Restrict Accounts with Privileged Active Directory (AD) Access from Logging into Endpoints CM0084
Restrict Accounts with Privileged Active Directory (AD) Access from Logging into Endpoints (CM0084)
In PlaybookDetails
- ID: CM0084
- Version: 1.0
- Created: 14 March 2025
- Modified: 14 March 2025
- Type: Disable
- Status: Active
Intended Outcome
Restricting accounts with privileged Active Directory (AD) access from logging into endpoints blocks adversary lateral movement via privileged AD access.Introduction
Accounts with domain privileges should only be accessed through designated Privileged Access Workstations (PAWs). If an adversary compromises a privileged or service account, they may attempt to perform lateral movement by accessing workstations, common access servers, and other endpoints. To disrupt the ability of an adversary to access these endpoints, system administrators should block accounts with privileged AD access, such as Domain Admins, from being able to log into unauthorized endpoints.Preparation
- Assess the impact of the mitigation on the job activities of the affected accounts.
- If containing the adversary, inhibiting their access to the compromised account first by first rotating credentials.
- Verify whether the user right is absolutely required by a service account. If so, create a Group Managed Service Account (gMSA) and delegate only the necessary privileges for the service running the task(s).
Risks
- Removing the ability for a service account to log into an endpoint may disrupt services or processes on the endpoint.
Guidance
Apply Deny Log On User Rights
To deny accounts with privileged AD access from logging into endpoints, the following restrictions should be enforced on the account(s):- Deny access to this computer from the network (SeDenyNetworkLogonRight)
- Deny logon as a service (SeDenyServiceLogonRight)
- Deny log on as a batch job (SeDenyBatchLogonRight)
- Deny log on locally (SeDenyInteractiveLogonRight)
- Deny log on through Remote Desktop (sometimes known as Deny log on through Terminal Services) (SeDenyRemoteInteractiveLogonRight)
Remove Unauthorized Log On User Rights
After applying the 'deny' user rights to an account or group, system administrators should remove the equivalent 'log on' user rights. These include- Access this computer from the network (SeNetworkLogonRight)
- Logon as a service (SeServiceLogonRight)
- Log on as a batch job (SeBatchLogonRight)
- Allow log on locally (SeInteractiveLogonRight)
- Allow log on through Remote Desktop Services (SeRemoteInteractiveLogonRight)
References
- Proactive Preparation and Hardening to Protect Against Destructive Attacks | https://cloud.google.com/blog/topics/threat-intelligence/protect-against-destructive-attacks/
- Implementing Least-Privilege Administrative Models | https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/implementing-least-privilege-administrative-models
- ID: CM0084
- Version: 1.0
- Created: 13 March 2025
- Modified: 13 March 2025
- Type: Disable