Detailed Course Outline
Repetition of best practices for installing domain controllers from 20 years of experience as an ADDS senior consultant Homemade security problems in Active Directory Understand Kerberos NTLM vs. Kerberos SMB SMB versions Attack scenarios Safe use of SMB PAC_Validation and the problems with the Microsoft implementation of Kerberos - en detail PTH - Pass the Hash - including a live attack with all participants Silver ticket Golden ticket Skeleton Key Kerberos ticket service Understand Kerberos Changing Kerberos Passwords: Why and How ... Change Kerberos passwords: the silver bullet with no failures Preventing Credential Thefting - A DeepDive: Attack Szenarie Pass-the-hash Silver Ticket gold ticket Skeleton Key Prevent credential thefting Configure Windows Defender Credential Guard Windows Defender Remote Credential Guard Bitlocker Use Windows Defender Device Guard Use AppLocker Use Windows Defender Application Guard Understand concepts: Operate animal models From Red Forest, Golden Forest and Bastion Forests Single domain model highly secure Clean installation source Verify hash values of the * .iso files Fciv.exe, Powershell, 7zip and IgorHasher Set up the first domain controller Understand ms-ds-machineaccountquota Use redircmp for new computer systems Use redirusr for new users Bitlocker Bitlocker and TPM 1.2 vs. 2.0 Bitlocker and PreBoot authentication AppLocker monitoring AD Audit Plus CyberArk Secure backup and recovery of Bitlocker-protected backup volumes Firewalling on domain controllers Configure IPSEC with RDP Harden the domain controller Center of Internet Security gpPack & PaT SIM LDA Microsoft tools Set up additional domain controllers Secure deployment of domain controllers, member servers and clients via MDT Installation and configuration of MDT highly secure Hardening MDT servers Roll out highly secure member servers and clients Operate domain controller securely via IPSEC Configure and use IPSEC IPSEC monitoring via MMC Set up the PKI server as an internal trusted ROOT CA Configure PKI Activate automatic certificate deployment via group policies Enrollment of non-standard certificates After hardening of the PKI Center of Internet Security gpPack & PaT SIM LDA Microsoft tools Jump server and privileged access workstation (PAW) - understand and implement concepts Set up and configure the jump server RSAT installation Install ADMIN-Center with a valid certificate of a trusted root PKI Bitlocker Bitlocker and TPM 1.2 vs. 2.0 Bitlocker and PreBoot authentication AppLocker Configure IPSEC with RDP Backup of jump servers on bitlocker-protected volumes Firewalling on JUMP servers Harden the jump server Center of Internet Security gpPack & PaT SIM LDA Microsoft tools Set up and configure PAW Bitlocker Bitlocker and TPM 1.2 vs. 2.0 Bitlocker and PreBoot authentication AppLocker Configure IPSEC and RDP Backup of PAWs on bitlocker-protected volumes Firewalling on PAWs Harden the domain controller Center of Internet Security gpPack & PaT SIM LDA Microsoft tools Security in domain networks 802.1X with MAC addresses Certificates MAC flooding on switches Switch off hubbing mode IPSEC with Kerberos and certificates Windows Defender Advanced Threat Protection (WDATP) Understand the concept of WDATP Roll out and monitor WDATP WDATP on domain controllers ... WDATP on jump servers and PAWs WDATP on Windows 10 clients Questions from the participants