Skip to main content

Due to increasing digitization, we are unfortunately also increasingly confronted with serious threats from the Internet. Hacker attacks are becoming more and more imaginative, intelligent and, above all, individual. In the Software Internet Cluster we would like to share our expertise on this topic.

Most IT security measures are easy to implement with little to medium effort, are available free of charge or only involve low costs. It’s all about basic security, which of course can and must be additionally secured with more complex measures. When it comes to IT security, you have to assume that hackers are already active in the system and starting attacks. One speaks of a so-called “zero trust” environment. So you have to be aware that a hacker attack can also be launched from any internal device.

Separation of Power in Active Directory

with Markus Schoas from hs2n Informationstechnologie GmbH

Ing. Markus Schoas – Managing Director of hs2n Informationstechnologie GmbH

Along with Michael Satlow and Markus Huber, Markus Schoas is one of the managing directors of hs2n Informationstechnologie GmbH, which was founded in Carinthia in 2001 and focuses its services on supporting IT Infrastructure, Consulting, Product Development and individual Software Solutions for medium-sized and large companies.

Many years of project experience and a wide range of know-how combined with an innovative and creative approach make hs2n an efficient partner. The focus of the company is also strongly in the area of IT security with its own products such as XEOX, the remote monitoring and management tool, as well as its own application firewall with two-factor authentication.

Learn more

Measures for the Separation of Powers in the AD

It must be avoided as far as possible that a domain administrator is compromised and the attacker gets hold of the so-called Golden Ticket! The golden ticket is the ultimate entry ticket to all system resources that are integrated into an Active Directory, as it allows the entire domain in a company to be compromised with all the necessary rights. As soon as such a Kerberos ticket gets into the hands of a hacker or hacker organization – it’s a security meltdown!

It must be made more difficult for the attacker to obtain a domain administrator’s password. It has therefore proven itself to reduce such sensitive attack surfaces. For this reason it is advisable that domain administrators can only log on to domain controllers and not to other servers or even clients within the domain.

Checklist

Logon exclusively on Domain Controller

A Windows domain policy must be created so that domain administrators can only log on to domain controllers.

Administrator Account per Server

Each server should have its own administrator account so that in case of a compromise, multiple servers are not affected at once. Giving IT staff global accounts that reside in local admin groups is an absolute no-no. The accounts of IT employees should only have normal user rights!

Using Group Managed Service Accounts

Only group-managed service accounts should be used on servers or clients.

Introduction of LAPS throughout the domain

The local administrator should have a different password for all clients and servers. For this purpose, the introduction of Local Administrator Password Solution (LAPS) in the entire domain makes sense.

You have any questions or need support with the professional implementation?
We would be glad to forward your request to our IT security experts.

Send Request