Derby, assistant n

出处:

责任编辑:

[ 2004-06-17 19:23 ]

Anyone who has deployed Active Directory (AD) and set up a good AD management process deserves a breather. A short one, that is, because one of the toughest tasks in managing AD is just around the corner: security.

Any venture into AD security should involve multi-forest AD designs, said AD security expert Ratmir Timashev. The reason? In a Jan. 30 security bulletin, Microsoft revealed an Active Directory Domain Trust vulnerability. The bulletin stated that "trusting domains do not verify domain membership of SIDs in authorizationdata."

If you can't see the forest through the trees in AD security, never fear. In this SearchWindowsManageability (SWM) interview, Aelita Software CEO Ratmir Timashev explains how the number of forests relates to Active Directory's security. Powell, Ohio-based Aelita worked with Microsoft to identify the recent domain trust vulnerability.

SWM: How does Active Directory organize the elements of a network, such as users and computers?

Timashev: Active Directory has three key containers. A forest is a collection of domains and is the highest-level container for network objects. Domains are level-down containers within a forest and represent an administrative and replication boundary. Domains are normally created for geographical or organizational reasons. The main purpose is to separate administration and/or reduce replication. Organizational units (OUs), which can be departments or groups, are used to structure and manage your network in a way that reflects a company's business organization.

SWM: Can you define single forest vs. multi-forest Active Directory design?

Timashev: A single forest design is the simplest design. There is only one forest for the whole company network. In other words, all the network objects for the whole company are organized within a single forest. A single Active Directory forest design is easier to administer, provides lower support costs, and offers the best collaboration and messaging environment for the whole company. However, a single forest is the least secure design.

A multi-forest design is when the entire company's network is separated into several forests. It carries higher administrative and support costs, and complicates collaboration and messaging. However, it provides the highest level of security.

SWM: How does the number of forests relate to security, particularly the Domain Trust vulnerability in AD?

Timashev: A domain used to be considered a security boundary. A domain as a security boundary holds users, computers, and other account information; provides security authentication; and controls access to the resources within the domain. A domain in Windows 2000 Active Directory cannot be considered a security boundary because of the following: Domains have automatic transitive trust relationships within a forest; all domain controllers have a writable copy of a security database; there is a writable copy of a Global Catalogavailable on domain controllers in all domains in the forest; the "Domain Trust" vulnerability and security identification (SID) history mechanism.

A domain in Windows 2000 is no longer a security boundary, and it does not provide enough security isolation. A rogue administrator in one domain can potentially get unauthorized access to resources in all domains in the forest by using the "Domain Trust" vulnerability or manipulating the Global Catalog. So, a single forest with multiple domains means no security boundaries in the directory.

SWM: How exactly does multi-forest design benefit an organization?

Timashev: By default, a user or administrator in one forest cannot access another forest, which means that the forest is a security boundary. A multi-forest design allows for security boundaries within corporate networks, thus improving the overall network security. The most sensitive parts of the network (corporate, accounting, finance, R&D, etc.) should be in a separate forest to guarantee the highest level of security and access control. In addition, different divisions within a large corporation should consider a separate forest for added security isolation.

Of course, some users might need to access data in another forest. For this need, administrators can create trust relationships between domains in the forests and use SID filtering, which is a mechanism that prevents the "Domain Trust" vulnerability from occurring between forests.

SWM: Can SID filtering be used between domains within the same forest to prevent the Domain Trust vulnerability?

Timashev: Unfortunately no. SID filtering cannot be used between domains in the same forest because it would prevent Active Directory from functioning properly.

SWM: What kinds of companies should consider a multi-forest design?

Timashev: Companies that might consider multi-forest designs are medium to large sized. They have more administrators, which increases the risk of having less supervision and the possibility of a rogue admin. Multi-forest designs will be most useful to financial, banking, insurance, healthcare and government services organizations. Of course, some of these fields are required by law or business practices to implement high levels of security.

SWM: Are there any drawbacks to multi-forest designs?

Timashev: Administrators need to consider how data might need to be synchronized between the forests and what administration practices and tools might be needed. The most important issue, though, is how to set up Exchange on a multi-forest network. Generally, administrators will need to implement either one Exchange organization for the entire network or have separate Exchange organizations for each forest.

FOR MORE INFORMATION:

>>Don't fear the Active Directory

>>Top 10 Active Directory management bloopers

Single forest vs. multi-forest Active Directory design相关推荐

  1. Active Directory PowerShell模块收集AD信息

    0x00 前言简介 Microsoft为Windows Server 2008 R2(以及更高版本)提供了多个Active Directory PowerShell cmdlet,这大大简化了以前需要 ...

  2. Active Directory 域服务(AD DS)

    本文内容 概述 工作组架构与域架构 名称空间(Namespace) 对象(Object).容器(Container)与组织单位(Organization Units,OU) 域树(Domain Tre ...

  3. HTB打靶(Active Directory 101 Mantis)

    namp扫描 Starting Nmap 7.93 ( https://nmap.org ) at 2023-02-02 03:40 EST Stats: 0:01:28 elapsed; 0 hos ...

  4. Active Directory之AD对象

    1.概述 在这篇文章中,我们将讨论不同的 Active Directory 对象及其基本概念,例如: 为什么域中需要 Active Directory 对象 如何创建它们? 如何枚举 Active D ...

  5. 【Windows Server 2019】活动目录 (Active Directory) ——将计算机加入域和脱离域

    目录 8. 将计算机加入域和脱离域 8.1 将客户机加入到fjnu.local域中 8.2 验证客户机加入到域后的信息 8.3 使用域账户用户在客户机上登录 8.4 使用本地账户用户在计算机上登录 8 ...

  6. 【Windows Server 2019】活动目录 (Active Directory) ——在同一区域安装多台域控制器

    目录 6. 安装多台域控制器 实验目的 6.1 配置服务器DNS2的IP地址 6.2 安装Active Diretory服务 6.3 将服务器DNS2提升为fjnu.local的域控制器 (1)进入[ ...

  7. Active Directory攻防实验室环境搭建教程(二)

    本文讲的是 Active Directory攻防实验室环境搭建教程(二), 这篇文章不是为了描述如何搭建配置非常完美的实验室.相反,本文的重点是实验室的具体环境,可以让你作为学习的工具快速,轻松地搞起 ...

  8. Active Directory网域

    Active Directory网域 3.1Windows网络的管理方式 3.1.1工作组模式 工作组由一组用网络连接在一起的计算机组成,他们将计算机内的资源共享给用户访问.工作组网络也被称为&quo ...

  9. 【Windows Server 2019】活动目录 (Active Directory) ——理论

    目录 1. Acitve Directory 的定义与作用 1.1 Acitve Directory 的定义 1.2 Acitve Directory 的作用 2. Acitve Directory ...

最新文章

  1. php生成pdf乱码_php+tcpdf生成pdf: 中文乱码
  2. LeetCode Construct Binary Tree from Inorder and Postorder Traversal
  3. 你应该需要知道的前端小技巧
  4. JVM的内存管理 Ⅰ
  5. 2020语言与智能技术竞赛-事件抽取方案整理(第一波
  6. Event 事件对象 (target)帆软修改提示框样式
  7. Atitit.web三大编程模型 Web Page Web Forms 和 MVC
  8. Kali Linux 暴力破解wifi密码详细步骤
  9. 个人所得综合税年度汇算,个税计算公式,个税计算案例
  10. 利用阿里云服务器制作一个浪漫的表白网页
  11. 思维为何会越来越原地踏步No.209
  12. openlayers4加载百度地图、百度影像图、谷歌地图、谷歌影像图
  13. rpm安装包安装方式
  14. 开发环境 -- 在linux中写一个脚本拷机
  15. Android 定制自己的launcher
  16. 一只蝴蝶引发的海啸:垂死的CDN行业风云再起
  17. 抽丝剥茧,C#面向对象快速上手
  18. 微软股价创新高,突破300美元!我入职后,股票翻了10倍!
  19. 已有一个Excel表格,用VBA批量新建文件夹
  20. HTML+CSS实现拼多多官网首页

热门文章

  1. Android中JSON解析细解及实例
  2. 子查询返回的值不止一个。当子查询跟随在 =、!=、、=、、= 之后,或子查询用作表达式时,这种情况是不允许的。...
  3. ABAP 在被访问的程序中获取访问程序的全局变量
  4. CSS之简单的双引号
  5. Tomcat无法启动,报错java.lang.NoClassDefFoundError: org/apache/juli/logging/LogFactory
  6. 二次注入 php,dedecms20140606 二次注入+存储型xss
  7. python爬虫xpath提取数据_python爬虫三大解析库之XPath解析库通俗易懂详讲
  8. gulp,grunt,bower,feoman,fis 简单说明
  9. java设计模式之设计原则⑤迪米特原则
  10. 在线场景感知:图像稀疏表示-ScSPM和LLC总结(lasso族、岭回归)