Using Protected Groups to Secure Privileged User Accounts
Benefits
Members of the Protected Users group who are signed-on to Windows 8.1 devices and Windows Server 2012 R2 hosts can no longer use:
- Default credential delegation (CredSSP) - plaintext credentials are not cached even when the Allow delegating default credentials policy is enabled
- Windows Digest - plaintext credentials are not cached even when they are enabled
- NTLM - NTOWF is not cached
- Kerberos long term keys - Kerberos ticket-granting ticket (TGT) is acquired at logon and cannot be re-acquired automatically
- Sign-on offline - the cached logon verifier is not created
If the domain functional level is Windows Server 2012 R2 , members of the group can no longer:
- Authenticate by using NTLM authentication
- Use Data Encryption Standard (DES) or RC4 cipher suites in Kerberos pre-authentication
- Be delegated by using unconstrained or constrained delegation
- Renew user tickets (TGTs) beyond the initial 4-hour lifetime
Requirements
The PDCe role should be hosted on a domain controller that runs Windows Server 2012 R2 to create the Protected Users security group.
Hosts must run Windows 8.1, Windows Server 2012 R2 or later to provide client-side restrictions for Protected Users. Members of this group have no additional protection if they are logged on to a device that runs a version of Windows earlier than Windows 8.1.
Domain controller-side restrictions for Protected Users require the domain functional level to be Windows Server 2012 R2 or later.
Action
Simply add users to the group, using UI tools such as Active Directory Administrative Center (ADAC) or Active Directory Users and Computers, or a command-line tool such as Dsmod group, or the Windows PowerShellAdd-ADGroupMember cmdlet
To track events, enable the following logs on domain controllers:
- Microsoft-Windows-Authentication/ProtectedUserFailures-DomainController
- Microsoft-Windows-Authentication/ProtectedUserSuccesses-DomainController
Impact
Members of the Protected Users group must be able to authenticate by using Kerberos with Advanced Encryption Standards (AES). The built-in administrator as well as any account, which has a password that was changed at a domain controller that runs an earlier version of Windows Server, is locked out. Therefore, follow these best practices:
Do not test in domains unless all domain controllers run Windows Server 2008 or later.
Change password for each user before adding the account to the Protected Users group or ensure that the password was changed recently on a domain controller that runs Windows Server 2008 or later.
Membership of the Protected Users also affect the Kerberos TGT lifetime and renewal times:
Kerberos Policy | Default | Protected Users |
Maximum lifetime for user ticket | 10 hours (600 minutes) | 240 minutes |
Maximum lifetime for user ticket renewal | 7 days (10,080 minutes) | 240 minutes |
Validation – Success
Connecting to server using RDP. Using the DNS name of the server results in Kerberos being used for authentication
Log Name: Microsoft-Windows-Authentication/ProtectedUserSuccesses-DomainController
Source: Microsoft-Windows-Kerberos-Key-Distribution-Center
Date: 2/5/2018 10:38:39 PM
Event ID: 303
Task Category: None
Level: Information
Keywords:
User: SYSTEM
Computer: RootDC01.Litware.com
Description:
A Kerberos ticket-granting-ticket (TGT) was issued for a member of the Protected User group.
Account Information:
Account Name: BBanner
Supplied Realm Name:
User ID: LITWARE\BBanner
Authentication Policy Information:
Silo Name:
Policy Name: AuthPol - Tier_0_Accounts_Devices
TGT Lifetime: 240
Device Information:
Device Name:
Service Information:
Service Name: krbtgt/LITWARE
Service ID: LITWARE\krbtgt
Network Information:
Client Address: ::ffff:10.10.20.24
Client Port: 49204
Additional Information:
Ticket Options: 0x78
Result Code: 0x0
Ticket Encryption Type: 0x7
Pre-Authentication Type: 2
Certificate Information:
Certificate Issuer Name:
Certificate Serial Number:
Certificate Thumbprint:
Certificate information is only provided if a certificate was used for pre-authentication.
Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.
Log Name: Microsoft-Windows-Authentication/ProtectedUserSuccesses-DomainController
Source: Microsoft-Windows-Kerberos-Key-Distribution-Center
Date: 2/5/2018 10:38:39 PM
Event ID: 304
Task Category: None
Level: Information
Keywords:
User: SYSTEM
Computer: RootDC01.Litware.com
Description:
A Kerberos service ticket was issued for a member of the Protected User group.
Account Information:
Account Name: BBanner@LITWARE.COM
Account Domain: LITWARE.COM
Logon GUID: {9fdc2786-483a-81c3-17ce-43276cb9e55e}
Authentication Policy Information:
Silo Name:
Policy Name:
Device Information:
Device Name:
Service Information:
Service Name: ROOTMS04$
Service ID: LITWARE\ROOTMS04$
Network Information:
Client Address: ::ffff:10.10.20.24
Client Port: 49205
Additional Information:
Ticket Options: 0x7B
Ticket Encryption Type: 0x1F
Failure Code: 0x0
Transited Services: -
This event is generated every time access is requested to a resource such as a computer or a Windows service. The service name indicates the resource to which access was requested.
This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event. The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.
Ticket options, encryption types, and failure codes are defined in RFC 4120.
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 2/5/2018 10:40:40 PM
Event ID: 4768
Task Category: Kerberos Authentication Service
Level: Information
Keywords: Audit Success
User: N/A
Computer: RootDC01.Litware.com
Description:
A Kerberos authentication ticket (TGT) was requested.
Account Information:
Account Name: BBanner
Supplied Realm Name: LITWARE.COM
User ID: LITWARE\BBanner
Service Information:
Service Name: krbtgt
Service ID: LITWARE\krbtgt
Network Information:
Client Address: ::ffff:10.10.20.24
Client Port: 49239
Additional Information:
Ticket Options: 0x40810010
Result Code: 0x0
Ticket Encryption Type: 0x12
Pre-Authentication Type: 2
Certificate Information:
Certificate Issuer Name:
Certificate Serial Number:
Certificate Thumbprint:
Certificate information is only provided if a certificate was used for pre-authentication.
Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.
Validation – Failure
When connecting over RDP, using the ip address of the server results in NTLM being used for authentication, which results in a failed authentication.
Log Name: Microsoft-Windows-Authentication/ProtectedUserFailures-DomainController
Source: Microsoft-Windows-NTLM
Date: 2/5/2018 10:50:23 PM
Event ID: 100
Task Category: None
Level: Error
Keywords:
User: SYSTEM
Computer: RootDC01.Litware.com
Description:
NTLM authentication failed because the account was a member of the Protected User group.
Account Name: BBanner
Device Name: ROOTMS01
Error Code: 0xC000006E
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 2/5/2018 10:50:23 PM
Event ID: 4822
Task Category: Credential Validation
Level: Information
Keywords: Audit Failure
User: N/A
Computer: RootDC01.Litware.com
Description:
NTLM authentication failed because the account was a member of the Protected User group.
Account Name: BBanner
Device Name: ROOTMS01
Error Code: 0xC000006E
Log Name: Security
Source: Microsoft-Windows-Security-Auditing
Date: 2/5/2018 10:50:23 PM
Event ID: 4776
Task Category: Credential Validation
Level: Information
Keywords: Audit Failure
User: N/A
Computer: RootDC01.Litware.com
Description: The computer attempted to validate the credentials for an account.
Authentication Package: MICROSOFT_AUTHENTICATION_PACKAGE_V1_0
Logon Account: BBanner
Source Workstation: ROOTMS01
Error Code: 0xC000006E