Microsoft Security Advisory 3062591 Option Local Administrator Password Management - Synergix
ADCE: Local Administrator Password Management
Pass-the-Hash (PtH) attacks against the Windows operating systems are becoming common. Microsoft wants organizations to assume that a breach has already occurred in order to highlight the need for a more mature defense. In most organizations, the Local Administrator Password is shared amongst many administrators and is a small set of static strings. This raises major security concerns specially when it comes to Pass-the-Hash attacks.
With AD Client Extensions installed, Local Administrator Password is system generated and stored in Active Directory in encrypted form. Passwords are validated regularly and reset to maintain the integrity. The password vault is infallible to the extend of AD Domain Infrastructure. Only designated administrators are allowed to retrieve and decrypt the password strings.
Encryption
Administrator Password is encrypted using unique encryption key
Unique Password
Local Administrator Password is unique and varies in length from 16 to 48 characters
No Schema Changes
No Schema Changes are required as passwords are stored in the vault.
Delegation
Leverages delegation in Azure AD to manage access to the vault
Remote Desktop
Remote Desktop connection can be established without typing username or password
Business Justification
Requestor is required to type business justification before opening the password valut
Least Privileges
Workflow is built following the principle of least privileges
Password Masking
By default, password is masked, when first retrieved.
Auditing
Integrated Audit Logs
Instrumentation
Computer properties, from various WMI claases, are stored in a database.