Windows Privilege

Secure your Windows privileged accounts

Privileged accounts on a network are prime targets for exploitation, whether it be from an outside attack or an insider with unsavory motives. Microsoft Windows has three kinds of privileged accounts:  Windows local administrator accounts, Active Directory service accounts, and domain admin accounts.

Windows local administrator accounts

Windows local admin accounts are a security problem for every organization because one set of login credentials is typically used by many IT administrators. This can make it difficult or even impossible to implement an identity access management policy because organizations cannot track who is gaining access to what network equipment at any given time. These accounts are everywhere – Windows workstations, servers and even your laptop fleet.

Finding all of the Windows local administrator accounts is a challenge, especially as new machines are rapidly deployed in virtual environments. These accounts are especially important because they are the prime target for an attacker who breaches a workstation. Once the attacker breaks the admin password, he can re-use the password to breach other machines on the network. Therefore, these passwords must to be randomized, changed regularly to prevent attacks, and usage needs to be carefully controlled and attributed to the correct user through audit trails.

Active Directory domain admin accounts

Windows server administrators need to use domain admin (DA) accounts to perform standard administrative tasks. Ideally, AD domain admin accounts should only be used when privilege is required (admins should not run as a domain admin for their regular AD account) and they should only be used by a single administrator for accountability. Also, these accounts are highly susceptible to Pass the Hash attacks because their passwords are not frequently changed. Pass the Hash is when an adversary can use the password hash from a previous domain admin logon to emulate that user on other systems. This gives attackers domain admin access across the network.  To protect these accounts, privilege management is very important. Access should be controlled and audited and passwords must be changed frequently to prevent Pass the Hash attacks – ideally after each usage of the account.

Secret Server can find Windows privileged accounts using Discovery, and can enforce password complexity and automatic password changing on a scheduled basis. Pass the Hash attacks can be prevented by using Check Out for Domain Admin accounts.

  • Key Benefits

    • Easily inventory and manage Windows workstation and Windows server accounts to gain control and enforce privilege identity management for all accounts.
    • Enforce organizational password policy for all Windows privileged accounts.
    • Reduce risk of breach escalation due to password reuse.
    • Reduce risk of breach escalation due to Pass the Hash.
    • Meet audit compliance requirements by bringing full accountability to the use of Windows privilege.