Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Question on Security - Firewall - IPSec - Domain Controllers - Assigned Users/Computers #9

Open
nathanpruitt opened this issue Sep 30, 2020 · 1 comment

Comments

@nathanpruitt
Copy link

Hello,

I was able to figure out most of the permissions here, but I'm curious on what two of these SIDs represent
2020-09-30 15_04_07-LAB-DC-01 - VMware Workstation

I may run into more questions on this as I continue, but I'm working on trying to keep all of this straight. It's a very different approach than what I'm used to, which is why I'm labbing this!

Thanks for any insight you can offer here!

-Nate

@utsecnet
Copy link
Owner

utsecnet commented Sep 30, 2020

Looks like maybe a user or group to which you have given access, but the accounts/groups no longer exists in AD. (My guess anyway)
I usually just allow ANY from Tier0 admins on Tier0 PAWs to All-Tier0-Servers. If you need additional clarification let me know. Just ensure that on Domain Controllers especially, you do not require authentication via IPSEC policies to domain ports otherwise you will prevent non-domain joined devices from being able to join, or network devices from hitting NTP, etc... You should only require authentication for management services like RDP (3389) and WMI stuff and any agent communication. Hit me up for any further clarification!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants