Implementing Remote Credential Guard and Remote Admin Mode on Domain-Joined Windows 10 Clients
Total Page:16
File Type:pdf, Size:1020Kb
INF258x: Implementing Remote Credential Guard and Remote Admin mode on Domain-joined Windows 10 Clients Estimated Time: 30 minutes You have a domain-joined Windows 10 client computer. You plan to take advantage of the Remote Desktop Credential Guard and Restrict Admin mode to protect credentials during Remote Desktop sessions between Windows 10 client and Windows Server 2016 computers. Objectives After completing this lab, students will be able to: • Implement Remote Credential Guard. • Implement the Restricted Admin mode. • Verify functionality of Remote Credential Guard and the Restricted Admin mode. Lab environment The lab consists of the following computers: • LON-DC1 – a Windows Server 2016 domain controller in the adatum.com single-domain forest. • LON-SVR1 – a Windows Server 2016 domain member server • LON-CL1 – a Windows 10 Pro or Enterprise version 1607 (or newer) domain member computer with Remote Server Administration Tools for Windows 10 All computers have Windows PowerShell Remoting enabled and have Internet connectivity Remote Desktop connections protected with Credential Guard have the following characteristics: • Require Windows 10 version 1607 (or newer) or Windows Server 2016 • Enforce of Kerberos authentication (NTLM is not allowed). • Require that both computers (a Remote Desktop client and a Remote Desktop host) are members of the same Active Directory domain or trusted Active Directory domains (Kerberos is enforced) • Support connecting with non-Administrative credentials (as a member of the Remote Desktop Users group) • Support connecting with signed-on, supplied, or saved credentials (starting with Windows 10, version 1703) • Support single sign-on • Do not support via the Remote Desktop classic Windows app (the Universal Windows Platform app is not supported) • Mitigate Pass The Hash attacks • Mitigate exploits of Remote Desktop session credentials following session disconnects • Allow for network access in the security context of the signed-on user Remote Desktop connections protected with Restricted Admin mode have the following characteristics: • Require Windows 7 (or newer) or Windows Server 2008 R2 (or newer) • Support NTLM and Kerberos • Support computers that are not members of Active Directory domains • Require that accounts used establish Remote Desktop sessions are members of the Administrators group on the remote computer. • Support connectivity via the Remote Desktop classic Windows app or the Universal Windows Platform app • Support connectivity with signed-on, supplied, or saved credentials • Support single sign-on • Mitigate of Pass The Hash attacks • Mitigate exploits of Remote Desktop sessions throughout their duration (including disconnects) • Support connecting with signed-on, supplied, or saved credentials. • Provide network access in the security context of the Remote Desktop session host computer Exercise 1: Implement Remote Desktop session protection with Remote Credential Guard In this exercise, you will implement Remote Desktop session protection with Remote Credential Guard. The main tasks for this exercise are as follows: 1. Enable Remote Credential Guard on the Remote Desktop target host. 2. Enable Remote Credential Guard on the Remote Desktop client 3. Allow Remote Desktop connections to the Remote Desktop target host 4. Establish a Remote Desktop session with Remote Credential Guard enabled. 5. Examine Remote Credential Guard protection. Task 1: Enable Remote Credential Guard on the Remote Desktop target host 1. Sign in to the LON-SVR1 Windows 2016 lab virtual machine with the following credentials: • USERNAME: ADATUM\Administrator • PASSWORD: Pa55w.rd 2. Right-click Start, in the Open text box, type regedit, and then click OK. 3. In the Registry Editor window, navigate to the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa registry key. 4. Create a new registry entry named DisableRestrictedAdmin of REG_DWORD type and set its value to 0. 5. Close Registry Editor. Alternatively, you can accomplish the same result by running the following from the Administrator: Windows PowerShell elevated prompt: Set-ItemProperty –Path HKLM:\System\CurrentControlSet\Control\Lsa –Name DisableRestrictedAdmin -Value 0 –Type DWord Task 2: Enable Remote Credential Guard on the Remote Desktop client 1. Sign in to the LON-DC1 Windows Server 2016 lab virtual machine with the following credentials: • USERNAME: ADATUM\Administrator • PASSWORD: Pa55w.rd 2. While signed in to LON-DC1 as ADATUM\Administrator, click Start, in the Start menu, expand the Windows Administrative Tools folder and click Active Directory Administrative Center. 3. In the Active Directory Administrative Center console, ensure that adatum (local) entry is selected, click Users, in the Tasks pane, click New and then click User. 4. In the Create User window, specify the following and click OK. • Full name: Student1 • User UPN logon: Student1 • User SamAccountName logon: Student1 • Password: Pa55w.rd • Password options: Other password options – Password never expires 5. Click OK. 6. While signed in to LON-DC1 as ADATUM\Administrator, click Start, in the Start menu, right-click Windows PowerShell, in the right-click menu, click More and click Run as administrator. 7. From the Administrator: Windows PowerShell window, type the following and press Enter: Invoke-Command –ComputerName LON-CL1 –ScriptBlock {Add-LocalGroupMember –Group ‘Administrators’ –Member ‘ADATUM\Student1’} This will add the newly created user to the local Administrators group on LON-CL1. You will use the ADATUM\Student1 account during this and subsequent tasks to test the functionality of Remote Credential Guard and the Restricted Admin Mode. 8. While signed in to LON-DC1 as ADATUM\Administrator, click Start, in the Start menu, expand the Windows Administrative Tools folder and click Group Policy Management. 9. In the Group Policy Management console, expand the Forest: Adatum.com and Domains nodes, right click Adatum.com, and click the Create a GPO in this domain, and Link it here entry in the right-click menu. 10. In the New GPO dialog box, in the Name text box, type Remote Desktop Protection Policy and click OK. 11. Back in the Group Policy Management console, expand the Adatum.com node and click the Remote Desktop Protection Policy GPO. If prompted with the message box stating You have selected a link to a Group Policy Object (GPO). Except for changes to link properties, changes you make here are global to the GPO, and will impact all other locations where this GPO is linked, enable the checkbox Do not show this message again and click OK. 12. On the Scope tab of the Remote Desktop Protection Policy GPO, click Authenticated Users, click Remove and, when prompted to confirm, click OK. 13. Click Add, in the Select User, Computer, or Group dialog box, click Object Types. 14. In the Object Types dialog box, select Computers and click OK. 15. type LON-CL1 and click OK Typically, you would use an Active Directory group containing the LON-CL1 computer account to apply Security Filtering of a GPO. We are using the LON-CL1 computer account directly for the sake of simplicity (since you would need to restart LON-CL1 in order for the group membership addition to take effect). This is actually a viable approach in a lab scenario. 16. Right-click the Remote Desktop Protection Policy GPO and, in the right-click menu click Edit. This will open Group Policy Management Editor. 17. In the Group Policy Management Editor window, navigate to Computer Configuration -> Policies - > Administrative Templates -> System -> Credentials Delegation 18. In the details pane, double-click Restrict delegation of credentials to remote servers 19. Click Enabled. 20. In the Use the following restricted mode drop-down list, select Require Remote Credential Guard. The Restrict delegation of credentials to remote servers setting offers three choices: • Require Remote Credential Guard – enforces Credential Guard • Require Restricted Admin – enforces Restricted Admin • Restrict Credential Delegation – enforces Credential Guard if supported – otherwise enforces Restricted Admin. 21. Click OK. Leave the Group Policy Management Editor window open. You will use it in Exercise 2. 22. Sign in to the LON-CL1 Windows 10 lab virtual machine with the following credentials: • USERNAME: ADATUM\Student1 • PASSWORD: Pa55w.rd1 23. Right-click Start and then click Windows PowerShell (Admin). 24. To ensure that the group policy change is applied, from the Administrator: Windows PowerShell prompt, run the following: gpupdate /force Task 3: Allow Remote Desktop connections to the Remote Desktop target host 1. On LON-SVR1, right-click Start and click Run. 2. In the Open text box, type sysdm.cpl and click OK. 3. In the System Properties dialog box, switch to the Remote tab. 4. Click Allow remote connections to this computer. 5. Click OK to acknowledge that Remote Desktop Firewall exceptions will be enabled. 6. Click Select Users. 7. In the Remote Desktop Users dialog box, click Add. 8. In the Select Users or Groups dialog box, type in Student1 and click OK. 9. Click OK to add the ADATUM\Student1 account to the local Remote Desktop Users group on LON- SRV1. 10. Click OK to allow Remote Desktop connections. Task 4: Establish a Remote Desktop session with Remote Credential Guard enabled. 1. On LON-CL1, right-click Start and click Run. 2. In the Open text box, type mstsc. 3. In the Remote Desktop Connection dialog box, click Show options. 4. In the Computer text box, type LON-SVR1.adatum.com. 5. Ensure that [email protected]