ad-assurance - RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT
Chronological Thread
- From: "Capehart,Jeffrey D" <>
- To: "" <>
- Subject: RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT
- Date: Mon, 1 Apr 2013 20:09:11 +0000
- Accept-language: en-US
- Authentication-results: sfpop-ironport04.merit.edu; dkim=neutral (message not signed) header.i=none
David, I would say the specific AD-related issues would be the set of detections that indicate “non-compliant” behavior, as already defined by the cookbook or the
gaps analysis. Some event log ID’s that indicated some known bad-behavior are: #2889: Unsigned LDAP binds #4624: NTLMv1 logins? But… what about event ID’s 8004 or 8003? Here was another site I found that might help. -Jeff Whenever the NTLM protocol is used for authentication, an event with ID 8004 shows up in a Windows Server 2008 R2 DC's log, an event with ID 8003 shows up in a Windows Server 2008 R2 member server's log, and an event with ID 8001 appears
in a Windows 7 client's log Windows 7 and Windows Server 2008 R2 include new Group Policy settings that let you audit, analyze, and restrict NTLM authentication use in your Windows environment. Microsoft introduced
three security policy settings you can use for auditing NTLM traffic. The settings are stored in the following Group Policy Object (GPO) container: Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options. They're
called:
You should enable the
Restrict NTLM: Audit NTLM authentication in this domain setting only on your Windows Server 2008 R2 domain controllers (DCs). To enable it, choose the
Enable all option in the Microsoft Management Console (MMC) GPO Editor snap-in.
You can use the other two settings --
Restrict NTLM: Outgoing NTLM traffic to remote servers and Restrict NTLM: Audit Incoming NTLM Traffic -- for auditing NTLM authentication traffic on all Windows 7 and Windows Server 2008 R2 computers. To enable auditing for the first setting,
choose the Audit all option, as Figure 1 shows; to enable auditing for the latter setting, choose the
Enable auditing for all accounts option. From: [mailto:]
On Behalf Of David Walker Thanks, Jeff; I've made the wording changes. See my next note, though, about the advisability of a very general Alternative Means statement, as I've proposed. Additional word-smithing suggestions:
|
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Rank, Mark, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Capehart,Jeffrey D, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Capehart,Jeffrey D, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Rank, Mark, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
- RE: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, Capehart,Jeffrey D, 04/01/2013
- Re: [AD-Assurance] Proposed Alternative Means for End-User Use of Non-Compliant Technologies - DRAFT, David Walker, 04/01/2013
Archive powered by MHonArc 2.6.16.