F5F Stay Refreshed Power Users Networks Ensure data security by implementing robust safeguards.

Ensure data security by implementing robust safeguards.

Ensure data security by implementing robust safeguards.

A
AnthonyDPlayz
Junior Member
1
05-13-2016, 12:27 AM
#1
The key points are how to secure Active Directory effectively. You should avoid putting AD in a management VLAN that opens all ports, as services still need access. It’s better to isolate user space completely. Segmentation helps, but you must ensure services can communicate securely. Companies often separate management and user networks into distinct forests without trust links, which limits breach impact but requires careful planning.
A
AnthonyDPlayz
05-13-2016, 12:27 AM #1

The key points are how to secure Active Directory effectively. You should avoid putting AD in a management VLAN that opens all ports, as services still need access. It’s better to isolate user space completely. Segmentation helps, but you must ensure services can communicate securely. Companies often separate management and user networks into distinct forests without trust links, which limits breach impact but requires careful planning.

C
Ch3z_
Member
65
05-13-2016, 01:06 AM
#2
Explore the best practices for protecting Active Directory. This resource outlines key strategies to enhance security.
C
Ch3z_
05-13-2016, 01:06 AM #2

Explore the best practices for protecting Active Directory. This resource outlines key strategies to enhance security.

F
Fijiboys777
Member
196
05-13-2016, 02:10 AM
#3
I reviewed the material and it seems to be more practical than anything else. It serves as a basic foundation. Focus on least privilege, two-factor authentication, limiting services, employing host-based AV and firewall, and monitoring logs. I’ve been using the DISA STIG guidelines for OS setup—this prevents domain admin accounts from being used for services like RDP and auditing is enabled. It’s likely to disrupt a carefree domain setup, so either fix the errors or turn off the problematic GPO. Adjusting the logon banner could also help, as the entire DoD will be surprised. I’m more interested in understanding what others are doing, such as the example of separating networks into isolated forests. Also curious about the advantages of placing a DC on a dedicated VLAN or behind extra firewall—probably HIPAA would handle IPS/IDS, but HIPAA doesn’t cover everything.
F
Fijiboys777
05-13-2016, 02:10 AM #3

I reviewed the material and it seems to be more practical than anything else. It serves as a basic foundation. Focus on least privilege, two-factor authentication, limiting services, employing host-based AV and firewall, and monitoring logs. I’ve been using the DISA STIG guidelines for OS setup—this prevents domain admin accounts from being used for services like RDP and auditing is enabled. It’s likely to disrupt a carefree domain setup, so either fix the errors or turn off the problematic GPO. Adjusting the logon banner could also help, as the entire DoD will be surprised. I’m more interested in understanding what others are doing, such as the example of separating networks into isolated forests. Also curious about the advantages of placing a DC on a dedicated VLAN or behind extra firewall—probably HIPAA would handle IPS/IDS, but HIPAA doesn’t cover everything.

G
Grifo24O
Member
181
05-18-2016, 07:44 PM
#4
I have my own AD network at home. As you noted, everything is on separate VLANs. For your configuration, you can reach the server since you need access to AD, but RDP won’t work because it’s disabled through a GPO for regular users. Only administrators can connect and use it. I also have three firewalls—one software-based and two hardware-based. I don’t have an IPS/IDS setup, which I think you should consider adding.
G
Grifo24O
05-18-2016, 07:44 PM #4

I have my own AD network at home. As you noted, everything is on separate VLANs. For your configuration, you can reach the server since you need access to AD, but RDP won’t work because it’s disabled through a GPO for regular users. Only administrators can connect and use it. I also have three firewalls—one software-based and two hardware-based. I don’t have an IPS/IDS setup, which I think you should consider adding.