Solved

Windows 2008 Active Directory Harden

Posted on 2013-06-25
4
512 Views
Last Modified: 2013-07-10
My 2008 active directory is pretty basic.  I would like to substantially harden it from a security perspective for the users.  Any suggestions?
0
Comment
Question by:deklinm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 167 total points
ID: 39276256
Take a look at the two documents I referenced in the blog below

http://adisfun.blogspot.com/2013/05/software-on-domain-controllers.html

If you want to look at DoD/military standards take a look at the DISA STIGS

http://iase.disa.mil/stigs/os/windows/2008r2.html

Also download security compliance manager   http://technet.microsoft.com/en-us/solutionaccelerators/cc835245.aspx

Lots of great guides to help you lockdown the system.



Thanks

Mike
0
 
LVL 9

Assisted Solution

by:MHMAdmins
MHMAdmins earned 167 total points
ID: 39276260
I would lock down permissions on your AD to users with read, and your domain admin with full control over the AD console. You can do this by right clicking on the OU container and go to the security tab and verify your permissions in the DACL.
0
 
LVL 13

Assisted Solution

by:Jaihunt
Jaihunt earned 166 total points
ID: 39277535
0
 
LVL 54

Expert Comment

by:McKnife
ID: 39280008
Hi.

Sometimes I wonder if we should not start abandoning these buzz words: "hardening", "lockdown" and so on: nobody defines what he is looking for anymore.

"harden it for the users" - what should that mean? Making it somewhat harder for the users to... to...? Please clarify what you are looking for: what are you trying to protect against whom/against what threat and what technical difficulties do you see doing so that we can assist you with?
0

Featured Post

How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article runs through the process of deploying a single EXE application selectively to a group of user.
This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question