwd>
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- AD.0200
- Vuln IDs
-
- V-8540
- Rule IDs
-
- SV-9037r3_rule
Checks: C-66407r2_chk
Open "Active Directory Domains and Trusts". (Available from various menus or run "domain.msc".) Right click the domain name in the left pane and select "Properties". Select the "Trusts" tab. For each outgoing forest trust, right-click the trust item and select "Properties". Select the "Authentication" tab. If the "Selective Authentication" option is not selected on every outgoing forest trust, this is a finding.
Fix: F-71795r1_fix
Enable Selective Authentication on outgoing forest trust. Open "Active Directory Domains and Trusts". (Available from various menus or run "domain.msc".) Right click the domain name in the left pane and select "Properties". Select the "Trusts" tab. For each outgoing forest trust, right-click the trust item and select "Properties". Select the "Authentication" tab. Select the "Selective Authentication" option. (It may be necessary to configure the "Allowed to Authenticate" permission on resources in the trusting domain.)
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- AD.0220
- Vuln IDs
-
- V-8547
- Rule IDs
-
- SV-9044r3_rule
Checks: C-66411r2_chk
Open "Active Directory Users and Computers" (available from various menus or run "dsa.msc"). Expand the domain being reviewed in the left pane and select the "Builtin" container. Double-click on the "Pre-Windows 2000 Compatible Access" group in the right pane. Select the "Members" tab. If the "Anonymous Logon" or "Everyone" groups are members, this is a finding. (By default, these groups are not included in current Windows versions.)
Fix: F-71799r1_fix
Ensure the "Anonymous Logon" and "Everyone" groups are not members of the "Pre-Windows 2000 Compatible Access group". (By default, these groups are not included in current Windows versions.) Open "Active Directory Users and Computers" (available from various menus or run "dsa.msc"). Expand the domain being reviewed in the left pane and select the "Builtin" container. Double-click on the "Pre-Windows 2000 Compatible Access" group in the right pane. Select the "Members" tab. If the "Anonymous Logon" or "Everyone" groups are members, select each and click "Remove".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0240
- Vuln IDs
-
- V-8548
- Rule IDs
-
- SV-9045r2_rule
Checks: C-7707r1_chk
1. Start the Active Directory Users and Computers console (Start, Run, “dsa.msc”). 2. Select and expand the left pane item that matches the name of the domain being reviewed. 3. Select the Built-in container. If the Incoming Forest Trust Builders group is defined perform the following: a. Double-click on the group and select the Members tab b. Count the number of accounts in the group c. Compare the accounts in the group with the local documentation. 4. Select the Users container. For each of the Domain Admins, Enterprise Admins, Schema Admins, and Group Policy Creator Owners groups perform the following: a. Double-click on the group and select the Members tab b. Count the number of accounts in the group c. Compare the accounts in the group with the local documentation. 5. If an account in a highly privileged AD security group is not listed in the local documentation, then this is a finding. 6. If the number of accounts defined in a highly privileged AD security group is greater than the number below, review the site documentation that justifies this number. a. For the Enterprise Admins, Schema Admins, Group Policy Creator Owners, and Incoming Forest Trust Builders groups, the number of accounts should be between zero (0) and five (5). b. The number of Domain Admins should be between one (1) and ten (10). 7. If the number of accounts defined in a highly privileged AD security group is greater than the guidance above and there is no documentation that justifies the number, then this is a finding.
Fix: F-8068r1_fix
Update the site documentation to include all the accounts that are members of highly privileged groups. Annotate the account list(s) with a statement such as, “The high number of privileged accounts is required to address site operational requirements.” Reduce the number of accounts in highly privileged groups to the minimum level necessary.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DS00.3200_AD
- Vuln IDs
-
- V-8549
- Rule IDs
-
- SV-31557r2_rule
Checks: C-14111r1_chk
1. Start the Active Directory Users and Computers console (Start, Run, “dsa.msc”). 2. Select and expand the left pane item that matches the name of the domain being reviewed. 3. Select the Built-in container. a. If the Incoming Forest Trust Builders group is defined, double-click on the group, and select the Members tab b. Examine the defined accounts to see if they are from a domain that is not in the forest being reviewed. 4. Select the Users container a. For each group (Domain Admins, Enterprise Admins, Schema Admins, and Group Policy Creator Owners), double-click on the group, and select the Members tab. b. Examine the defined accounts to see if they are from a domain that is not in the forest being reviewed. 5. If any account in a privileged group is from a domain outside the forest being reviewed and that outside forest is not maintained by the same organization (e.g., enclave) or subject to the same security policies, then this is a finding. Supplementary Notes: Note: An account that is from an outside domain appears in the format “outside-domain-NetBIOSname\account” or “account@outside-domain-fully-qualified-name”. Examples are “AOFN21\jsmith” or “jsmith@AOFN21.OST.COM”. It may be necessary to use the AD Domains and Trusts (domain.msc) console to determine if the domain is from another AD forest. Note: It is possible to move the highly privileged AD security groups out of the AD Users container. If the Domain Admins, Enterprise Admins, Schema Admins, or Group Policy Creator Owners groups are not in the AD Users container, ask the SA for the new location and use that location for this check.
Fix: F-28135r1_fix
Remove accounts from outside directories that are not part of the same organization or are not subject to the same security policies from the highly privileged groups.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0160
- Vuln IDs
-
- V-8551
- Rule IDs
-
- SV-9048r3_rule
Checks: C-58021r1_chk
Open "Active Directory Domains and Trusts" (run "domain.msc") or "Active Directory Users and Computers" (run "dsa.msc"). Right click in the left pane on the name of the Domain being reviewed. Select "Raise domain functional level…" The current domain functional level will be displayed (as well as the option to raise the domain functional level). Select "Cancel" to exit. Alternately, using PowerShell (Windows 2008 R2 or later). Select "Active Directory Module for Windows PowerShell", available in Administrative Tools or the Start Screen. Run "Get-ADDomain". View the value for "DomainMode:" If the current domain functional level is a Windows Server version no longer supported by Microsoft, this is a finding. Microsoft will no longer support Windows Server 2003 after 14 July 2015.
Fix: F-62383r1_fix
Raise the domain functional level to a Windows Server version still supported by Microsoft. Microsoft will no longer support Windows Server 2003 after 14 July 2015. Raising the domain functional level needs to be carefully planned and implemented. This prevents the addition of domain controllers to the domain using Windows versions prior to the current domain functional level. See Microsoft documentation for the process and requirements of raising the domain functional level.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DS00.3230_AD
- Vuln IDs
-
- V-8553
- Rule IDs
-
- SV-30992r3_rule
Checks: C-66415r2_chk
Open "Active Directory Sites and Services". (Available from various menus or run "dssite.msc".) Expand "Sites" in the left pane. If only a single site exists, this is NA. By default the first site in a domain is named "Default-First-Site-Name" but may have been changed. If more than one site exists, expand "Inter-Site Transports" and select "IP". For each site link that is defined in the right pane perform the following: Right click the site link item and select "Properties". If the interval on the "General" tab for the "Replicate every" field is greater than "1440", this is a finding. Click the "Change Schedule" button. If the time frames selected for "Replication Available" do not allow for replication to occur at least daily, this is a finding. Click the Cancel buttons to exit.
Fix: F-71803r1_fix
Maintain an Active Directory replication schedule that allows inter-site replication to occur at least on a daily basis. Open "Active Directory Sites and Services". (Available from various menus or run "dssite.msc".) Expand "Sites" in the left pane. Expand "Inter-Site Transports" and select "IP". For each site link that is defined in the right pane perform the following: Right click the site link item and select "Properties". Select an interval in the "Replicate every" field less than "1440". (By default this is 180.) Click the Change Schedule button. Select time frames for "Replication Available" to allow for replication to occur at least daily.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- DS00.0160_AD
- Vuln IDs
-
- V-25385
- Rule IDs
-
- SV-31547r3_rule
Checks: C-66403r2_chk
Review the organization's procedures for the backing up active directory data. Verify the frequency at which active directory data is backed up. If the Availability categorization of the domain is low, this must be at least weekly. If the Availability categorization of the domain is moderate or high, this must be at least daily. Verify the type of backup is appropriate to capturing the directory data. For AD domain controllers, this must include a System State data backup. If any of these conditions are not met, this is a finding.
Fix: F-71791r1_fix
Update the organization's procedures for the backing up active directory data. Ensure the frequency at which active directory data is backed up is as follows: If the Availability categorization of the domain is low, this must be at least weekly. If the Availability categorization of the domain is moderate or high, this must be at least daily. Ensure the type of backup is appropriate to capturing the directory data. For AD domain controllers, this must include a System State data backup.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0151
- Vuln IDs
-
- V-25840
- Rule IDs
-
- SV-32179r2_rule
Checks: C-32375r1_chk
1. Interview the IAM. 2. Obtain a copy of the site’s policy that addresses password change frequency. 3. Check that the policy addresses the requirement for the DSRM password to be changed at least yearly. Alternatively review logs or other evidence that indicates that the password has been changed within the last year. Note that there is no known method to check password age online while the server is active as a domain controller. 4. If there is no policy for changing the DSRM password at least yearly or no indication that it has been changed within the last year, then this is a finding.
Fix: F-28702r1_fix
Create or implement a local site policy to change the DSRM password at least yearly.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- AD.9100
- Vuln IDs
-
- V-25841
- Rule IDs
-
- SV-32180r2_rule
Checks: C-32377r1_chk
1. Verify that the domain and forest in which the domain controller resides have been reviewed using the requirements in the appropriate document in the Active Directory STIG. 2. The security assessment must be conducted at the same time or no more than 1 year prior to the review of the domain controller. 3. VMS asset information, dated reports, or other documentation can be used to provide verification. 4. If it is not possible to verify that the domain and forest have been reviewed, then this is a finding.
Fix: F-28704r1_fix
Perform reviews of the domain and/or forest in which the domain controller resides at least annually.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0270
- Vuln IDs
-
- V-25997
- Rule IDs
-
- SV-32648r2_rule
Checks: C-32870r1_chk
1. Verify that the site has applied the Network Infrastucture STIG to configure the VPN and IPSec. 2. Verify that IPSec and other communications and security configurations for the management and replication of the RODC will be managed by use of the minimum required Group Policy Objects (GPOs). 3. Include an inspection of the RODC server in the DMZ when inspection for least privilege. 4. Verify that required patches and compatibility packs are installed if RODC is used with Windows 2003 (or earlier) clients. 5. If RODC server and configuration does not comply with requirements, then this is a finding.
Fix: F-29022r1_fix
1. Ensure compliance with VPN and IPSec requirements in the Network Insfrastucture STIG. 2. Ensure IPSec and other communications and security configurations for the management and replication of the RODC uses the minimum required Group Policy Objects (GPOs) to provide the required functionality. 3. Replicate only the information needed to provide the functionality required. If full replication of all directory data is not needed, then replicated selective ID and authentication information as needed to the RODC. 4. Include an inspection of the RODC server in the DMZ when inspection for least privilege.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AD.0001
- Vuln IDs
-
- V-36431
- Rule IDs
-
- SV-47837r2_rule
Checks: C-44673r3_chk
Review the Enterprise Admins group in Active Directory Users and Computers. Any accounts that are members of the Enterprise Admins group must be documented with the IAO. Each Enterprise Administrator must have a separate unique account specifically for managing the Active Directory forest. If any account listed in the Enterprise Admins group is a member of other administrator groups including the Domain Admins group, domain member server administrators groups, or domain workstation administrators groups, this is a finding.
Fix: F-40963r2_fix
Create the necessary documentation that identifies the members of the Enterprise Admins group. Ensure that each member has a separate unique account that can only be used to manage the Active Directory Forest. Remove any Enterprise Admin accounts from other administrator groups.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AD.0002
- Vuln IDs
-
- V-36432
- Rule IDs
-
- SV-47838r2_rule
Checks: C-44674r2_chk
Review the Domain Admins group in Active Directory Users and Computers. Any accounts that are members of the Domain Admins group must be documented with the IAO. Each Domain Administrator must have a separate unique account specifically for managing the Active Directory domain and domain controllers. If any account listed in the Domain Admins group is a member of other administrator groups including the Enterprise Admins group, domain member server administrators groups, or domain workstation administrators groups, this is a finding.
Fix: F-40964r2_fix
Create the necessary documentation that identifies the members of the Domain Admins group. Ensure that each member has a separate unique account that can only be used to manage the Active Directory domain and domain controllers. Remove any Domain Admin accounts from other administrator groups.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0003
- Vuln IDs
-
- V-36433
- Rule IDs
-
- SV-47839r2_rule
Checks: C-44675r3_chk
Review the membership groups in Active Directory Users and Computers. Membership groups must be designated at the domain level specifically for domain member server administrators. Domain member server administrator groups and any accounts that are members of the groups must be documented with the IAO. Each member server administrator must have a separate unique account specifically for managing member servers. If any account listed in a domain member server administrator group is a member of other administrator groups including the Enterprise Admins group, the Domain Admins group, or domain workstation administrator groups, this is a finding.
Fix: F-40965r3_fix
Create the necessary documentation that identifies the members of domain member server administrator groups. Ensure that each member has a separate unique account that can only be used to manage domain member servers. Remove any domain member server accounts from other administrator groups.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0004
- Vuln IDs
-
- V-36434
- Rule IDs
-
- SV-47840r2_rule
Checks: C-44676r3_chk
Review the membership groups in Active Directory Users and Computers. Membership groups must be designated at the domain level specifically for domain workstation administrators. Domain workstation administrator groups and any accounts that are members of the groups must be documented with the IAO. Each domain workstation administrator must have a separate unique account specifically for managing domain workstations. If any account listed in a domain workstation administrator group is a member of other administrator groups including the Enterprise Admins group, the Domain Admins group, or domain member server administrator groups, this is a finding.
Fix: F-40966r3_fix
Create the necessary documentation that identifies the members of domain workstation administrator groups. Ensure that each member has a separate unique account that can only be used to manage domain workstations. Remove any domain workstation administrator accounts from other administrator groups.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AD.0005
- Vuln IDs
-
- V-36435
- Rule IDs
-
- SV-47841r2_rule
Checks: C-44677r1_chk
Review the properties of all privileged accounts in Active Directory Users and Computers. Under the Account tab, verify "Account is sensitive and cannot be delegated" is selected in the Account Options section. If delegation is not prohibited for any privileged account, this is a finding.
Fix: F-40967r1_fix
Open Active Directory Users and Computers. View the properties of all privileged accounts. Under the Account tab, select "Account is sensitive and cannot be delegated" in the Account Options section.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- AD.MP.0001
- Vuln IDs
-
- V-36436
- Rule IDs
-
- SV-47842r4_rule
Checks: C-58505r2_chk
If Active Directory is only managed with local logons to domain controllers, not remotely, this can be marked NA. Verify that any domain systems used to manage Active Directory remotely are used exclusively for managing Active Directory. If domain systems used for managing Active Directory are used for additional functions, this is a finding. In situations where an additional physical machine dedicated to AD admin tasks is not practicable, virtual machines (VM) may be securely employed in either of the following configurations: -Windows 8, Windows Server 2012 or later for the AD admin management role. -Use local guest VMs running within Hyper-V for all other tasks to include admin roles on other servers as well as any user tasks such as web browsing or email. -Use a Type-1 Hypervisor with separate guest VMs for AD admin management roles and any other roles. In either case, the higher integrity AD admin platform and the lower integrity platforms must be separate. The AD admin platform must be configured not to forward the AD admin credentials to other guest VMs or to make the AD admin credentials available to other guest VMs. Additionally, guest VMs for user and less critical admin activities must apply the security requirements from the applicable STIG, especially so that AD admin accounts are denied all logon types.
Fix: F-49310r1_fix
Set aside domain systems to manage Active Directory remotely. Ensure they are used only for the purpose of managing Active Directory. Otherwise, use the local domain controller console to manage Active Directory.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- AD.0007
- Vuln IDs
-
- V-36437
- Rule IDs
-
- SV-47843r2_rule
Checks: C-44679r4_chk
Verify access to the internet is prevented for systems dedicated to managing Active Directory. Various methods may be employed to accomplish this, such as restrictions at boundary firewalls, through proxy services, or with the Windows Firewall. Review the Internet access restrictions with the administrator. If Internet access is not prevented, this is a finding.
Fix: F-40969r3_fix
Block Internet access for systems dedicated to managing Active Directory. This can be accomplished by restrictions at boundary firewalls, proxy services, with the Windows Firewall or other methods.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- AD.0008
- Vuln IDs
-
- V-36438
- Rule IDs
-
- SV-47844r3_rule
Checks: C-66437r2_chk
Verify local administrator accounts on domain systems are using unique passwords. If local administrator accounts on domain systems are sharing a password, this is a finding. Microsoft's Local Administrator Password Solution (LAPS) provides an automated solution for maintaining and regularly changing the local administrator password for domain-joined systems. Other automated solutions that provide this capability may also be used. If LAPS has been installed and enabled in the domain, the following PowerShell query will return a list of systems that do not have a local administrator password managed by LAPS. (The LAPS PowerShell module requires PowerShell 2.0 or higher and .NET Framework 4.0.) Start PowerShell. If the LAPS PowerShell module has not been previously imported, execute the following first: "Import-Module AdmPwd.ps". Execute "Get-PwdAdmPassword -ComputerName * | Where-object {$_.password -eq $null}" If any systems are listed, this is a finding. Ignore computers with "OU=Domain Controllers" in the DistinguishedName field.
Fix: F-71825r1_fix
Set unique passwords for all local administrator accounts on domain systems. Microsoft's Local Administrator Password Solution (LAPS) provides an automated solution for maintaining and regularly changing the local administrator password for domain-joined systems. Other automated solutions that provide this capability may also be used. See Microsoft Security Advisory 3062591 for additional information and download of LAPS. https://technet.microsoft.com/en-us/library/security/3062591.aspx
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0009
- Vuln IDs
-
- V-43648
- Rule IDs
-
- SV-56469r2_rule
Checks: C-49394r2_chk
Verify separate smart cards are used for EA and DA accounts from smart cards used for other accounts. EA and DA accounts may be on the same smart card but must be separate from any other accounts. If separate smart cards for EA and DA accounts from other accounts are not used, this is a finding.
Fix: F-49248r2_fix
Use separate smart cards for EA and DA accounts from smart cards used for other accounts. EA and DA accounts may be on the same smart card but must be separate from any other accounts.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- AD.0010
- Vuln IDs
-
- V-43649
- Rule IDs
-
- SV-56470r2_rule
Checks: C-49395r3_chk
Verify "Smart card is required for interactive logon" is disabled and re-enabled for all smart card required EA and DA accounts at least every 60 days. If the setting "Smart card is required for interactive logon" is not disabled then re-enabled for all EA and DA accounts that require smart card logons at least every 60 days, this is a finding.
Fix: F-49249r3_fix
Disable then re-enable "Smart card is required for interactive logon" for all smart card required EA and DA accounts at least every 60 days.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- AD.0011
- Vuln IDs
-
- V-43650
- Rule IDs
-
- SV-56471r2_rule
Checks: C-49396r3_chk
Verify "Smart card is required for interactive logon" is disabled and re-enabled for all smart card required administrative accounts associated with critical servers at least every 60 days. If the setting "Smart card is required for interactive logon" is not disabled then re-enabled for all critical server administrative accounts that require smart card logons at least every 60 days, this is a finding.
Fix: F-49250r3_fix
Disable then re-enable "Smart card is required for interactive logon" for all smart card required critical server administrative accounts at least every 60 days.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- AD.0012
- Vuln IDs
-
- V-43651
- Rule IDs
-
- SV-56472r2_rule
Checks: C-49397r3_chk
Verify "Smart card is required for interactive logon" is disabled and re-enabled for all smart card required other important accounts (VIPS and other administrators) at least every 60 days. If the setting "Smart card is required for interactive logon" is not disabled then re-enabled for other important accounts (VIPS and other administrators) that require smart card logons at least every 60 days, this is a finding.
Fix: F-49251r3_fix
Disable then re-enable "Smart card is required for interactive logon" for all smart card required other important accounts (VIPS and other administrators) at least every 60 days.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0013
- Vuln IDs
-
- V-43652
- Rule IDs
-
- SV-56473r2_rule
Checks: C-49398r4_chk
If the domain does not have any public facing servers, this is NA. Review the local Administrators group on public facing servers. Only the appropriate administrator groups or accounts responsible for administration of the system may be members of the group. For public facing servers, the Domain Admins group must be replaced by a domain member server administrator group whose members are different from any used to manage internal servers. If any domain accounts or groups used to manage internal servers are members of the local administrators group, this is a finding.
Fix: F-49252r2_fix
If the domain does not have any public facing servers, this is NA. Configure the system to include only administrator groups or accounts that are responsible for the system in the local Administrators group. For public facing servers, replace the Domain Admins group with a domain member server administrator group whose members are different from any used to manage internal servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.MP.0002
- Vuln IDs
-
- V-43710
- Rule IDs
-
- SV-56531r2_rule
Checks: C-49400r3_chk
Verify the operating system version on AD admin platforms is at least Windows 7, Windows Server 2008 R2, or later. If the operating system is an earlier version, this is a finding.
Fix: F-49311r2_fix
Use Windows 7, Windows Server 2008 R2, or later as the operating system for all AD admin platforms.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.MP.0003
- Vuln IDs
-
- V-43711
- Rule IDs
-
- SV-56532r2_rule
Checks: C-49401r1_chk
Review the local Administrators group of AD admin platforms. Verify separate domain administrative accounts are used to manage AD admin platforms from non-AD admin platforms. These should be dedicated domain accounts where practicable. Otherwise EA/DA accounts may be used. If accounts used to manage AD admin platforms are used for any non-AD admin platforms, this is a finding.
Fix: F-49312r1_fix
Use separate domain administrative accounts to manage AD admin platforms from non-AD admin platforms. These should be dedicated domain accounts where practicable. Otherwise EA/DA accounts may be used.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.AU.0001
- Vuln IDs
-
- V-43712
- Rule IDs
-
- SV-56533r3_rule
Checks: C-66421r1_chk
Verify account usage events for administrative accounts are being monitored. This includes events related to approved administrative accounts as well as accounts being added to privileged groups such as Administrators, Domain and Enterprise Admins and other organization defined administrative groups. Event monitoring may be implemented through various methods including log aggregation and the use of monitoring tools. Monitor for the events listed below, at minimum. If these events are not monitored, this is a finding. Account Lockouts (Subcategory: User Account Management) 4740 - A user account is locked out. User Added to Privileged Group (Subcategory: Security Group Management) 4728 - A member was added to a security-enabled global group. 4732 - A member was added to a security-enabled local group. 4756 - A member was added to a security-enabled universal group. Successful User Account Login (Subcategory: Logon) 4624 - An account was successfully logged on. Failed User Account Login (Subcategory: Logon) 4625 - An account failed to log on. Account Login with Explicit Credentials (Subcategory: Logon) 4648 - A logon was attempted using explicit credentials.
Fix: F-71809r1_fix
Monitor account usage events for administrative accounts. This includes events related to approved administrative accounts as well as accounts being added to privileged groups such as Administrators, Domain and Enterprise Admins and other organization defined administrative groups. Event monitoring may be implemented through various methods including log aggregation and the use of monitoring tools. Monitor for the events listed below, at minimum. Account Lockouts (Subcategory: User Account Management) 4740 - A user account is locked out. User Added to Privileged Group (Subcategory: Security Group Management) 4728 - A member was added to a security-enabled global group. 4732 - A member was added to a security-enabled local group. 4756 - A member was added to a security-enabled universal group. Successful User Account Login (Subcategory: Logon) 4624 - An account was successfully logged on. Failed User Account Login (Subcategory: Logon) 4625 - An account failed to log on. Account Login with Explicit Credentials (Subcategory: Logon) 4648 - A logon was attempted using explicit credentials. The "Account Usage" section of NSA's "Spotting the Adversary with Windows Event Log Monitoring" provides additional information. http://www.nsa.gov/ia/_files/app/Spotting_the_Adversary_with_Windows_Event_Log_Monitoring.pdf.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.AU.0002
- Vuln IDs
-
- V-43713
- Rule IDs
-
- SV-56534r3_rule
Checks: C-66425r1_chk
Verify attempts to use local accounts to log on remotely from other systems are being monitored. Event monitoring may be implemented through various methods including log aggregation and the use of monitoring tools. Monitor for the events listed below. If these events are not monitored, this is a finding. More advanced filtering is necessary to obtain the pertinent information than just looking for event IDs. Search for the event IDs listed with the following additional attributes: Logon Type = 3 (Network) Authentication Package Name = NTLM Not a domain logon and not the ANONYMOUS LOGON account Successful User Account Login (Subcategory: Logon) 4624 - An account was successfully logged on. Failed User Account Login (Subcategory: Logon) 4625 - An account failed to log on.
Fix: F-71813r2_fix
Monitor for attempts to use local accounts to log on remotely from other systems. Event monitoring may be implemented through various methods including log aggregation and the use of monitoring tools. Monitor for the events listed below. More advanced filtering is necessary to obtain the pertinent information than just looking for event IDs. Search for the event IDs listed with the following additional attributes: Logon Type = 3 (Network) Authentication Package Name = NTLM Not a domain logon and not the ANONYMOUS LOGON account Successful User Account Login (Subcategory: Logon) 4624 - An account was successfully logged on. Failed User Account Login (Subcategory: Logon) 4625 - An account failed to log on. The "Pass the Hash Detection" section of NSA's "Spotting the Adversary with Windows Event Log Monitoring" provides a sample query for filtering. http://www.nsa.gov/ia/_files/app/Spotting_the_Adversary_with_Windows_Event_Log_Monitoring.pdf.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.AU.0003
- Vuln IDs
-
- V-43714
- Rule IDs
-
- SV-56535r3_rule
Checks: C-66429r1_chk
Verify Remote Desktop logins are being monitored. Event monitoring may be implemented through various methods including log aggregation and the use of monitoring tools. Monitor for the events listed below. If these events are not monitored, this is a finding. More advanced filtering is necessary to obtain the pertinent information than just looking for event IDs. Search for the event IDs listed with the following additional attributes: Logon Type = 10 (RemoteInteractive) Authentication Package Name = Negotiate Successful User Account Login (Subcategory: Logon) 4624 - An account was successfully logged on.
Fix: F-71817r1_fix
More advanced filtering is necessary to obtain the pertinent information than just looking for event IDs. Search for the event IDs listed with the following additional attributes: Logon Type = 10 (RemoteInteractive) Authentication Package Name = Negotiate Successful User Account Login (Subcategory: Logon) 4624 - An account was successfully logged on. The "Remote Desktop Logon Detection" section of NSA's "Spotting the Adversary with Windows Event Log Monitoring" provides a sample query for filtering. http://www.nsa.gov/ia/_files/app/Spotting_the_Adversary_with_Windows_Event_Log_Monitoring.pdf.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- AD.MP.0004
- Vuln IDs
-
- V-44058
- Rule IDs
-
- SV-56888r2_rule
Checks: C-49473r3_chk
Verify firewall rules prevent outbound communications from AD admin platforms, except for domain controllers being managed. If outbound communications are allowed between AD admin platforms and any other systems other than domain controllers, this is a finding.
Fix: F-49678r3_fix
Maintain firewall rules to prevent outbound communications from AD admin platforms, except with domain controllers being managed.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- AD.0014
- Vuln IDs
-
- V-44059
- Rule IDs
-
- SV-56889r2_rule
Checks: C-49474r3_chk
If no Windows service \ application accounts with manually managed passwords have administrative privileges, this is NA. Verify Windows service \ application accounts with administrative privileges and manually managed passwords, have passwords changed at least every 60 days.
Fix: F-49679r4_fix
If no Windows service \ application accounts with manually managed passwords have administrative privileges, this is NA. Change passwords for Windows service \ application accounts with administrative privileges and manually managed passwords, at least every 60 days.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AD.0015
- Vuln IDs
-
- V-53727
- Rule IDs
-
- SV-67945r1_rule
Checks: C-54679r1_chk
Verify domain controllers are blocked from Internet access. Various methods may be employed to accomplish this, such as restrictions at boundary firewalls, through proxy services, host based firewalls or IPsec. Review the Internet access restrictions with the administrator. If Internet access is not prevented, this is a finding. If a critical function requires Internet access, this must be documented and approved by the organization.
Fix: F-58535r1_fix
Block domain controllers from internet access. This can be accomplished with various methods, such as restrictions at boundary firewalls, proxy services, host based firewalls, or IPsec. If a critical function requires Internet access, this must be documented and approved by the organization.