, 11 tweets, 5 min read Read on Twitter
Please share in this thread some defensive techniques that are relatively simple to configure/deploy that has a high success rate (low false positives).

I'll start:
* Detect Kerberoasting:
trimarcsecurity.com/single-post/Tr…

* Detect PW Spraying:
trimarcsecurity.com/single-post/20…

#BlueTeam
* Deploy LAPS to automatically rotate local Administrator passwords on Windows computers
adsecurity.org/?p=1790
microsoft.com/en-us/download…
* Test & Deploy "AaronLocker" for simplified AppLocker deployment
github.com/microsoft/Aaro…
Ok, so not exactly simple, but can be very effective.
* Switch highly privileged service accounts with manually changed passwords to Group Managed Service Accounts (GMSAs)
docs.microsoft.com/en-us/windows-…

Note: Not exactly simple, but effective. Ensure service supports GMSA config.
* Add all AD admins to the "Protected Users" group.
Restricts authentication to Kerberos AES, prevents specific credential caching on system, & protects against Kerberos delegation attacks (+others).
(does require some OS & DC support for full protection)

docs.microsoft.com/en-us/windows-…
* Prevent Domain Admins & other privileged groups from logging onto workstations & servers
docs.microsoft.com/en-us/windows-…
* Enable & use the Windows Firewall to frustrate attackers
channel9.msdn.com/Events/Ignite/…
* Work to get NTLMv2 preferred in your environment by setting DC & client policy to "Send NTLMv2 response only\refuse LM" (supports NTLMv1, which isn't great).
Preferably "Send NTLMv2 response only\refuse LM & NTLM"

Enable NTLM auditing to discover use:
docs.microsoft.com/en-us/windows/…
* Update all of your Domain Controllers to Windows Server 2016.

Fun Fact:
When @jaredhaight & I were working to create labs for our #DerbyCon training on Windows Security (ok, so 99.9% Jared), we noticed that many of the recon tools didn't work against 2016, but did for 2012R2.
There are a number of minor security tweaks in the Windows Server 2016/Windows 10 OS that reduce the capability of recon tools. Blog post later for more detail

For example: Newer Win10 versions prevent users from enumerating local Admin group membership.
gallery.technet.microsoft.com/SAMRi10-Harden…
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Sean (will be at DerbyCon)
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!