- Use double factor authentication for privileged accounts, such as domain admin accounts, but also critical accounts (but also accounts having the SeDebug right). See http://technet.microsoft.com/fr-fr/library/ff404294(v=ws.10).aspx. You might also want to consider deploying smartcard logon for VPN: http://technet.microsoft.com/en-us/library/cc875840.aspx - Harden security administration leveraging admin bastions: those machines are especially hardened, and the administrators first connects to the bastion, then from the bastion connects to the remote machine (server/equipment) to be administrated. Traceability can be enforced this way (even generic admin accounts could be linked to nominative accounts), as well as authentication (smart card logon to be used on the remote server). Great measure to defend against keylogging, pass-the-hash attack, and administrators potentially unwanted actions. - Enhance network isolation with Network Access Control technologies, for instance NAP, at least for critical assets and infrastructure servers: http://technet.microsoft.com/library/cc512682.aspx and http://technet.microsoft.com/en-us/library/cc753550(v=ws.10).aspx - Harden Outlook Web App (OWA) access by publishing it through reverse proxies, and automatically deploy a component to check remote clients security. Forefront UAG could be an example to do so, see: http://www.microsoft.com/en-us/download/confirmation.aspx?id=302 - Run offline scans of antivirus, after a compromise and on a regular basis (sensitive machines). Here is an implementation example made of SCCM and System Sweeper: http://blogs.technet.com/b/configmgrteam/archive/2012/04/12/launching-a-windows-defender-offline-scan-with-configuration-manager-2012-osd.aspx - Enable Network Level Authentication: http://technet.microsoft.com/en-us/library/cc732713.aspx - Mitigate unpatched applications vulnerabilities exploitation with DEP, ALSR (if applicable). Deploy the EMET: http://blogs.technet.com/b/srd/archive/2013/06/17/emet-4-0-now-available-for-download.aspx depending on the versions of Windows you're running.
- White/blacklisting applications, through AppLocker for example: http://technet.microsoft.com/en-us/library/ee791890(v=ws.10).aspx - Use strong algorithms to cypher network communications: from the list of implemented SSL/TLS versions, depending on the versions of Windows you have got, enable and prioritize the strongest cyphering suite possible (see http://blogs.msdn.com/b/benjaminperkins/archive/2011/10/07/secure-channel-compatibility-support-with-ssl-and-tls.aspx). By default, our recommendation is TLS 1.1 or 1.2, both client and server side. - Use IpSec at least between domain controlers (AD replication, etc), and for critical application servers: http://technet.microsoft.com/en-us/library/deploy-ipsec-firewall-policies-step-by-step(v=ws.10).aspx
Philippe Vialle - MSFT edited Revision 4. Comment: formatting
Philippe Vialle - MSFT edited Revision 3. Comment: added link to previous article
Philippe Vialle - MSFT edited Revision 2. Comment: formatting