When it comes to domain modification, adversaries may change the domain settings to escalate privileges in domain environments. Domains provide the ability for centralized management of how various resources such as computers and users interact with one another. The policies that concern the domain also include configuration settings between different domains in a forest environment. Domain policy modification includes both:
There is a high risk when it comes to adversaries gaining access to modify domain policies, since domain configurations control a vast number of interactions in AD. Some examples of the types of misuse that can take place are:
An important note here is that an adversary may modify the domain policy to launch an attack and then restore the settings to prevent detection of any suspicious activity.
Event logs can be used for identifying domain modifications. In the case of Group Policy modifications, various Windows Event IDs are logged for modifying, creating, moving, deleting, and recovering deleted objects. It is recommended to monitor any modifications to domain trust settings (for example, if and when a user or application modifies federation settings) via actions that are associated with a policy. In addition, you can monitor commands that are specifically used to modify domain policy settings.
Domain policy modification can be prevented and mitigated in case of incidents through certain methods. For example:
Zoho Corporation Pvt. Ltd. All rights reserved.