8-Step Guide to Administering
Windows Without Domain
Admin Privileges
Presenter: IT Security Consultant Russell Smith
@smithrussell
@smithrussell
@smithrussell
Do you issue IT staff with
domain admin privileges?
Privileged access = Increased
RISK
Risks Associated with Privileged Account Use
▪ Malware, viruses, and ransomware
▪ Pass-the-Hash and Pass-the-Token attacks
▪ Brute-force attacks
▪ Unsanctioned configuration changes
▪ Ability to disable security defences
▪ Data leakage
▪ Privilege abuse
Privileged Accounts Not Required
▪ Everyday AD management tasks
▪ Connecting to remote devices using Remote Desktop
▪ Using PowerShell Remoting
▪ Managing end-user devices
▪ Managing servers
1. Enforce Separation of
Administration
Separate Roles
DC
DNS
DHCP
Exchange
File Server
Separate Roles
DC
DNS DHCP Exchange File server
2. Enforce Least Privilege by
Limiting Privileged Group
Membership
Enforce Least Privilege by Limiting Privileged Group Membership
Domain Admins
Enterprise
Admins
Schema Admins
Enforce Least Privilege by Limiting Privileged Group Membership
Domain Admins
Enterprise
Admins
Schema Admins
Enforce Least Privilege by Limiting Privileged Group Membership
Domain
Admins
Enterprise
Admins
Schema
Admins
Backup Operators Print Operators Group Policy Owner
Creators
Read-only Domain
Controllers
Server Operators
BUILTINAdministrators Cryptographic Operators
Account Operators Domain Controllers
3. Fine-Grained User/Privileged
User Account Management
Privileged User Account Management
Domain
Admins
Enterprise
Admins
Schema
Admins
Custom OU
Privileged User Account Management
Domain
Admins
Enterprise
Admins
Schema
Admins
Custom OU
Delegation of Control Wizard (ADUC)
Delegation of Control Wizard (ADUC)
Remote Server Administration Tools (RSAT)
Standard user managing Active Directory
4. Manage Administrative
Access to End-User Devices
Group Policy Preferences or Restricted Groups Policy
5. Manage Privileged Access
to Servers
Local Administrator Password Solution (LAPS)
Active Directory
Manage Privileged Access to Servers
AD group
'Server 1'
AD group
'Server 2'
AD group
'Server 3'
Manage Privileged Access to Servers
AD group
'Server 1'
AD group
'Server 2'
AD group
'Server 3'
BUILTIN
Admini
strators
BUILTIN
Admini
strators
BUILTIN
Admini
strators
6. Leverage PowerShell Just
Enough Administration
Leverage PowerShell Just Enough Administration
PowerShell Remoting
ServerManagement PC
Default Endpoint
Groups: Administrators,
Remote Management Users
Exposes all cmdlets, modules,
and functions
Leverage PowerShell Just Enough Administration
PowerShell Remoting
ServerManagement PC
Constrained Endpoint
Groups: Any
Limited cmdlets, modules,
and functions
Per-session JEA account (optional)
7. Use Privileged Access
Management Across Domain
Controllers
Leverage PowerShell Just Enough Administration
▪ Privileged Access Management (PAM)
▪ Tiered AD administration
▪ Privileged Access Workstations (PAWs)
Privileged Access Management in Windows Server 2016
TIER 0
Privileged Access Workstations
PAW PAW PAW
DC
RSAT
8. Enable WSUS and
Centralize Events
TIER 0
Windows Server Update Services (WSUS)
WSUS
DC
Windows Event Forwarding
Collector
DC TIER 0
TIER 1
PowerBroker for
Windows
Jason Silva
Product Manager
Who is BeyondTrust?
EXPERIENCED
Prevents privilege
abuse and stops
data breaches for
4,000+ customers
worldwideCOMPLETE
PAM SOLUTION
Integrated privilege
& vulnerability
management,
threat & behavioral
analytics
LEADER
Gartner,
Forrester,
KuppingerCole
BeyondTrust Stops the Cyber Attack Chain
• Reduce attack surfaces by eliminating
credential sharing, enforcing least privilege,
and prioritizing and patching system
vulnerabilities
• Monitor and audit sessions for unauthorized
access, changes to files and directories, and
compliance
• Analyze behavior to detect suspicious user,
account and asset activity
Endpoint Privilege
Management
Remove excessive user privileges
and control applications on endpoints
WINDOWS | MAC
Enterprise Password
Security
Provide accountability and control over
privileged credentials and sessions
APPS | DATABASES | DEVICES
SSH KEYS | CLOUD | VIRTUAL
Server Privilege
Management
Control, audit and simplify access for
DevOps and business-critical systems
UNIX | LINUX | WINDOWS
ASSET & ACCOUNT
DISCOVERY
THREAT & VULNERABILITY
INTELLIGENCE &
BEHAVIORAL ANALYTICS
REPORTING &
CONNECTORS
POLICY & ACTION
RESPONSE
THE POWERBROKER PRIVILEGED ACCESS MANAGEMENT PLATFORM
BeyondInsight
Comprehensive Windows Privilege Management
Dynamic
Access Policy
Comprehensive
Least Privilege
Privileged
Threat
Analytics
Remote
System &
Application
Control
Auditing &
Governance
File &
Policy
Integrity
Monitoring
Privilege
Management
Best Practices
Product Demonstration
Quick Poll + Q&A
Thank you for attending!

8-step Guide to Administering Windows without Domain Admin Privileges