SlideShare a Scribd company logo
1 of 1
Download to read offline
NO SETTING OF RESTRICTIONS BY
GROUP AND OU
& How to fix them!
Active Directory’s built in access controls around logons
are failing IT. Each hole represents a security gap that puts
you at risk from external attacks, insider threats and
non-compliance issues.
There’s no facility to establish logon time and
workstation restrictions based on these logical
users subset mechanisms, despite a wide range
of compliance standards calling for it.
N O I D E N T I F Y I N G A N I N I T I A L A C C E S S
P O I N T F R O M A N E S T E D S E S S I O N
NO CONCURRENT LOGON CONTROL
NO FORCING LOGOFF WHEN
ALLOWED LOGON TIME EXPIRES
NO RESPONSE TO EVENTS AND
FORCING A REMOTE LOGOFF
This is especially needed in situations where a
threat actor (whether internal or external) is
horizontally moving within your network. Being
able to target the initial endpoint would help kill
the entire chain of access.
AD can establish when users can log on (and not
allow logon outside those times), but doesn’t
have the ability to kick someone off your network.
Simply put, there is no centralized means
within AD to track each and every place a
user logs on.
There are many good reasons you may want to
react to an event and perform a forced remote
logoff - and is nonetheless required for major
compliance regulations.
8 SECURITY HOLES
IN WINDOWS GROUP
POLICY SETTINGS
NO SENDING PREVIOUS LOGON
NOTIFICATIONS
NO WARNING USERS THEMSELVES OF
SUSPICIOUS CREDENTIAL USE
Informing the user of irregular use of their own
credentials empowers the user to act as part of
your security team. Who better to know when a
logon was inappropriate than the user themselves!
Just letting the user know the last time they
logged on would improve security. It’s also a must
for NIST 800-53 compliance. But, without
centralized tracking of every logon, this simply
isn’t possible natively.
NO TEMPORARY CONTROLS
Without a defined time period, users end
up being left with access rules well beyond
their immediate need.
To ensure a user really is who they say they are,
organizations need to turn to more effective controls. By
adding policies, restrictions and real-time insight around
logons, organizations can act before unauthorized access
is achieved and before damage is done.
No logon, no threat.
Learn More
Read in full how UserLock can enforce these 8 controls
USERLOCK

More Related Content

More from IS Decisions

More from IS Decisions (12)

RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudySchool Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case Study
 
Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
 
FileAudit Presentation | Windows File System Auditing
FileAudit Presentation  | Windows File System AuditingFileAudit Presentation  | Windows File System Auditing
FileAudit Presentation | Windows File System Auditing
 
UserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows NetworksUserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows Networks
 
FileAudit Datasheet
FileAudit DatasheetFileAudit Datasheet
FileAudit Datasheet
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock Datasheet
 
8 Holes in Windows Login Controls
8 Holes in Windows Login Controls8 Holes in Windows Login Controls
8 Holes in Windows Login Controls
 
RemoteExec Presentation
RemoteExec PresentationRemoteExec Presentation
RemoteExec Presentation
 
IS Decisions in the NUMB3RS
IS Decisions in the NUMB3RSIS Decisions in the NUMB3RS
IS Decisions in the NUMB3RS
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company Presentation
 
WinReporter Presentation
WinReporter PresentationWinReporter Presentation
WinReporter Presentation
 

Recently uploaded

Recently uploaded (20)

SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 

8 Security Holes in Windows Group Policy and How to Fix Them.

  • 1. NO SETTING OF RESTRICTIONS BY GROUP AND OU & How to fix them! Active Directory’s built in access controls around logons are failing IT. Each hole represents a security gap that puts you at risk from external attacks, insider threats and non-compliance issues. There’s no facility to establish logon time and workstation restrictions based on these logical users subset mechanisms, despite a wide range of compliance standards calling for it. N O I D E N T I F Y I N G A N I N I T I A L A C C E S S P O I N T F R O M A N E S T E D S E S S I O N NO CONCURRENT LOGON CONTROL NO FORCING LOGOFF WHEN ALLOWED LOGON TIME EXPIRES NO RESPONSE TO EVENTS AND FORCING A REMOTE LOGOFF This is especially needed in situations where a threat actor (whether internal or external) is horizontally moving within your network. Being able to target the initial endpoint would help kill the entire chain of access. AD can establish when users can log on (and not allow logon outside those times), but doesn’t have the ability to kick someone off your network. Simply put, there is no centralized means within AD to track each and every place a user logs on. There are many good reasons you may want to react to an event and perform a forced remote logoff - and is nonetheless required for major compliance regulations. 8 SECURITY HOLES IN WINDOWS GROUP POLICY SETTINGS NO SENDING PREVIOUS LOGON NOTIFICATIONS NO WARNING USERS THEMSELVES OF SUSPICIOUS CREDENTIAL USE Informing the user of irregular use of their own credentials empowers the user to act as part of your security team. Who better to know when a logon was inappropriate than the user themselves! Just letting the user know the last time they logged on would improve security. It’s also a must for NIST 800-53 compliance. But, without centralized tracking of every logon, this simply isn’t possible natively. NO TEMPORARY CONTROLS Without a defined time period, users end up being left with access rules well beyond their immediate need. To ensure a user really is who they say they are, organizations need to turn to more effective controls. By adding policies, restrictions and real-time insight around logons, organizations can act before unauthorized access is achieved and before damage is done. No logon, no threat. Learn More Read in full how UserLock can enforce these 8 controls USERLOCK