The Active Directory RID Manager$ object must be configured with proper audit settings.
From Windows Server 2008 R2 Domain Controller Security Technical Implementation Guide
Part of WINAU-000212-DC
Associated with:
CCI-000172
CCI-002234
SV-55068r1_rule
The Active Directory RID Manager$ object must be configured with proper audit settings.
Vulnerability discussion
When inappropriate audit settings are configured for directory service database objects, it may be possible for a user or process to update the data without generating any tracking data. The impact of missing audit data is related to the type of object. A failure to capture audit data for objects used by identification, authentication, or authorization functions could degrade or eliminate the ability to track changes to access policy for systems or data. For Active Directory (AD), there are a number of critical object types in the domain naming context of the AD database for which auditing is essential. This includes the RID Manager$ object. Because changes to these objects can significantly impact access controls or the availability of systems, the absence of auditing data makes it impossible to identify the source of changes that impact the confidentiality, integrity, and availability of data and systems throughout an AD domain. The lack of proper auditing can result in insufficient forensic evidence needed to investigate an incident and prosecute the intruder.
Check content
Verify the auditing configuration for the RID Manager$ object.
Open "Active Directory Users and Computers". (Available from various menus or run "dsa.msc".)
Ensure Advanced Features is selected in the View menu.
Select System under the domain being reviewed in the left pane.
Right-click the RID Manager$ object in the right pane and select Properties.
Select the Security tab.
Select the Advanced button and then the Auditing tab.
If the audit settings on the RID Manager$ object are not at least as inclusive as those below, this is a finding.
Type - Fail
Name - Everyone
Access - Full Control
Inherited From -
The success types listed below are defaults. Where Special is listed in the summary screens for Access, detailed Permissions are provided for reference, various Properties selections may also exist by default.
Type - Success
Name - Everyone
Access - Special
Inherited From -
(Access - Special = Write all properties, All extended rights, Change RID master)
Two instances with the following summary information will be listed.
Type - Success
Name - Everyone
Access - (blank)
Inherited From - (CN of domain)
Fix text
Configure the audit settings for RID Manager$ object to include the following.
Type - Fail
Name - Everyone
Access - Full Control
Inherited From -
The success types listed below are defaults. Where Special is listed in the summary screens for Access, detailed Permissions are provided for reference, various Properties selections may also exist by default.
Type - Success
Name - Everyone
Access - Special
Inherited From -
(Access - Special = Write all properties, All extended rights, Change RID master)
Two instances with the following summary information will be listed.
Type - Success
Name - Everyone
Access - (blank)
Inherited From - (CN of domain)
Pro Tips
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer