Below is a set of default Windows client and server settings right after installing and configuring the domain. List compiled from my own observations, may vary between Windows versions. I used Windows Server 2022 Evaluation and Windows 10 Evaluation systems. This can be useful for domain lateral movement or domain privilege escalation.
NOTE: this list may be updated over time.
Domain settings
There is domain\Administrator domain account in Domain Admins, Schema Admins, Enterprise Admins, Group Policy Creator, and local Administrators group on DC.
There is krbtgt in Domain Users group.
There is Guest account in domain.
An example: ADLAB\hpotter, adlab.local\hpotter, adlab\hpotter and even hpotter (wihout domain part) works the same in most of the logons. Logon by default uses domain user. If there are two users (local and domain) with the same name, it uses the local user first and domain part must be specified explictly to use the domain user.
Domain Admins, Enterprise Admins, Administrators and Domain Controllers have privileges to perform DCSync operation.
Domain Controller settings
Domain domain\Administrator account is local Administrator on DC as well. There's no other (local-only) Administrator account on DC - only domain one.
Domain Admins are placed in local Administrators group on DC.
There is Active Directory PowerShell module present on Windows Server.
Remote UAC affects non-built-in local Administrators. Read more here.
WinRM is enabled on DC (winrs connection to DC does work).
Default Domain Controller (with AD DS enabled) port scan:
Not shown: 989 filtered tcp ports (no-response)PORT STATE SERVICE REASON53/tcp open domain syn-ack ttl 12888/tcp open kerberos-sec syn-ack ttl 128135/tcp open msrpc syn-ack ttl 128139/tcp open netbios-ssn syn-ack ttl 128389/tcp open ldap syn-ack ttl 128445/tcp open microsoft-ds syn-ack ttl 128464/tcp open kpasswd5 syn-ack ttl 128593/tcp open http-rpc-epmap syn-ack ttl 128636/tcp open ldapssl syn-ack ttl 1283268/tcp open globalcatLDAP syn-ack ttl 1283269/tcp open globalcatLDAPssl syn-ack ttl 128
Default DC SMB shares from non-admin user point of view. Admin user has access to all of the SMB shares.
ADMIN$ NO ACCESS Remote AdminC$ NO ACCESS Default shareIPC$ READ ONLY Remote IPCNETLOGON READ ONLY Logon server share SYSVOL READ ONLY Logon server share
Windows client settings
The local Administrator account is present on a machine but it is disabled (the presence of a domain doesn't matter).
Domain Admins group is added to local Administrators group on every machine in the domain (after domain join). Because of that, any domain admin is local admin as well.
Remote UAC affects non-built-in local Administrators. Read more here.
There's no Active Directory PowerShell module on machines (the presence of a domain doesn't matter).