SMART PROFILER

SECURITY ASSESSMENT REPORT

Technology: Microsoft Active Directory

Tenant: DynamicPacks.net

Assessment Date: 02/22/2025 18:41:46

This Introduction contains a global summary of the health and security scans performed on the company infrastructure with SmartProfiler for Active Directory Assessment. Detailed information about the scans can be found in the Health & Security Maturity Framework and Technical Findings sections of this report. The assessment was performed according to ANSSI and MITRE ATT&CK definition. ANSSI is French National Agency for the Security of Information Systems. For more information, please check out here: https://www.cert.ssi.gouv.fr/uploads/guide-ad.html. There are tests that also recommended by Microsoft have been performed too.

SmartProfiler’s Active Directory tests are divided into three main categories: AD Security, AD Configuration , and AD Health Check. You can click on each category in the left section or select the Score Category to view the associated tests and their status. Please note there are no sub-categories for AD Health Issues.

8Embedded Image

CRITICAL

135Embedded Image

HIGH

10Embedded Image

MEDIUM

7Embedded Image

LOW

124Embedded Image

PASSED

0Embedded Image

MANUAL CHECK

43.06%

Shows overall Security score for AD Forest based on the tests executed by SmartProfiler. Overall Score includes Security-Config and Health AD Tests.

OVERALL SCORE

37.74%

Shows overall score settings that need to be configured correctly in AD Domains. These settings are recommended by Microsoft.

SECURITY SCORE

54.24%

Shows overall score settings that need to be configured correctly in AD Domains. These settings are recommended by Microsoft.

CONFIGURATION SCORE

70.59%

Shows health score for AD and Domain Controllers. Health issues can be found in AD Health Status category in left pane.

HEALTH SCORE

65.22%

Shows overall Security Score for AD Risky Items. Risky Items need to be addressed ASAP. Risky Items can be found in Risky Items Category.

RISKY ITEMS SCORE

70.91%

Shows overall Score for Domain Controllers found in all AD Domains in AD Forest.

DOMAIN CONTROLLERS SCORE

53.09%

Tests recommended by ANSSI and MITRE for Active Directory can be found on ANSSI and MITRE Sites.

ANSSI/MITRE SCORE

35.68%

Tests recommended by Microsoft. Please check test link in AD Status for more information.

MS RECOMMENDED SCORE

4.41%

Shows overall score for CIS Hardening settings on Domain Controllers. Please check Domain Controllers CIS Hardening for more information.

DC HARDENING SCORE

23.53%

Shows overall score for Privileged Accounts. Please navigate to Privileged Accounts category to see tests associated with Privileged Accounts.

PRIVILEGED ACCOUNTS SCORE

93.33%

Shows overall score for Users in all AD Domains. Please navigate to AD Security Risks-Users category to see tests associated with users.

USER RISKS SCORE

100%

Shows overall score for Computers in all AD Domains. Please navigate to AD Security Risks-Computers category to see tests associated.

COMPUTER RISKS SCORE

100%

Shows overall score for Admins and if any of them is configured with SPNs and if sending Bad Logon attempts can be found in AD Security Risks-Admins.

ADMINS RISKS SCORE

71.43%

Show overall score for tests executed in Sensitive Changes and make sure Sensitive Objects in AD are not modified.

SENSITIVE CHANGES SCORE

44.44%

Shows overall score for critical and default accounts such as default Administrator and Guest accounts.

CRTTICAL ACCOUNTS SCORE

100%

Shows overall score for Objects owned by users other than admins for critical objects in all Active Directory domains.

OBJ OWNERSHIP SCORE

25%

Shows overall score for Domain Policies and if the Password and Account Policies are configured correctly in all AD Domains in AD Forest.

DOMAIN POLICIES SCORE

0%

Shows overall score for AD Permissions applied at different levels in all AD Domains. Permissions tests can be found in AD Permissions Category.

AD PERMISSIONS SCORE

0%

Shows overall Security score for AD Features. Some AD Features such as Protected Users Group and Recycle bin need to be used in all AD Domains.

AD FEATURES SCORE

64.29%

Shows overall score for all AD Sites and if the AD Sites are configured correctly and as per Microsoft and other security organizations.

AD SITES SCORE

75%

Shows overall score for Forest PDC Emulator and domain controllers in all AD Domains to ensure Domain Controllers are using correct time sync.

TIME SYNC SCORE

71.43%

Shows AD Objects overall Score and if the AD Objects are in use and configured correctly such as unprotected OUs.

AD OBJECTS SCORE

10.53%

Shows overall score for AD GPO to ensure required GPO settings are configured in the AD Domains and all AD GPOs are applying correctly.

AD GPO SCORE

100%

Shows overall Score for DNS ensuring no static DNS Records and other tests which are recommended to check in an Active Directory environment.

AD DNS SCORE

AZURE ENTRA ID SSO

54.17%

OVERALL SCORE

Test Severity
Items Affected Objects
Ensure On-Prem AD Users are not Privileged Users in Azure Entra ID Embedded Image No Items No Aff Objects
Ensure Azure Administrative Units are used Embedded Image No Items No Aff Objects
Ensure Azure Guests cannot invite other Guests Embedded Image No Items No Aff Objects
Ensure privileged accounts have MFA Configured Embedded Image No Items No Aff Objects
Ensure non-Admins cannot register custom applications Embedded Image No Items No Aff Objects
Ensure no Guest Accounts in Azure Privileged groups Embedded Image No Items No Aff Objects
Ensure Security Defaults is enabled Embedded Image No Items No Aff Objects
Ensure Normal Azure Users do not have Permissions to provide unrestricted user Consent Embedded Image No Items No Aff Objects
Ensure Conditional Access Policy with signin user-risk location as Factor Embedded Image No Items No Aff Objects
Ensure no Guest accounts that are inactive for more than 45 days Embedded Image No Items No Aff Objects
Conditional Access policy with Continuous Access Evaluation disabled Embedded Image No Items No Aff Objects
AAD Connect sync account password reset Embedded Image No Items No Aff Objects
Ensure Guest users are restricted Embedded Image No Items No Aff Objects
Ensure user are configured with MFA Embedded Image No Items No Aff Objects
Conditional Access Policy that disables admin token persistence Embedded Image No Items No Aff Objects
Conditional Access Policy that does not require a password change from high risk users Embedded Image No Items No Aff Objects
Conditional Access Policy that does not require MFA when sign-in risk has been identified Embedded Image No Items No Aff Objects
Ensure Guest invites not accepted in last 30 days are identified Embedded Image No Items No Aff Objects
Ensure Synced AAD Users not privileged Users in Azure Embedded Image No Items No Aff Objects
Ensure No Private IP Addresses in Conditional Access policies Embedded Image No Items No Aff Objects
Ensure Number Matching enabled in MFA Embedded Image No Items No Aff Objects
Ensure AD privileged users are not synced to AAD Embedded Image No Items No Aff Objects
Ensure no more than 5 Global Administrators Embedded Image No Items No Aff Objects
Ensure SSO computer account with latest password Embedded Image No Items No Aff Objects
Ensure RBCD is not applied to AZUREADSSOACC account Embedded Image No Items No Aff Objects
ItemValue
Number of AD Sites1
Number of Application Partitions2
Number of Global Catalogs1
Forest UPN Suffixes
Forest Schema Masterdc114.Dynamicpacks.net
Forest Domain Naming Masterdc114.Dynamicpacks.net
Forest Root DomainDynamicpacks.net
Forest DomainsDynamicpacks.net
Forest Functional LevelWindows2016Forest
AD Forest NameDynamicPacks.net
DomainHostNameIPv4AddressIPv6AddressIsGlobalCatalogIsReadOnlyOperatingSystemOperatingSystemServicePackSiteSslPort
Dynamicpacks.netdc114.Dynamicpacks.net172.16.31.114TrueFalseWindows Server 2019 Standard EvaluationDefault-First-Site-Name636
DomainForestFunctional LevelInfrastructure MasterNetBIOS NamePDC EmulatorRID Master
Dynamicpacks.netDynamicpacks.netWindows2016Domaindc114.Dynamicpacks.netDYNAMICPACKS0dc114.Dynamicpacks.netdc114.Dynamicpacks.net
AD SiteBridgehead ServersCurrent ISTGIn Site LinksLocationServersSite OptionSubnets
Default-First-Site-Name0dc114.Dynamicpacks.net110
AD Site LinkAD SitesTotal AD Sites
DEFAULTIPSITELINKCN=Default-First-Site-Name-CN=Sites-CN=Configuration-DC=Dynamicpacks-DC=net1
AD DomainMinimum Password Length
Dynamicpacks.net7
Test Severity Items Affected Objects IOC/IOE
AdminSDHolder was Modified in last 30 days
TEST IDvuln1_permissions_adminsdholder
Embedded Image "AdminSDHolder Object was modified in total domains:1" 1 IOC
Misconfigured Administrative Accounts Found
TEST IDMS-RECOMMENDED
Embedded Image "Total Admins Misconfigured:2" 2 IOE IOC
Weak Password Policies Affected Admins
TEST IDvuln2_privileged_members_password
Embedded Image "Total Privileged Account using Weak Password Policy:2" 23 IOE IOC
TLS 1.1 Enabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers with TLS 1.1 Protocol Enabled:1" 1 IOE
NTLM Authentication Enabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers with NTLM Enabled:1" 1 IOE
Missing DNS Scavenging DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DNS Servers Not Enabled with Server Level Scavenging:1" 1 IOE
Print Spooler Service Running DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers with Print Spooler Service running:1" 1 IOE
Accounts with Extended Rights to Read LAPS Passwords Found
TEST IDMS-RECOMMENDED
Embedded Image "Illegal Accounts Found to read LAPS in AD Domains:LAPS/Module Not Installed" LAPS/Module Not Installed IOE IOC
Protected Users Group Status
TEST IDvuln3_protected_users
Embedded Image "Total Domains Not Using Protected Users Group:1" 1
Missing Microsoft LAPS in AD Forest
TEST IDMS-RECOMMENDED
Embedded Image "Microsoft LAPS Status:Not Deployed" Not Deployed
Objects Modified in Last 10 Days
TEST IDMS-RECOMMENDED
LINK
Embedded Image "Total Objects Modified in AD Domains in last 10 days:241" 241 IOE IOC
Objects Created in Last 10 Days
TEST IDMS-RECOMMENDED
LINK
Embedded Image "Total Objects Created in AD Domains in last 10 days:241" 241 IOE IOC
Anyone can Join Computers to Domain
TEST IDMS-RECOMMENDED
Embedded Image "Total Domains Allowing Normal Users to Join Computers to domain:1" 1 IOE
Denied RODC Password Replication Group missing Privileged Accounts
TEST IDvuln3_rodc_denied_group
Embedded Image "Total Missing Privileged Groups in Denied RODC Password Replication Group:8" 8 IOE
Schema Admin Group members
TEST IDMS-RECOMMENDED
Embedded Image "Schema Admins Group contains members:1" 1 IOE
Missing Domain Zones Scavenging
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Zones Not Enabled with Scavenging:1" 1 IOC
User Accounts Pass Never Expires
TEST IDvuln2_dont_expire
Embedded Image "Total Users with Password Never Expires in all Domains:1" 1 IOC
Sensitive GPOs Modified
TEST IDMS-RECOMMENDED
Embedded Image "Sensitive GPOs Status in Last 10 Days:WARNING: Modified" WARNING: Modified IOC
Changes to Privileged Groups in Last 15 days
TEST IDMS-RECOMMENDED
Embedded Image "Total Privileged Groups Modified in Last 15 Days in All Domains:13" 13 IOC
Built-In Admin Account Not protected
TEST IDMS-RECOMMENDED
Embedded Image "Default Administrator Account not protected in all domains:1" 1 IOE IOC
Built-In Admin Account Not Disabled
TEST IDMS-RECOMMENDED
Embedded Image "Default Admin Account not disabled in Total Domains:1" 1 IOE IOC
Built-In Admin Account Not Renamed
TEST IDMS-RECOMMENDED
Embedded Image "Default Admin Account not renamed in Total Domains:1" 1 IOE
Built-In Admin Account was used in last 10 days
TEST IDMS-RECOMMENDED
Embedded Image "Total Domains in which Default Administrator account was used in last 10 days:1" 1 IOC
Guest Account is not renamed
TEST IDMS-RECOMMENDED
Embedded Image "Guest Account not renamed in Total Domains:1" 1 IOE
Missing Privileged Groups in Protected Users Group
TEST IDvuln3_protected_users
Embedded Image "Total Missing Privileged Groups in Protected Users Group:Not In Use" Not In Use IOE IOC
Privileged Accounts Pass Never Expires
TEST IDvuln2_dont_expire
Embedded Image "Total Privileged Accounts set to Password Never Expire in all Domains:0" 34 IOE IOC
Too Many Privileged Accounts
TEST IDvuln_privileged_members
Embedded Image "Affected AD Domains:0" 20 IOC
Inactive Admins
TEST IDvuln1_user_accounts_dormant
Embedded Image "Total Enabled Admin Accounts Not In Use Since Last 30 Days:0" 19 IOE
Privileged Groups Contain more than 20 members
TEST IDvuln1_privileged_members
Embedded Image "Privileged Groups Contain More than 20 members:0" 18 IOE
Kerberos Pre-authentication Disabled
TEST IDvuln1_kerberos_properties_preauth_priv
Embedded Image "Total Pre-Authentication Admins in all domains:0" 55 IOE IOC
Privileged Groups Contained Computer Accounts
TEST IDMS-RECOMMENDED
Embedded Image "Total computer accounts part of privileged groups:0" 90 IOE IOC
Privileged Admins missing AdminCount=1 Flag
TEST IDMS-RECOMMENDED
Embedded Image "Total Admins not set with AdminCount=1 flag in all domains:0" 87 IOC
ForeignSecurityPrincipals In Privileged Groups
TEST IDMS-RECOMMENDED
Embedded Image "Total ForeignSecurityPrincipal in Privileged Groups:0" 64 IOE IOC
Operators Groups are not empty
TEST IDMS-RECOMMENDED
Embedded Image "Operators Groups containing total members in all domains:0" 10 IOE IOC
Password Do Not Expire
TEST IDvuln1_dont_expire_priv
Embedded Image "Total Admin Accounts set to PasswordNeverExpires:1" 12 IOE
Default Domain Policy-Minimum Password Length
TEST IDvuln2_privileged_members_password
Embedded Image "Account Policies Not Configured correctly in Total Domains:1" 1 IOE
FGPP Policies-Minimum Password Length
TEST IDvuln2_privileged_members_password
Embedded Image "FGPP Not Configured Correctly In Domains:Not Created" Not Created IOE
FGPP Policies Not Applying
TEST IDMS-RECOMMENDED
Embedded Image "Total FGPP Not Applying in All Domains:Not Created" Not Created IOE
AllowNT4Crypto DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with AllowNT4Crypto Enabled:1" 1 IOE
RC4 Encryption Enabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers With RC4 Encryption Enabled:1" 1 IOE
Missing Updates DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs Not Updated Since Last 45 Days:1" 1 IOE
Errors and Warnings in Log DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with Event Log Errors:1" 1 IOE
Scheduled Tasks found on Domain Controllers
TEST IDMS-RECOMMENDED
Embedded Image "Total Scheduled Tasks on DCs:3" 3 IOC
Software Installed on Domain Controllers
TEST IDMS-RECOMMENDED
Embedded Image "Total Software Installed on DCs:6" 6 IOE
Sites without Subnets Association
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Sites Without Subnets:1" 1
PDC Emulator Time Source
TEST IDMS-RECOMMENDED
Embedded Image "Root PDC Time Source:Internal Source" Internal Source
Disabled GPOs
TEST IDMS-RECOMMENDED
Embedded Image "Total Disabled GPOs:0" 23
GPOs not Linked to OUs
TEST IDMS-RECOMMENDED
Embedded Image "Total OUs without GPO Linked:0" 23 IOE
GPOs not Applying
TEST IDMS-RECOMMENDED
Embedded Image "Total GPOs not applying correctly in All Domains:0" 34
Orphaned GPO Containers
TEST IDMS-RECOMMENDED
Embedded Image "Total Orphaned Group Policy Objects:0" 34
Found GPOs with Block Inheritance
TEST IDMS-RECOMMENDED
Embedded Image "Total GPOs with Block Inheritance Defined:0" 2
GPO Naming Convention
TEST IDMS-RECOMMENDED
Embedded Image "Number Of GPOs do not follow Standard Naming Convention:0" 32
Found GPO with WMI Filters
TEST IDMS-RECOMMENDED
Embedded Image "Total GPO with WMI Filter:0" 45
Domain GPO Application Status
TEST IDMS-RECOMMENDED
Embedded Image "Total GPOs Not Applied:0" 23
No Group Policy Objects Defining Log Size and Retention
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Domains Affected:1" 23
No Group Policy Objects to Prevent Domain Admins from logging on to Workstations or Servers Found
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Domains Affected:1" 1
No Group Policy Objects to Block ISO Execution Found
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Domains Affected:1" 1
No Group Policy Objects to Mitigate SMBv1 Found
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Domains Affected:1" 1
No Group Policy Objects Enforcing UAC Prompt for Elevation Found
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Domains Affected:1" 1
No Group Policy Objects to Mitigate Accidental Script Execution
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Domains Affected:1" 1
No Group Policy Objects to Mitigate NTLMv1 Protocol
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Domains Affected:1" 1
High Value Targets Found
TEST IDMS-RECOMMENDED
Embedded Image "Total High Value Targets Found:2" 2 IOE IOC
Access Control Lists on Computers Found
TEST IDMS-RECOMMENDED
Embedded Image "Total Abusable ACLs on Computer Objects:0" 23 IOE IOC
Access Control Lists on Security Groups Found
TEST IDMS-RECOMMENDED
Embedded Image "Found Dangerous Group Permissions in AD Domains:0" 23 IOE IOC
Access Control Lists on Users Found
TEST IDMS-RECOMMENDED
Embedded Image "Found Dangerous User Permissions:0" 23 IOE IOC
Group Policy Objects with Improper Permissions Found
TEST IDMS-RECOMMENDED
Embedded Image "Abusable GPO Permissions found in Total AD Domains:0" 23 IOE IOC
Group Policy Object Assignments with Improper Permissions Found
TEST IDMS-RECOMMENDED
LINK
Embedded Image "Total Abusable GPO Permissions in AD Domains:0" 23 IOE IOC
Dangerous Permissions Found on MicrosoftDNS Container
TEST IDvuln_permissions_msdns
Embedded Image "AD Domains Affected:0" 23 IOE IOC
Dangerous Permissions Found on Naming Contexts
TEST IDvuln_permissions_naming_context
Embedded Image "AD Domains Affected:0" 23 IOE IOC
Pre-Windows 2000 Compatible Access Group is not empty
TEST IDvuln_compatible_2000_anonymous
Embedded Image "Number of AD Domains Affected:0" 23 IOE IOC
Found Groups with SID history Set
TEST IDvuln_sidhistory_present
Embedded Image "Total Groups With sIDHistory Affected domains:0" 23 IOE IOC
Normal Users Full Control Permissions on OUs
TEST IDMS-RECOMMENDED
Embedded Image "Total Normal User Accounts with Full Control Rights to Organizational Units in all Domains:0" 0 IOE IOC
EVERYONE Full Control Permissions on OUs
TEST IDMS-RECOMMENDED
Embedded Image "Total Organizational Units with Everyone Full Control Access Rights:0" 23 IOE IOC
Abusable Permissions Found on SYSVOL and NETLOGON
TEST IDMS-RECOMMENDED
LINK
Embedded Image "Abusable Permissions Found on SYSVOL and Netlogon Shares:Ok" Ok IOE IOC
LAPS SearchFlag modified
TEST IDMS-RECOMMENDED
LINK
Embedded Image "LAPS SearchFlags Modified:Modified" Modified IOE IOC
Unauthorized Users having GPLink Rights on Domain NC
TEST IDMS-RECOMMENDED
LINK
Embedded Image "AD Domains Affected:0" 23 IOE IOC
Unauthorized Users having GPLink Rights on Domain Controllers OU
TEST IDMS-RECOMMENDED
LINK
Embedded Image "AD Domains Affected:0" 23 IOE IOC
Unauthorized Users having GPLink Rights on AD Sites
TEST IDMS-RECOMMENDED
LINK
Embedded Image "AD Sites Affected:0" 23 IOE IOC
AD Recycle Bin Status
TEST IDMS-RECOMMENDED
Embedded Image "AD Recycle Bin Status:Disabled" Disabled
Privileged Management Status
TEST IDMS-RECOMMENDED
Embedded Image "Privileged Access Management Status:Disabled" Disabled
Managed Service Accounts Status
TEST IDMS-RECOMMENDED
Embedded Image "Managed Service Accounts Status:Are not in use" Are not in use
Missing SSL Authentication DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs without SSL:1" 1 IOE
Missing Enough DNS Servers in NIC DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs With inadequate Number Of DNS Servers in NIC Property:1" 1
Not Enough Local Disks DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs Not Configured With Recommended Disk Configuration:1" 1
Missing AD Sites Coverage
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Sites Not Covered:1" 1
Sites Missing Bridgehead Server
TEST IDMS-RECOMMENDED
Embedded Image "Number Of AD Sites Without Bridgehead Servers:1" 1
AD Sites Redundancy
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Sites with Only One Domain Controller:1" 1
Unprotected OUs
TEST IDMS-RECOMMENDED
Embedded Image "Total Ous not protected:1" 1
gMSA Accounts Status
TEST IDMS-RECOMMENDED
Embedded Image "Total Domains With gMSA Accounts:0" 0
Additional Roles and Features DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers with Additional Roles and Features:1" 1 IOE
Replication Interval Not Optimized Sites
TEST IDMS-RECOMMENDED
Embedded Image "Replication Interval is not optimized for Site Links:1" 1
Security Groups without Objects
TEST IDMS-RECOMMENDED
Embedded Image "Total Empty Security Groups In All Domains:32" 32
Users without UPN specified
TEST IDMS-RECOMMENDED
Embedded Image "Total Users with UPN Blank in all Domains:3" 3
Missing Location Text in AD Sites
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Sites Not Defined With Location:1" 1
GPO Description
TEST IDMS-RECOMMENDED
Embedded Image "Number of GPOs not set with Description:2" 23
Orphaned Admins on AdminSDHolder
TEST IDvuln1_permissions_adminsdholder
Embedded Image "Total Possible Orphaned Admins in all Domains on AdminSDHolder object:0" 0 IOC
Dangerous Permissions on AdminSDHolder
TEST IDvuln1_privileged_members_perm vuln2_privileged_members_perm
Embedded Image "AD Domains Affected:0" 0 IOC
Constrained delegation to domain controller service
TEST IDvuln1_delegation_a2d2
Embedded Image "Total Computers with Constrained Delegation in all Domains:0" 0 IOC
Resource-based constrained delegation on domain controllers
TEST IDvuln1_delegation_sourcedeleg
Embedded Image "Total Computers with Resource-Based Delegation in all Domains:0" 0 IOC
Anonymous Access to Active Directory
TEST IDvuln1_dsheuristics_bad
Embedded Image "Anonymous Access To Active Directory:0" 0 IOE
Anonymous or EVERYONE in Pre-Windows 2000 Group
TEST IDvuln2_compatible_2000_anonymous
Embedded Image "Number of Domains Affected:0" 0 IOE IOC
Found Hidden Domain Controllers
TEST IDMS-RECOMMENDED
Embedded Image "Total Hidden Domain Controllers:0" 0 IOE
Successful Exploit Machine Accounts Found
TEST IDMS-RECOMMENDED
Embedded Image "Total Exploit Machine Accounts:0" 0 IOE
Possible User-based Service Accounts found
TEST IDMS-RECOMMENDED
Embedded Image "Total Possible User-Based Service Accounts:0" 0 IOC
Domain Trusts Found
TEST IDMS-RECOMMENDED
Embedded Image "Domain Trusts Status:Not Found" Not Found IOE IOC
Replication Errors DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCS in Replication Errors:0" 0 IOE
Allowed RODC Password Replication Group is not empty
TEST IDvuln3_rodc_allowed_group
Embedded Image "Total Members in RODC Replication Group:0" 0 IOE
Managed service accounts with passwords unchanged for more than 90 days
TEST IDvuln_password_change_msa_no_change_90
Embedded Image "Total Managed Service Accounts Password Unchanged Since last 90 days:0" 0 IOE
msDS-NeverRevealGroupattribute RODC missing Privileged Accounts
TEST IDvuln3_rodc_never_reveal
Embedded Image "Total Privileged Groups Not in PRP Denied List:0" 0 IOE
Unsecure Updates Zones
TEST IDvuln1_dnszone_bad_prop vuln3_dnszone_bad_prop
Embedded Image "Total DNS Zones accepting non-secure updates:0" 0 IOE IOC
Users with LastPasswordSet was never Set
TEST IDvuln2_dont_expire
Embedded Image "Total Users with LastPasswordSet was never set in all Domains:0" 20 IOE
Users with PWDLastSet to ZERO
TEST IDvuln1_user_accounts_dormant
Embedded Image "Total Users with PWDLastSet to ZERO in all Domains:0" 23 IOE
Users with SPNs Configured
TEST IDvuln1_spn_priv
Embedded Image "Total Users with SPN defined in all Domains:0" 23 IOE
Password Expiration is missing for smart card users
TEST IDvuln_smartcard_expire_passwords
Embedded Image "AD Domains Affected:0" 4 IOE
Accounts vulnerable to Kerberoasting Found
TEST IDMS-RECOMMENDED
Embedded Image "Total Kerberoasting Accounts Found:0" 23 IOE
Users With DES encryption
TEST IDvuln2_kerberos_properties_deskey
Embedded Image "Total Users with DES Encryption in all Domains:0" 23 IOE
Users With Reversible Encryption
TEST IDvuln3_reversible_password
Embedded Image "Total Users with Reversible Encryption set in all Domains:0" 23 IOE
Users With Kerberos Pre-Authentication
TEST IDvuln1_kerberos_properties_preauth_priv vuln2_kerberos_properties_preauth
Embedded Image "Total Pre-Authentication Users in all domains:0" 23 IOE
Users Modified with PrimaryGroupID
TEST IDvuln3_primary_group_id_nochange vuln1_primary_group_id_1000
Embedded Image "Total Users with PrimaryGroupID Modified in all Domains:0" 23 IOC
Users Sending Bad Logons
TEST IDMS-RECOMMENDED
Embedded Image "Total Users sending Bad Logons in all Domains:0" 23 IOC
Users Disabled
TEST IDvuln_user_accounts_dormant
Embedded Image "Total Disabled Users in all Domains:0" 234 IOC
Stale User Accounts
TEST IDvuln1_user_accounts_dormant
Embedded Image "Total Stale User Accounts in all Domains:0" 400 IOC
Users Expired
TEST IDMS-RECOMMENDED
Embedded Image "Total Expired Users in all Domains:0" 200 IOC
User Accounts Pass Not Required
TEST IDvuln2_dont_expire
Embedded Image "Total Users with Password Not Required set in all Domains:0" 0 IOC
Computers with SPNs Configured
TEST IDvuln1_spn_priv
Embedded Image "Total Computers using ServicePrincipalNames in all Domains:0" 0 IOE
Computers With Unconstrained Delegation
TEST IDvuln2_delegation_t4d
Embedded Image "Total Computers with Unconstrained Delegation in all Domains:0" 0 IOE
Computers Modified with PrimaryGroupID
TEST IDvuln3_primary_group_id_nochange vuln1_primary_group_id_1000
Embedded Image "Total Computers modified with PrimaryGroupID:0" 0 IOC
Computers Sending Bad Logons
TEST IDMS-RECOMMENDED
Embedded Image "Total Computers sending Bad Logon Attempts in all Domains:0" 0 IOC
Computers Disabled
TEST IDvuln_user_accounts_dormant
Embedded Image "Total Disabled Computer Accounts in all Domains:0" 140 IOC
Stale Computer Accounts
TEST IDvuln1_user_accounts_dormant
Embedded Image "Total Stale Computer Accounts in all Domains:0" 200 IOC
Unsupported Operating Systems
TEST IDMS-RECOMMENDED
Embedded Image "Total End Of Life-Unsupported Operating Systems:0" 0 IOE
Admins with SPNs Configured
TEST IDvuln1_spn_priv
Embedded Image "Total Admin Accounts With ServicePrincipalName Identified:0" 0 IOE
Admins Sending Bad Logons
TEST IDMS-RECOMMENDED
Embedded Image "Total Privileged Users With Bad Logon Attempts:0" 0 IOC
Domain Controllers not owned by Admins
TEST IDvuln1_permissions_dc
Embedded Image "Total Domain Controllers owned by non-privileged accounts:0" 0 IOC
Computer Objects not managed by Admins
TEST IDvuln3_owner
Embedded Image "Total Computers Not Managed By Admins in all Domains:0" 0 IOC
Organizational Units not managed by Admins
TEST IDvuln3_owner
Embedded Image "Total Organizational Units Not Managed By Admins:0" 0 IOC
Recently Created Privileged Admins
TEST IDMS-RECOMMENDED
Embedded Image "Total Privileged Accounts created in last 10 days in all domains:0" 0 IOC
Users Identified with Privileged SIDs in sIDHistory
TEST IDMS-RECOMMENDED
Embedded Image "Total Users containing Admin Accounts in sIDHistory in all Domains:0" 0 IOC
Computers Identified with Privileged SIDs in sIDHistory
TEST IDMS-RECOMMENDED
Embedded Image "Total Computers containing Admin Accounts in sIDHistory in all Domains:0" 0 IOC
Found Excluded Groups by AdminSDHolder and SDProp
TEST IDMS-RECOMMENDED
Embedded Image "Total Excluded Groups by SDProp Process:0" 0 IOC
krbtgt Account with Resource-Based Constrained Delegation
TEST IDMS-RECOMMENDED
Embedded Image "Affected number of Domains:0" 0 IOC
Built-In Admin Account Password Not Changed in 90 days
TEST IDMS-RECOMMENDED
Embedded Image "Total Domains in which Default Administrator password not changed since last 90 days:0" 0 IOE
KRBTGT Account Password Not Changed
TEST IDvuln2_krbtgt
Embedded Image "Total Domains Using KRBTGT Old Password:0" 0 IOE
Guest Account is enabled
TEST IDMS-RECOMMENDED
Embedded Image "Total Guest Accounts Enabled in All Domains:0" 0 IOE
Administrator Account ServicePrincipalNames Found
TEST IDMS-RECOMMENDED
LINK
Embedded Image "Total AD Domains Affected:0" 0 IOE
Disabled Admins part of Privileged Groups
TEST IDMS-RECOMMENDED
Embedded Image "Total Disabled Admins In Privileged Groups:0" 23 IOE
Passwords Not Changed within 90 days
TEST IDvuln1_password_change_priv
Embedded Image "Total Admin Accounts Did Not Change Their Passwords Since Last 90 Days:0" 23 IOE
DNSAdmins Group has members
TEST IDvuln1_dnsadmins and vuln1_permissions_msdn
Embedded Image "Total Members In DNSAdmins Group In All Domains:0" 45 IOE IOC
AdminsCount Flag set users not acting as Admins
TEST IDMS-RECOMMENDED
LINK
Embedded Image "Total Unknown Admins Found:0" 232 IOC
Account Lockout Policies Missing
TEST IDMS-RECOMMENDED
Embedded Image "Total Accounts Locked Out in All Domains:0" 0 IOE
Domain Controllers Modified with PrimaryGroupID
TEST IDvuln3_primary_group_id_nochange vuln1_primary_group_id_1000
Embedded Image "Total Domain Controllers modified with PrimaryGroupID:0" 0 IOC
SMB 1 Protocol Enabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers with SMB1 Server Protocol Enabled:0" 0 IOE
SMB 1 Client Protocol Enabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers with SMB1 Client Service Enabled:0" 0 IOE
LAN Manager password hashes Enabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with LAN Manager Password Hashes:0" 0 IOE
SMB Signing Disabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domains Controller Without SMB Signing:0" 0 IOE
LDAP Signing Disabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers Without LDAP Signing:0" 0 IOE
Inconsistent DCs
TEST IDvuln1_dc_inconsistent_uac
Embedded Image "Total Domain Controllers in Inconsistent State:0" 0 IOE
Unauthenticated DCs since last 45 Days
TEST IDvuln1_password_change_inactive_dc
Embedded Image "Total Domain Controllers Not Authenticated Within 45 days In All Domains:0" 0 IOE
Secrets not renewed DCs
TEST IDvuln1_password_change_dc_no_change
Embedded Image "Total Domain Controllers Not Changed Password Within 45 Days In All Domains:0" 0 IOE
Missed Reboot Cycles DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs Not Rebooted Since Last 30 Days:0" 0 IOE
No Contacts with Domain Controllers in Last Three Months
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers not contacted since last three months:0" 0 IOE
Ensure UNC Paths for SYSVOL and NETLOGON are harderend
TEST IDMS-RECOMMENDED
LINK
Embedded Image "SYSVOL and Netlogon Hardening Missing on Total DCs:0" 0 IOE
Orphaned DCs
TEST IDvuln1_dc_inconsistent_uac
Embedded Image "Total Orphaned Domain Controllers:0" 0 IOE
Missing DNS Forwarders DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DNS Servers Do Not Have Forwarders Configured:0" 0 IOE
Missing Root Hints DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DNS Servers Do Not Have Root Hints Configured:0" 0 IOE
Missing Host Records DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs Missing Host Records in DNS:0" 0 IOE
Not Enough Free Space DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with Low Disk Space:0" 0 IOE
Loopback Address Missing DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs not configured with Loopback Address:0" 0 IOE
Multihomed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCS in Multihomed State:0" 0 IOE
NTFS Replication DCs
TEST IDvuln2_sysvol_ntfrs
Embedded Image "Total Domain Controllers utilizing NTFRS for AD Replication:0" 0 IOE
Strict Replication Disabled DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with Strict Replication Consistency not enabled:0" 0 IOE IOC
DCDiag Failure DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with DCDiag Failures:0" 0
Out Of Default OUs DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs outside of it's Default OU:0" 0
Unsupported OS DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs running Unsupported Operating Systems:0" 0 IOE
Missing DNS Dynmaic Registration on NIC DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCS NIC Dynamic Updates Not Enabled:0" 0
Missing _msdcs Zone DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DNS Servers Missing _msdcs Zone:0" 0
Event Log Config Not Correct DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with Event Log misconfiguration:0" 0
Event Log Size Not Optimized DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with Event Log Size not optimal:0" 0
Fax Server role installed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers have Fax Server Installed::0" 0 IOE
Microsoft FTP service installed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers have FTP Server Installed::0" 0 IOE
Peer Name Resolution Protocol installed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers have Peer Name Resolution Protocol Installed::0" 0 IOE
Simple TCP-IP Services installed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers have Simple TCP/IP Services Installed::0" 0 IOE
Telnet Client installed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers have Telnet Client Installed::0" 0 IOE
TFTP Client installed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers have TFTP Client Installed::0" 0 IOE
Server Message Block (SMB) v1 protocol Installed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers have SMB 1.0/CIFS File Sharing Support Installed::0" 0 IOE
Windows PowerShell 2.0 installed DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers have Windows PowerShell 2.0 Engine Installed::0" 0 IOE
ADWS Service Set to Manual DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs ADWS Not Set to Start Automatic:0" 0 IOE
DHCP Service Running DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total Domain Controllers with DHCP Server running:0" 0 IOE
AD Services not running DCs
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs with Services Not Running:0" 0 IOE
Total Undefined Subnets
TEST IDMS-RECOMMENDED
Embedded Image "Total Undefined Subnets in AD Forest:0" 0
Sites without ISTG Role
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Sites Do Not Have ISTG Defined:0" 0
Manual Replication Connection Objects
TEST IDMS-RECOMMENDED
Embedded Image "Total Manual Replication Connection Objects:0" 0
Missing Global Catalog Sites
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Sites Without Global Catalog Servers or No Universal Group Caching Enabled:0" 0
Duplicate Site Links
TEST IDMS-RECOMMENDED
Embedded Image "Total Duplicate Site Links:0" 0
Sites With Manual Bridgehead Server
TEST IDMS-RECOMMENDED
Embedded Image "Number Of AD Sites With Manual Bridgehead Servers:0" 0
Sites creating Mesh Topology
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Site Links Containing More than Two AD Sites:0" 0
AD Sites without Site Link
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Sites Not In Site Links:0" 0
AD Sites without Domain Controller
TEST IDMS-RECOMMENDED
Embedded Image "Total AD Sites Without Domain Controllers:0" 0
Domain Controllers Time Source
TEST IDMS-RECOMMENDED
Embedded Image "Total DCs Not Defined With Correct Time-Source:0" 0
Domain FSMO Placement
TEST IDMS-RECOMMENDED
Embedded Image "AD FSMO Placement Status:FSMO Placement is correct." FSMO Placement is correct.
Domain Naming Master and Schema Master Placement
TEST IDMS-RECOMMENDED
Embedded Image "Status:Hosted on same computer" Hosted on same computer
Managed Service Accounts Not Linked
TEST IDMS-RECOMMENDED
Embedded Image "Total Managed Service Accounts are not Linked:0" 0 IOE
TombstoneLifeTime Modified?
TEST IDMS-RECOMMENDED
Embedded Image "Current TombstoneLifeTime Value:180" 180
Check AD Forest Functional Level
TEST IDMS-RECOMMENDED
Embedded Image "AD Forest Functional Level:Dynamicpacks.net is Windows2016Forest" Dynamicpacks.net is Windows2016Forest
Check AD Domain Functional Level
TEST IDMS-RECOMMENDED
Embedded Image "Status:Ok" Ok
Ogranizational Units without Objects
TEST IDMS-RECOMMENDED
Embedded Image "Total Empty Organizational Units In All Domains:0" 0
Duplicate SPNs
TEST IDvuln1_delegation_sourcedeleg
Embedded Image "Total Duplicate SPNs in AD Domains:0" 0
Unauthenticated Servers
TEST IDvuln2_password_change_server_no_change_90
Embedded Image "Total Servers Not Authenticated Within 90 Days in All Domains:0" 0 IOE IOC
Secrets not renewed Servers
TEST IDvuln3_password_change_server_no_change_45
Embedded Image "Total Servers Not Changing Password within 45 days in all Domains:0" 0 IOE IOC
AD Forest Schema Not upto date
TEST IDvuln2_adupdate_bad
Embedded Image "Current Forest Schema Version Status:OK:88" OK:88 IOE
Found Unused Netlogon Scripts
TEST IDMS-RECOMMENDED
LINK
Embedded Image "Total Unused Scripts In All Domains:0" 0 IOE IOC
No Group Policy Objects for Preventing passwords using reversible encryption
TEST IDMS-RECOMMENDED
LINK
Embedded Image "Total AD Domains Affected:0" 0
GPO Preferences Containing Passwords
TEST IDMS-RECOMMENDED
LINK
Embedded Image "GPO Preferences Containing Password in All AD Domains:0" 0
Too many DNS Static Records
TEST IDMS-RECOMMENDED
Embedded Image "Total Static Records:0" 0 IOC
DNS Round-Robin Not Enabled
TEST IDMS-RECOMMENDED
Embedded Image "Total DNS Servers Not Enabled With Round Robin:0" 0
Conditional Forwarders Not Working
TEST IDMS-RECOMMENDED
Embedded Image "Total Conditional Forwarders Configured:0" 0

Users Info

AD DomainBlank PasswordLastPassword UnsetStaleDisabledPass Never ExpiresExpiredReversible EncDES EncPrimaryGroupID ModifiedPWDLastSet UnsetKerberos Pre-AuthWith SPNsSending Bad LogonsPassword Not RequiredUnconstrained Delegation
Dynamicpacks.netBlank PAsswordBlank PAsswordInactive0100500000040NOT FOUND
Domaintwo.comBlank PasswordBlank PasswordInactive010010000000040NOT FOUND

Computers Info

AD DomainDisabledStaleWith SPNsSending Bad LogonsPrimaryGroupID ModifiedUnmanagedUnconstrained Delegation
Dynamicpacks.net0000NOT FOUND00
Domaintwo.com0000NOT FOUND00

DC Info

DomainHostNameIPv4AddressIPv6AddressIsGlobalCatalogIsReadOnlyOperatingSystemOperatingSystemServicePackSiteSslPort
Dynamicpacks.netdc114.Dynamicpacks.net172.16.31.114TrueFalseWindows Server 2019 Standard EvaluationDefault-First-Site-Name636

The Consolidation/Migration Score shows details about the score for two types of items; Objects and Security Risks. Objects Score indicates the objects such as users, groups, admins, computers and Operating System that require remediation. Security Risks Score indicates the risks that need to be mitigated before the migration. It also tells you whether the source AD Domain is ready for migration or not. Below summary is for all AD Domains. If you need to see the information for a specific domain then please select the AD Domain from the list.

Domain: DynamicPacks.net

MIGRATION SCORE

54.17%

% of Migration Ready

Categories % Stale
Inactive/Disabled
% Security Risks
Users

20.85%

91.67%

Computers

85%

100%

Admins

1.05%

100%

Servers

STALESCORE%

SESCORE%

Operating Systems

STALESCORE%

SESCORE%

Groups

STALESCORE%

SESCORE%

Admin Groups

STALESCORE%

SESCORE%

Domain Controllers

STALESCORE%

SESCORE%

AD GPOs

2%

12.5%

AD Permissions

100%

0%

Organizational Units

STALESCORE%

SESCORE%

SERVERS

FILLSERVERSTABLEHERE

OPERATING SYSTEMS

FILLOPERATINGSYSTEMTABLESHERE

GROUPS

FILLALLGROUPSTABLEHERE

ADMIN GROUPS

FILLALLADMINGROUPSHERE

DOMAIN CONTROLLERS

FILLDOMAINCONTROLLERSTABLEHERE

ORGANIZATIONAL UNITS

FILLORGANIAZTIONALUNITSTABLEHERE
Test Severity Impact Recommendation
Lock screen camera status Embedded Image
Lock screen slide show status Embedded Image Setting is not configured at all or not configured correctly. Slide shows that are displayed on the lock screen could display sensitive information to unauthorized personnel. Turning off this feature will limit access to the information to a logged-on user. Configure the policy value for Computer Configuration >> Administrative Templates >> Control Panel >> Personalization >> Prevent enabling lock screen slide show to Enabled.
Passwords to be saved status Embedded Image Setting is not configured at all or not configured correctly. Saving passwords in the Remote Desktop Client could allow an unauthorized user to establish a remote desktop session to another system. The system must be configured to prevent users from saving passwords in the Remote Desktop Client. Satisfies: SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00156 Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Connection Client >> Do not allow passwords to be saved to Enabled.
Always prompt for password upon connection status Embedded Image Setting is not configured at all or not configured correctly. This setting controls the ability of users to supply passwords automatically as part of their remote desktop connection. Disabling this setting would allow anyone to use the stored credentials in a connection item to connect to the terminal server. Satisfies: SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00156 Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> Always prompt for password upon connection to Enabled.
Require secure RPC communication status Embedded Image Setting is not configured at all or not configured correctly. Allowing unsecure RPC communication exposes the system to man-in-the-middle attacks and data disclosure attacks. A man-in-the-middle attack occurs when an intruder captures packets between a client and server and modifies them before allowing the packets to be exchanged. Usually the attacker will modify the information in the packets in an attempt to cause either the client or server to reveal sensitive information. Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> Require secure RPC communication to Enabled.
Set client connection encryption level status Embedded Image Setting is not configured at all or not configured correctly. Remote connections must be encrypted to prevent interception of data or sensitive information. Selecting High Level will ensure encryption of Remote Desktop Services sessions in both directions. Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Security >> Set client connection encryption level to Enabled with High Level selected.
Windows Defender SmartScreen status Embedded Image
AutoPlay status Embedded Image Setting is not configured at all or not configured correctly. Allowing AutoPlay to execute may introduce malicious code to a system. AutoPlay begins reading from a drive as soon media is inserted into the drive. As a result, the setup file of programs or music on audio media may start. By default, AutoPlay is disabled on removable drives, such as the floppy disk drive (but not the CD-ROM drive) and on network drives. Enabling this policy disables AutoPlay on all drives. Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> Turn off AutoPlay to Enabled with All Drives selected.
Default behavior for AutoRun status Embedded Image Setting is not configured at all or not configured correctly. Allowing AutoRun commands to execute may introduce malicious code to a system. Configuring this setting prevents AutoRun commands from executing. Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> AutoPlay Policies >> Set the default behavior for AutoRun to Enabled with Do not execute any autorun commands selected.
UNC Paths Hardened status Embedded Image Setting is not configured at all or not configured correctly. Additional security requirements are applied to Universal Naming Convention (UNC) paths specified in hardened UNC paths before allowing access to them. This aids in preventing tampering with or spoofing of connections to these paths. Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Network Provider >> Hardened UNC Paths to Enabled with at least the following configured in Hardened UNC Paths: (click the Show button to display) Value Name: \*SYSVOL
Insecure guest logons status Embedded Image Setting is not configured at all or not configured correctly. Insecure guest logons allow unauthenticated access to shared folders. Shared resources on a system must require authentication to establish proper access. Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> Lanman Workstation >> Enable insecure guest logons to Disabled.
Audit- Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings status Embedded Image Setting is not configured at all or not configured correctly. The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require a password. This can allow access to system resources by unauthorized users. Renaming this account to an unidentified name improves the protection of this account and the system. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Accounts: Rename guest account to a name other than Guest.
Domain controller- LDAP server signing requirements status Embedded Image Setting is not configured at all or not configured correctly. Unsigned network traffic is susceptible to man-in-the-middle attacks, where an intruder captures packets between the server and the client and modifies them before forwarding them to the client. In the case of an LDAP server, this means that an attacker could cause a client to make decisions based on false records from the LDAP directory. The risk of an attacker pulling this off can be decreased by implementing strong physical security measures to protect the network infrastructure. Furthermore, implementing Internet Protocol security (IPsec) authentication header mode (AH), which performs mutual authentication and packet integrity for Internet Protocol (IP) traffic, can make all types of man-in-the-middle attacks extremely difficult. Satisfies: SRG-OS-000423-GPOS-00187, SRG-OS-000424-GPOS-00188 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain controller: LDAP server signing requirements to Require signing.
Domain controller- Refuse machine account password changes status Embedded Image Setting is not configured at all or not configured correctly. Enabling this setting on all domain controllers in a domain prevents domain members from changing their computer account passwords. If these passwords are weak or compromised, the inability to change them may leave these computers vulnerable. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain controller: Refuse machine account password changes to Disabled.
Domain member- Digitally encrypt secure channel data (when possible) status Embedded Image Setting is not configured at all or not configured correctly. Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but not all information is encrypted. If this policy is enabled, outgoing secure channel traffic will be encrypted. Satisfies: SRG-OS-000423-GPOS-00187, SRG-OS-000424-GPOS-00188 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Digitally encrypt secure channel data (when possible) to Enabled.
Domain member- Digitally sign secure channel data (when possible) status Embedded Image Setting is not configured at all or not configured correctly. Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked. If this policy is enabled, outgoing secure channel traffic will be signed. Satisfies: SRG-OS-000423-GPOS-00187, SRG-OS-000424-GPOS-00188 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Digitally sign secure channel data (when possible) to Enabled.
Domain member- Disable machine account password changes status Embedded Image Setting is not configured at all or not configured correctly. Computer account passwords are changed automatically on a regular basis. Disabling automatic password changes can make the system more vulnerable to malicious access. Frequent password changes can be a significant safeguard for the system. A new password for the computer account will be generated every 30 days. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Disable machine account password changes to Disabled.
Domain member- Maximum machine account password age status Embedded Image Setting is not configured at all or not configured correctly. Computer account passwords are changed automatically on a regular basis. This setting controls the maximum password age that a machine account may have. This must be set to no more than 30 days, ensuring the machine changes its password monthly. This is the default configuration for this setting (30 days). Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Maximum machine account password age to 30 or less (excluding 0, which is unacceptable).
Domain member- Require strong (Windows 2000 or later) session key status Embedded Image Setting is not configured at all or not configured correctly. A computer connecting to a domain controller will establish a secure channel. The secure channel connection may be subject to compromise, such as hijacking or eavesdropping, if strong session keys are not used to establish the connection. Requiring strong session keys enforces 128-bit encryption between systems. Satisfies: SRG-OS-000423-GPOS-00187, SRG-OS-000424-GPOS-00188 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Domain member: Require strong (Windows 2000 or Later) session key to Enabled.
Interactive logon- Machine inactivity limit status Embedded Image Setting is not configured at all or not configured correctly. Unattended systems are susceptible to unauthorized use and should be locked when unattended. The screen saver should be set at a maximum of 15 minutes and be password protected. This protects critical and sensitive data from exposure to unauthorized personnel with physical access to the computer. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Interactive logon: Machine inactivity limit to 900 seconds or less, excluding 0 which is effectively disabled.
Microsoft network client- Digitally sign communications (always) status Embedded Image Setting is not configured at all or not configured correctly. The server message block (SMB) protocol provides the basis for many network operations. Digitally signed SMB packets aid in preventing man-in-the-middle attacks. If this policy is enabled, the SMB client will only communicate with an SMB server that performs SMB packet signing. Satisfies: SRG-OS-000423-GPOS-00187, SRG-OS-000424-GPOS-00188 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Microsoft network client: Digitally sign communications (always) to Enabled.
Microsoft network client- Send unencrypted password to third-party SMB servers status Embedded Image Setting is not configured at all or not configured correctly. Some non-Microsoft SMB servers only support unencrypted (plain-text) password authentication. Sending plain-text passwords across the network when authenticating to an SMB server reduces the overall security of the environment. Check with the vendor of the SMB server to determine if there is a way to support encrypted password authentication. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Microsoft Network Client: Send unencrypted password to third-party SMB servers to Disabled.
Network access- Do not allow anonymous enumeration of SAM accounts status Embedded Image Setting is not configured at all or not configured correctly. Anonymous enumeration of SAM accounts allows anonymous logon users (null session connections) to list all accounts names, thus providing a list of potential points to attack the system. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network access: Do not allow anonymous enumeration of SAM accounts to Enabled.
Network access- Do not allow anonymous enumeration of SAM accounts and shares status Embedded Image Setting is not configured at all or not configured correctly. Allowing anonymous logon users (null session connections) to list all account names and enumerate all shared resources can provide a map of potential points to attack the system. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network access: Do not allow anonymous enumeration of SAM accounts and shares to Enabled.
Network security- Allow LocalSystem NULL session fallback status Embedded Image Setting is not configured at all or not configured correctly. NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Allow LocalSystem NULL session fallback to Disabled.
Network security- Allow LocalSystem NULL session fallback status Embedded Image Setting is not configured at all or not configured correctly. NTLM sessions that are allowed to fall back to Null (unauthenticated) sessions may gain unauthorized access. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Allow LocalSystem NULL session fallback to Disabled.
Network security- LAN Manager authentication level status Embedded Image Setting is not configured at all or not configured correctly. The Kerberos v5 authentication protocol is the default for authentication of users who are logging on to domain accounts. NTLM, which is less secure, is retained in later Windows versions for compatibility with clients and servers that are running earlier versions of Windows or applications that still use it. It is also used to authenticate logons to standalone computers that are running later versions. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: LAN Manager authentication level to Send NTLMv2 response only. Refuse LM & NTLM.
Network security- LDAP client signing requirements Embedded Image Setting is not configured at all or not configured correctly. This setting controls the signing requirements for LDAP clients. This must be set to Negotiate signing or Require signing, depending on the environment and type of LDAP server in use. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: LDAP client signing requirements to Negotiate signing at a minimum.
Network security- Minimum session security for NTLM SSP based (including secure RPC) clients status Embedded Image Setting is not configured at all or not configured correctly. Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Minimum session security for NTLM SSP based (including secure RPC) clients to Require NTLMv2 session security and Require 128-bit encryption (all options selected).
Network security- Minimum session security for NTLM SSP based (including secure RPC) servers status Embedded Image Setting is not configured at all or not configured correctly. Microsoft has implemented a variety of security support providers for use with Remote Procedure Call (RPC) sessions. All of the options must be enabled to ensure the maximum security level. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> Network security: Minimum session security for NTLM SSP based (including secure RPC) servers to Require NTLMv2 session security and Require 128-bit encryption (all options selected).
System objects- Strengthen default permissions of internal system objects status Embedded Image
User Account Control- Admin Approval Mode for the Built-in Administrator account status Embedded Image Setting is not configured at all or not configured correctly. User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the built-in Administrator account so that it runs in Admin Approval Mode. Satisfies: SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00156 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Admin Approval Mode for the Built-in Administrator account to Enabled.
User Account Control- Behavior of the elevation prompt for administrators in Admin Approval Mode status Embedded Image Setting is not configured at all or not configured correctly. User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures the elevation requirements for logged-on administrators to complete a task that requires raised privileges. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode to Prompt for consent on the secure desktop. The more secure option for this setting, Prompt for credentials on the secure desktop, would also be acceptable.
User Account Control- Behavior of the elevation prompt for standard users status Embedded Image Setting is not configured at all or not configured correctly. User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting controls the behavior of elevation when requested by a standard user account. Satisfies: SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00156 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Behavior of the elevation prompt for standard users to Automatically deny elevation requests.
User Account Control- Detect application installations and prompt for elevation status Embedded Image Setting is not configured at all or not configured correctly. User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting requires Windows to respond to application installation requests by prompting for credentials. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Detect application installations and prompt for elevation to Enabled.
User Account Control- Only elevate UIAccess applications that are installed in secure locations status Embedded Image Setting is not configured at all or not configured correctly. User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures Windows to only allow applications installed in a secure location on the file system, such as the Program Files or the WindowsSystem32 folders, to run with elevated privileges. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Only elevate UIAccess applications that are installed in secure locations to Enabled.
User Account Control- Run all administrators in Admin Approval Mode status Embedded Image Setting is not configured at all or not configured correctly. User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting enables UAC. Satisfies: SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00156 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Run all administrators in Admin Approval Mode to Enabled.
User Account Control- Virtualize file and registry write failures to per-user locations status Embedded Image Setting is not configured at all or not configured correctly. User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting configures non-UAC-compliant applications to run in virtualized file and registry entries in per-user locations, allowing them to run. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> Security Options >> User Account Control: Virtualize file and registry write failures to per-user locations to Enabled.
Audit Credential Validation status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Credential Validation records events related to validation tests on credentials for a user account logon. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Logon >> Audit Credential Validation with Success selected.
Audit Computer Account Management status Embedded Image
Audit Other Account Management Events status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Other Account Management Events records events such as the access of a password hash or the Password Policy Checking API being called. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000064-GPOS-00033, SRG-OS-000462-GPOS-00206, SRG-OS-000466-GPOS-00210 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> Audit Other Account Management Events with Success selected.
Audit Security Group Management status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Security Group Management records events such as creating, deleting, or changing security groups, including changes in group members. Satisfies: SRG-OS-000004-GPOS-00004, SRG-OS-000239-GPOS-00089, SRG-OS-000240-GPOS-00090, SRG-OS-000241-GPOS-00091, SRG-OS-000303-GPOS-00120, SRG-OS-000476-GPOS-00221 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> Audit Security Group Management with Success selected.
Audit User Account Management status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. User Account Management records events such as creating, changing, deleting, renaming, disabling, or enabling user accounts. Satisfies: SRG-OS-000004-GPOS-00004, SRG-OS-000239-GPOS-00089, SRG-OS-000240-GPOS-00090, SRG-OS-000241-GPOS-00091, SRG-OS-000303-GPOS-00120, SRG-OS-000476-GPOS-00221 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Account Management >> Audit User Account Management with Success selected.
Audit PNP Activity status Embedded Image
Audit Process Creation status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Process Creation records events related to the creation of a process and the source. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000471-GPOS-00215 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Detailed Tracking >> Audit Process Creation with Success selected.
Audit Directory Service Access status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Audit Directory Service Access records events related to users accessing an Active Directory object. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000458-GPOS-00203, SRG-OS-000463-GPOS-00207, SRG-OS-000468-GPOS-00212 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> Directory Service Access with Success selected.
Audit Directory Service Changes status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Audit Directory Service Changes records events related to changes made to objects in Active Directory Domain Services. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000458-GPOS-00203, SRG-OS-000463-GPOS-00207, SRG-OS-000468-GPOS-00212 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> DS Access >> Directory Service Changes with Success selected.
Audit Account Lockout status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Account Lockout events can be used to identify potentially malicious logon attempts. Satisfies: SRG-OS-000240-GPOS-00090, SRG-OS-000470-GPOS-00214 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> Audit Account Lockout with Success selected.
Audit Group Membership status Embedded Image
Audit Logon status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Logon records user logons. If this is an interactive logon, it is recorded on the local system. If it is to a network share, it is recorded on the system accessed. Satisfies: SRG-OS-000032-GPOS-00013, SRG-OS-000470-GPOS-00214, SRG-OS-000472-GPOS-00217, SRG-OS-000473-GPOS-00218, SRG-OS-000475-GPOS-00220 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> Audit Logon with Success selected.
Audit Other Logon/Logoff Events status Embedded Image
Audit Special Logon status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Special Logon records special logons that have administrative privileges and can be used to elevate processes. Satisfies: SRG-OS-000470-GPOS-00214, SRG-OS-000472-GPOS-00217, SRG-OS-000473-GPOS-00218, SRG-OS-000475-GPOS-00220 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Logon/Logoff >> Audit Special Logon with Success selected.
Audit Detailed File Share status Embedded Image
Audit File Share status Embedded Image
Audit Other Object Access Events status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Auditing for other object access records events related to the management of task scheduler jobs and COM+ objects. Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Object Access >> Audit Other Object Access Events with Success selected.
Audit Removable Storage status Embedded Image
Audit Audit Policy Change status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Audit Policy Change records events related to changes in audit policy. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000458-GPOS-00203, SRG-OS-000463-GPOS-00207, SRG-OS-000468-GPOS-00212 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> Audit Audit Policy Change with Success selected.
Audit Authentication Policy Change status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Authentication Policy Change records events related to changes in authentication policy, including Kerberos policy and Trust changes. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000064-GPOS-00033, SRG-OS-000462-GPOS-00206, SRG-OS-000466-GPOS-00210 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Policy Change >> Audit Authentication Policy Change with Success selected.
Audit MPSSVC Rule-Level Policy Change status Embedded Image
Audit Other Policy Change Events status Embedded Image
Audit Sensitive Privilege Use status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Sensitive Privilege Use records events related to use of sensitive privileges, such as Act as part of the operating system or Debug programs. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000064-GPOS-00033, SRG-OS-000462-GPOS-00206, SRG-OS-000466-GPOS-00210 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> Privilege Use >> Audit Sensitive Privilege Use with Success selected.
Audit Other System Events status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Audit Other System Events records information related to cryptographic key operations and the Windows Firewall service. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000458-GPOS-00203, SRG-OS-000463-GPOS-00207, SRG-OS-000468-GPOS-00212 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit Other System Events with Success selected.
Audit Security State Change status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Security State Change records events related to changes in the security state, such as startup and shutdown of the system. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000458-GPOS-00203, SRG-OS-000463-GPOS-00207, SRG-OS-000468-GPOS-00212 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit Security State Change with Success selected.
Audit Security System Extension status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. Security System Extension records events related to extension code being loaded by the security subsystem. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000458-GPOS-00203, SRG-OS-000463-GPOS-00207, SRG-OS-000468-GPOS-00212 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit Security System Extension with Success selected.
Audit System Integrity status Embedded Image Setting is not configured at all or not configured correctly. Maintaining an audit trail of system activity logs can help identify configuration errors, troubleshoot service disruptions, and analyze compromises that have occurred, as well as detect attacks. Audit logs are necessary to provide a trail of evidence in case the system or network is compromised. Collecting this data is essential for analyzing the security of information assets and detecting signs of suspicious and unexpected behavior. System Integrity records events related to violations of integrity to the security subsystem. Satisfies: SRG-OS-000327-GPOS-00127, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222 Configure the policy value for Computer Configuration >> Windows Settings >> Security Settings >> Advanced Audit Policy Configuration >> System Audit Policies >> System >> Audit System Integrity with Success selected.
Domain member- Digitally encrypt or sign secure channel data (always) status Embedded Image Setting is configured or test is passed.
Microsoft network server- Digitally sign communications (always) status Embedded Image Setting is configured or test is passed.
Network security- Do not store LAN Manager hash value on next password change status Embedded Image Setting is configured or test is passed.
Test Severity Items Affected Objects IOC/IOE
Missing DNS Scavenging DCs Embedded Image "Total DNS Servers Not Enabled with Server Level Scavenging:1" 1 IOE
Missing Domain Zones Scavenging Embedded Image "Total Domain Zones Not Enabled with Scavenging:1" 1 IOC
Default Domain Policy-Minimum Password Length Embedded Image "Account Policies Not Configured correctly in Total Domains:1" 1 IOE
FGPP Policies-Minimum Password Length Embedded Image "FGPP Not Configured Correctly In Domains:Not Created" Not Created IOE
FGPP Policies Not Applying Embedded Image "Total FGPP Not Applying in All Domains:Not Created" Not Created IOE
Errors and Warnings in Log DCs Embedded Image "Total DCs with Event Log Errors:1" 1 IOE
Sites without Subnets Association Embedded Image "Total AD Sites Without Subnets:1" 1
PDC Emulator Time Source Embedded Image "Root PDC Time Source:Internal Source" Internal Source
Disabled GPOs Embedded Image "Total Disabled GPOs:0" 23
GPOs not Linked to OUs Embedded Image "Total OUs without GPO Linked:0" 23 IOE
GPOs not Applying Embedded Image "Total GPOs not applying correctly in All Domains:0" 34
Orphaned GPO Containers Embedded Image "Total Orphaned Group Policy Objects:0" 34
Found GPOs with Block Inheritance Embedded Image "Total GPOs with Block Inheritance Defined:0" 2
GPO Naming Convention Embedded Image "Number Of GPOs do not follow Standard Naming Convention:0" 32
Found GPO with WMI Filters Embedded Image "Total GPO with WMI Filter:0" 45
AD Recycle Bin Status Embedded Image "AD Recycle Bin Status:Disabled" Disabled
Privileged Management Status Embedded Image "Privileged Access Management Status:Disabled" Disabled
Managed Service Accounts Status Embedded Image "Managed Service Accounts Status:Are not in use" Are not in use
Missing AD Sites Coverage Embedded Image "Total AD Sites Not Covered:1" 1
Sites Missing Bridgehead Server Embedded Image "Number Of AD Sites Without Bridgehead Servers:1" 1
AD Sites Redundancy Embedded Image "Total AD Sites with Only One Domain Controller:1" 1
Additional Roles and Features DCs Embedded Image "Total Domain Controllers with Additional Roles and Features:1" 1 IOE
Replication Interval Not Optimized Sites Embedded Image "Replication Interval is not optimized for Site Links:1" 1
Security Groups without Objects Embedded Image "Total Empty Security Groups In All Domains:32" 32
Users without UPN specified Embedded Image "Total Users with UPN Blank in all Domains:3" 3
Missing Location Text in AD Sites Embedded Image "Total AD Sites Not Defined With Location:1" 1
GPO Description Embedded Image "Number of GPOs not set with Description:2" 23
Unsecure Updates Zones Embedded Image "Total DNS Zones accepting non-secure updates:0" 0 IOE IOC
Unsupported Operating Systems Embedded Image "Total End Of Life-Unsupported Operating Systems:0" 0 IOE
Domain Controllers not owned by Admins Embedded Image "Total Domain Controllers owned by non-privileged accounts:0" 0 IOC
Missing DNS Forwarders DCs Embedded Image "Total DNS Servers Do Not Have Forwarders Configured:0" 0 IOE
Missing Root Hints DCs Embedded Image "Total DNS Servers Do Not Have Root Hints Configured:0" 0 IOE
NTFS Replication DCs Embedded Image "Total Domain Controllers utilizing NTFRS for AD Replication:0" 0 IOE
Strict Replication Disabled DCs Embedded Image "Total DCs with Strict Replication Consistency not enabled:0" 0 IOE IOC
Out Of Default OUs DCs Embedded Image "Total DCs outside of it's Default OU:0" 0
Unsupported OS DCs Embedded Image "Total DCs running Unsupported Operating Systems:0" 0 IOE
Event Log Config Not Correct DCs Embedded Image "Total DCs with Event Log misconfiguration:0" 0
Event Log Size Not Optimized DCs Embedded Image "Total DCs with Event Log Size not optimal:0" 0
ADWS Service Set to Manual DCs Embedded Image "Total DCs ADWS Not Set to Start Automatic:0" 0 IOE
DHCP Service Running DCs Embedded Image "Total Domain Controllers with DHCP Server running:0" 0 IOE
Total Undefined Subnets Embedded Image "Total Undefined Subnets in AD Forest:0" 0
Sites without ISTG Role Embedded Image "Total AD Sites Do Not Have ISTG Defined:0" 0
Manual Replication Connection Objects Embedded Image "Total Manual Replication Connection Objects:0" 0
Missing Global Catalog Sites Embedded Image "Total AD Sites Without Global Catalog Servers or No Universal Group Caching Enabled:0" 0
Duplicate Site Links Embedded Image "Total Duplicate Site Links:0" 0
Sites With Manual Bridgehead Server Embedded Image "Number Of AD Sites With Manual Bridgehead Servers:0" 0
Sites creating Mesh Topology Embedded Image "Total AD Site Links Containing More than Two AD Sites:0" 0
AD Sites without Site Link Embedded Image "Total AD Sites Not In Site Links:0" 0
AD Sites without Domain Controller Embedded Image "Total AD Sites Without Domain Controllers:0" 0
Domain Controllers Time Source Embedded Image "Total DCs Not Defined With Correct Time-Source:0" 0
Domain FSMO Placement Embedded Image "AD FSMO Placement Status:FSMO Placement is correct." FSMO Placement is correct.
Domain Naming Master and Schema Master Placement Embedded Image "Status:Hosted on same computer" Hosted on same computer
Managed Service Accounts Not Linked Embedded Image "Total Managed Service Accounts are not Linked:0" 0 IOE
TombstoneLifeTime Modified? Embedded Image "Current TombstoneLifeTime Value:180" 180
Check AD Forest Functional Level Embedded Image "AD Forest Functional Level:Dynamicpacks.net is Windows2016Forest" Dynamicpacks.net is Windows2016Forest
Check AD Domain Functional Level Embedded Image "Status:Ok" Ok
Ogranizational Units without Objects Embedded Image "Total Empty Organizational Units In All Domains:0" 0
Too many DNS Static Records Embedded Image "Total Static Records:0" 0 IOC
DNS Round-Robin Not Enabled Embedded Image "Total DNS Servers Not Enabled With Round Robin:0" 0
Test Severity Items Affected Objects IOC/IOE
Domain GPO Application Status Embedded Image "Total GPOs Not Applied:0" 23
Missing SSL Authentication DCs Embedded Image "Total DCs without SSL:1" 1 IOE
Missing Enough DNS Servers in NIC DCs Embedded Image "Total DCs With inadequate Number Of DNS Servers in NIC Property:1" 1
Not Enough Local Disks DCs Embedded Image "Total DCs Not Configured With Recommended Disk Configuration:1" 1
Replication Errors DCs Embedded Image "Total DCS in Replication Errors:0" 0 IOE
Missed Reboot Cycles DCs Embedded Image "Total DCs Not Rebooted Since Last 30 Days:0" 0 IOE
Orphaned DCs Embedded Image "Total Orphaned Domain Controllers:0" 0 IOE
Missing Host Records DCs Embedded Image "Total DCs Missing Host Records in DNS:0" 0 IOE
Not Enough Free Space DCs Embedded Image "Total DCs with Low Disk Space:0" 0 IOE
Loopback Address Missing DCs Embedded Image "Total DCs not configured with Loopback Address:0" 0 IOE
Multihomed DCs Embedded Image "Total DCS in Multihomed State:0" 0 IOE
DCDiag Failure DCs Embedded Image "Total DCs with DCDiag Failures:0" 0
Missing DNS Dynmaic Registration on NIC DCs Embedded Image "Total DCS NIC Dynamic Updates Not Enabled:0" 0
Missing _msdcs Zone DCs Embedded Image "Total DNS Servers Missing _msdcs Zone:0" 0
AD Services not running DCs Embedded Image "Total DCs with Services Not Running:0" 0 IOE
Conditional Forwarders Not Working Embedded Image "Total Conditional Forwarders Configured:0" 0
Test Severity Items Affected Objects ANSSI ID IOC/IOE
AdminSDHolder was Modified in last 30 days Embedded Image "AdminSDHolder Object was modified in total domains:1" 1 vuln1_permissions_adminsdholder IOC
Weak Password Policies Affected Admins Embedded Image "Total Privileged Account using Weak Password Policy:2" 23 vuln2_privileged_members_password IOE IOC
Protected Users Group Status Embedded Image "Total Domains Not Using Protected Users Group:1" 1 vuln3_protected_users
Denied RODC Password Replication Group missing Privileged Accounts Embedded Image "Total Missing Privileged Groups in Denied RODC Password Replication Group:8" 8 vuln3_rodc_denied_group IOE
User Accounts Pass Never Expires Embedded Image "Total Users with Password Never Expires in all Domains:1" 1 vuln2_dont_expire IOC
Missing Privileged Groups in Protected Users Group Embedded Image "Total Missing Privileged Groups in Protected Users Group:Not In Use" Not In Use vuln3_protected_users IOE IOC
Privileged Accounts Pass Never Expires Embedded Image "Total Privileged Accounts set to Password Never Expire in all Domains:0" 34 vuln2_dont_expire IOE IOC
Too Many Privileged Accounts Embedded Image "Affected AD Domains:0" 20 vuln_privileged_members IOC
Inactive Admins Embedded Image "Total Enabled Admin Accounts Not In Use Since Last 30 Days:0" 19 vuln1_user_accounts_dormant IOE
Privileged Groups Contain more than 20 members Embedded Image "Privileged Groups Contain More than 20 members:0" 18 vuln1_privileged_members IOE
Kerberos Pre-authentication Disabled Embedded Image "Total Pre-Authentication Admins in all domains:0" 55 vuln1_kerberos_properties_preauth_priv IOE IOC
Password Do Not Expire Embedded Image "Total Admin Accounts set to PasswordNeverExpires:1" 12 vuln1_dont_expire_priv IOE
Default Domain Policy-Minimum Password Length Embedded Image "Account Policies Not Configured correctly in Total Domains:1" 1 vuln2_privileged_members_password IOE
FGPP Policies-Minimum Password Length Embedded Image "FGPP Not Configured Correctly In Domains:Not Created" Not Created vuln2_privileged_members_password IOE
Dangerous Permissions Found on MicrosoftDNS Container Embedded Image "AD Domains Affected:0" 23 vuln_permissions_msdns IOE IOC
Dangerous Permissions Found on Naming Contexts Embedded Image "AD Domains Affected:0" 23 vuln_permissions_naming_context IOE IOC
Pre-Windows 2000 Compatible Access Group is not empty Embedded Image "Number of AD Domains Affected:0" 23 vuln_compatible_2000_anonymous IOE IOC
Found Groups with SID history Set Embedded Image "Total Groups With sIDHistory Affected domains:0" 23 vuln_sidhistory_present IOE IOC
Orphaned Admins on AdminSDHolder Embedded Image "Total Possible Orphaned Admins in all Domains on AdminSDHolder object:0" 0 vuln1_permissions_adminsdholder IOC
Dangerous Permissions on AdminSDHolder Embedded Image "AD Domains Affected:0" 0 vuln1_privileged_members_perm vuln2_privileged_members_perm IOC
Constrained delegation to domain controller service Embedded Image "Total Computers with Constrained Delegation in all Domains:0" 0 vuln1_delegation_a2d2 IOC
Resource-based constrained delegation on domain controllers Embedded Image "Total Computers with Resource-Based Delegation in all Domains:0" 0 vuln1_delegation_sourcedeleg IOC
Anonymous Access to Active Directory Embedded Image "Anonymous Access To Active Directory:0" 0 vuln1_dsheuristics_bad IOE
Anonymous or EVERYONE in Pre-Windows 2000 Group Embedded Image "Number of Domains Affected:0" 0 vuln2_compatible_2000_anonymous IOE IOC
Allowed RODC Password Replication Group is not empty Embedded Image "Total Members in RODC Replication Group:0" 0 vuln3_rodc_allowed_group IOE
Managed service accounts with passwords unchanged for more than 90 days Embedded Image "Total Managed Service Accounts Password Unchanged Since last 90 days:0" 0 vuln_password_change_msa_no_change_90 IOE
msDS-NeverRevealGroupattribute RODC missing Privileged Accounts Embedded Image "Total Privileged Groups Not in PRP Denied List:0" 0 vuln3_rodc_never_reveal IOE
Unsecure Updates Zones Embedded Image "Total DNS Zones accepting non-secure updates:0" 0 vuln1_dnszone_bad_prop vuln3_dnszone_bad_prop IOE IOC
Users with LastPasswordSet was never Set Embedded Image "Total Users with LastPasswordSet was never set in all Domains:0" 20 vuln2_dont_expire IOE
Users with PWDLastSet to ZERO Embedded Image "Total Users with PWDLastSet to ZERO in all Domains:0" 23 vuln1_user_accounts_dormant IOE
Users with SPNs Configured Embedded Image "Total Users with SPN defined in all Domains:0" 23 vuln1_spn_priv IOE
Password Expiration is missing for smart card users Embedded Image "AD Domains Affected:0" 4 vuln_smartcard_expire_passwords IOE
Users With DES encryption Embedded Image "Total Users with DES Encryption in all Domains:0" 23 vuln2_kerberos_properties_deskey IOE
Users With Reversible Encryption Embedded Image "Total Users with Reversible Encryption set in all Domains:0" 23 vuln3_reversible_password IOE
Users With Kerberos Pre-Authentication Embedded Image "Total Pre-Authentication Users in all domains:0" 23 vuln1_kerberos_properties_preauth_priv vuln2_kerberos_properties_preauth IOE
Users Modified with PrimaryGroupID Embedded Image "Total Users with PrimaryGroupID Modified in all Domains:0" 23 vuln3_primary_group_id_nochange vuln1_primary_group_id_1000 IOC
Users Disabled Embedded Image "Total Disabled Users in all Domains:0" 234 vuln_user_accounts_dormant IOC
Stale User Accounts Embedded Image "Total Stale User Accounts in all Domains:0" 400 vuln1_user_accounts_dormant IOC
User Accounts Pass Not Required Embedded Image "Total Users with Password Not Required set in all Domains:0" 0 vuln2_dont_expire IOC
Computers with SPNs Configured Embedded Image "Total Computers using ServicePrincipalNames in all Domains:0" 0 vuln1_spn_priv IOE
Computers With Unconstrained Delegation Embedded Image "Total Computers with Unconstrained Delegation in all Domains:0" 0 vuln2_delegation_t4d IOE
Computers Modified with PrimaryGroupID Embedded Image "Total Computers modified with PrimaryGroupID:0" 0 vuln3_primary_group_id_nochange vuln1_primary_group_id_1000 IOC
Computers Disabled Embedded Image "Total Disabled Computer Accounts in all Domains:0" 140 vuln_user_accounts_dormant IOC
Stale Computer Accounts Embedded Image "Total Stale Computer Accounts in all Domains:0" 200 vuln1_user_accounts_dormant IOC
Admins with SPNs Configured Embedded Image "Total Admin Accounts With ServicePrincipalName Identified:0" 0 vuln1_spn_priv IOE
Domain Controllers not owned by Admins Embedded Image "Total Domain Controllers owned by non-privileged accounts:0" 0 vuln1_permissions_dc IOC
Computer Objects not managed by Admins Embedded Image "Total Computers Not Managed By Admins in all Domains:0" 0 vuln3_owner IOC
Organizational Units not managed by Admins Embedded Image "Total Organizational Units Not Managed By Admins:0" 0 vuln3_owner IOC
KRBTGT Account Password Not Changed Embedded Image "Total Domains Using KRBTGT Old Password:0" 0 vuln2_krbtgt IOE
Passwords Not Changed within 90 days Embedded Image "Total Admin Accounts Did Not Change Their Passwords Since Last 90 Days:0" 23 vuln1_password_change_priv IOE
DNSAdmins Group has members Embedded Image "Total Members In DNSAdmins Group In All Domains:0" 45 vuln1_dnsadmins and vuln1_permissions_msdn IOE IOC
Domain Controllers Modified with PrimaryGroupID Embedded Image "Total Domain Controllers modified with PrimaryGroupID:0" 0 vuln3_primary_group_id_nochange vuln1_primary_group_id_1000 IOC
Inconsistent DCs Embedded Image "Total Domain Controllers in Inconsistent State:0" 0 vuln1_dc_inconsistent_uac IOE
Unauthenticated DCs since last 45 Days Embedded Image "Total Domain Controllers Not Authenticated Within 45 days In All Domains:0" 0 vuln1_password_change_inactive_dc IOE
Secrets not renewed DCs Embedded Image "Total Domain Controllers Not Changed Password Within 45 Days In All Domains:0" 0 vuln1_password_change_dc_no_change IOE
Orphaned DCs Embedded Image "Total Orphaned Domain Controllers:0" 0 vuln1_dc_inconsistent_uac IOE
NTFS Replication DCs Embedded Image "Total Domain Controllers utilizing NTFRS for AD Replication:0" 0 vuln2_sysvol_ntfrs IOE
Duplicate SPNs Embedded Image "Total Duplicate SPNs in AD Domains:0" 0 vuln1_delegation_sourcedeleg
Unauthenticated Servers Embedded Image "Total Servers Not Authenticated Within 90 Days in All Domains:0" 0 vuln2_password_change_server_no_change_90 IOE IOC
Secrets not renewed Servers Embedded Image "Total Servers Not Changing Password within 45 days in all Domains:0" 0 vuln3_password_change_server_no_change_45 IOE IOC
AD Forest Schema Not upto date Embedded Image "Current Forest Schema Version Status:OK:88" OK:88 vuln2_adupdate_bad IOE
Test Severity Items Affected Objects MS Test Link IOC/IOE
Misconfigured Administrative Accounts Found Embedded Image "Total Admins Misconfigured:2" 2
https//www.sans.org/blog/protecting-privileged-domain-accounts-safeguarding-access-tokens# ~ text=Enabling%20the%20setting%20%22Account%20isbe%20available%20to%20the%20attacker.&text=As%20mentioned%20earlier%2C%20this%20doesvulnerability%20on%20the%20compromised%20machine.
IOE IOC
TLS 1.1 Enabled DCs Embedded Image "Total Domain Controllers with TLS 1.1 Protocol Enabled:1" 1
https://learn.microsoft.com/en-us/defender-for-identity/security-assessment-legacy-protocols
IOE
NTLM Authentication Enabled DCs Embedded Image "Total Domain Controllers with NTLM Enabled:1" 1
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain
IOE
Missing DNS Scavenging DCs Embedded Image "Total DNS Servers Not Enabled with Server Level Scavenging:1" 1
https://social.technet.microsoft.com/wiki/contents/articles/21724.how-dns-aging-and-scavenging-works.aspx
IOE
Print Spooler Service Running DCs Embedded Image "Total Domain Controllers with Print Spooler Service running:1" 1
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
IOE
Accounts with Extended Rights to Read LAPS Passwords Found Embedded Image "Illegal Accounts Found to read LAPS in AD Domains:LAPS/Module Not Installed" LAPS/Module Not Installed
https//adsecurity.org/?p=3164
IOE IOC
Missing Microsoft LAPS in AD Forest Embedded Image "Microsoft LAPS Status:Not Deployed" Not Deployed
https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview
Objects Modified in Last 10 Days Embedded Image "Total Objects Modified in AD Domains in last 10 days:241" 241
IOE IOC
Objects Created in Last 10 Days Embedded Image "Total Objects Created in AD Domains in last 10 days:241" 241
IOE IOC
Anyone can Join Computers to Domain Embedded Image "Total Domains Allowing Normal Users to Join Computers to domain:1" 1
https://social.technet.microsoft.com/wiki/contents/articles/5446.active-directory-how-to-prevent-authenticated-users-from-joining-workstations-to-a-domain.aspx
IOE
Schema Admin Group members Embedded Image "Schema Admins Group contains members:1" 1
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/remove-all-members-from-the-schema-admins-group-unless-you-are-actively-changing-the-schema
IOE
Missing Domain Zones Scavenging Embedded Image "Total Domain Zones Not Enabled with Scavenging:1" 1
https://social.technet.microsoft.com/wiki/contents/articles/21724.how-dns-aging-and-scavenging-works.aspx
IOC
Sensitive GPOs Modified Embedded Image "Sensitive GPOs Status in Last 10 Days:WARNING: Modified" WARNING: Modified
https://attack.mitre.org/tactics/TA0008/
IOC
Changes to Privileged Groups in Last 15 days Embedded Image "Total Privileged Groups Modified in Last 15 Days in All Domains:13" 13
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-b--privileged-accounts-and-groups-in-active-directory
IOC
Built-In Admin Account Not protected Embedded Image "Default Administrator Account not protected in all domains:1" 1
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-d--securing-built-in-administrator-accounts-in-active-directory
IOE IOC
Built-In Admin Account Not Disabled Embedded Image "Default Admin Account not disabled in Total Domains:1" 1
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-d--securing-built-in-administrator-accounts-in-active-directory
IOE IOC
Built-In Admin Account Not Renamed Embedded Image "Default Admin Account not renamed in Total Domains:1" 1
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-d--securing-built-in-administrator-accounts-in-active-directory
IOE
Built-In Admin Account was used in last 10 days Embedded Image "Total Domains in which Default Administrator account was used in last 10 days:1" 1
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-d--securing-built-in-administrator-accounts-in-active-directory
IOC
Guest Account is not renamed Embedded Image "Guest Account not renamed in Total Domains:1" 1
https://www.cert.ssi.gouv.fr/uploads/guide-ad.html#permissions_adminsdholder
IOE
Privileged Groups Contained Computer Accounts Embedded Image "Total computer accounts part of privileged groups:0" 90
https://attack.mitre.org/tactics/TA0004/
IOE IOC
Privileged Admins missing AdminCount=1 Flag Embedded Image "Total Admins not set with AdminCount=1 flag in all domains:0" 87
https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/faqs-from-the-field-on-krbtgt-reset/ba-p/2367838
IOC
ForeignSecurityPrincipals In Privileged Groups Embedded Image "Total ForeignSecurityPrincipal in Privileged Groups:0" 64
https://social.technet.microsoft.com/wiki/contents/articles/51367.active-directory-foreign-security-principals-and-special-identities.aspx
IOE IOC
Operators Groups are not empty Embedded Image "Operators Groups containing total members in all domains:0" 10
https://attack.mitre.org/tactics/TA0004/
IOE IOC
FGPP Policies Not Applying Embedded Image "Total FGPP Not Applying in All Domains:Not Created" Not Created
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/adac/introduction-to-active-directory-administrative-center-enhancements--level-100-#fine_grained_pswd_policy_mgmt
IOE
AllowNT4Crypto DCs Embedded Image "Total DCs with AllowNT4Crypto Enabled:1" 1
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/disable-the-allownt4crypto-setting-on-all-affected-domain-controllers
IOE
RC4 Encryption Enabled DCs Embedded Image "Total Domain Controllers With RC4 Encryption Enabled:1" 1
https://learn.microsoft.com/en-us/windows-server/security/kerberos/preventing-kerberos-change-password-that-uses-rc4-secret-keys and https://www.cert.ssi.gouv.fr/uploads/guide-ad.html#kerberos_properties_deskey
IOE
Missing Updates DCs Embedded Image "Total DCs Not Updated Since Last 45 Days:1" 1
https://techcommunity.microsoft.com/t5/security-compliance-and-identity/updating-best-practices-for-domain-controllers/ba-p/3263043
IOE
Errors and Warnings in Log DCs Embedded Image "Total DCs with Event Log Errors:1" 1
A general recommendation to ensure no recent errors in Domain Controllers.
IOE
Scheduled Tasks found on Domain Controllers Embedded Image "Total Scheduled Tasks on DCs:3" 3
https//www.zerodayinitiative.com/blog/2019/6/11/exploiting-the-windows-task-scheduler-through-cve-2019-1069
IOC
Software Installed on Domain Controllers Embedded Image "Total Software Installed on DCs:6" 6
https//docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/securing-domain-controllers-against-attack
IOE
Sites without Subnets Association Embedded Image "Total AD Sites Without Subnets:1" 1
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/prevent-degraded-performance-by-defining-missing-subnets
PDC Emulator Time Source Embedded Image "Root PDC Time Source:Internal Source" Internal Source
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd723673(v=ws.10)
Disabled GPOs Embedded Image "Total Disabled GPOs:0" 23
https://social.technet.microsoft.com/wiki/contents/articles/22457.10-common-problems-causing-group-policy-to-not-apply.aspx
GPOs not Linked to OUs Embedded Image "Total OUs without GPO Linked:0" 23
https://social.technet.microsoft.com/wiki/contents/articles/22457.10-common-problems-causing-group-policy-to-not-apply.aspx
IOE
GPOs not Applying Embedded Image "Total GPOs not applying correctly in All Domains:0" 34
https://social.technet.microsoft.com/wiki/contents/articles/22457.10-common-problems-causing-group-policy-to-not-apply.aspx
Orphaned GPO Containers Embedded Image "Total Orphaned Group Policy Objects:0" 34
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/consider-removing-orphaned-group-policy-containers-from-active-directory
Found GPOs with Block Inheritance Embedded Image "Total GPOs with Block Inheritance Defined:0" 2
https://learn.microsoft.com/en-us/previous-versions/windows/desktop/policy/overriding-and-blocking-group-policy
GPO Naming Convention Embedded Image "Number Of GPOs do not follow Standard Naming Convention:0" 32
A general recommendation to ensure GPOs can be identified easily in a large Active Directory environment.
Found GPO with WMI Filters Embedded Image "Total GPO with WMI Filter:0" 45
https://learn.microsoft.com/en-us/troubleshoot/windows-server/group-policy/wmi-group-policy-filters-not-working
Domain GPO Application Status Embedded Image "Total GPOs Not Applied:0" 23
https://social.technet.microsoft.com/wiki/contents/articles/22457.10-common-problems-causing-group-policy-to-not-apply.aspx
No Group Policy Objects Defining Log Size and Retention Embedded Image "Total AD Domains Affected:1" 23
https//docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory
No Group Policy Objects to Prevent Domain Admins from logging on to Workstations or Servers Found Embedded Image "Total AD Domains Affected:1" 1
https//docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication
No Group Policy Objects to Block ISO Execution Found Embedded Image "Total AD Domains Affected:1" 1
https//techcommunity.microsoft.com/t5/storage-at-microsoft/stop-using-smb1/ba-p/425858
No Group Policy Objects to Mitigate SMBv1 Found Embedded Image "Total AD Domains Affected:1" 1
https//www.microsoft.com/security/blog/2021/11/11/html-smuggling-surges-highly-evasive-loader-technique-increasingly-used-in-banking-malware-targeted-attacks/
No Group Policy Objects Enforcing UAC Prompt for Elevation Found Embedded Image "Total AD Domains Affected:1" 1
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode
No Group Policy Objects to Mitigate Accidental Script Execution Embedded Image "Total AD Domains Affected:1" 1
https://www.microsoft.com/security/blog/2021/11/11/html-smuggling-surges-highly-evasive-loader-technique-increasingly-used-in-banking-malware-targeted-attacks/
No Group Policy Objects to Mitigate NTLMv1 Protocol Embedded Image "Total AD Domains Affected:1" 1
https://support.microsoft.com/en-us/topic/security-guidance-for-ntlmv1-and-lm-network-authentication-da2168b6-4a31-0088-fb03-f081acde6e73
Lock screen camera status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Lock screen slide show status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Passwords to be saved status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Always prompt for password upon connection status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Require secure RPC communication status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Set client connection encryption level status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Windows Defender SmartScreen status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
AutoPlay status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Default behavior for AutoRun status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
UNC Paths Hardened status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Insecure guest logons status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit- Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Domain controller- LDAP server signing requirements status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Domain controller- Refuse machine account password changes status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Domain member- Digitally encrypt secure channel data (when possible) status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Domain member- Digitally sign secure channel data (when possible) status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Domain member- Disable machine account password changes status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Domain member- Maximum machine account password age status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Domain member- Require strong (Windows 2000 or later) session key status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Interactive logon- Machine inactivity limit status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Microsoft network client- Digitally sign communications (always) status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Microsoft network client- Send unencrypted password to third-party SMB servers status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Network access- Do not allow anonymous enumeration of SAM accounts status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Network access- Do not allow anonymous enumeration of SAM accounts and shares status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Network security- Allow LocalSystem NULL session fallback status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Network security- Allow LocalSystem NULL session fallback status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Network security- LAN Manager authentication level status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Network security- LDAP client signing requirements Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Network security- Minimum session security for NTLM SSP based (including secure RPC) clients status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Network security- Minimum session security for NTLM SSP based (including secure RPC) servers status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
System objects- Strengthen default permissions of internal system objects status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
User Account Control- Admin Approval Mode for the Built-in Administrator account status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
User Account Control- Behavior of the elevation prompt for administrators in Admin Approval Mode status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
User Account Control- Behavior of the elevation prompt for standard users status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
User Account Control- Detect application installations and prompt for elevation status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
User Account Control- Only elevate UIAccess applications that are installed in secure locations status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
User Account Control- Run all administrators in Admin Approval Mode status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
User Account Control- Virtualize file and registry write failures to per-user locations status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Credential Validation status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Computer Account Management status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Other Account Management Events status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Security Group Management status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit User Account Management status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit PNP Activity status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Process Creation status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Directory Service Access status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Directory Service Changes status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Account Lockout status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Group Membership status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Logon status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Other Logon/Logoff Events status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Special Logon status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Detailed File Share status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit File Share status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Other Object Access Events status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Removable Storage status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Audit Policy Change status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Authentication Policy Change status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit MPSSVC Rule-Level Policy Change status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Other Policy Change Events status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Sensitive Privilege Use status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Other System Events status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Security State Change status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit Security System Extension status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
Audit System Integrity status Embedded Image "Setting Status:Missing" Missing
https://www.cisecurity.org/
High Value Targets Found Embedded Image "Total High Value Targets Found:2" 2
https//docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/delegating-administration-by-using-ou-objects
IOE IOC
Access Control Lists on Computers Found Embedded Image "Total Abusable ACLs on Computer Objects:0" 23
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-groups
IOE IOC
Access Control Lists on Security Groups Found Embedded Image "Found Dangerous Group Permissions in AD Domains:0" 23
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-groups
IOE IOC
Access Control Lists on Users Found Embedded Image "Found Dangerous User Permissions:0" 23
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-groups
IOE IOC
Group Policy Objects with Improper Permissions Found Embedded Image "Abusable GPO Permissions found in Total AD Domains:0" 23
https//www.bleepingcomputer.com/news/security/uptick-seen-in-iso-email-attachments-delivering-malware/
IOE IOC
Group Policy Object Assignments with Improper Permissions Found Embedded Image "Total Abusable GPO Permissions in AD Domains:0" 23
IOE IOC
Normal Users Full Control Permissions on OUs Embedded Image "Total Normal User Accounts with Full Control Rights to Organizational Units in all Domains:0" 0
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/delegating-administration-by-using-ou-objects
IOE IOC
EVERYONE Full Control Permissions on OUs Embedded Image "Total Organizational Units with Everyone Full Control Access Rights:0" 23
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/delegating-administration-by-using-ou-objects
IOE IOC
Abusable Permissions Found on SYSVOL and NETLOGON Embedded Image "Abusable Permissions Found on SYSVOL and Netlogon Shares:Ok" Ok
IOE IOC
LAPS SearchFlag modified Embedded Image "LAPS SearchFlags Modified:Modified" Modified
IOE IOC
Unauthorized Users having GPLink Rights on Domain NC Embedded Image "AD Domains Affected:0" 23
IOE IOC
Unauthorized Users having GPLink Rights on Domain Controllers OU Embedded Image "AD Domains Affected:0" 23
IOE IOC
Unauthorized Users having GPLink Rights on AD Sites Embedded Image "AD Sites Affected:0" 23
IOE IOC
AD Recycle Bin Status Embedded Image "AD Recycle Bin Status:Disabled" Disabled
https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/the-ad-recycle-bin-understanding-implementing-best-practices-and/ba-p/396944
Privileged Management Status Embedded Image "Privileged Access Management Status:Disabled" Disabled
https://learn.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services
Managed Service Accounts Status Embedded Image "Managed Service Accounts Status:Are not in use" Are not in use
https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/managed-service-accounts-understanding-implementing-best/ba-p/397009
Missing SSL Authentication DCs Embedded Image "Total DCs without SSL:1" 1
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/enable-ldap-over-ssl-3rd-certification-authority
IOE
Missing Enough DNS Servers in NIC DCs Embedded Image "Total DCs With inadequate Number Of DNS Servers in NIC Property:1" 1
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/how-domain-controllers-are-located
Not Enough Local Disks DCs Embedded Image "Total DCs Not Configured With Recommended Disk Configuration:1" 1
https://learn.microsoft.com/en-us/windows-server/administration/performance-tuning/role/active-directory-server/capacity-planning-for-active-directory-domain-services
Missing AD Sites Coverage Embedded Image "Total AD Sites Not Covered:1" 1
https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/sites-sites-everywhere-8230/ba-p/399239
Sites Missing Bridgehead Server Embedded Image "Number Of AD Sites Without Bridgehead Servers:1" 1
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/replication/active-directory-replication-concepts
AD Sites Redundancy Embedded Image "Total AD Sites with Only One Domain Controller:1" 1
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd378865(v=ws.10)
Unprotected OUs Embedded Image "Total Ous not protected:1" 1
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd723677(v=ws.10)
gMSA Accounts Status Embedded Image "Total Domains With gMSA Accounts:0" 0
https://learn.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview
Additional Roles and Features DCs Embedded Image "Total Domain Controllers with Additional Roles and Features:1" 1
A general recommendation to ensure Domain Controllers do not have other roles and features installed.
IOE
Replication Interval Not Optimized Sites Embedded Image "Replication Interval is not optimized for Site Links:1" 1
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/determining-the-interval
Security Groups without Objects Embedded Image "Total Empty Security Groups In All Domains:32" 32
A general recommendation to ensure Active Directory doesn't have security groups without members.
Users without UPN specified Embedded Image "Total Users with UPN Blank in all Domains:3" 3
https://learn.microsoft.com/en-us/azure/active-directory/hybrid/connect/howto-troubleshoot-upn-changes
Missing Location Text in AD Sites Embedded Image "Total AD Sites Not Defined With Location:1" 1
A general recommendation to ensure sites can be identified easily.
GPO Description Embedded Image "Number of GPOs not set with Description:2" 23
A general recommendation to ensure GPOs can be identified easily in a large Active Directory environment.
Found Hidden Domain Controllers Embedded Image "Total Hidden Domain Controllers:0" 0
https//twitter.com/kaidja/status/1480212323818217479
IOE
Successful Exploit Machine Accounts Found Embedded Image "Total Exploit Machine Accounts:0" 0
https//twitter.com/malmoeb/status/1511760068743766026
IOE
Possible User-based Service Accounts found Embedded Image "Total Possible User-Based Service Accounts:0" 0
https//docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview
IOC
Domain Trusts Found Embedded Image "Domain Trusts Status:Not Found" Not Found
https//www.qomplx.com/qomplx-knowledge-fundamentals-of-active-directory-trust-relationships/
IOE IOC
Replication Errors DCs Embedded Image "Total DCS in Replication Errors:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/common-active-directory-replication-errors
IOE
Accounts vulnerable to Kerberoasting Found Embedded Image "Total Kerberoasting Accounts Found:0" 23
https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview
IOE
Users Sending Bad Logons Embedded Image "Total Users sending Bad Logons in all Domains:0" 23
https://attack.mitre.org/techniques/T1078/002/
IOC
Users Expired Embedded Image "Total Expired Users in all Domains:0" 200
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/regularly-check-for-and-remove-inactive-user-accounts-in-active-directory
IOC
Computers Sending Bad Logons Embedded Image "Total Computers sending Bad Logon Attempts in all Domains:0" 0
https://attack.mitre.org/techniques/T1078/002/
IOC
Unsupported Operating Systems Embedded Image "Total End Of Life-Unsupported Operating Systems:0" 0
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/upgrade-computers-running-an-unsupported-operating-system
IOE
Admins Sending Bad Logons Embedded Image "Total Privileged Users With Bad Logon Attempts:0" 0
https://attack.mitre.org/techniques/T1078/002/
IOC
Recently Created Privileged Admins Embedded Image "Total Privileged Accounts created in last 10 days in all domains:0" 0
https://attack.mitre.org/tactics/TA0004/
IOC
Users Identified with Privileged SIDs in sIDHistory Embedded Image "Total Users containing Admin Accounts in sIDHistory in all Domains:0" 0
https://learn.microsoft.com/en-us/defender-for-identity/security-assessment-unsecure-sid-history-attribute
IOC
Computers Identified with Privileged SIDs in sIDHistory Embedded Image "Total Computers containing Admin Accounts in sIDHistory in all Domains:0" 0
https://learn.microsoft.com/en-us/defender-for-identity/security-assessment-unsecure-sid-history-attribute
IOC
Found Excluded Groups by AdminSDHolder and SDProp Embedded Image "Total Excluded Groups by SDProp Process:0" 0
https://attack.mitre.org/tactics/TA0003/
IOC
krbtgt Account with Resource-Based Constrained Delegation Embedded Image "Affected number of Domains:0" 0
https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/faqs-from-the-field-on-krbtgt-reset/ba-p/2367838
IOC
Built-In Admin Account Password Not Changed in 90 days Embedded Image "Total Domains in which Default Administrator password not changed since last 90 days:0" 0
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-d--securing-built-in-administrator-accounts-in-active-directory
IOE
Guest Account is enabled Embedded Image "Total Guest Accounts Enabled in All Domains:0" 0
https://www.cert.ssi.gouv.fr/uploads/guide-ad.html#permissions_adminsdholder
IOE
Administrator Account ServicePrincipalNames Found Embedded Image "Total AD Domains Affected:0" 0
IOE
Disabled Admins part of Privileged Groups Embedded Image "Total Disabled Admins In Privileged Groups:0" 23
https://d3fend.mitre.org/technique/d3f:UserAccountPermissions/
IOE
AdminsCount Flag set users not acting as Admins Embedded Image "Total Unknown Admins Found:0" 232
IOC
Account Lockout Policies Missing Embedded Image "Total Accounts Locked Out in All Domains:0" 0
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/set-the-account-lockout-threshold-to-the-recommended-value
IOE
SMB 1 Protocol Enabled DCs Embedded Image "Total Domain Controllers with SMB1 Server Protocol Enabled:0" 0
https://learn.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3?tabs=server
IOE
SMB 1 Client Protocol Enabled DCs Embedded Image "Total Domain Controllers with SMB1 Client Service Enabled:0" 0
https://learn.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/detect-enable-and-disable-smbv1-v2-v3?tabs=server
IOE
LAN Manager password hashes Enabled DCs Embedded Image "Total DCs with LAN Manager Password Hashes:0" 0
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/prevent-storage-of-lan-manager-password-hashes
IOE
SMB Signing Disabled DCs Embedded Image "Total Domains Controller Without SMB Signing:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing
IOE
LDAP Signing Disabled DCs Embedded Image "Total Domain Controllers Without LDAP Signing:0" 0
https://learn.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/domain-controller-ldap-server-signing-requirements
IOE
Missed Reboot Cycles DCs Embedded Image "Total DCs Not Rebooted Since Last 30 Days:0" 0
A general recommendation to ensure domain controllers are rebooted every 30 days
IOE
No Contacts with Domain Controllers in Last Three Months Embedded Image "Total Domain Controllers not contacted since last three months:0" 0
https://www.cert.ssi.gouv.fr/uploads/ad_checklist.html
IOE
Ensure UNC Paths for SYSVOL and NETLOGON are harderend Embedded Image "SYSVOL and Netlogon Hardening Missing on Total DCs:0" 0
IOE
Missing DNS Forwarders DCs Embedded Image "Total DNS Servers Do Not Have Forwarders Configured:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/forwarders-resolution-timeouts
IOE
Missing Root Hints DCs Embedded Image "Total DNS Servers Do Not Have Root Hints Configured:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/troubleshoot-dns-name-resolution
IOE
Missing Host Records DCs Embedded Image "Total DCs Missing Host Records in DNS:0" 0
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd378978(v=ws.10)
IOE
Not Enough Free Space DCs Embedded Image "Total DCs with Low Disk Space:0" 0
https://learn.microsoft.com/en-us/windows-server/administration/performance-tuning/role/active-directory-server/capacity-planning-for-active-directory-domain-services
IOE
Loopback Address Missing DCs Embedded Image "Total DCs not configured with Loopback Address:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/troubleshoot-dns-event-id-4013
IOE
Multihomed DCs Embedded Image "Total DCS in Multihomed State:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/unwanted-nic-registered-dns-mulithomed-dc
IOE
Strict Replication Disabled DCs Embedded Image "Total DCs with Strict Replication Consistency not enabled:0" 0
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd723692(v=ws.10)
IOE IOC
DCDiag Failure DCs Embedded Image "Total DCs with DCDiag Failures:0" 0
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731968(v=ws.11)
Out Of Default OUs DCs Embedded Image "Total DCs outside of it's Default OU:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/group-policy-application-rules-for-domain-controller
Unsupported OS DCs Embedded Image "Total DCs running Unsupported Operating Systems:0" 0
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/upgrade-computers-running-an-unsupported-operating-system
IOE
Missing DNS Dynmaic Registration on NIC DCs Embedded Image "Total DCS NIC Dynamic Updates Not Enabled:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-dns-dynamic-updates-windows-server-2003
Missing _msdcs Zone DCs Embedded Image "Total DNS Servers Missing _msdcs Zone:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/active-directory-domain-join-troubleshooting-guidance
Event Log Config Not Correct DCs Embedded Image "Total DCs with Event Log misconfiguration:0" 0
A general recommendation to ensure logs are configured correctly.
Event Log Size Not Optimized DCs Embedded Image "Total DCs with Event Log Size not optimal:0" 0
A general recommendation to ensure log size is configured correctly.
Fax Server role installed DCs Embedded Image "Total Domain Controllers have Fax Server Installed::0" 0
https://www.cisecurity.org/
IOE
Microsoft FTP service installed DCs Embedded Image "Total Domain Controllers have FTP Server Installed::0" 0
https://www.cisecurity.org/
IOE
Peer Name Resolution Protocol installed DCs Embedded Image "Total Domain Controllers have Peer Name Resolution Protocol Installed::0" 0
https://www.cisecurity.org/
IOE
Simple TCP-IP Services installed DCs Embedded Image "Total Domain Controllers have Simple TCP/IP Services Installed::0" 0
https://www.cisecurity.org/
IOE
Telnet Client installed DCs Embedded Image "Total Domain Controllers have Telnet Client Installed::0" 0
https://www.cisecurity.org/
IOE
TFTP Client installed DCs Embedded Image "Total Domain Controllers have TFTP Client Installed::0" 0
https://www.cisecurity.org/
IOE
Server Message Block (SMB) v1 protocol Installed DCs Embedded Image "Total Domain Controllers have SMB 1.0/CIFS File Sharing Support Installed::0" 0
https://www.cisecurity.org/
IOE
Windows PowerShell 2.0 installed DCs Embedded Image "Total Domain Controllers have Windows PowerShell 2.0 Engine Installed::0" 0
https://www.cisecurity.org/
IOE
ADWS Service Set to Manual DCs Embedded Image "Total DCs ADWS Not Set to Start Automatic:0" 0
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/configure-the-active-directory-web-services-adws-to-start-automatically-on-all-servers
IOE
DHCP Service Running DCs Embedded Image "Total Domain Controllers with DHCP Server running:0" 0
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/disable-or-remove-the-dhcp-server-service-installed-on-any-domain-controllers
IOE
AD Services not running DCs Embedded Image "Total DCs with Services Not Running:0" 0
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd723679(v=ws.10)
IOE
Total Undefined Subnets Embedded Image "Total Undefined Subnets in AD Forest:0" 0
https://learn.microsoft.com/en-us/services-hub/health/remediation-steps-ad/prevent-degraded-performance-by-defining-missing-subnets
Sites without ISTG Role Embedded Image "Total AD Sites Do Not Have ISTG Defined:0" 0
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/replication/active-directory-replication-concepts
Manual Replication Connection Objects Embedded Image "Total Manual Replication Connection Objects:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/duplicate-active-directory-replication-connections
Missing Global Catalog Sites Embedded Image "Total AD Sites Without Global Catalog Servers or No Universal Group Caching Enabled:0" 0
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd723676(v=ws.10)
Duplicate Site Links Embedded Image "Total Duplicate Site Links:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/duplicate-active-directory-replication-connections
Sites With Manual Bridgehead Server Embedded Image "Number Of AD Sites With Manual Bridgehead Servers:0" 0
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/replication/active-directory-replication-concepts
Sites creating Mesh Topology Embedded Image "Total AD Site Links Containing More than Two AD Sites:0" 0
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/designing-the-site-topology
AD Sites without Site Link Embedded Image "Total AD Sites Not In Site Links:0" 0
https://techcommunity.microsoft.com/t5/windows-server-for-it-pro/considerations-with-creating-an-additional-ad-site-and-linking/td-p/1453048
AD Sites without Domain Controller Embedded Image "Total AD Sites Without Domain Controllers:0" 0
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/ad-ds-design-and-planning
Domain Controllers Time Source Embedded Image "Total DCs Not Defined With Correct Time-Source:0" 0
https://social.technet.microsoft.com/wiki/contents/articles/50924.active-directory-time-synchronization.aspx
Domain FSMO Placement Embedded Image "AD FSMO Placement Status:FSMO Placement is correct." FSMO Placement is correct.
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd391860(v=ws.10)
Domain Naming Master and Schema Master Placement Embedded Image "Status:Hosted on same computer" Hosted on same computer
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd378868(v=ws.10)
Managed Service Accounts Not Linked Embedded Image "Total Managed Service Accounts are not Linked:0" 0
https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/managed-service-accounts-understanding-implementing-best/ba-p/397009
IOE
TombstoneLifeTime Modified? Embedded Image "Current TombstoneLifeTime Value:180" 180
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd723674(v=ws.10)
Check AD Forest Functional Level Embedded Image "AD Forest Functional Level:Dynamicpacks.net is Windows2016Forest" Dynamicpacks.net is Windows2016Forest
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-functional-levels
Check AD Domain Functional Level Embedded Image "Status:Ok" Ok
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-functional-levels
Ogranizational Units without Objects Embedded Image "Total Empty Organizational Units In All Domains:0" 0
A general recommendation to ensure no empty Ous in domains.
Found Unused Netlogon Scripts Embedded Image "Total Unused Scripts In All Domains:0" 0
IOE IOC
No Group Policy Objects for Preventing passwords using reversible encryption Embedded Image "Total AD Domains Affected:0" 0
GPO Preferences Containing Passwords Embedded Image "GPO Preferences Containing Password in All AD Domains:0" 0
Too many DNS Static Records Embedded Image "Total Static Records:0" 0
A general recommendation to ensure all static records are identified and removed except those related to Domain controllers.
IOC
DNS Round-Robin Not Enabled Embedded Image "Total DNS Servers Not Enabled With Round Robin:0" 0
https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/active-directory-communication-fails
Conditional Forwarders Not Working Embedded Image "Total Conditional Forwarders Configured:0" 0
A general recommendation to ensure conditional forwarders configured are working.
Domain member- Digitally encrypt or sign secure channel data (always) status Embedded Image "Setting Status:Found" Found
https://www.cisecurity.org/
Microsoft network server- Digitally sign communications (always) status Embedded Image "Setting Status:Found" Found
https://www.cisecurity.org/
Network security- Do not store LAN Manager hash value on next password change status Embedded Image "Setting Status:Found" Found
https://www.cisecurity.org/
Test Severity Items Affected Objects IOC/IOE
Protected Users Group Status Embedded Image Total Domains Not Using Protected Users Group:1 1
Missing Microsoft LAPS in AD Forest Embedded Image Microsoft LAPS Status:Not Deployed Not Deployed
AD Recycle Bin Status Embedded Image AD Recycle Bin Status:Disabled Disabled
Privileged Management Status Embedded Image Privileged Access Management Status:Disabled Disabled
Managed Service Accounts Status Embedded Image Managed Service Accounts Status:Are not in use Are not in use
gMSA Accounts Status Embedded Image Total Domains With gMSA Accounts:0 0
Test Severity Items Affected Objects IOC/IOE
AdminSDHolder was Modified in last 30 days Embedded Image AdminSDHolder Object was modified in total domains:1 1 IOC
Objects Modified in Last 10 Days Embedded Image Total Objects Modified in AD Domains in last 10 days:241 241 IOE IOC
Objects Created in Last 10 Days Embedded Image Total Objects Created in AD Domains in last 10 days:241 241 IOE IOC
Anyone can Join Computers to Domain Embedded Image Total Domains Allowing Normal Users to Join Computers to domain:1 1 IOE
Denied RODC Password Replication Group missing Privileged Accounts Embedded Image Total Missing Privileged Groups in Denied RODC Password Replication Group:8 8 IOE
Schema Admin Group members Embedded Image Schema Admins Group contains members:1 1 IOE
Missing Domain Zones Scavenging Embedded Image Total Domain Zones Not Enabled with Scavenging:1 1 IOC
Orphaned Admins on AdminSDHolder Embedded Image Total Possible Orphaned Admins in all Domains on AdminSDHolder object:0 0 IOC
Dangerous Permissions on AdminSDHolder Embedded Image AD Domains Affected:0 0 IOC
Constrained delegation to domain controller service Embedded Image Total Computers with Constrained Delegation in all Domains:0 0 IOC
Resource-based constrained delegation on domain controllers Embedded Image Total Computers with Resource-Based Delegation in all Domains:0 0 IOC
Anonymous Access to Active Directory Embedded Image Anonymous Access To Active Directory:0 0 IOE
Anonymous or EVERYONE in Pre-Windows 2000 Group Embedded Image Number of Domains Affected:0 0 IOE IOC
Found Hidden Domain Controllers Embedded Image Total Hidden Domain Controllers:0 0 IOE
Successful Exploit Machine Accounts Found Embedded Image Total Exploit Machine Accounts:0 0 IOE
Possible User-based Service Accounts found Embedded Image Total Possible User-Based Service Accounts:0 0 IOC
Domain Trusts Found Embedded Image Domain Trusts Status:Not Found Not Found IOE IOC
Replication Errors DCs Embedded Image Total DCS in Replication Errors:0 0 IOE
Allowed RODC Password Replication Group is not empty Embedded Image Total Members in RODC Replication Group:0 0 IOE
Managed service accounts with passwords unchanged for more than 90 days Embedded Image Total Managed Service Accounts Password Unchanged Since last 90 days:0 0 IOE
msDS-NeverRevealGroupattribute RODC missing Privileged Accounts Embedded Image Total Privileged Groups Not in PRP Denied List:0 0 IOE
Unsecure Updates Zones Embedded Image Total DNS Zones accepting non-secure updates:0 0 IOE IOC
Test Severity Items Affected Objects IOC/IOE
User Accounts Pass Never Expires Embedded Image Total Users with Password Never Expires in all Domains:1 1 IOC
Users with LastPasswordSet was never Set Embedded Image Total Users with LastPasswordSet was never set in all Domains:0 20 IOE
Users with PWDLastSet to ZERO Embedded Image Total Users with PWDLastSet to ZERO in all Domains:0 23 IOE
Users with SPNs Configured Embedded Image Total Users with SPN defined in all Domains:0 23 IOE
Password Expiration is missing for smart card users Embedded Image AD Domains Affected:0 4 IOE
Accounts vulnerable to Kerberoasting Found Embedded Image Total Kerberoasting Accounts Found:0 23 IOE
Users With DES encryption Embedded Image Total Users with DES Encryption in all Domains:0 23 IOE
Users With Reversible Encryption Embedded Image Total Users with Reversible Encryption set in all Domains:0 23 IOE
Users With Kerberos Pre-Authentication Embedded Image Total Pre-Authentication Users in all domains:0 23 IOE
Users Modified with PrimaryGroupID Embedded Image Total Users with PrimaryGroupID Modified in all Domains:0 23 IOC
Users Sending Bad Logons Embedded Image Total Users sending Bad Logons in all Domains:0 23 IOC
Users Disabled Embedded Image Total Disabled Users in all Domains:0 234 IOC
Stale User Accounts Embedded Image Total Stale User Accounts in all Domains:0 400 IOC
Users Expired Embedded Image Total Expired Users in all Domains:0 200 IOC
User Accounts Pass Not Required Embedded Image Total Users with Password Not Required set in all Domains:0 0 IOC
Test Severity Items Affected Objects IOC/IOE
Computers with SPNs Configured Embedded Image Total Computers using ServicePrincipalNames in all Domains:0 0 IOE
Computers With Unconstrained Delegation Embedded Image Total Computers with Unconstrained Delegation in all Domains:0 0 IOE
Computers Modified with PrimaryGroupID Embedded Image Total Computers modified with PrimaryGroupID:0 0 IOC
Computers Sending Bad Logons Embedded Image Total Computers sending Bad Logon Attempts in all Domains:0 0 IOC
Computers Disabled Embedded Image Total Disabled Computer Accounts in all Domains:0 140 IOC
Stale Computer Accounts Embedded Image Total Stale Computer Accounts in all Domains:0 200 IOC
Unsupported Operating Systems Embedded Image Total End Of Life-Unsupported Operating Systems:0 0 IOE
Test Severity Items Affected Objects IOC/IOE
Admins with SPNs Configured Embedded Image Total Admin Accounts With ServicePrincipalName Identified:0 0 IOE
Admins Sending Bad Logons Embedded Image Total Privileged Users With Bad Logon Attempts:0 0 IOC
Test Severity Items Affected Objects IOC/IOE
Domain Controllers not owned by Admins Embedded Image Total Domain Controllers owned by non-privileged accounts:0 0 IOC
Computer Objects not managed by Admins Embedded Image Total Computers Not Managed By Admins in all Domains:0 0 IOC
Organizational Units not managed by Admins Embedded Image Total Organizational Units Not Managed By Admins:0 0 IOC
Test Severity Items Affected Objects IOC/IOE
Sensitive GPOs Modified Embedded Image Sensitive GPOs Status in Last 10 Days:WARNING: Modified WARNING: Modified IOC
Changes to Privileged Groups in Last 15 days Embedded Image Total Privileged Groups Modified in Last 15 Days in All Domains:13 13 IOC
Recently Created Privileged Admins Embedded Image Total Privileged Accounts created in last 10 days in all domains:0 0 IOC
Users Identified with Privileged SIDs in sIDHistory Embedded Image Total Users containing Admin Accounts in sIDHistory in all Domains:0 0 IOC
Computers Identified with Privileged SIDs in sIDHistory Embedded Image Total Computers containing Admin Accounts in sIDHistory in all Domains:0 0 IOC
Found Excluded Groups by AdminSDHolder and SDProp Embedded Image Total Excluded Groups by SDProp Process:0 0 IOC
krbtgt Account with Resource-Based Constrained Delegation Embedded Image Affected number of Domains:0 0 IOC
Test Severity Items Affected Objects IOC/IOE
Built-In Admin Account Not protected Embedded Image Default Administrator Account not protected in all domains:1 1 IOE IOC
Built-In Admin Account Not Disabled Embedded Image Default Admin Account not disabled in Total Domains:1 1 IOE IOC
Built-In Admin Account Not Renamed Embedded Image Default Admin Account not renamed in Total Domains:1 1 IOE
Built-In Admin Account was used in last 10 days Embedded Image Total Domains in which Default Administrator account was used in last 10 days:1 1 IOC
Guest Account is not renamed Embedded Image Guest Account not renamed in Total Domains:1 1 IOE
Built-In Admin Account Password Not Changed in 90 days Embedded Image Total Domains in which Default Administrator password not changed since last 90 days:0 0 IOE
KRBTGT Account Password Not Changed Embedded Image Total Domains Using KRBTGT Old Password:0 0 IOE
Guest Account is enabled Embedded Image Total Guest Accounts Enabled in All Domains:0 0 IOE
Administrator Account ServicePrincipalNames Found Embedded Image Total AD Domains Affected:0 0 IOE
Test Severity Items Affected Objects IOC/IOE
Misconfigured Administrative Accounts Found Embedded Image Total Admins Misconfigured:2 2 IOE IOC
Weak Password Policies Affected Admins Embedded Image Total Privileged Account using Weak Password Policy:2 23 IOE IOC
Missing Privileged Groups in Protected Users Group Embedded Image Total Missing Privileged Groups in Protected Users Group:Not In Use Not In Use IOE IOC
Privileged Accounts Pass Never Expires Embedded Image Total Privileged Accounts set to Password Never Expire in all Domains:0 34 IOE IOC
Too Many Privileged Accounts Embedded Image Affected AD Domains:0 20 IOC
Inactive Admins Embedded Image Total Enabled Admin Accounts Not In Use Since Last 30 Days:0 19 IOE
Privileged Groups Contain more than 20 members Embedded Image Privileged Groups Contain More than 20 members:0 18 IOE
Kerberos Pre-authentication Disabled Embedded Image Total Pre-Authentication Admins in all domains:0 55 IOE IOC
Privileged Groups Contained Computer Accounts Embedded Image Total computer accounts part of privileged groups:0 90 IOE IOC
Privileged Admins missing AdminCount=1 Flag Embedded Image Total Admins not set with AdminCount=1 flag in all domains:0 87 IOC
ForeignSecurityPrincipals In Privileged Groups Embedded Image Total ForeignSecurityPrincipal in Privileged Groups:0 64 IOE IOC
Operators Groups are not empty Embedded Image Operators Groups containing total members in all domains:0 10 IOE IOC
Password Do Not Expire Embedded Image Total Admin Accounts set to PasswordNeverExpires:1 12 IOE
Disabled Admins part of Privileged Groups Embedded Image Total Disabled Admins In Privileged Groups:0 23 IOE
Passwords Not Changed within 90 days Embedded Image Total Admin Accounts Did Not Change Their Passwords Since Last 90 Days:0 23 IOE
DNSAdmins Group has members Embedded Image Total Members In DNSAdmins Group In All Domains:0 45 IOE IOC
AdminsCount Flag set users not acting as Admins Embedded Image Total Unknown Admins Found:0 232 IOC
Test Severity Items Affected Objects IOC/IOE
Default Domain Policy-Minimum Password Length Embedded Image Account Policies Not Configured correctly in Total Domains:1 1 IOE
FGPP Policies-Minimum Password Length Embedded Image FGPP Not Configured Correctly In Domains:Not Created Not Created IOE
FGPP Policies Not Applying Embedded Image Total FGPP Not Applying in All Domains:Not Created Not Created IOE
Account Lockout Policies Missing Embedded Image Total Accounts Locked Out in All Domains:0 0 IOE
Test Severity Items Affected Objects IOC/IOE
TLS 1.1 Enabled DCs Embedded Image Total Domain Controllers with TLS 1.1 Protocol Enabled:1 1 IOE
NTLM Authentication Enabled DCs Embedded Image Total Domain Controllers with NTLM Enabled:1 1 IOE
AllowNT4Crypto DCs Embedded Image Total DCs with AllowNT4Crypto Enabled:1 1 IOE
RC4 Encryption Enabled DCs Embedded Image Total Domain Controllers With RC4 Encryption Enabled:1 1 IOE
Missing Updates DCs Embedded Image Total DCs Not Updated Since Last 45 Days:1 1 IOE
Domain Controllers Modified with PrimaryGroupID Embedded Image Total Domain Controllers modified with PrimaryGroupID:0 0 IOC
SMB 1 Protocol Enabled DCs Embedded Image Total Domain Controllers with SMB1 Server Protocol Enabled:0 0 IOE
SMB 1 Client Protocol Enabled DCs Embedded Image Total Domain Controllers with SMB1 Client Service Enabled:0 0 IOE
LAN Manager password hashes Enabled DCs Embedded Image Total DCs with LAN Manager Password Hashes:0 0 IOE
SMB Signing Disabled DCs Embedded Image Total Domains Controller Without SMB Signing:0 0 IOE
LDAP Signing Disabled DCs Embedded Image Total Domain Controllers Without LDAP Signing:0 0 IOE
Inconsistent DCs Embedded Image Total Domain Controllers in Inconsistent State:0 0 IOE
Unauthenticated DCs since last 45 Days Embedded Image Total Domain Controllers Not Authenticated Within 45 days In All Domains:0 0 IOE
Secrets not renewed DCs Embedded Image Total Domain Controllers Not Changed Password Within 45 Days In All Domains:0 0 IOE
Missed Reboot Cycles DCs Embedded Image Total DCs Not Rebooted Since Last 30 Days:0 0 IOE
No Contacts with Domain Controllers in Last Three Months Embedded Image Total Domain Controllers not contacted since last three months:0 0 IOE
Ensure UNC Paths for SYSVOL and NETLOGON are harderend Embedded Image SYSVOL and Netlogon Hardening Missing on Total DCs:0 0 IOE
Test Severity Items Affected Objects IOC/IOE
Missing DNS Scavenging DCs Embedded Image Total DNS Servers Not Enabled with Server Level Scavenging:1 1 IOE
Errors and Warnings in Log DCs Embedded Image Total DCs with Event Log Errors:1 1 IOE
Scheduled Tasks found on Domain Controllers Embedded Image Total Scheduled Tasks on DCs:3 3 IOC
Missing SSL Authentication DCs Embedded Image Total DCs without SSL:1 1 IOE
Missing Enough DNS Servers in NIC DCs Embedded Image Total DCs With inadequate Number Of DNS Servers in NIC Property:1 1
Not Enough Local Disks DCs Embedded Image Total DCs Not Configured With Recommended Disk Configuration:1 1
Orphaned DCs Embedded Image Total Orphaned Domain Controllers:0 0 IOE
Missing DNS Forwarders DCs Embedded Image Total DNS Servers Do Not Have Forwarders Configured:0 0 IOE
Missing Root Hints DCs Embedded Image Total DNS Servers Do Not Have Root Hints Configured:0 0 IOE
Missing Host Records DCs Embedded Image Total DCs Missing Host Records in DNS:0 0 IOE
Not Enough Free Space DCs Embedded Image Total DCs with Low Disk Space:0 0 IOE
Loopback Address Missing DCs Embedded Image Total DCs not configured with Loopback Address:0 0 IOE
Multihomed DCs Embedded Image Total DCS in Multihomed State:0 0 IOE
NTFS Replication DCs Embedded Image Total Domain Controllers utilizing NTFRS for AD Replication:0 0 IOE
Strict Replication Disabled DCs Embedded Image Total DCs with Strict Replication Consistency not enabled:0 0 IOE IOC
DCDiag Failure DCs Embedded Image Total DCs with DCDiag Failures:0 0
Out Of Default OUs DCs Embedded Image Total DCs outside of it's Default OU:0 0
Unsupported OS DCs Embedded Image Total DCs running Unsupported Operating Systems:0 0 IOE
Missing DNS Dynmaic Registration on NIC DCs Embedded Image Total DCS NIC Dynamic Updates Not Enabled:0 0
Missing _msdcs Zone DCs Embedded Image Total DNS Servers Missing _msdcs Zone:0 0
Event Log Config Not Correct DCs Embedded Image Total DCs with Event Log misconfiguration:0 0
Event Log Size Not Optimized DCs Embedded Image Total DCs with Event Log Size not optimal:0 0
Test Severity Items Affected Objects IOC/IOE
Print Spooler Service Running DCs Embedded Image Total Domain Controllers with Print Spooler Service running:1 1 IOE
Software Installed on Domain Controllers Embedded Image Total Software Installed on DCs:6 6 IOE
Additional Roles and Features DCs Embedded Image Total Domain Controllers with Additional Roles and Features:1 1 IOE
Fax Server role installed DCs Embedded Image Total Domain Controllers have Fax Server Installed::0 0 IOE
Microsoft FTP service installed DCs Embedded Image Total Domain Controllers have FTP Server Installed::0 0 IOE
Peer Name Resolution Protocol installed DCs Embedded Image Total Domain Controllers have Peer Name Resolution Protocol Installed::0 0 IOE
Simple TCP-IP Services installed DCs Embedded Image Total Domain Controllers have Simple TCP/IP Services Installed::0 0 IOE
Telnet Client installed DCs Embedded Image Total Domain Controllers have Telnet Client Installed::0 0 IOE
TFTP Client installed DCs Embedded Image Total Domain Controllers have TFTP Client Installed::0 0 IOE
Server Message Block (SMB) v1 protocol Installed DCs Embedded Image Total Domain Controllers have SMB 1.0/CIFS File Sharing Support Installed::0 0 IOE
Windows PowerShell 2.0 installed DCs Embedded Image Total Domain Controllers have Windows PowerShell 2.0 Engine Installed::0 0 IOE
ADWS Service Set to Manual DCs Embedded Image Total DCs ADWS Not Set to Start Automatic:0 0 IOE
DHCP Service Running DCs Embedded Image Total Domain Controllers with DHCP Server running:0 0 IOE
AD Services not running DCs Embedded Image Total DCs with Services Not Running:0 0 IOE
Test Severity Items Affected Objects IOC/IOE
Sites without Subnets Association Embedded Image Total AD Sites Without Subnets:1 1
Missing AD Sites Coverage Embedded Image Total AD Sites Not Covered:1 1
Sites Missing Bridgehead Server Embedded Image Number Of AD Sites Without Bridgehead Servers:1 1
AD Sites Redundancy Embedded Image Total AD Sites with Only One Domain Controller:1 1
Replication Interval Not Optimized Sites Embedded Image Replication Interval is not optimized for Site Links:1 1
Total Undefined Subnets Embedded Image Total Undefined Subnets in AD Forest:0 0
Sites without ISTG Role Embedded Image Total AD Sites Do Not Have ISTG Defined:0 0
Manual Replication Connection Objects Embedded Image Total Manual Replication Connection Objects:0 0
Missing Global Catalog Sites Embedded Image Total AD Sites Without Global Catalog Servers or No Universal Group Caching Enabled:0 0
Duplicate Site Links Embedded Image Total Duplicate Site Links:0 0
Sites With Manual Bridgehead Server Embedded Image Number Of AD Sites With Manual Bridgehead Servers:0 0
Sites creating Mesh Topology Embedded Image Total AD Site Links Containing More than Two AD Sites:0 0
AD Sites without Site Link Embedded Image Total AD Sites Not In Site Links:0 0
AD Sites without Domain Controller Embedded Image Total AD Sites Without Domain Controllers:0 0
Test Severity Items Affected Objects IOC/IOE
PDC Emulator Time Source Embedded Image Root PDC Time Source:Internal Source Internal Source
Domain Controllers Time Source Embedded Image Total DCs Not Defined With Correct Time-Source:0 0
Domain FSMO Placement Embedded Image AD FSMO Placement Status:FSMO Placement is correct. FSMO Placement is correct.
Domain Naming Master and Schema Master Placement Embedded Image Status:Hosted on same computer Hosted on same computer
Test Severity Items Affected Objects IOC/IOE
Unprotected OUs Embedded Image Total Ous not protected:1 1
Security Groups without Objects Embedded Image Total Empty Security Groups In All Domains:32 32
Users without UPN specified Embedded Image Total Users with UPN Blank in all Domains:3 3
Missing Location Text in AD Sites Embedded Image Total AD Sites Not Defined With Location:1 1
Managed Service Accounts Not Linked Embedded Image Total Managed Service Accounts are not Linked:0 0 IOE
TombstoneLifeTime Modified? Embedded Image Current TombstoneLifeTime Value:180 180
Check AD Forest Functional Level Embedded Image AD Forest Functional Level:Dynamicpacks.net is Windows2016Forest Dynamicpacks.net is Windows2016Forest
Check AD Domain Functional Level Embedded Image Status:Ok Ok
Ogranizational Units without Objects Embedded Image Total Empty Organizational Units In All Domains:0 0
Duplicate SPNs Embedded Image Total Duplicate SPNs in AD Domains:0 0
Unauthenticated Servers Embedded Image Total Servers Not Authenticated Within 90 Days in All Domains:0 0 IOE IOC
Secrets not renewed Servers Embedded Image Total Servers Not Changing Password within 45 days in all Domains:0 0 IOE IOC
AD Forest Schema Not upto date Embedded Image Current Forest Schema Version Status:OK:88 OK:88 IOE
Found Unused Netlogon Scripts Embedded Image Total Unused Scripts In All Domains:0 0 IOE IOC
Test Severity Items Affected Objects IOC/IOE
Disabled GPOs Embedded Image Total Disabled GPOs:0 23
GPOs not Linked to OUs Embedded Image Total OUs without GPO Linked:0 23 IOE
GPOs not Applying Embedded Image Total GPOs not applying correctly in All Domains:0 34
Orphaned GPO Containers Embedded Image Total Orphaned Group Policy Objects:0 34
Found GPOs with Block Inheritance Embedded Image Total GPOs with Block Inheritance Defined:0 2
GPO Naming Convention Embedded Image Number Of GPOs do not follow Standard Naming Convention:0 32
Found GPO with WMI Filters Embedded Image Total GPO with WMI Filter:0 45
Domain GPO Application Status Embedded Image Total GPOs Not Applied:0 23
No Group Policy Objects Defining Log Size and Retention Embedded Image Total AD Domains Affected:1 23
No Group Policy Objects to Prevent Domain Admins from logging on to Workstations or Servers Found Embedded Image Total AD Domains Affected:1 1
No Group Policy Objects to Block ISO Execution Found Embedded Image Total AD Domains Affected:1 1
No Group Policy Objects to Mitigate SMBv1 Found Embedded Image Total AD Domains Affected:1 1
No Group Policy Objects Enforcing UAC Prompt for Elevation Found Embedded Image Total AD Domains Affected:1 1
No Group Policy Objects to Mitigate Accidental Script Execution Embedded Image Total AD Domains Affected:1 1
No Group Policy Objects to Mitigate NTLMv1 Protocol Embedded Image Total AD Domains Affected:1 1
GPO Description Embedded Image Number of GPOs not set with Description:2 23
No Group Policy Objects for Preventing passwords using reversible encryption Embedded Image Total AD Domains Affected:0 0
GPO Preferences Containing Passwords Embedded Image GPO Preferences Containing Password in All AD Domains:0 0
Test Severity Items Affected Objects IOC/IOE
Too many DNS Static Records Embedded Image Total Static Records:0 0 IOC
DNS Round-Robin Not Enabled Embedded Image Total DNS Servers Not Enabled With Round Robin:0 0
Conditional Forwarders Not Working Embedded Image Total Conditional Forwarders Configured:0 0
Test Severity Items Affected Objects IOC/IOE
Accounts with Extended Rights to Read LAPS Passwords Found Embedded Image Illegal Accounts Found to read LAPS in AD Domains:LAPS/Module Not Installed LAPS/Module Not Installed IOE IOC
High Value Targets Found Embedded Image Total High Value Targets Found:2 2 IOE IOC
Access Control Lists on Computers Found Embedded Image Total Abusable ACLs on Computer Objects:0 23 IOE IOC
Access Control Lists on Security Groups Found Embedded Image Found Dangerous Group Permissions in AD Domains:0 23 IOE IOC
Access Control Lists on Users Found Embedded Image Found Dangerous User Permissions:0 23 IOE IOC
Group Policy Objects with Improper Permissions Found Embedded Image Abusable GPO Permissions found in Total AD Domains:0 23 IOE IOC
Group Policy Object Assignments with Improper Permissions Found Embedded Image Total Abusable GPO Permissions in AD Domains:0 23 IOE IOC
Dangerous Permissions Found on MicrosoftDNS Container Embedded Image AD Domains Affected:0 23 IOE IOC
Dangerous Permissions Found on Naming Contexts Embedded Image AD Domains Affected:0 23 IOE IOC
Pre-Windows 2000 Compatible Access Group is not empty Embedded Image Number of AD Domains Affected:0 23 IOE IOC
Found Groups with SID history Set Embedded Image Total Groups With sIDHistory Affected domains:0 23 IOE IOC
Normal Users Full Control Permissions on OUs Embedded Image Total Normal User Accounts with Full Control Rights to Organizational Units in all Domains:0 0 IOE IOC
EVERYONE Full Control Permissions on OUs Embedded Image Total Organizational Units with Everyone Full Control Access Rights:0 23 IOE IOC
Abusable Permissions Found on SYSVOL and NETLOGON Embedded Image Abusable Permissions Found on SYSVOL and Netlogon Shares:Ok Ok IOE IOC
LAPS SearchFlag modified Embedded Image LAPS SearchFlags Modified:Modified Modified IOE IOC
Unauthorized Users having GPLink Rights on Domain NC Embedded Image AD Domains Affected:0 23 IOE IOC
Unauthorized Users having GPLink Rights on Domain Controllers OU Embedded Image AD Domains Affected:0 23 IOE IOC
Unauthorized Users having GPLink Rights on AD Sites Embedded Image AD Sites Affected:0 23 IOE IOC
Embedded Image

TEST NAME

Protected Users Group Status

Description

Protected Users Group is NOT in use.
The Protected Users group was introduced in Server 2012-R2 Active Directory to minimize credential exposure for privileged accounts. Users in the Protected Users group are more secure when authenticating Windows resources. The differences include no longer caching clear-text passwords, even when Windows Digest is enabled, NTLM will no longer cache clear-text passwords, and Kerberos will no longer create DES or RC4 keys. When logging into domain controllers, members of the Protected Users group cannot authenticate via NTLM (Kerberos only), use DES or RC4 for Kerberos pre-authentication, and cannot be delegated with constrained or unconstrained delegation.

Recommendation and Steps

Ensure that all privileged users are members of the Protected Users group. If using a pre-2012-R2 schema, then the protected users group does not exist. This is an exposure, but the remediation is to upgrade the schema. Warning: use of the Protected Users group comes with significant functional impacts. Privileged users must be members of the Protected Users group.

Associated Objects Per Domain/AD Forest

AD DomainProtected Users Group In Use?
Dynamicpacks.netNot In Use-No Admins Added

Affected Objects

AD DomainProtected Users Group In Use?
Dynamicpacks.netNot In Use-No Admins Added
Embedded Image

TEST NAME

AD Recycle Bin Status

Description

AD Recycle Bin feature is NOT Enabled.
Please review and enable AD Recycle Bin feature in Active Directory. There are some Forest Functional Level requirements which must be met before it can be enabled.

Recommendation and Steps

Refer issue details.

Associated Objects Per Domain/AD Forest

Final StatusItemValue
DisabledAD Recycle Bin Feature

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Privileged Management Status

Description

AD Privileged Access Management is NOT enabled.
Refer issue details.

Recommendation and Steps

Please review and enable AD Privileged Access Management feature in Active Directory. There are some Forest Functional Level requirements which must be met before it can be enabled.

Associated Objects Per Domain/AD Forest

Final StatusItemValue
DisabledPrivileged Access Management Feature

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Managed Service Accounts Status

Description

Found Managed Service Accounts in Active Directory domains. 
Refer issue details.

Recommendation and Steps

Please review the list provided and remove the Managed Service Accounts that are not in use.

Associated Objects Per Domain/AD Forest

AD DomainManaged Service Account
Dynamicpacks.net0

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

gMSA Accounts Status

Description

gMSA is NOT in use.
The group Managed Service Account (gMSA) feature in Windows Server 2016 allows automatic rotation of passwords for service accounts, making them much more difficult for attackers to compromise. The feature should be used whenever possible for service accounts.

Recommendation and Steps

Group Managed Service Accounts should be used to protect service accounts.

Associated Objects Per Domain/AD Forest

AD DomainTotal gMSA Accounts
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Missing Microsoft LAPS in AD Forest

Description

Microsoft LAPS is not deployed in AD Forest.
Microsoft LAPS helps in protecting against pass-the-hash and lateral-traversal attacks, improved security for remote help desk scenarios, Ability to sign in to and recover devices that are otherwise inaccessible, a fine-grained security model (access control lists and optional password encryption) for securing passwords that are stored in Windows Server Active Directory, and support for the Azure role-based access control model for securing passwords that are stored in Azure Active Directory.

Recommendation and Steps

It is recommended to implement Microsoft LAPS in AD Forest using the official Microsoft documentation available here: https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview

Associated Objects Per Domain/AD Forest

Microsoft LAPS Status
Not Deployed

Affected Objects

Embedded Image

TEST NAME

Orphaned Admins on AdminSDHolder

Description

No Orphaned Admins were found on the AdminSDHolder Object.

Embedded Image

TEST NAME

Dangerous Permissions on AdminSDHolder

Description

No Full Control Permissions on AdminSDHolder Object.

Embedded Image

TEST NAME

AdminSDHolder was Modified in last 30 days

Description

AdminSDHolder was modified in the last 30 days.
Active Directory Domain Services uses AdminSDHolder, protected groups and Security Descriptor propagator (SD propagator or SDPROP for short) to secure privileged users and groups from unintentional modification. Unlike most objects in the Active Directory domain, which are owned by the Administrators group, AdminSDHolder is owned by the Domain Admins group. The AdminSDHolder object has a unique Access Control List (ACL), which is used to control the permissions of security principals that are members of built-in privileged Active Directory groups.  Every hour, a background process runs on the domain controller to compare manual modifications to an ACL and overwrites them so that the ACL matches the ACL on the AdminSDHolder object. Any changes to AdminSDHolder object is a security risk.

Recommendation and Steps

Please review why AdminSDHolder was modified and if any user or computer accounts that were added to the security tab of the AdminSDHolder object.

Associated Objects Per Domain/AD Forest

AD DomainAdminSDHolder Object was modified in last 30 days?Last Modification Date
Dynamicpacks.netwas modified12/30/2024 23:06:04

Affected Objects

AD DomainAdminSDHolder Object was modified in last 30 days?Last Modification Date
Dynamicpacks.netwas modified12/30/2024 23:06:04
Embedded Image

TEST NAME

Constrained delegation to domain controller service

Description

No computer accounts found with constrained delegation.

Embedded Image

TEST NAME

Resource-based constrained delegation on domain controllers

Description

No Resource-based constrained delegation is configured on domain controllers.

Embedded Image

TEST NAME

Anonymous Access to Active Directory

Description

Anonymous Access to Active Directory is disabled

Embedded Image

TEST NAME

Anonymous or EVERYONE in Pre-Windows 2000 Group

Description

Everyone or Anonymous groups were not found in Pre-Windows 2000 compatibility group.

Embedded Image

TEST NAME

Found Hidden Domain Controllers

Description

Test has passed.

Embedded Image

TEST NAME

Successful Exploit Machine Accounts Found

Description

Test has passed.

Embedded Image

TEST NAME

Possible User-based Service Accounts found

Description

Test has passed.

Embedded Image

TEST NAME

Objects Modified in Last 10 Days

Description

Objects were created in last 10 days.
As such there is no impact, but need to identify as to if there is any privileged account that was created in the last 10 days.

Recommendation and Steps

Please review the list of objects created.

Associated Objects Per Domain/AD Forest

AD DomainNumber Of objects Modified in Last 10 Days
Dynamicpacks.net241

Affected Objects

AD DomainDistinguishedNameObjectClassWhenChanged
Dynamicpacks.netCN=SYSVOL Subscription-CN=Domain System Volume-CN=DFSR-LocalSettings-CN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netmsDFSR-Subscription12/30/2024 10:56:37 PM
Dynamicpacks.netCN=Domain System Volume-CN=DFSR-LocalSettings-CN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netmsDFSR-Subscriber12/30/2024 10:51:36 PM
Dynamicpacks.netCN=DFSR-LocalSettings-CN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netmsDFSR-LocalSettings12/30/2024 10:56:37 PM
Dynamicpacks.netCN=DC114-CN=Topology-CN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-Member12/30/2024 10:51:36 PM
Dynamicpacks.netCN=Topology-CN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-Topology12/30/2024 10:51:36 PM
Dynamicpacks.netCN=SYSVOL Share-CN=Content-CN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-ContentSet12/30/2024 10:51:36 PM
Dynamicpacks.netCN=Content-CN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-Content12/30/2024 10:51:36 PM
Dynamicpacks.netCN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-ReplicationGroup12/30/2024 10:51:36 PM
Dynamicpacks.netCN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-GlobalSettings12/30/2024 10:51:36 PM
Dynamicpacks.netDC=k.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=f.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=e.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=l.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=a.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=g.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=m.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=d.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=b.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=c.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=h.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=i.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=j.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=@-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode12/30/2024 10:51:34 PM
Dynamicpacks.netDC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsZone12/30/2024 10:51:34 PM
Dynamicpacks.netCN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:51:34 PM
Dynamicpacks.netCN=DnsUpdateProxy-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:51:33 PM
Dynamicpacks.netCN=DnsAdmins-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:51:33 PM
Dynamicpacks.netCN=RID Set-CN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netrIDSet12/30/2024 10:51:04 PM
Dynamicpacks.netCN=RID Manager$-CN=System-DC=Dynamicpacks-DC=netrIDManager12/30/2024 10:51:04 PM
Dynamicpacks.netCN=Enterprise Key Admins-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Key Admins-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Protected Users-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:48 PM
Dynamicpacks.netCN=Cloneable Domain Controllers-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:48 PM
Dynamicpacks.netCN=Enterprise Read-only Domain Controllers-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:48 PM
Dynamicpacks.netCN=Read-only Domain Controllers-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Denied RODC Password Replication Group-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:48 PM
Dynamicpacks.netCN=Allowed RODC Password Replication Group-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:48 PM
Dynamicpacks.netCN=6E157EDF-4E72-4052-A82A-EC3F91021A22-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:50:47 PM
Dynamicpacks.netCN=S-1-5-9-CN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netforeignSecurityPrincipal12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Terminal Server License Servers-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Windows Authorization Access Group-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Incoming Forest Trust Builders-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Pre-Windows 2000 Compatible Access-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Account Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Server Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=RAS and IAS Servers-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Group Policy Creator Owners-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Domain Guests-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Domain Users-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Domain Admins-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Cert Publishers-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:46 PM
Dynamicpacks.netCN=Enterprise Admins-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Schema Admins-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Domain Controllers-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Domain Computers-CN=Users-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:46 PM
Dynamicpacks.netCN=krbtgt-CN=Users-DC=Dynamicpacks-DC=netuser12/30/2024 11:06:04 PM
Dynamicpacks.netCN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netcomputer12/30/2024 10:56:37 PM
Dynamicpacks.netCN=Server-CN=System-DC=Dynamicpacks-DC=netsamServer12/30/2024 10:56:04 PM
Dynamicpacks.netCN=Storage Replica Administrators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Remote Management Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Access Control Assistance Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Hyper-V Administrators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=RDS Management Servers-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=RDS Endpoint Servers-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=RDS Remote Access Servers-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Certificate Service DCOM Access-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Event Log Readers-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Cryptographic Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=S-1-5-17-CN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netforeignSecurityPrincipal12/30/2024 10:47:27 PM
Dynamicpacks.netCN=IIS_IUSRS-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Distributed COM Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Performance Log Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Performance Monitor Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Network Configuration Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Remote Desktop Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Replicator-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Backup Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Print Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Guests-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=S-1-5-11-CN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netforeignSecurityPrincipal12/30/2024 10:47:27 PM
Dynamicpacks.netCN=S-1-5-4-CN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netforeignSecurityPrincipal12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 10:50:47 PM
Dynamicpacks.netCN=Administrators-CN=Builtin-DC=Dynamicpacks-DC=netgroup12/30/2024 11:06:04 PM
Dynamicpacks.netCN=Builtin-DC=Dynamicpacks-DC=netbuiltinDomain12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Guest-CN=Users-DC=Dynamicpacks-DC=netuser12/30/2024 10:47:27 PM
Dynamicpacks.netCN=Administrator-CN=Users-DC=Dynamicpacks-DC=netuser12/30/2024 11:06:04 PM
Dynamicpacks.netCN=TPM Devices-DC=Dynamicpacks-DC=netmsTPM-InformationObjectsContainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=PSPs-CN=System-DC=Dynamicpacks-DC=netmsImaging-PSPs12/30/2024 10:47:22 PM
Dynamicpacks.netCN=Password Settings Container-CN=System-DC=Dynamicpacks-DC=netmsDS-PasswordSettingsContainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=ActiveDirectoryUpdate-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=Windows2003Update-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=A0C238BA-9E30-4EE6-80A6-43F731E9A5CD-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=434bb40d-dbc9-4fe7-81d4-d57229f7b080-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=7F950403-0AB3-47F9-9730-5D7B0269F9BD-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=3a6b3fbf-3168-4312-a10d-dd5b3393952d-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=e6d5fd00-385d-4e65-b02d-9da3493ed850-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=E5F9E791-D96D-4FC9-93C9-D53E1DC439BA-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=C81FC9CC-0130-4FD1-B272-634D74818133-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=83C53DA7-427E-47A4-A07A-A324598B88F7-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ff4f9d27-7157-4cb0-80a9-5d6f2b14c8ff-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=f4728883-84dd-483c-9897-274f2ebcf11e-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=54afcfb9-637a-4251-9f47-4d50e7021211-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=c3c927a6-cc1d-47c0-966b-be8f9b63d991-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=82112ba0-7e4c-4a44-89d9-d46c9612bf91-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=d262aae8-41f7-48ed-9f35-56bbb677573d-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=5e1574f6-55df-493e-a671-aaeffca6a100-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=c88227bc-fcca-4b58-8d8a-cd3d64528a02-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=4c93ad42-178a-4275-8600-16811d28f3aa-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=b96ed344-545a-4172-aa0c-68118202f125-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=de10d491-909f-4fb0-9abb-4b7865c0fe80-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=9738c400-7795-4d6e-b19d-c16cd6486166-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=4aaabc3a-c416-4b9c-a6bb-4b453ab1c1f0-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=231fb90b-c92a-40c9-9379-bacfc313a3e3-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=f58300d1-b71a-4DB6-88a1-a8b9538beaca-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=aed72870-bf16-4788-8ac7-22299c8207f1-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=71482d49-8870-4cb3-a438-b6fc9ec35d70-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=2951353e-d102-4ea5-906c-54247eeec741-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=0b7fb422-3609-4587-8c2e-94b10f67d1bf-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ebad865a-d649-416f-9922-456b53bbb5b8-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=57428d75-bef7-43e1-938b-2e749f5a8d56-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=61b34cb0-55ee-4be9-b595-97810b92b017-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=a1789bfb-e0a2-4739-8cc0-e77d892d080a-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=dda1d01d-4bd7-4c49-a184-46f9241b560e-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=8ddf6913-1c7b-4c59-a5af-b9ca3b3d2c4c-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=13d15cf0-e6c8-11d6-9793-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=c4f17608-e611-11d6-9793-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=3e4f4182-ac5d-4378-b760-0eab2de593e2-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=3051c66f-b332-4a73-9a20-2d6a7d6e6a1c-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd568d-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd568c-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd568b-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd568a-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5689-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5688-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5687-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5686-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5685-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5684-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5683-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5682-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5681-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5680-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd567f-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd567e-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd567d-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd567c-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd567b-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd567a-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5679-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6bcd5678-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=3c784009-1f57-4e2a-9b04-6915c9e71961-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=8ca38317-13a4-4bd4-806f-ebed6acb5d0c-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=f7ed4553-d82b-49ef-a839-2f38a36bb069-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=7cfb016c-4f87-4406-8166-bd9df943947f-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=8437C3D8-7689-4200-BF38-79E4AC33DFA0-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=4dfbb973-8a62-4310-a90c-776e00f83222-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=7ffef925-405b-440a-8d58-35e8cd6e98c3-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=5c82b233-75fc-41b3-ac71-c69592e6bf15-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=293f0798-ea5c-4455-9f5d-45f33a30703b-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=a3dac986-80e7-4e59-a059-54cb1ab43cb9-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=51cba88b-99cf-4e16-bef2-c427b38d0767-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=446f24ea-cfd5-4c52-8346-96e170bcb912-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6ff880d6-11e7-4ed1-a20f-aac45da48650-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=9cac1f66-2167-47ad-a472-2a13251310e4-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=f607fd87-80cf-45e2-890b-6cf97ec0e284-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=98de1d3e-6611-443b-8b4e-f4337f1ded0b-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=10b3ad2a-6883-4fa7-90fc-6377cbdc1b26-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=6ada9ff7-c9df-45c1-908e-9fef2fab008a-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=d85c0bfd-094f-4cad-a2b5-82ac9268475d-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=a86fe12a-0f62-4e2a-b271-d27f601f8182-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=0e660ea3-8a5e-4495-9ad7-ca1bd4638f9e-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=860c36ed-5241-4c62-a18b-cf6ff9994173-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=7868d4c8-ac41-4e05-b401-776280e8e9f1-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=2416c60a-fe15-4d7a-a61e-dffd5df864d3-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=f3dd09dd-25e8-4f9c-85df-12d6d2f2f2f5-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=bab5f54d-06c8-48de-9b87-d78b796564e4-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ab402345-d3c3-455d-9ff7-40268a1099b6-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=WMIGPO-CN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=PolicyType-CN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=SOM-CN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=PolicyTemplate-CN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ComPartitionSets-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ComPartitions-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=AdminSDHolder-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 11:06:04 PM
Dynamicpacks.netCN=ipsecNFA{6A1F5C6F-72B7-11D2-ACF0-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNegotiationPolicy{59319BF0-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNegotiationPolicy{7238523F-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNFA{594272FD-071D-11D3-AD22-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNFA{59319BF3-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNFA{7238523E-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecISAKMPPolicy{7238523D-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecISAKMPPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecPolicy{7238523C-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNegotiationPolicy{59319C01-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNFA{59319C04-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecISAKMPPolicy{72385237-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecISAKMPPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecPolicy{72385236-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecFilter{72385235-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecFilter12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNegotiationPolicy{7238523B-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNegotiationPolicy{59319BDF-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecFilter{7238523A-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecFilter12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNegotiationPolicy{72385233-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNFA{594272E2-071D-11D3-AD22-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNFA{59319BE2-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecNFA{72385232-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecISAKMPPolicy{72385231-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecISAKMPPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ipsecPolicy{72385230-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=IP Security-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=Dfs-Configuration-CN=System-DC=Dynamicpacks-DC=netdfsConfiguration12/30/2024 10:47:21 PM
Dynamicpacks.netCN=File Replication Service-CN=System-DC=Dynamicpacks-DC=netnTFRSSettings12/30/2024 10:47:21 PM
Dynamicpacks.netCN=RAS and IAS Servers Access Check-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=Machine-CN={6AC1786C-016F-11D2-945F-00C04fB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=User-CN={6AC1786C-016F-11D2-945F-00C04fB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN={6AC1786C-016F-11D2-945F-00C04fB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netgroupPolicyContainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=Machine-CN={31B2F340-016D-11D2-945F-00C04FB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=User-CN={31B2F340-016D-11D2-945F-00C04FB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN={31B2F340-016D-11D2-945F-00C04FB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netgroupPolicyContainer12/30/2024 10:53:02 PM
Dynamicpacks.netCN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=Meetings-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=AppCategories-CN=Default Domain Policy-CN=System-DC=Dynamicpacks-DC=netclassStore12/30/2024 10:47:21 PM
Dynamicpacks.netCN=Default Domain Policy-CN=System-DC=Dynamicpacks-DC=netdomainPolicy12/30/2024 10:47:21 PM
Dynamicpacks.netCN=ObjectMoveTable-CN=FileLinks-CN=System-DC=Dynamicpacks-DC=netlinkTrackObjectMoveTable12/30/2024 10:47:21 PM
Dynamicpacks.netCN=VolumeTable-CN=FileLinks-CN=System-DC=Dynamicpacks-DC=netlinkTrackVolumeTable12/30/2024 10:47:21 PM
Dynamicpacks.netCN=FileLinks-CN=System-DC=Dynamicpacks-DC=netfileLinkTracking12/30/2024 10:47:21 PM
Dynamicpacks.netCN=RpcServices-CN=System-DC=Dynamicpacks-DC=netrpcContainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=WinsockServices-CN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=Keys-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=Managed Service Accounts-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=NTDS Quotas-DC=Dynamicpacks-DC=netmsDS-QuotaContainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=Microsoft-CN=Program Data-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=Program Data-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:22 PM
Dynamicpacks.netCN=Infrastructure-DC=Dynamicpacks-DC=netinfrastructureUpdate12/30/2024 10:47:22 PM
Dynamicpacks.netCN=LostAndFound-DC=Dynamicpacks-DC=netlostAndFound12/30/2024 10:47:21 PM
Dynamicpacks.netCN=System-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netOU=Domain Controllers-DC=Dynamicpacks-DC=netorganizationalUnit12/30/2024 10:47:22 PM
Dynamicpacks.netCN=Computers-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netCN=Users-DC=Dynamicpacks-DC=netcontainer12/30/2024 10:47:21 PM
Dynamicpacks.netDC=Dynamicpacks-DC=netdomainDNS12/30/2024 10:52:10 PM
Embedded Image

TEST NAME

Objects Created in Last 10 Days

Description

Objects were created in last 10 days.
As such there is no impact, but need to identify as to if there is any privileged account that was created in the last 10 days.

Recommendation and Steps

Please review the list of objects created.

Associated Objects Per Domain/AD Forest

AD DomainNumber Of objects Created in Last 10 Days
Dynamicpacks.net241

Affected Objects

AD DomainDistinguishedNameObjectClassWhenChanged
Dynamicpacks.netCN=SYSVOL Subscription-CN=Domain System Volume-CN=DFSR-LocalSettings-CN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netmsDFSR-Subscription
Dynamicpacks.netCN=Domain System Volume-CN=DFSR-LocalSettings-CN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netmsDFSR-Subscriber
Dynamicpacks.netCN=DFSR-LocalSettings-CN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netmsDFSR-LocalSettings
Dynamicpacks.netCN=DC114-CN=Topology-CN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-Member
Dynamicpacks.netCN=Topology-CN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-Topology
Dynamicpacks.netCN=SYSVOL Share-CN=Content-CN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-ContentSet
Dynamicpacks.netCN=Content-CN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-Content
Dynamicpacks.netCN=Domain System Volume-CN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-ReplicationGroup
Dynamicpacks.netCN=DFSR-GlobalSettings-CN=System-DC=Dynamicpacks-DC=netmsDFSR-GlobalSettings
Dynamicpacks.netDC=k.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=f.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=e.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=l.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=a.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=g.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=m.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=d.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=b.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=c.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=h.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=i.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=j.root-servers.net-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=@-DC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsNode
Dynamicpacks.netDC=RootDNSServers-CN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netdnsZone
Dynamicpacks.netCN=MicrosoftDNS-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=DnsUpdateProxy-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=DnsAdmins-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=RID Set-CN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netrIDSet
Dynamicpacks.netCN=RID Manager$-CN=System-DC=Dynamicpacks-DC=netrIDManager
Dynamicpacks.netCN=Enterprise Key Admins-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Key Admins-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Protected Users-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Cloneable Domain Controllers-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Enterprise Read-only Domain Controllers-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Read-only Domain Controllers-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Denied RODC Password Replication Group-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Allowed RODC Password Replication Group-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=6E157EDF-4E72-4052-A82A-EC3F91021A22-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=S-1-5-9-CN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netforeignSecurityPrincipal
Dynamicpacks.netCN=Terminal Server License Servers-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Windows Authorization Access Group-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Incoming Forest Trust Builders-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Pre-Windows 2000 Compatible Access-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Account Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Server Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=RAS and IAS Servers-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Group Policy Creator Owners-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Domain Guests-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Domain Users-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Domain Admins-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Cert Publishers-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Enterprise Admins-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Schema Admins-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Domain Controllers-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Domain Computers-CN=Users-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=krbtgt-CN=Users-DC=Dynamicpacks-DC=netuser
Dynamicpacks.netCN=DC114-OU=Domain Controllers-DC=Dynamicpacks-DC=netcomputer
Dynamicpacks.netCN=Server-CN=System-DC=Dynamicpacks-DC=netsamServer
Dynamicpacks.netCN=Storage Replica Administrators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Remote Management Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Access Control Assistance Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Hyper-V Administrators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=RDS Management Servers-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=RDS Endpoint Servers-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=RDS Remote Access Servers-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Certificate Service DCOM Access-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Event Log Readers-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Cryptographic Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=S-1-5-17-CN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netforeignSecurityPrincipal
Dynamicpacks.netCN=IIS_IUSRS-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Distributed COM Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Performance Log Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Performance Monitor Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Network Configuration Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Remote Desktop Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Replicator-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Backup Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Print Operators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Guests-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=S-1-5-11-CN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netforeignSecurityPrincipal
Dynamicpacks.netCN=S-1-5-4-CN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netforeignSecurityPrincipal
Dynamicpacks.netCN=Users-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Administrators-CN=Builtin-DC=Dynamicpacks-DC=netgroup
Dynamicpacks.netCN=Builtin-DC=Dynamicpacks-DC=netbuiltinDomain
Dynamicpacks.netCN=Guest-CN=Users-DC=Dynamicpacks-DC=netuser
Dynamicpacks.netCN=Administrator-CN=Users-DC=Dynamicpacks-DC=netuser
Dynamicpacks.netCN=TPM Devices-DC=Dynamicpacks-DC=netmsTPM-InformationObjectsContainer
Dynamicpacks.netCN=PSPs-CN=System-DC=Dynamicpacks-DC=netmsImaging-PSPs
Dynamicpacks.netCN=Password Settings Container-CN=System-DC=Dynamicpacks-DC=netmsDS-PasswordSettingsContainer
Dynamicpacks.netCN=ActiveDirectoryUpdate-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Windows2003Update-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=A0C238BA-9E30-4EE6-80A6-43F731E9A5CD-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=434bb40d-dbc9-4fe7-81d4-d57229f7b080-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=7F950403-0AB3-47F9-9730-5D7B0269F9BD-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=3a6b3fbf-3168-4312-a10d-dd5b3393952d-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=e6d5fd00-385d-4e65-b02d-9da3493ed850-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=E5F9E791-D96D-4FC9-93C9-D53E1DC439BA-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=C81FC9CC-0130-4FD1-B272-634D74818133-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=83C53DA7-427E-47A4-A07A-A324598B88F7-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=ff4f9d27-7157-4cb0-80a9-5d6f2b14c8ff-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=f4728883-84dd-483c-9897-274f2ebcf11e-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=54afcfb9-637a-4251-9f47-4d50e7021211-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=c3c927a6-cc1d-47c0-966b-be8f9b63d991-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=82112ba0-7e4c-4a44-89d9-d46c9612bf91-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=d262aae8-41f7-48ed-9f35-56bbb677573d-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=5e1574f6-55df-493e-a671-aaeffca6a100-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=c88227bc-fcca-4b58-8d8a-cd3d64528a02-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=4c93ad42-178a-4275-8600-16811d28f3aa-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=b96ed344-545a-4172-aa0c-68118202f125-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=de10d491-909f-4fb0-9abb-4b7865c0fe80-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=9738c400-7795-4d6e-b19d-c16cd6486166-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=4aaabc3a-c416-4b9c-a6bb-4b453ab1c1f0-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=231fb90b-c92a-40c9-9379-bacfc313a3e3-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=f58300d1-b71a-4DB6-88a1-a8b9538beaca-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=aed72870-bf16-4788-8ac7-22299c8207f1-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=71482d49-8870-4cb3-a438-b6fc9ec35d70-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=2951353e-d102-4ea5-906c-54247eeec741-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=0b7fb422-3609-4587-8c2e-94b10f67d1bf-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=ebad865a-d649-416f-9922-456b53bbb5b8-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=57428d75-bef7-43e1-938b-2e749f5a8d56-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=61b34cb0-55ee-4be9-b595-97810b92b017-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=a1789bfb-e0a2-4739-8cc0-e77d892d080a-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=dda1d01d-4bd7-4c49-a184-46f9241b560e-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=8ddf6913-1c7b-4c59-a5af-b9ca3b3d2c4c-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=13d15cf0-e6c8-11d6-9793-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=c4f17608-e611-11d6-9793-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=3e4f4182-ac5d-4378-b760-0eab2de593e2-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=3051c66f-b332-4a73-9a20-2d6a7d6e6a1c-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd568d-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd568c-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd568b-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd568a-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5689-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5688-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5687-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5686-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5685-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5684-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5683-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5682-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5681-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5680-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd567f-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd567e-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd567d-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd567c-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd567b-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd567a-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5679-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6bcd5678-8314-11d6-977b-00c04f613221-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=3c784009-1f57-4e2a-9b04-6915c9e71961-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=8ca38317-13a4-4bd4-806f-ebed6acb5d0c-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=f7ed4553-d82b-49ef-a839-2f38a36bb069-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=7cfb016c-4f87-4406-8166-bd9df943947f-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=8437C3D8-7689-4200-BF38-79E4AC33DFA0-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=4dfbb973-8a62-4310-a90c-776e00f83222-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=7ffef925-405b-440a-8d58-35e8cd6e98c3-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=5c82b233-75fc-41b3-ac71-c69592e6bf15-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=293f0798-ea5c-4455-9f5d-45f33a30703b-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=a3dac986-80e7-4e59-a059-54cb1ab43cb9-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=51cba88b-99cf-4e16-bef2-c427b38d0767-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=446f24ea-cfd5-4c52-8346-96e170bcb912-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6ff880d6-11e7-4ed1-a20f-aac45da48650-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=9cac1f66-2167-47ad-a472-2a13251310e4-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=f607fd87-80cf-45e2-890b-6cf97ec0e284-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=98de1d3e-6611-443b-8b4e-f4337f1ded0b-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=10b3ad2a-6883-4fa7-90fc-6377cbdc1b26-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=6ada9ff7-c9df-45c1-908e-9fef2fab008a-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=d85c0bfd-094f-4cad-a2b5-82ac9268475d-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=a86fe12a-0f62-4e2a-b271-d27f601f8182-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=0e660ea3-8a5e-4495-9ad7-ca1bd4638f9e-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=860c36ed-5241-4c62-a18b-cf6ff9994173-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=7868d4c8-ac41-4e05-b401-776280e8e9f1-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=2416c60a-fe15-4d7a-a61e-dffd5df864d3-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=f3dd09dd-25e8-4f9c-85df-12d6d2f2f2f5-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=bab5f54d-06c8-48de-9b87-d78b796564e4-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=ab402345-d3c3-455d-9ff7-40268a1099b6-CN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Operations-CN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=DomainUpdates-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=WMIGPO-CN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=PolicyType-CN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=SOM-CN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=PolicyTemplate-CN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=WMIPolicy-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=ComPartitionSets-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=ComPartitions-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=AdminSDHolder-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=ipsecNFA{6A1F5C6F-72B7-11D2-ACF0-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA
Dynamicpacks.netCN=ipsecNegotiationPolicy{59319BF0-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy
Dynamicpacks.netCN=ipsecNegotiationPolicy{7238523F-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy
Dynamicpacks.netCN=ipsecNFA{594272FD-071D-11D3-AD22-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA
Dynamicpacks.netCN=ipsecNFA{59319BF3-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA
Dynamicpacks.netCN=ipsecNFA{7238523E-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA
Dynamicpacks.netCN=ipsecISAKMPPolicy{7238523D-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecISAKMPPolicy
Dynamicpacks.netCN=ipsecPolicy{7238523C-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecPolicy
Dynamicpacks.netCN=ipsecNegotiationPolicy{59319C01-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy
Dynamicpacks.netCN=ipsecNFA{59319C04-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA
Dynamicpacks.netCN=ipsecISAKMPPolicy{72385237-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecISAKMPPolicy
Dynamicpacks.netCN=ipsecPolicy{72385236-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecPolicy
Dynamicpacks.netCN=ipsecFilter{72385235-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecFilter
Dynamicpacks.netCN=ipsecNegotiationPolicy{7238523B-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy
Dynamicpacks.netCN=ipsecNegotiationPolicy{59319BDF-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy
Dynamicpacks.netCN=ipsecFilter{7238523A-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecFilter
Dynamicpacks.netCN=ipsecNegotiationPolicy{72385233-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNegotiationPolicy
Dynamicpacks.netCN=ipsecNFA{594272E2-071D-11D3-AD22-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA
Dynamicpacks.netCN=ipsecNFA{59319BE2-5EE3-11D2-ACE8-0060B0ECCA17}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA
Dynamicpacks.netCN=ipsecNFA{72385232-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecNFA
Dynamicpacks.netCN=ipsecISAKMPPolicy{72385231-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecISAKMPPolicy
Dynamicpacks.netCN=ipsecPolicy{72385230-70FA-11D1-864C-14A300000000}-CN=IP Security-CN=System-DC=Dynamicpacks-DC=netipsecPolicy
Dynamicpacks.netCN=IP Security-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Dfs-Configuration-CN=System-DC=Dynamicpacks-DC=netdfsConfiguration
Dynamicpacks.netCN=File Replication Service-CN=System-DC=Dynamicpacks-DC=netnTFRSSettings
Dynamicpacks.netCN=RAS and IAS Servers Access Check-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Machine-CN={6AC1786C-016F-11D2-945F-00C04fB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=User-CN={6AC1786C-016F-11D2-945F-00C04fB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN={6AC1786C-016F-11D2-945F-00C04fB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netgroupPolicyContainer
Dynamicpacks.netCN=Machine-CN={31B2F340-016D-11D2-945F-00C04FB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=User-CN={31B2F340-016D-11D2-945F-00C04FB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN={31B2F340-016D-11D2-945F-00C04FB984F9}-CN=Policies-CN=System-DC=Dynamicpacks-DC=netgroupPolicyContainer
Dynamicpacks.netCN=Policies-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Meetings-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=AppCategories-CN=Default Domain Policy-CN=System-DC=Dynamicpacks-DC=netclassStore
Dynamicpacks.netCN=Default Domain Policy-CN=System-DC=Dynamicpacks-DC=netdomainPolicy
Dynamicpacks.netCN=ObjectMoveTable-CN=FileLinks-CN=System-DC=Dynamicpacks-DC=netlinkTrackObjectMoveTable
Dynamicpacks.netCN=VolumeTable-CN=FileLinks-CN=System-DC=Dynamicpacks-DC=netlinkTrackVolumeTable
Dynamicpacks.netCN=FileLinks-CN=System-DC=Dynamicpacks-DC=netfileLinkTracking
Dynamicpacks.netCN=RpcServices-CN=System-DC=Dynamicpacks-DC=netrpcContainer
Dynamicpacks.netCN=WinsockServices-CN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Keys-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Managed Service Accounts-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=NTDS Quotas-DC=Dynamicpacks-DC=netmsDS-QuotaContainer
Dynamicpacks.netCN=Microsoft-CN=Program Data-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Program Data-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=ForeignSecurityPrincipals-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Infrastructure-DC=Dynamicpacks-DC=netinfrastructureUpdate
Dynamicpacks.netCN=LostAndFound-DC=Dynamicpacks-DC=netlostAndFound
Dynamicpacks.netCN=System-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netOU=Domain Controllers-DC=Dynamicpacks-DC=netorganizationalUnit
Dynamicpacks.netCN=Computers-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netCN=Users-DC=Dynamicpacks-DC=netcontainer
Dynamicpacks.netDC=Dynamicpacks-DC=netdomainDNS
Embedded Image

TEST NAME

Domain Trusts Found

Description

Test has passed.

Embedded Image

TEST NAME

Anyone can Join Computers to Domain

Description

Normal users can add computers to Active Directory.
The ability to add computer accounts to a domain without restrictions or monitoring present opportunities for attackers to add their own accounts or take advantage of uncontrolled computers with vulnerabilities, thereby extending their reach and entrenching themselves in the environment.

Recommendation and Steps

It is recommended to set the ms-DS-MachineAccountQuota attribute on the domain NC head to 0 to disable regular users' ability to add computer accounts.

Associated Objects Per Domain/AD Forest

AD DomainNormal Users Can Join Computers to Domain?
Dynamicpacks.netYes: ms-DS-MachineAccountQuota:10

Affected Objects

AD DomainNormal Users Can Join Computers to Domain?
Dynamicpacks.netYes: ms-DS-MachineAccountQuota:10
Embedded Image

TEST NAME

Replication Errors DCs

Description

Active Directory Replication is working normally.

Embedded Image

TEST NAME

Allowed RODC Password Replication Group is not empty

Description

Allowed RODC Password Replication Group is empty.

Embedded Image

TEST NAME

Managed service accounts with passwords unchanged for more than 90 days

Description

Test has passed.

Embedded Image

TEST NAME

Denied RODC Password Replication Group missing Privileged Accounts

Description

Denied RODC Password Replication Group does not contain privileged groups.
Some default groups are missing from the Denied RODC Password Replication Group. It is a security risk to expose passwords of privileged groups.

Recommendation and Steps

The Denied RODC Password Replication Group must include the following members: Domain Controllers, Read-only Domain Controllers, Group Policy Creator Owners, Domain Admins, Cert Publishers, Enterprise Admins, Schema Admins, and KRBTGT groups.

Associated Objects Per Domain/AD Forest

AD DomainTotal Missing Members in Denied RODC Password Replication Group
Dynamicpacks.net8

Affected Objects

AD DomainMissing Privileged Group in Denied RODC Password Replication Group
Dynamicpacks.netEnterprise Key Admins
Dynamicpacks.netKey Admins
Dynamicpacks.netAccount Operators
Dynamicpacks.netServer Operators
Dynamicpacks.netReplicator
Dynamicpacks.netBackup Operators
Dynamicpacks.netPrint Operators
Dynamicpacks.netAdministrators
Embedded Image

TEST NAME

msDS-NeverRevealGroupattribute RODC missing Privileged Accounts

Description

Privileged Groups found in msDS-NeverRevealGroupattribute Attribute.

Embedded Image

TEST NAME

Schema Admin Group members

Description

Found members in Schema Admins Group.
Only members of the Schema Admins group can modify the schema, so accounts should only be added to this group when a change to the Schema is required and removed afterwards. This approach helps prevent an attacker from compromising a Schema Admin account, which could have serious consequences.

Recommendation and Steps

It is recommended to remove all members from the Schema Admins Group.

Associated Objects Per Domain/AD Forest

AD ForestTotal Schema Members
DynamicPacks.net1

Affected Objects

Schema Member
Administrator
Embedded Image

TEST NAME

Unsecure Updates Zones

Description

Domain DNS Zones are configured to accept dynamic updates securely.

Embedded Image

TEST NAME

Missing Domain Zones Scavenging

Description

Domain Zones do not have DNS Aging enabled. 
It is important to note that if you do not enable Aging for a Domain Zone DNS Server may result in a huge number of stale DNS records. 

Recommendation and Steps

It is recommended to enable DNS Aging for each Domain Zone.

Associated Objects Per Domain/AD Forest

Connected to PDCDomain ZoneFinal StatusIs Aging Enabled?No Refresh IntervalRefresh Interval
dc114.Dynamicpacks.netDynamicpacks.netDNS Scavenging is not enabled for Domain Zone.False7.00:00:007.00:00:00

Affected Objects

Connected to PDCDomain ZoneFinal StatusIs Aging Enabled?No Refresh IntervalRefresh Interval
dc114.Dynamicpacks.netDynamicpacks.netDNS Scavenging is not enabled for Domain Zone.False7.00:00:007.00:00:00
Embedded Image

TEST NAME

AD Partitions Backup Status

Description

All AD Partitions were backed up recently.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD PartitionFinal StatusLast Backup Date
DC=ForestDnsZones DC=Dynamicpacks DC=netOk
DC=DomainDnsZones DC=Dynamicpacks DC=netOk
CN=Schema CN=Configuration DC=Dynamicpacks DC=netOk
CN=Configuration DC=Dynamicpacks DC=netOk
DC=Dynamicpacks DC=netOk

Affected Objects

Embedded Image

TEST NAME

Users with LastPasswordSet was never Set

Description

Test has passed.

Embedded Image

TEST NAME

Users with PWDLastSet to ZERO

Description

PWDLastSet is set to some timestamp for all users and no dormant accounts were found.

Embedded Image

TEST NAME

Users with SPNs Configured

Description

No Users found with Service Principals Configured.

Embedded Image

TEST NAME

Password Expiration is missing for smart card users

Description

Test has passed.

Embedded Image

TEST NAME

Accounts vulnerable to Kerberoasting Found

Description

Test has passed.

Embedded Image

TEST NAME

Users With DES encryption

Description

The USE_DES_KEY_ONLY flag is not set for any user.

Embedded Image

TEST NAME

Users With Reversible Encryption

Description

No accounts have their passwords stored in Active Directory using reversible encryption.

Embedded Image

TEST NAME

Users With Kerberos Pre-Authentication

Description

The DONT_REQUIRE_PREAUTH flag is NOT set for users.

Embedded Image

TEST NAME

Users Modified with PrimaryGroupID

Description

Test has been passed

Embedded Image

TEST NAME

Users Sending Bad Logons

Description

No Bad Logon Attempts were found from users.

Embedded Image

TEST NAME

Users Disabled

Description

No Disabled user accounts were found in AD Domains.

Embedded Image

TEST NAME

Stale User Accounts

Description

No Stale user accounts were found in AD Domains.

Embedded Image

TEST NAME

Users Expired

Description

No Expired Accounts were found in Active Directory.

Embedded Image

TEST NAME

User Accounts Pass Never Expires

Description

Password Never Expires user accounts were found in AD Domains. 
Every user must be set to renew their password except user accounts which are created for use with applications. Service Accounts can be set to not expire.

Recommendation and Steps

Please check why passwords for these user accounts are set to not expire. 

Associated Objects Per Domain/AD Forest

AD DomainTotal Users With Password Never Expires
Dynamicpacks.net1

Affected Objects

AD DomainBadLogonCountDistinguishedNameDoesNotRequirePreAuthEnabledPasswordLastSetPasswordNeverExpiresPasswordNotRequiredPrimaryGroupIDPWDLastSetSamAccountNameSIDHistoryUserAccountControlUserPrincipalName
Dynamicpacks.net0CN=Administrator-CN=Users-DC=Dynamicpacks-DC=netFalseTrue12/21/2024 9:36:08 PMTrueFalse513133793193685017197AdministratorMicrosoft.ActiveDirectory.Management.ADPropertyValueCollection66048
Embedded Image

TEST NAME

User Accounts Pass Not Required

Description

No Users with Password Not Required flag.

Embedded Image

TEST NAME

Computers with SPNs Configured

Description

No Computer accounts were found with Service Principals

Embedded Image

TEST NAME

Computers With Unconstrained Delegation

Description

No accounts found with unconstrained delegation.

Embedded Image

TEST NAME

Computers Modified with PrimaryGroupID

Description

Test has been passed

Embedded Image

TEST NAME

Computers Sending Bad Logons

Description

No Computers are sending Bad Logon Attempts.

Embedded Image

TEST NAME

Computers Disabled

Description

No Disabled computers were found in AD Domains.

Embedded Image

TEST NAME

Stale Computer Accounts

Description

No Stale Computer Accounts were found.

Embedded Image

TEST NAME

Unsupported Operating Systems

Description

No Computers running an unsupported operating version were found in Active Directory.

Embedded Image

TEST NAME

Admins with SPNs Configured

Description

Admin Accounts with Service Principal Names are not found.

Embedded Image

TEST NAME

Admins Sending Bad Logons

Description

No Admins found with Bad Logon Attempts.

Embedded Image

TEST NAME

Domain Controllers not owned by Admins

Description

All Domain Controller computer accounts are owned by privileged accounts.

Embedded Image

TEST NAME

Computer Objects not managed by Admins

Description

Computer accounts are managed by admin accounts.

Embedded Image

TEST NAME

Organizational Units not managed by Admins

Description

Organizational units are managed by admin accounts.

Embedded Image

TEST NAME

Sensitive GPOs Modified

Description

Sensitive Group Policy Objects have been changed in the last 10 days.
Changes to the Default Domain Policy or Default Domain Controllers Policy should be accounted for by the administrators. If the change cannot be accounted for, investigate the change looking for potential weakening of security posture and why the change was made.

Recommendation and Steps

Please ensure the change is made by an Administrator as changing to default domain and domain controller policies is generally not required.

Associated Objects Per Domain/AD Forest

AD DomainDefault Domain GPO Modified Last DateDomain Controller GPO Modified Last Date
Dynamicpacks.net12/30/2024 22:47:2012/30/2024 22:47:20

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Recently Created Privileged Admins

Description

Embedded Image

TEST NAME

Changes to Privileged Groups in Last 15 days

Description

Found indicator of exposure found.
Recent additions or deletions to privileged group members could be normal operational changes or could indicate attempts at persistence or cleaning up of tracks after an attack.

Recommendation and Steps

Confirm that any additions/removals from privileged groups are valid and properly accounted for.

Associated Objects Per Domain/AD Forest

AD DomainTotal Privileged Groups Modified in Last 15 Days
Dynamicpacks.net13

Affected Objects

AD DomainLast Modification DatePrivileged Group
Dynamicpacks.net12/30/2024 23:06:04Enterprise Key Admins
Dynamicpacks.net12/30/2024 23:06:04Key Admins
Dynamicpacks.net12/30/2024 23:06:04Read-only Domain Controllers
Dynamicpacks.net12/30/2024 23:06:04Account Operators
Dynamicpacks.net12/30/2024 23:06:04Server Operators
Dynamicpacks.net12/30/2024 23:06:04Domain Admins
Dynamicpacks.net12/30/2024 23:06:04Enterprise Admins
Dynamicpacks.net12/30/2024 23:06:04Schema Admins
Dynamicpacks.net12/30/2024 23:06:04Domain Controllers
Dynamicpacks.net12/30/2024 23:06:04Replicator
Dynamicpacks.net12/30/2024 23:06:04Backup Operators
Dynamicpacks.net12/30/2024 23:06:04Print Operators
Dynamicpacks.net12/30/2024 23:06:04Administrators
Embedded Image

TEST NAME

Users Identified with Privileged SIDs in sIDHistory

Description

Users do not contain Privileged Accounts SID in sIDHistory.

Embedded Image

TEST NAME

Computers Identified with Privileged SIDs in sIDHistory

Description

No computer accounts with privileged Accounts SID in sIDHistory.

Embedded Image

TEST NAME

Found Excluded Groups by AdminSDHolder and SDProp

Description

Embedded Image

TEST NAME

krbtgt Account with Resource-Based Constrained Delegation

Description

krbtgt account do not have resource-based constrained delegation.

Embedded Image

TEST NAME

Built-In Admin Account Not protected

Description

Default Administrator account is not protected.
Use of a domain's Administrator account should be reserved only for initial build activities, and possibly, disaster-recovery scenarios. To ensure that an Administrator account can be used to effect repairs in the event that no other accounts can be used, you should not change the default membership of the Administrator account in any domain in the forest. Instead, you should secure the Administrator account in each domain in the forest.

Recommendation and Steps

It is recommended to enable the Account is sensitive and cannot be delegated flag on the administrator account and make sure to change the password.

Associated Objects Per Domain/AD Forest

AD DomainDefault Administrator Account Protection Status
Dynamicpacks.netNot Protected-Cannot be delegated Not enabled

Affected Objects

AD DomainDefault Administrator Account Protection Status
Dynamicpacks.netNot Protected-Cannot be delegated Not enabled
Embedded Image

TEST NAME

Built-In Admin Account Not Disabled

Description

Default Administrators account in domains have not been renamed or disabled.
Anyone with an administrator account can attempt to log on to domain which will cause Bad Logon Events on domain controllers.

Recommendation and Steps

Please review the list and make sure to rename and disabled Default Administrator account in each domain.

Associated Objects Per Domain/AD Forest

AD DomainAdministrator Account NameEnabledFinal Status
Dynamicpacks.netAdministratorTrueNOT OK

Affected Objects

AD DomainAdministrator Account NameEnabledFinal Status
Dynamicpacks.netAdministratorTrueNOT OK
Embedded Image

TEST NAME

Built-In Admin Account Not Renamed

Description

Default Administrators account in domains have not been renamed or disabled.
Anyone with an administrator account can attempt to log on to domain which will cause Bad Logon Events on domain controllers.

Recommendation and Steps

Please review the list and make sure to rename and disabled Default Administrator account in each domain.

Associated Objects Per Domain/AD Forest

AD DomainDefault Administrator Account Renamed?
Dynamicpacks.netNot Renamed

Affected Objects

AD DomainDefault Administrator Account Renamed?
Dynamicpacks.netNot Renamed
Embedded Image

TEST NAME

Built-In Admin Account Password Not Changed in 90 days

Description

Default Administrator account password was changed in 90 days.

Embedded Image

TEST NAME

Built-In Admin Account was used in last 10 days

Description

Default Administrator account was used recently in some domains.
The default Admin account should only be used for initial Active Directory setup and for disaster recovery purposes. If default admin account is used, then it could indicate that the user has been compromised.

Recommendation and Steps

If best practices are followed and domain Admin is not used, this would indicate a compromise. Ensure any logins to the built-in Domain Administrator account are legitimate and accounted for. If not accounted for, a breach is likely and should be investigated.

Associated Objects Per Domain/AD Forest

AD DomainDefault Admin Account Used StatusLast Logon Date
Dynamicpacks.netWas Used12/30/2024 10:52:18 PM

Affected Objects

AD DomainDefault Admin Account Used StatusLast Logon Date
Dynamicpacks.netWas Used12/30/2024 10:52:18 PM
Embedded Image

TEST NAME

KRBTGT Account Password Not Changed

Description

krbtgt password was changed within 180 days.

Embedded Image

TEST NAME

Guest Account is enabled

Description

Guest Account is disabled in all domains.

Embedded Image

TEST NAME

Guest Account is not renamed

Description

Guest account in domains have not been renamed or disabled.
The built-in guest account is a well-known user account on all Windows systems and, as initially installed, does not require a password.  This can allow access to system resources by unauthorized users.  Renaming this account to an unidentified name improves the protection of this account and the system.

Recommendation and Steps

Please review the list and make sure to rename and disabled Guest account in each domain.

Associated Objects Per Domain/AD Forest

AD DomainGuest Account Renamed?
Dynamicpacks.netNot Renamed

Affected Objects

AD DomainGuest Account Renamed?
Dynamicpacks.netNot Renamed
Embedded Image

TEST NAME

Administrator Account ServicePrincipalNames Found

Description

Test has passed.

Embedded Image

TEST NAME

Misconfigured Administrative Accounts Found

Description

Test has failed.
Administrative accounts were found that are not configured to have the 'This account is sensitive and cannot be delegated' option enabled. This leaves the account vulnerable to potential abuse of delegated rights to change the administrative account password disable copy or modify the account properties.

Recommendation and Steps

This can be remediated by running the following PowerShell command as a privileged user (Domain Admin)

Associated Objects Per Domain/AD Forest

AD DomainTotal Admins Misconfigured
Dynamicpacks.net2

Affected Objects

AD DomainAdmin NameSensitive Account and Cannot be Delegated Option
Dynamicpacks.netkrbtgtNot Set
Dynamicpacks.netAdministratorNot Set
Embedded Image

TEST NAME

Missing Privileged Groups in Protected Users Group

Description

Not all Privileged Groups are part of Protected Users Group.
Accounts for services and computers should never be members of the Protected Users group. This group provides incomplete protection anyway, because the password or certificate is always available on the host. Authentication will fail with the error the username or password is incorrect" for any service or computer that is added to the Protected Users group."

Recommendation and Steps

Privileged users must be members of the Protected Users group so as to enforce Kerberos authentication, reduce Kerberos ticket lifetime, enforce usage of strong encryption algorithm (AES), prevent caching of passwords on workstations, and prevent any type of Kerberos delegation. However, please note use of the Protected Users group comes with significant functional impacts. Ensure to add all protected groups and users to Protected Users Group.

Associated Objects Per Domain/AD Forest

AD DomainTotal Missing Privileged Groups in Protected Users Group
Dynamicpacks.netMissing All Admins

Affected Objects

Embedded Image

TEST NAME

Privileged Accounts Pass Never Expires

Description

No Privileged User Accounts were found that use Password Never Expires Flag.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Admins Password Never Expires
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Too Many Privileged Accounts

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Privileged Accounts
Dynamicpacks.net2

Affected Objects

Embedded Image

TEST NAME

Inactive Admins

Description

All Admins have been active.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainEnabled Admins Are Inactive Since Last 30 Days
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Privileged Groups Contain more than 20 members

Description

Administrative groups contain 20 or less members.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

Final StatusIn AD DomainSecurity GroupTotal Members
DC=netDC=DynamicpacksCN=Enterprise Key AdminsCN=Users
DC=netDC=DynamicpacksCN=Key AdminsCN=Users
DC=netDC=DynamicpacksCN=Read-only Domain ControllersCN=Users
DC=netDC=DynamicpacksCN=Account OperatorsCN=Builtin
DC=netDC=DynamicpacksCN=Server OperatorsCN=Builtin
DC=netDC=DynamicpacksCN=Domain AdminsCN=Users
DC=netDC=DynamicpacksCN=Enterprise AdminsCN=Users
DC=netDC=DynamicpacksCN=Schema AdminsCN=Users
DC=netDC=DynamicpacksCN=Domain ControllersCN=Users
DC=netDC=DynamicpacksCN=ReplicatorCN=Builtin
DC=netDC=DynamicpacksCN=Backup OperatorsCN=Builtin
DC=netDC=DynamicpacksCN=Print OperatorsCN=Builtin
DC=netDC=DynamicpacksCN=AdministratorsCN=Builtin

Affected Objects

Embedded Image

TEST NAME

Kerberos Pre-authentication Disabled

Description

All Admin accounts have DONT_REQUIRE_PREAUTH flag set to false.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainAdmin With Kerberos Pre-Authentication Disabled
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Disabled Admins part of Privileged Groups

Description

No Disabled users are part of Privileged Groups.

Embedded Image

TEST NAME

Passwords Not Changed within 90 days

Description

Privileged User Accounts have been changing their passwords regularly.

Embedded Image

TEST NAME

DNSAdmins Group has members

Description

No other users are part of DNS Admins Group

Embedded Image

TEST NAME

Privileged Groups Contained Computer Accounts

Description

No computer accounts are member of privileged Groups.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Computer Accounts part of Privileged Groups
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Privileged Admins missing AdminCount=1 Flag

Description

All members in privileged groups have AdminCount=1 flag set.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainAdminAdminCount Status
Dynamicpacks.netCN=Administrator-CN=Users-DC=Dynamicpacks-DC=netSET

Affected Objects

Embedded Image

TEST NAME

ForeignSecurityPrincipals In Privileged Groups

Description

No ForeignSecurityPrincipal or orphaned princials were found in privileged admin groups.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainAdminIs a ForeignSecurityPrincipal?Member Of
Dynamicpacks.netAdministratorFalseAdministrators
Dynamicpacks.netEnterprise AdminsFalseAdministrators
Dynamicpacks.netDomain AdminsFalseAdministrators
Dynamicpacks.netAdministratorFalseDomain Admins
AdministratorFalseEnterprise Admins

Affected Objects

Embedded Image

TEST NAME

Operators Groups are not empty

Description

All Operators Groups are empty in all domains.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

Account Operators Member CountAD DomainBackup Operators Member CountPrint Operators Member CountServer Operators Member Count
0Dynamicpacks.net000

Affected Objects

Embedded Image

TEST NAME

Weak Password Policies Affected Admins

Description

Privileged Users are not using strong password policies.
A password length of seven characters can be cracked instantly by various brute force tools. Apart from the danger of account compromise, having a weak password policy also leads to complex problems like regulatory compliance.

Recommendation and Steps

For privileged accounts, enforcing a password policy with the following requirements is recommended:  forced change at most every 3 years and length of 8 or more characters is recommended.

Associated Objects Per Domain/AD Forest

AD DomainAdmin AccountMinimum Password Length
Dynamicpacks.netCN=krbtgt-CN=Users-DC=Dynamicpacks-DC=net7
Dynamicpacks.netCN=Administrator-CN=Users-DC=Dynamicpacks-DC=net7

Affected Objects

AD DomainAdmin Using Weak Password PolicyMinimum Password Length
Dynamicpacks.netCN=krbtgt-CN=Users-DC=Dynamicpacks-DC=net7
Dynamicpacks.netCN=Administrator-CN=Users-DC=Dynamicpacks-DC=net7
Embedded Image

TEST NAME

Password Do Not Expire

Description

Some privileged accounts have passwords that never expire.
If no security mechanism enforces a periodic password rotation, taking over an account allows any malicious user to keep their access rights in the domain for extended periods of time.

Recommendation and Steps

Passwords should be periodically changed for all privileged group members (at most every 3 years). To enforce application of the domain password policy on these accounts, their DONT_EXPIRE flag should not be set. This account flag should then be unset, usually by unchecking the password never expires" option in the "Account" tab of the user properties. Their passwords should then be rolled immediately."

Associated Objects Per Domain/AD Forest

AD DomainPasswordNeverExpire?Privileged Account
Dynamicpacks.netFalseCN=krbtgt-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netTrueCN=Administrator-CN=Users-DC=Dynamicpacks-DC=net

Affected Objects

AD DomainPasswordNeverExpire?Privileged Account
Dynamicpacks.netTrueCN=Administrator-CN=Users-DC=Dynamicpacks-DC=net
Embedded Image

TEST NAME

AdminsCount Flag set users not acting as Admins

Description

Test has passed.

Embedded Image

TEST NAME

Default Domain Policy-Minimum Password Length

Description

Account Policies are configured correctly.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainMinimum Password Length
Dynamicpacks.net7

Affected Objects

AD DomainMinimum Password Length
Dynamicpacks.net7
Embedded Image

TEST NAME

FGPP Policies-Minimum Password Length

Description

FGPP password parameters are not configured correctly.
Minimum password set to 7 or less will not help in providing adequate defense against a brute force attack. 

Recommendation and Steps

Please review the list of FGPP provided and make sure to enable Password Complexity. Please check the account policies parameters and ensure values are correct. The Minimum Password Length recommended is 12 and password complexity must be enabled.

Associated Objects Per Domain/AD Forest

Affected Objects

Embedded Image

TEST NAME

FGPP Policies Not Applying

Description

Some FGPP Policies have been created but they do not apply to any objects.
Users will not receive Password Policies from FGPP.

Recommendation and Steps

Please review the list and make sure FGPP Policies are applying to desired objects.

Associated Objects Per Domain/AD Forest

Affected Objects

Embedded Image

TEST NAME

Account Lockout Policies Missing

Description

Account Lockout Policies are configured in Active Directory domains.

Embedded Image

TEST NAME

Domain Controllers Modified with PrimaryGroupID

Description

Test has been passed

Embedded Image

TEST NAME

SMB 1 Protocol Enabled DCs

Description

SMB1 Protocol is disabled on all domain controllers.

Embedded Image

TEST NAME

SMB 1 Client Protocol Enabled DCs

Description

SMB1 client Protocol is disabled on all domain controllers.

Embedded Image

TEST NAME

AllowNT4Crypto DCs

Description

Found Domain Controllers were found with NT4 Crypto.
Allowing old NT4 cryptography algorithms could be a serious security risk, and could be a signal that in the environment there might still be very old and unsecure hardware or software being used (like NT4 or older SAMBA SMB clients).. Besides, all currently supported OS don't even honor this setting anymore.

Recommendation and Steps

Recommended action is to disable NT4 Crypto on affected domain controllers. In Registry Editor navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters and change the value of AllowNT4Crypto to 0.

Associated Objects Per Domain/AD Forest

AllowNT4Crypto StatusConnectionDomain ControllerFinal StatusReg EntryRegistry Key
AllowNT4Crypto is Enabled - Not FoundOkdc114.Dynamicpacks.netNot OkAllowNT4CryptoHKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters

Affected Objects

AllowNT4Crypto StatusConnectionDomain ControllerFinal StatusReg EntryRegistry Key
AllowNT4Crypto is Enabled - Not FoundOkdc114.Dynamicpacks.netNot OkAllowNT4CryptoHKLM:\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
Embedded Image

TEST NAME

LAN Manager password hashes Enabled DCs

Description

No Domain Controllers are storing LAN Manager Password Hashes

Embedded Image

TEST NAME

SMB Signing Disabled DCs

Description

SMB Signing is enabled on domain controllers.

Embedded Image

TEST NAME

LDAP Signing Disabled DCs

Description

LDAP Signing is enabled on domain controllers.

Embedded Image

TEST NAME

TLS 1.1 Enabled DCs

Description

TLS 1.1 protocol is not disabled on all domain controllers.
Modern cyber-attacks methods often make specific use of legacy protocols in their attack and often utilize them to target organizations that have yet to implement the proper mitigation.

Recommendation and Steps

To retire the use of legacy protocols, your organization must first discover which internal entities and applications rely on them. Recommendation is to disabled TLS 1.1 protocol on all affected domain controllers by applying a registry fix or using Default Domain Controllers GPO.

Associated Objects Per Domain/AD Forest

ConnectionDomain ControllerFinal StatusReg EntryRegistry KeyTLS 1.1 Status
Okdc114.Dynamicpacks.netNot OkDisabledByDefaultHKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\ServerTLS 1.1 is not disabled - Not Found

Affected Objects

ConnectionDomain ControllerFinal StatusReg EntryRegistry KeyTLS 1.1 Status
Okdc114.Dynamicpacks.netNot OkDisabledByDefaultHKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\ServerTLS 1.1 is not disabled - Not Found
Embedded Image

TEST NAME

NTLM Authentication Enabled DCs

Description

Found NTLM enabled on all domain controllers.
NTLM and NTLMv2 authentication is vulnerable to various malicious attacks, including SMB replay, man-in-the-middle attacks, and brute force attacks. Reducing and eliminating NTLM authentication from your environment forces the Windows operating system to use more secure protocols, such as the Kerberos version 5 protocol, or different authentication mechanisms, such as smart cards. The main risk of disabling NTLM is the potential usage of legacy or incorrectly configured applications that can still use NTLM authentication.

Recommendation and Steps

It is recommended to disable NTLM Protocol on domain controllers by using the registry or GPO. Edit the Default Domain Policy, go to the GPO section Computer Configurations, Select Policies, and then take, security Setting from Windows Settings, then choose Local Policies -> Security Options, and find the policy Network Security: LAN Manager authentication level. Configure Send LM & NTLM responses to use NTLMv2 session security if negotiated to apply settings to all domain controllers.

Associated Objects Per Domain/AD Forest

ConnectionDomain ControllerFinal StatusNTLM Protocol StatusReg EntryRegistry Key
Okdc114.Dynamicpacks.netNot OkNTLM is not disabled - Not FoundLmCompatibilityLevelHKLM:\SYSTEM\CurrentControlSet\Services\Lsa

Affected Objects

ConnectionDomain ControllerFinal StatusNTLM Protocol StatusReg EntryRegistry Key
Okdc114.Dynamicpacks.netNot OkNTLM is not disabled - Not FoundLmCompatibilityLevelHKLM:\SYSTEM\CurrentControlSet\Services\Lsa
Embedded Image

TEST NAME

Inconsistent DCs

Description

No domain controllers in inconsistent state.

Embedded Image

TEST NAME

RC4 Encryption Enabled DCs

Description

Some Domain Controllers have RC4 encryption enabled or supported.
The USE_DES_KEY_ONLY flag is set for some users. This flag allows domain controllers to issue Kerberos tickets encrypted with the DES algorithm. This property was designed for backward compatibility with older Kerberos implementations. The DES algorithm is considered weak and must not be used anymore. This flag weakens the security of distributed Kerberos tickets significantly, and speeds up brute force cracking attempts.

Recommendation and Steps

The USE_DES_KEY_ONLY flag must be unset from userAccountControl attribute of each affected account. This can be performed by unchecking the Use Kerberos DES encryption types for this account" options in the user account properties. Any incompatible software must be upgraded."

Associated Objects Per Domain/AD Forest

ConnectionDomain ControllerFinal StatusIs RC4 Encryption Enabled?msDS-SupportedEncryptionTypes Value
Okdc114.Dynamicpacks.netNot OkYes28-AES 128 AES 256 RC4_HMAC_MD5

Affected Objects

ConnectionDomain ControllerFinal StatusIs RC4 Encryption Enabled?msDS-SupportedEncryptionTypes Value
Okdc114.Dynamicpacks.netNot OkYes28-AES 128 AES 256 RC4_HMAC_MD5
Embedded Image

TEST NAME

Unauthenticated DCs since last 45 Days

Description

All Domain Controllers have been authenticating and working as expected

Embedded Image

TEST NAME

Secrets not renewed DCs

Description

Domain Controllers have been renewing their secrets.

Embedded Image

TEST NAME

Missing Updates DCs

Description

Some domain controllers have not been patched for the last 45 days. 
Domain Controllers will not receive important security updates.

Recommendation and Steps

All Domain Controllers must be patched to avoid security risks.

Associated Objects Per Domain/AD Forest

Command StatusConnectionDomain ControllerFinal StatusLast Update DateNumber of Updates Applied Since last 45 Days
OkOkdc114.Dynamicpacks.netWARNING: Domain Controller has not been patched since last 45 days.Saturday- September 7- 2019 12:00:00 AM0

Affected Objects

Command StatusConnectionDomain ControllerFinal StatusLast Update DateNumber of Updates Applied Since last 45 Days
OkOkdc114.Dynamicpacks.netWARNING: Domain Controller has not been patched since last 45 days.Saturday- September 7- 2019 12:00:00 AM0
Embedded Image

TEST NAME

Missed Reboot Cycles DCs

Description

All Domain controllers have been rebooting regularly. Please ensure all Domain Controllers were checked.

Embedded Image

TEST NAME

No Contacts with Domain Controllers in Last Three Months

Description

Test has passed.

Embedded Image

TEST NAME

Ensure UNC Paths for SYSVOL and NETLOGON are harderend

Description

Embedded Image

TEST NAME

Ensure No Open Shares on Domain Controllers

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Zerologon Vulnerability Test

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Orphaned DCs

Description

No Orphaned Domain Controllers were found.

Embedded Image

TEST NAME

Missing DNS Scavenging DCs

Description

Some DNS Servers do not have automatic scavenging enabled. 
Disabling Scavenging might result in a huge number of stale DNS Entries. 

Recommendation and Steps

Note that if all your Domain Zones are AD Integrated it is recommended to keep Scavenging enabled only on one DNS Server.

Associated Objects Per Domain/AD Forest

Command StatusConnectionDomain ControllerFinal StatusIs Scavenging Enabled?Last Scavenging TimeNo Refresh IntervalRefresh IntervalScavenging Interval
OkOkdc114.Dynamicpacks.netThis DNS Server is not configured to scavenge stale DNS Records automatically.False7.00:00:00

Affected Objects

Command StatusConnectionDomain ControllerFinal StatusIs Scavenging Enabled?Last Scavenging TimeNo Refresh IntervalRefresh IntervalScavenging Interval
OkOkdc114.Dynamicpacks.netThis DNS Server is not configured to scavenge stale DNS Records automatically.False7.00:00:00
Embedded Image

TEST NAME

Missing DNS Forwarders DCs

Description

DNS Servers have one or more DNS Forwarders configured. 

Embedded Image

TEST NAME

Missing Root Hints DCs

Description

All DNS Servers have one or more Root Hints configured. 

Embedded Image

TEST NAME

Missing Host Records DCs

Description

A Host Records for all domain controllers are registered in the DNS Server.

Embedded Image

TEST NAME

Not Enough Free Space DCs

Description

Domain Controllers have more than 10 GB of disk space available. Please ensure all Domain Controllers were checked.

Embedded Image

TEST NAME

Errors and Warnings in Log DCs

Description

Domain Controllers have errors in Event Logs since last 10 days in Directory Service-Application and System Logs.
The errors may impact domain controller operation.

Recommendation and Steps

Test reports number of errors and warnings reported since last 10 days. You might want to check domain controllers event log to ensure the errors and warnings can be ignored safely or consult a technician to resolve these errors. 

Associated Objects Per Domain/AD Forest

Command StatusConnectionDomain ControllerFinal StatusLog NameNumber Of Errors Since last 10 DaysNumber Of Warnings Since last 10 Days
OkOkdc114.Dynamicpacks.netNot OkSystem1127
OkOkdc114.Dynamicpacks.netNot OkApplication24

Affected Objects

Domain ControllerErrors in Log?
dc114.Dynamicpacks.netFound Errors and Warnings
Embedded Image

TEST NAME

Loopback Address Missing DCs

Description

All Domain Controllers have been configured with loopback 127.0.0.1 address. Please ensure all Domain Controllers were checked.

Embedded Image

TEST NAME

Multihomed DCs

Description

No Multihomed Domain Controllers were found. Please ensure all Domain Controllers were checked.

Embedded Image

TEST NAME

Missing SSL Authentication DCs

Description

Domain Controllers have not been configured with SSL.
It is a security risk. All clients must be authenticated via a secure channel.

Recommendation and Steps

Please review the list provided and make sure to configure Domain Controllers with SSL.

Associated Objects Per Domain/AD Forest

ConnectionDomain ControllerFinal StatusIs SSL Enabled?
Okdc114.Dynamicpacks.netNot OkNot Enabled

Affected Objects

ConnectionDomain ControllerFinal StatusIs SSL Enabled?
Okdc114.Dynamicpacks.netNot OkNot Enabled
Embedded Image

TEST NAME

NTFS Replication DCs

Description

No domain controllers were found with NTFRS Service enabled.

Embedded Image

TEST NAME

Strict Replication Disabled DCs

Description

Strict Replication Consistency is enabled on all domain controllers.

Embedded Image

TEST NAME

DCDiag Failure DCs

Description

All DCDiag tests have been passed on all domain controllers.

Embedded Image

TEST NAME

Out Of Default OUs DCs

Description

All Domain Controllers are located under Domain Controllers OU.

Embedded Image

TEST NAME

Unsupported OS DCs

Description

All Domain Controllers are running Windows Server 2012 or later versions.

Embedded Image

TEST NAME

Missing Enough DNS Servers in NIC DCs

Description

Some Domain Controllers have not been configured with enough DNS Servers in the TCP/IP property of the network card. 
Domain Controllers will not be able to reach other DNS Servers for DNS lookups. Configuring enough DNS Servers will ensure a DNS Query can be resolved.

Recommendation and Steps

Please check affected objects excel sheet and check which Domain Controller requires updating with DNS configuration. It is recommended to configure domain controllers with at least 2 DNS Servers. 

Associated Objects Per Domain/AD Forest

Command StatusConnectionDefault GatewayDNS ServersDomain ControllerFinal StatusIP AddressNetwork Adapter DescriptionSubnet
OkOk172.16.31.253127.0.0.1dc114.Dynamicpacks.netNot enough DNS Servers have been configured on this domain controller.172.16.31.114 fe80::98da:3be0:b630:2507Intel(R) 82574L Gigabit Network Connection255.255.255.0 64

Affected Objects

Command StatusConnectionDefault GatewayDNS ServersDomain ControllerFinal StatusIP AddressNetwork Adapter DescriptionSubnet
OkOk172.16.31.253127.0.0.1dc114.Dynamicpacks.netNot enough DNS Servers have been configured on this domain controller.172.16.31.114 fe80::98da:3be0:b630:2507Intel(R) 82574L Gigabit Network Connection255.255.255.0 64
Embedded Image

TEST NAME

Not Enough Local Disks DCs

Description

Disks on Domain Controllers are not configured as per Active Directory best practices. 
Domain Controllers will result in performance issues.

Recommendation and Steps

As per best practices domain controllers file must be hosted on separate volumes to avoid any performance issues. For example, SYSVOL to be hosted on a separate disk - Active Directory Logs to be hosted on another disk and so on. 

Associated Objects Per Domain/AD Forest

Command StatusConnectionDomain ControllerFinal StatusNumber of Volumes
OkOkdc114.Dynamicpacks.netThere are less than three volumes configured in the domain controller to host OS and Active Directory Files.3

Affected Objects

Command StatusConnectionDomain ControllerFinal StatusNumber of Volumes
OkOkdc114.Dynamicpacks.netThere are less than three volumes configured in the domain controller to host OS and Active Directory Files.3
Embedded Image

TEST NAME

Missing DNS Dynmaic Registration on NIC DCs

Description

Dynamic DNS Registration is enabled for all domain controllers. Please ensure all Domain Controllers were checked.

Embedded Image

TEST NAME

Missing _msdcs Zone DCs

Description

DNS Servers host _msdcs zone. 

Embedded Image

TEST NAME

Event Log Config Not Correct DCs

Description

Event Log Configuration was fetched from Domain Controllers.

Embedded Image

TEST NAME

Event Log Size Not Optimized DCs

Description

Event Log size Configuration on Domain Controllers is ok.

Embedded Image

TEST NAME

Scheduled Tasks found on Domain Controllers

Description

Test has failed.
Scheduled tasks have been known to be exploited to allow attackers to elevate privileges gain persistence and download and deploy malware. This finding indicates that scheduled tasks were found on the Domain Controllers within the domain queried.

Recommendation and Steps

Review scheduled tasks listed in the accompanying file(s) for legitimacy and validate that they are needed. Remove any unneeded unnecessary tasks.

Associated Objects Per Domain/AD Forest

Domain ControllerTotal Scheduled Tasks
dc114.Dynamicpacks.net3

Affected Objects

CimClassCimInstancePropertiesCimSystemPropertiesDomain ControllerLastRunTimeLastTaskResultNextRunTimeNumberOfMissedRunsPSComputerNameTaskNameTaskPath
Root/Microsoft/Windows/TaskScheduler:MSFT_TaskDynamicInfoMicrosoft.Management.Infrastructure.Internal.Data.CimPropertiesCollectionMicrosoft.Management.Infrastructure.CimSystemPropertiesdc114.Dynamicpacks.net12/30/2024 10:52:52 PM2670090dc114.Dynamicpacks.netCacheTask\Microsoft\Windows\Wininet\
Root/Microsoft/Windows/TaskScheduler:MSFT_TaskDynamicInfoMicrosoft.Management.Infrastructure.Internal.Data.CimPropertiesCollectionMicrosoft.Management.Infrastructure.CimSystemPropertiesdc114.Dynamicpacks.net12/30/2024 10:53:53 PM2670090dc114.Dynamicpacks.netCreateExplorerShellUnelevatedTask\
Root/Microsoft/Windows/TaskScheduler:MSFT_TaskDynamicInfoMicrosoft.Management.Infrastructure.Internal.Data.CimPropertiesCollectionMicrosoft.Management.Infrastructure.CimSystemPropertiesdc114.Dynamicpacks.net12/30/2024 10:52:52 PM26700912/31/2024 10:27:27 PM0dc114.Dynamicpacks.netMicrosoftEdgeUpdateTaskMachineCore{D1365C39-B303-4873-81D5-B8CA78667278}\
Embedded Image

TEST NAME

Fax Server role installed DCs

Description

Role/Feature is not insatlled

Embedded Image

TEST NAME

Microsoft FTP service installed DCs

Description

Role/Feature is not insatlled

Embedded Image

TEST NAME

Peer Name Resolution Protocol installed DCs

Description

Role/Feature is not insatlled

Embedded Image

TEST NAME

Simple TCP-IP Services installed DCs

Description

Role/Feature is not insatlled

Embedded Image

TEST NAME

Telnet Client installed DCs

Description

Role/Feature is not insatlled

Embedded Image

TEST NAME

TFTP Client installed DCs

Description

Role/Feature is not insatlled

Embedded Image

TEST NAME

Server Message Block (SMB) v1 protocol Installed DCs

Description

Role/Feature is not insatlled

Embedded Image

TEST NAME

Windows PowerShell 2.0 installed DCs

Description

Role/Feature is not insatlled

Description

Print Spooler Service is not disabled on all domain controllers.
CVE-2021-1675 is weaponized to compromise Domain Controllers. This is actually already happening in the real world, leading to a zero-day vulnerability event. Luckily, the vulnerability can be easily thwarted with a simple configuration change on Domain Controllers by disabling the Print Spooler service.

Recommendation and Steps

Print spooler services are enabled by default. If not absolutely required, disable the service on all domain controllers. If required, make sure the server is fully patched and follow Microsoft guidance here. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527

Associated Objects Per Domain/AD Forest

ConnectionDomain ControllerFinal StatusPrint Spooler Service Status
Okdc114.Dynamicpacks.netNot OkRunning-Not OK

Affected Objects

ConnectionDomain ControllerFinal StatusPrint Spooler Service Status
Okdc114.Dynamicpacks.netNot OkRunning-Not OK
Embedded Image

TEST NAME

ADWS Service Set to Manual DCs

Description

ADWS Service is set to start automatically on all domain controllers.

Embedded Image

TEST NAME

DHCP Service Running DCs

Description

DHCP Server Service is disabled or not installed on all domain controllers.

Embedded Image

TEST NAME

Additional Roles and Features DCs

Description

Domain Controllers were found running other Roles and Features.
Domain Controller performance is impacted. The System Resources will be utilized by other Roles and Features installed.

Recommendation and Steps

Please review the list provided and make sure to remove any other Roles and Features which are not needed or shift them to other servers.

Associated Objects Per Domain/AD Forest

Domain ControllerFeature/RoleRole or Feature Name
dc114.Dynamicpacks.netFeatureXPS-Viewer
dc114.Dynamicpacks.netFeatureWoW64-Support
dc114.Dynamicpacks.netFeaturePowerShell-ISE
dc114.Dynamicpacks.netFeaturePowerShell
dc114.Dynamicpacks.netFeaturePowerShellRoot
dc114.Dynamicpacks.netFeatureWindows-Defender
dc114.Dynamicpacks.netFeatureRSAT-DNS-Server
dc114.Dynamicpacks.netFeatureRSAT-ADDS-Tools
dc114.Dynamicpacks.netFeatureRSAT-AD-AdminCenter
dc114.Dynamicpacks.netFeatureRSAT-ADDS
dc114.Dynamicpacks.netFeatureRSAT-AD-PowerShell
dc114.Dynamicpacks.netFeatureRSAT-AD-Tools
dc114.Dynamicpacks.netFeatureRSAT-Role-Tools
dc114.Dynamicpacks.netFeatureRSAT
dc114.Dynamicpacks.netFeatureGPMC
dc114.Dynamicpacks.netFeatureNET-WCF-TCP-PortSharing45
dc114.Dynamicpacks.netFeatureNET-WCF-Services45
dc114.Dynamicpacks.netFeatureNET-Framework-45-Core
dc114.Dynamicpacks.netFeatureNET-Framework-45-Features
dc114.Dynamicpacks.netRole ServiceStorage-Services
dc114.Dynamicpacks.netRole ServiceFS-FileServer
dc114.Dynamicpacks.netRole ServiceFile-Services
dc114.Dynamicpacks.netRoleFileAndStorage-Services
dc114.Dynamicpacks.netRoleDNS
dc114.Dynamicpacks.netRoleAD-Domain-Services

Affected Objects

ConnectionDomain ControllerFinal StatusTotal FeaturesTotal Roles
Okdc114.Dynamicpacks.netNOT OK196
Embedded Image

TEST NAME

AD Services not running DCs

Description

All Domain Controller Services are running. Please ensure all Domain Controllers were checked.

Embedded Image

TEST NAME

Software Installed on Domain Controllers

Description

Test has failed.
A list of software installed on Domain Controllers. Best Practice dictates that nothing should be installed on a Domain Controller that is not necessary for it to function. These should be audited and reviewed regularly.

Recommendation and Steps

Remove any software installations that are not needed for Domain Controller functionality.

Associated Objects Per Domain/AD Forest

Domain ControllerFinal StatusNo of Software Installed
dc114.Dynamicpacks.netNot Ok6

Affected Objects

InstallDateNamePSComputerName
20241230SmartProfiler SecurityDC114
20241221VMware ToolsDC114
20241221Microsoft Visual C++ 2022 X86 Minimum Runtime - 14.32.31332DC114
20241221Microsoft Visual C++ 2022 X86 Additional Runtime - 14.32.31332DC114
20241221Microsoft Visual C++ 2022 X64 Additional Runtime - 14.32.31332DC114
20241221Microsoft Visual C++ 2022 X64 Minimum Runtime - 14.32.31332DC114
Embedded Image

TEST NAME

Total Undefined Subnets

Description

Did not find any subnets that is under unknown category. Please ensure all Domain Controllers were checked.

Embedded Image

TEST NAME

Sites without ISTG Role

Description

All AD Sites have ISTG Defined.

Embedded Image

TEST NAME

Manual Replication Connection Objects

Description

No Manual AD Replication Connection Objects found in the AD Forest.

Embedded Image

TEST NAME

Sites without Subnets Association

Description

Some AD Sites do not have Subnets associated. 
Application and User authentication is impacted. Users and applications will go to domain controllers in other sites for authentications.

Recommendation and Steps

It is highly recommended to associate required user/application subnets with AD Sites. If subnets are not associated with AD Sites users in the AD Sites might choose a remote domain controller for authentication.

Associated Objects Per Domain/AD Forest

Active Directory SiteFinal StatusSite LocationTotal Subnets
Default-First-Site-NameNot Ok

Affected Objects

Active Directory SiteFinal StatusSite LocationTotal Subnets
Default-First-Site-NameNot Ok
Embedded Image

TEST NAME

Missing Global Catalog Sites

Description

All Sites are configured at least with one Global Catalog Server.

Embedded Image

TEST NAME

Missing AD Sites Coverage

Description

Some Active Directory sites are not covered.
Each Active Directory site needs to be covered by each other. Otherwise, users will be authenticated to other site domain controllers resulting in crossing network boundaries.

Recommendation and Steps

Please ensure KCC has run its algorithm to cover each Active Directory Site. Initiate the KCC algorithm manually.

Associated Objects Per Domain/AD Forest

AD SiteAdjacent SitesFinal StatusTotal Adjacent Sites
Default-First-Site-NameNot Ok - This AD Site is not covered.0

Affected Objects

AD SiteAdjacent SitesFinal StatusTotal Adjacent Sites
Default-First-Site-NameNot Ok - This AD Site is not covered.0

Description

No Duplicate site Links were found.

Embedded Image

TEST NAME

Sites Missing Bridgehead Server

Description

Some AD Sites are configured with manual or no automatic Bridgehead Servers were found. Since KCC can designate a domain controller as a bridgehead server automatically, it is recommended to avoid assigning manual Bridgehead Servers.
A bridgehead server is a server that is mainly used for intersite replication. You can configure a bridgehead server for every site that is created for each intersite replication protocol. This helps to control the server that is used to replicate information to other servers.

Recommendation and Steps

The ability to configure a server as a bridgehead server gives you greater control over the resources used for replication between intersite. It is recommended to remove manually configured bridgehead servers and let KCC designate a bridgehead server automatically.

Associated Objects Per Domain/AD Forest

AD SiteAuto BHFinal StatusIP-ServersManual IP-BHsManual SMTP-BHsServersSMTP-Servers
Default-First-Site-Name0Bridgehead Servers not assigned by KCC00

Affected Objects

AD SiteAuto BHFinal StatusIP-ServersManual IP-BHsManual SMTP-BHsServersSMTP-Servers
Default-First-Site-Name0Bridgehead Servers not assigned by KCC00
Embedded Image

TEST NAME

Sites With Manual Bridgehead Server

Description

No manual Bridgehead servers are configured.

Embedded Image

TEST NAME

Sites creating Mesh Topology

Description

Embedded Image

TEST NAME

Replication Interval Not Optimized Sites

Description

Some Active Directory Site Links are using non-standard Replication Intervals. AD Sites have been configured to use 180 as the replication interval. If you have only one AD Site in your environment, then ignore the issue.
The frequent changes will not replicate as quickly as possible between AD Sites.

Recommendation and Steps

It is recommended to configure a lower replication interval for sites that process changes frequently. 

Associated Objects Per Domain/AD Forest

AD Site LinkFinal StatusReplication IntervalTotal Sites In Link
DEFAULTIPSITELINKNot Ok1801

Affected Objects

AD Site LinkFinal StatusReplication IntervalTotal Sites In Link
DEFAULTIPSITELINKNot Ok1801
Embedded Image

TEST NAME

AD Sites Redundancy

Description

Some AD Sites have only one Domain Controller deployed. 
Single Point of Failure. If the domain controller goes down in the AD Site, the authentication will be impacted for users and applications reside in the AD Site.

Recommendation and Steps

It is recommended to have at least two domain controllers deployed in an AD Site to avoid clients reaching out to remote domain controllers for authentication.

Associated Objects Per Domain/AD Forest

AD SiteFinal StatusLocationTotal Servers
Default-First-Site-NameNot Ok1

Affected Objects

AD SiteFinal StatusLocationTotal Servers
Default-First-Site-NameNot Ok1

Description

All AD Sites are associated with a Site Link.

Embedded Image

TEST NAME

AD Sites without Domain Controller

Description

All AD Sites have at least one Domain Controller deployed.

Embedded Image

TEST NAME

PDC Emulator Time Source

Description

Domain Controller Time Synchronization is not correct. 
Impacts authentication between domain controllers and clients.

Recommendation and Steps

Please ensure PDC syncs its time from an External NTP Server and other domain controllers sync using the default Time Synchronization settings. All other Domain Controllers must be using NT5DS registry entry. 

Associated Objects Per Domain/AD Forest

Command StatusConnectionController TypeDomain ControllerFinal StatusSync From
OkOkPDCdc114.Dynamicpacks.netWARNING: Root PDC must sync its time from an External NTP Server by specifying NTP (Local) value in Type Registry entry. It is not recommended to use NT5DS and AllSync(Local) for PDC.Internal Source

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Domain Controllers Time Source

Description

Domain Controllers have been configured with the correct time source.

Embedded Image

TEST NAME

Domain FSMO Placement

Description

FSMO Placement is correct.

Embedded Image

TEST NAME

Domain Naming Master and Schema Master Placement

Description

Schema Master and Domain Naming Master are hosted on same computer.

Embedded Image

TEST NAME

Managed Service Accounts Not Linked

Description

Managed Service Accounts are linked to computer accounts.

Embedded Image

TEST NAME

TombstoneLifeTime Modified?

Description

TombstoneLifetime value is set to 180 days.

Embedded Image

TEST NAME

Check AD Forest Functional Level

Description

Test has passed.

Embedded Image

TEST NAME

Check AD Domain Functional Level

Description

Test has passed.

Embedded Image

TEST NAME

Ogranizational Units without Objects

Description

No Empty Organizational Units were found in AD Domains.

Embedded Image

TEST NAME

Security Groups without Objects

Description

Security Groups have been created in Domain, but they do not hold any members. 
Refer issue details.

Recommendation and Steps

Please check why empty Security Groups have been created in Domain. The output also contains the pre-defined security groups other than user-defined security groups. 

Associated Objects Per Domain/AD Forest

AD DomainTotal Groups Without Members
Dynamicpacks.net32

Affected Objects

AD DomainDistinguishedName
Dynamicpacks.netCN=DnsUpdateProxy-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=DnsAdmins-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Enterprise Key Admins-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Key Admins-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Protected Users-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Cloneable Domain Controllers-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Enterprise Read-only Domain Controllers-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Allowed RODC Password Replication Group-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Terminal Server License Servers-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Incoming Forest Trust Builders-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Account Operators-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Server Operators-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=RAS and IAS Servers-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Cert Publishers-CN=Users-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Storage Replica Administrators-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Remote Management Users-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Access Control Assistance Operators-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Hyper-V Administrators-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=RDS Management Servers-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=RDS Endpoint Servers-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=RDS Remote Access Servers-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Certificate Service DCOM Access-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Event Log Readers-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Cryptographic Operators-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Distributed COM Users-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Performance Log Users-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Performance Monitor Users-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Network Configuration Operators-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Remote Desktop Users-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Replicator-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Backup Operators-CN=Builtin-DC=Dynamicpacks-DC=net
Dynamicpacks.netCN=Print Operators-CN=Builtin-DC=Dynamicpacks-DC=net
Embedded Image

TEST NAME

Users without UPN specified

Description

Some Domain Users do not have UPN filled.
UPN is required by other applications.

Recommendation and Steps

Please review the list and make sure to address the users that do not have the UPN filled.

Associated Objects Per Domain/AD Forest

AD DomainTotal Users With Blank UPN
Dynamicpacks.net3

Affected Objects

AD DomainBadLogonCountDistinguishedNameDoesNotRequirePreAuthEnabledPasswordLastSetPasswordNeverExpiresPasswordNotRequiredPrimaryGroupIDPWDLastSetSamAccountNameSIDHistoryUserAccountControlUserPrincipalName
Dynamicpacks.net0CN=krbtgt-CN=Users-DC=Dynamicpacks-DC=netFalseFalse12/30/2024 10:50:46 PMFalseFalse513133801014466281895krbtgtMicrosoft.ActiveDirectory.Management.ADPropertyValueCollection514
Dynamicpacks.net0CN=Guest-CN=Users-DC=Dynamicpacks-DC=netFalseFalseTrueTrue5140GuestMicrosoft.ActiveDirectory.Management.ADPropertyValueCollection66082
Dynamicpacks.net0CN=Administrator-CN=Users-DC=Dynamicpacks-DC=netFalseTrue12/21/2024 9:36:08 PMTrueFalse513133793193685017197AdministratorMicrosoft.ActiveDirectory.Management.ADPropertyValueCollection66048
Embedded Image

TEST NAME

Unprotected OUs

Description

Some Organizational Units have not been protected from Accidental deletion. 
Accidental Deletion protects objects from being deleted accidentally. 

Recommendation and Steps

Please ensure Accidental Deletion is configured for all OUs.

Associated Objects Per Domain/AD Forest

AD DomainTotal Organizational Units Not Protected
Dynamicpacks.net1

Affected Objects

AD DomainIs Protected?OU NameOU Path
Dynamicpacks.netNot ProtectedDomain ControllersOU=Domain Controllers-DC=Dynamicpacks-DC=net
Embedded Image

TEST NAME

Duplicate SPNs

Description

No Duplicate SPNs were found in Active Directory.

Embedded Image

TEST NAME

Unauthenticated Servers

Description

All Servers have been changing their passwords within allowed days limit.

Embedded Image

TEST NAME

Secrets not renewed Servers

Description

All servers have been changing their passwords within 45 days.

Embedded Image

TEST NAME

Missing Location Text in AD Sites

Description

AD Sites do not have a description text set that defines the AD site location.
In a large environment it will be difficult to identify sites or applications will fail to query AD Site description if not defined.

Recommendation and Steps

It is recommended to set a description text to identify the role of the AD Site. Some applications use AD Site Location text to get the details about the AD Sites.

Associated Objects Per Domain/AD Forest

AD SiteFinal StatusLocation Text
Default-First-Site-NamePlease provide a description for AD Site.

Affected Objects

AD SiteFinal StatusLocation Text
Default-First-Site-NamePlease provide a description for AD Site.
Embedded Image

TEST NAME

AD Forest Schema Not upto date

Description

Forest is using UpToDate schema

Embedded Image

TEST NAME

Found Unused Netlogon Scripts

Description

Embedded Image

TEST NAME

Disabled GPOs

Description

No Disabled GPOs found in AD Domains.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Disabled GPOs
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

GPOs not Linked to OUs

Description

All Organizational Units have atleast one GPO defined.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainGPO Not Linked To Total Organizational Units
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

GPOs not Applying

Description

All GPO objects are applying successfully.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainApplies ToGPO Name
Dynamicpacks.netAuthenticated UsersDefault Domain Controllers Policy
Dynamicpacks.netAuthenticated UsersDefault Domain Policy

Affected Objects

Embedded Image

TEST NAME

Orphaned GPO Containers

Description

No Orphaned Group Policy Objects were found.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Orphaned GPTs
Dynamicpacks.netNo Orphaned GPTs

Affected Objects

Embedded Image

TEST NAME

Found GPOs with Block Inheritance

Description

None of the Organizational Units have been configured with GPO Block Policy Inheritance settings.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal GPO Using Block Inheritance Option
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

GPO Naming Convention

Description

All GPO follow standard naming convention.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal GPOs Not Following Standard Naming Convention
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

GPO Description

Description

Some Group Policy Objects do not have a description set.
While there is no direct impact on this but ensuring a description is set on GPO for identification.

Recommendation and Steps

It is recommended to set description for each GPO in domain.

Associated Objects Per Domain/AD Forest

AD DomainTotal GPOs Without Description
Dynamicpacks.net2

Affected Objects

Connected to PDC ServerDescriptionFinal StatusGPO NameIn AD Domain
dc114.Dynamicpacks.netNot OkDefault Domain Controllers PolicyDynamicpacks.net
dc114.Dynamicpacks.netNot OkDefault Domain PolicyDynamicpacks.net
Embedded Image

TEST NAME

Found GPO with WMI Filters

Description

No GPOs have been configured with WMI Filters.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal GPOs With WMI Filter
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Domain GPO Application Status

Description

All GPOs have been configured to apply to required objects.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal GPO Not Applied
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

No Group Policy Objects Defining Log Size and Retention

Description

Test has failed.
Group Policy Objects are used to centralize enforcement of configurations and policies for domain user and computer assets. GPO's can be leveraged to define log file size and retention.

Recommendation and Steps

Create a Group Policy Object to enforce the configuration of logging on servers and endpoints. At a minimum logging should be enabled and enforced on mission critical systems.

Associated Objects Per Domain/AD Forest

AD DomainLog Size and Retention Configured?
Dynamicpacks.netNo GPO defining log size or retention

Affected Objects

AD DomainLog Size and Retention Configured?
Dynamicpacks.netNo GPO defining log size or retention
Embedded Image

TEST NAME

No Group Policy Objects to Prevent Domain Admins from logging on to Workstations or Servers Found

Description

Test has failed.
Group Policy Objects are used to centralize enforcement of configurations and policies for domain user and computer assets. GPO's can be leveraged to remove the ability to perform unsafe actions like logging into a workstation as a Domain Admin. These actions increase the risk and likelihood of credential theft and compromise.

Recommendation and Steps

Create a Group Policy Object to prevent Domain Admins from logging on to Workstations or Servers.

Associated Objects Per Domain/AD Forest

AD DomainStatus
Dynamicpacks.netNo GPO to prevent Domain Admin Accounts from logging on to Workstations or Servers

Affected Objects

AD DomainStatus
Dynamicpacks.netNo GPO to prevent Domain Admin Accounts from logging on to Workstations or Servers
Embedded Image

TEST NAME

No Group Policy Objects to Block ISO Execution Found

Description

Test has failed.
Group Policy Objects are used to centralize enforcement of configurations and policies for domain user and computer assets. GPO's can be leveraged to disable execution of ISO automatically.

Recommendation and Steps

Create a Group Policy Object to disable ISO execution.

Associated Objects Per Domain/AD Forest

AD DomainStatus
Dynamicpacks.netNo GPO to block ISO file launch

Affected Objects

AD DomainStatus
Dynamicpacks.netNo GPO to block ISO file launch
Embedded Image

TEST NAME

No Group Policy Objects to Prevent Credential Caching on to Workstations or Servers Found

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

No Group Policy Objects to Mitigate SMBv1 Found

Description

Test has failed.
Group Policy Objects are used to centralize enforcement of configurations and policies for domain user and computer assets. GPO's can be leveraged to disable unsafe protocols like SMBv1. While disabling or removing SMBv1 might cause some compatibility issues with old computers or software SMBv1 has significant security vulnerabilities and should not be used.

Recommendation and Steps

Create a Group Policy Object to disable SMBv1 protocols.

Associated Objects Per Domain/AD Forest

AD DomainStatus
Dynamicpacks.netNo GPO to disable SMBv1

Affected Objects

AD DomainStatus
Dynamicpacks.netNo GPO to disable SMBv1
Embedded Image

TEST NAME

No Group Policy Objects Enforcing UAC Prompt for Elevation Found

Description

Test has failed.
Group Policy Objects are used to centralize enforcement of configurations and policies for domain user and computer assets. GPO's can be leveraged to enforce security measures like the User Account Control (UAC) prompt to grant elevated permissions. Enforcing the use of the UAC prompt hinders an attackers ability to silently or programmatically elevate a standard users privileges to administrative permissions.

Recommendation and Steps

Create a Group Policy Object to enforce UAC prompts for all users.

Associated Objects Per Domain/AD Forest

AD DomainStatus
Dynamicpacks.netNo GPO found enforcing UAC prompt for elevation

Affected Objects

AD DomainStatus
Dynamicpacks.netNo GPO found enforcing UAC prompt for elevation
Embedded Image

TEST NAME

No Group Policy Objects to Mitigate Accidental Script Execution

Description

Test has failed.
Groups Policy Objects are used to centralize enforcement of configurations and policies for domain user and computer assets. GPO's can be leveraged to replace the default file associations with a program of your choice. Replacing the default file association of JavaScript (.js) file extensions to a program like notepad will mitigate the risk associated with automated or inadvertent file execution. The following extensions are evaluated

Recommendation and Steps

Create a Group Policy Object to replace the default file association for JavaScript file extensions.

Associated Objects Per Domain/AD Forest

AD DomainStatus
Dynamicpacks.netNo GPO to block accidental execution of js jse cjs mjs iced liticed iced.md cs coffee litcoffee coffee.md ts tsx ls es6 es jsx sjs eg

Affected Objects

AD DomainStatus
Dynamicpacks.netNo GPO to block accidental execution of js jse cjs mjs iced liticed iced.md cs coffee litcoffee coffee.md ts tsx ls es6 es jsx sjs eg
Embedded Image

TEST NAME

No Group Policy Objects to Mitigate NTLMv1 Protocol

Description

Test has failed.
NTLMv1 is a legacy authentication protocol with weak encryption that allows attackers to easily retrieve credentials from the network and perform NTLM Relay attacks.

Recommendation and Steps

Create a Group Policy Object to disable NTLMv1 protocols. Additionally, disabling these protocols in a Golden Image is recommended.

Associated Objects Per Domain/AD Forest

AD DomainStatus
Dynamicpacks.netNo GPO to disable or audit NTLMv1

Affected Objects

AD DomainStatus
Dynamicpacks.netNo GPO to disable or audit NTLMv1
Embedded Image

TEST NAME

No Group Policy Objects for Preventing passwords using reversible encryption

Description

Embedded Image

TEST NAME

GPO Preferences Containing Passwords

Description

Embedded Image

TEST NAME

Too many DNS Static Records

Description

No DNS Static Records were found in Domain Zones.

Embedded Image

TEST NAME

DNS Round-Robin Not Enabled

Description

All DNS Servers have DNS Round Robin Enabled. 

Embedded Image

TEST NAME

Conditional Forwarders Not Working

Description

DNS Servers do not host any Conditional Forwarders. 

Embedded Image

TEST NAME

High Value Targets Found

Description

Test has failed.
Members of Administrative groups have elevated privileges in an Active Directory environment. Compromise of these accounts allows attackers to control various aspects of the domain up to and including a complete domain takeover.

Recommendation and Steps

Review members of these Administrative groups and ensure that they do require these rights. Proper delegation of rights to non-default Security Groups offers greater security for the domain. Consider using a Privileged Access Management (PAM) tool and Just in Time (JIT) Administration utilities.

Associated Objects Per Domain/AD Forest

AD DomainTotal HVT
Dynamicpacks.net2

Affected Objects

AD DomainValue
Dynamicpacks.netGuest is a member of Guests
Dynamicpacks.netAdministrator is a member of Administrators
Embedded Image

TEST NAME

Accounts with Extended Rights to Read LAPS Passwords Found

Description

Test has failed.
Accounts in an Active Directory with extended or overly permissive rights to OU's and Computers may be granted unintentional permissions to read modify or administer the Local Admin Password Solution (LAPS) on domain objects.

Recommendation and Steps

Identified accounts should be reviewed to ensure that they are supposed to have the rights to view read or modify LAPS password information. Auditing of LAPS access can be configured by running the PowerShell commands.

Associated Objects Per Domain/AD Forest

AD DomainStatus
Dynamicpacks.netLAPS Module not installed

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Access Control Lists on Computers Found

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Abusable ACLs
Dynamicpacks.net0

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Access Control Lists on Security Groups Found

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

Abusable ACLs on Group ObjectsAD Domain
0Dynamicpacks.net

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Access Control Lists on Users Found

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

Abusable ACLs on User ObjectsAD Domain
0Dynamicpacks.net

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Group Policy Objects with Improper Permissions Found

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

Abusable GPO Permissions Found?AD Domain
NoDynamicpacks.net

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Group Policy Object Assignments with Improper Permissions Found

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainFound Improper GPO Permissions?
Dynamicpacks.netNo

Affected Objects

Embedded Image

TEST NAME

Dangerous Permissions Found on MicrosoftDNS Container

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainFound Abusable Permissions on MicrosoftDNS Container?
Dynamicpacks.netNo

Affected Objects

Embedded Image

TEST NAME

Dangerous Permissions Found on Naming Contexts

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

Affected Objects

Embedded Image

TEST NAME

Pre-Windows 2000 Compatible Access Group is not empty

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainIs Pre-Windows 2000 Compatible Access Group Empty?
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Found Groups with SID history Set

Description

Test has passed.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Groups Containing SID History
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Normal Users Full Control Permissions on OUs

Description

No Organizational Units have Full Control for any account configured.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Normal Users with Full Control On OUs
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

EVERYONE Full Control Permissions on OUs

Description

No Organizational Units have Full Control for Everyone configured.

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainTotal Organizational Units With EVERYONE Full Control Permission
Dynamicpacks.net0

Affected Objects

Embedded Image

TEST NAME

Abusable Permissions Found on SYSVOL and NETLOGON

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest

Access TypeAD DomainAllow/DenyIdentityShareType
ReadAndExecuteExtendedDynamicpacks.netAllowBUILTIN\Server OperatorsNETLOGON
ReadAndExecuteDynamicpacks.netSynchronizeBUILTIN\Server OperatorsNETLOGON
ReadAndExecuteExtendedDynamicpacks.netAllowBUILTIN\AdministratorsNETLOGON
FullControl (Sub Only)Dynamicpacks.netAllowBUILTIN\AdministratorsNETLOGON
ReadAndExecuteExtendedDynamicpacks.netAllowNT AUTHORITY\SYSTEMNETLOGON
FullControl (Sub Only)Dynamicpacks.netAllowNT AUTHORITY\SYSTEMNETLOGON
ReadAndExecuteExtendedDynamicpacks.netAllowNT AUTHORITY\Authenticated UsersNETLOGON
ReadAndExecuteDynamicpacks.netSynchronizeNT AUTHORITY\Authenticated UsersNETLOGON
FullControl (Sub Only)Dynamicpacks.netAllowCREATOR OWNERNETLOGON
ReadAndExecuteExtendedDynamicpacks.netAllowBUILTIN\Server OperatorsSYSVOL
-1610612736Dynamicpacks.netAllowBUILTIN\Server OperatorsSYSVOL
ReadAndExecuteExtendedDynamicpacks.netAllowBUILTIN\AdministratorsSYSVOL
ReadAndExecuteExtendedDynamicpacks.netAllowBUILTIN\AdministratorsSYSVOL
ReadAndExecuteExtendedDynamicpacks.netAllowNT AUTHORITY\SYSTEMSYSVOL
FullControl (Sub Only)Dynamicpacks.netAllowNT AUTHORITY\SYSTEMSYSVOL
ReadAndExecuteExtendedDynamicpacks.netAllowNT AUTHORITY\Authenticated UsersSYSVOL
-1610612736Dynamicpacks.netAllowNT AUTHORITY\Authenticated UsersSYSVOL
ReadAndExecuteExtendedDynamicpacks.netAllowCREATOR OWNERSYSVOL

Affected Objects

Embedded Image

TEST NAME

LAPS SearchFlag modified

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD ForestFinal StatusLAPS SearchFlag Permissions
DynamicPacks.netNOT OK - Doesn't contain fCONFIDENTIAL

Affected Objects

AD ForestFinal StatusLAPS SearchFlag Permissions
DynamicPacks.netNOT OK - Doesn't contain fCONFIDENTIAL

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainGPLink Write Found on Domain NC by unauthorized users?
Dynamicpacks.netNot Found

Affected Objects

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD DomainGPLink Write Found on Domain Controllers OU by unauthorized users?
Dynamicpacks.netNot Found

Affected Objects

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest

AD ForestGPLink Write Found on AD Sites by unauthorized users?
DynamicPacks.netNot Found

Affected Objects

Embedded Image

TEST NAME

Ensure On-Prem AD Users are not Privileged Users in Azure Entra ID

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure Azure Administrative Units are used

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure Azure Guests cannot invite other Guests

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure privileged accounts have MFA Configured

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure non-Admins cannot register custom applications

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure no Guest Accounts in Azure Privileged groups

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure Security Defaults is enabled

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure Conditional Access Policy with signin user-risk location as Factor

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure no Guest accounts that are inactive for more than 45 days

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Conditional Access policy with Continuous Access Evaluation disabled

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

AAD Connect sync account password reset

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure Guest users are restricted

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure user are configured with MFA

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Conditional Access Policy that disables admin token persistence

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Conditional Access Policy that does not require a password change from high risk users

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Conditional Access Policy that does not require MFA when sign-in risk has been identified

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure Guest invites not accepted in last 30 days are identified

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure Synced AAD Users not privileged Users in Azure

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure No Private IP Addresses in Conditional Access policies

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure Number Matching enabled in MFA

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure AD privileged users are not synced to AAD

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure no more than 5 Global Administrators

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure SSO computer account with latest password

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects
Embedded Image

TEST NAME

Ensure RBCD is not applied to AZUREADSSOACC account

Description

Recommendation and Steps

Associated Objects Per Domain/AD Forest


Data File not available or no Affected Objects

Affected Objects


Data File not available or no Affected Objects

SmartProfiler scoring method is determined by using following formulas:

1
For each category, we check number of tests in category and total number of passed items. For example, if AD GPO category has 10 tests and if 4 tests have been passed then to calculate score for AD GPO category we use Total Passed / Total Tests * 100 = Security Score.
2
Not executed tests are not included in above formula.

As you can see in below score for Sensitive Changes category. There are seven tests in Sensitive Changes category and only FIVE out of seven have been passed.

71.43%

Show overall score for tests executed in Sensitive Changes and make sure Sensitive Objects in AD are not modified.

SENSITIVE CHANGES SCORE

71.43%

Show overall score for tests executed in Sensitive Changes and make sure Sensitive Objects in AD are not modified.

SENSITIVE CHANGES SCORE