All posts
Windows default security settings
Created at: 2024-04-29
Below is a set of default Windows client and server settings right after installing and configuring the domain. List compiled from my own observations, may vary between Windows versions. I used Windows Server 2022 Evaluation and Windows 10 Evaluation systems. This can be useful for domain lateral movement or domain privilege escalation.
NOTE: this list may be updated over time.
Domain settings
- There is
domain\Administrator
domain account inDomain Admins
,Schema Admins
,Enterprise Admins
,Group Policy Creator
, and localAdministrators
group on DC. - There is
krbtgt
inDomain Users
group. - There is
Guest
account in domain. - An example:
ADLAB\hpotter
,adlab.local\hpotter
,adlab\hpotter
and evenhpotter
(wihout domain part) works the same in most of the logons. Logon by default uses domain user. If there are two users (local and domain) with the same name, it uses the local user first and domain part must be specified explictly to use the domain user. Domain Admins
,Enterprise Admins
,Administrators
andDomain Controllers
have privileges to perform DCSync operation.
Domain Controller settings
- Domain
domain\Administrator
account is local Administrator on DC as well. There's no other (local-only)Administrator
account on DC - only domain one. Domain Admins
are placed in localAdministrators
group on DC.- There is Active Directory PowerShell module present on Windows Server.
- Remote UAC affects non-built-in local Administrators. Read more here.
- WinRM is enabled on DC (
winrs
connection to DC does work). - RDP service is disabled.
- RDP Pass-The-Hash (Restricted Admin Mode) is disabled. Read more here.
- WMI is allowed on firewall.
- SMB is allowed on firewall. This is especially important for RPC-named-pipe-based lateral movement techniques such as PsExec or SmbExec.
Default Domain Controller (with AD DS enabled) port scan:
Default DC SMB shares from non-admin user point of view. Admin user has access to all of the SMB shares.
Windows client settings
- The local
Administrator
account is present on a machine but it is disabled (the presence of a domain doesn't matter). Domain Admins
group is added to localAdministrators
group on every machine in the domain (after domain join). Because of that, any domain admin is local admin as well.- Remote UAC affects non-built-in local Administrators. Read more here.
- There's no Active Directory PowerShell module on machines (the presence of a domain doesn't matter).
- WinRM is disabled.
- RDP service is disabled.
- RDP Pass-The-Hash (Restricted Admin Mode) is disabled. Read more here.
- WMI is not allowed on firewall.
- SMB shares are present but SMB is not allowed on firewall. The firewall SMB exception is enabled when, for example, a new share is created. This is especially important for RPC-named-pipe-based lateral movement techniques such as PsExec or SmbExec.
Default Windows client machine open ports before domain connection:
Default Windows client machine open ports after domain connection: