The sub-techniques beta is now live! Read the release blog post for more info.

Active Directory Configuration

Configure Active Directory to prevent use of certain techniques; use SID Filtering, etc.

ID: M1015
Version: 1.0
Created: 06 June 2019
Last Modified: 13 June 2019

Techniques Addressed by Mitigation

Domain ID Name Description
Enterprise T1003 Credential Dumping

Manage the access control list for "Replicating Directory Changes" and other permissions associated with domain controller replication.[6][7]

Enterprise T1081 Credentials in Files

Remove vulnerable Group Policy Preferences.[1]

Enterprise T1097 Pass the Ticket

For containing the impact of a previously generated golden ticket, reset the built-in KRBTGT account password twice, which will invalidate any existing golden tickets that have been created with the KRBTGT hash and other Kerberos tickets derived from it.

Enterprise T1178 SID-History Injection

Clean up SID-History attributes after legitimate account migration is complete.

Consider applying SID Filtering to interforest trusts, such as forest trusts and external trusts, to exclude SID-History from requests to access domain resources. SID Filtering ensures that any authentication requests over a trust only contain SIDs of security principals from the trusted domain (i.e preventing the trusted domain from claiming a user has membership in groups outside of the domain).

SID Filtering of forest trusts is enabled by default, but may have been disabled in some cases to allow a child domain to transitively access forest trusts. SID Filtering of external trusts is automatically enabled on all created external trusts using Server 2003 or later domain controllers. However note that SID Filtering is not automatically applied to legacy trusts or may have been deliberately disabled to allow inter-domain access to resources.

SID Filtering can be applied by:

  • Disabling SIDHistory on forest trusts using the netdom tool (netdom trust /domain: /EnableSIDHistory:no on the domain controller)

  • Applying SID Filter Quarantining to external trusts using the netdom tool (netdom trust /domain: /quarantine:yes on the domain controller)

  • Applying SID Filtering to domain trusts within a single forest is not recommended as it is an unsupported configuration and can cause breaking changes. If a domain within a forest is untrustworthy then it should not be a member of the forest. In this situation it is necessary to first split the trusted and untrusted domains into separate forests where SID Filtering can be applied to an interforest trust[2][3][4][5]

Enterprise T1072 Third-party Software

Ensure proper system and access isolation for critical network systems through use of group policy.

References