Documentation
-
Replicating Directory Changes permission - Windows Server
Describes how to grant the "Replicating Directory Changes" permission for the Microsoft Metadirectory Services ADMA service account.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Published: December 12, 2017
Version: 1.1
Microsoft is releasing this security advisory to provide information regarding security settings for the AD DS (Active Directory Domain Services) account used by Azure AD Connect for directory synchronization. This advisory also provides guidance on what on-premises AD administrators can do to ensure that the account is properly secured.
Azure AD Connect lets customers synchronize directory data between their on-premises AD and Azure AD. Azure AD Connect requires the use of an AD DS user account to access the on-premises AD. This account is sometimes referred to as the AD DS connector account. When setting up Azure AD Connect, the installing administrator can either:
For Azure AD Connect to fulfill its function, the account must be granted specific privileged directory permissions (such as Write permissions to directory objects for Hybrid Exchange writeback, or DS-Replication-Get-Changes and DS-Replication-Get-Changes-All for Password Hash Synchronization). To learn more about the account, refer to article Azure AD Connect: Accounts and Permissions.
Suppose there is a malicious on-premises AD administrator with limited access to customer’s on-premises AD but has Reset-Password permission to the AD DS account. The malicious administrator can reset the password of the AD DS account to a known password value. This in turn allows the malicious administrator to gain unauthorized, privileged access to the customer’s on-premises AD.
Manage your on-premises AD following best practices
Microsoft recommends customers to manage their on-premises AD following the best practices described in the article Securing Active Directory Administrative Groups and Accounts. Where possible:
Lock down access to the AD DS account
Lock down access to the AD DS account by implementing the following permission changes in the on-premises AD:
Type | Name | Access | Applies To |
---|---|---|---|
Allow | SYSTEM | Full Control | This object |
Allow | Enterprise Admins | Full Control | This object |
Allow | Domain Admins | Full Control | This object |
Allow | Administrators | Full Control | This object |
Allow | Enterprise Domain Controllers | List Contents | This object |
Allow | Enterprise Domain Controllers | Read All Properties | This object |
Allow | Enterprise Domain Controllers | Read Permissions | This object |
Allow | Authenticated Users | List Contents | This object |
Allow | Authenticated Users | Read All Properties | This object |
Allow | Authenticated Users | Read Permissions | This object |
You can use the PowerShell script available at Prepare Active Directory Forest and Domains for Azure AD Connect Sync to help you implement the permission changes on the AD DS account.
To find if this vulnerability was made use of to compromise your AADConnect configuration, do the following:
An improvement has been added to Azure AD Connect version 1.1.654.0 (and after) to ensure that the recommended permission changes described under the section Lock down access to the AD DS account are automatically applied when Azure AD Connect creates the AD DS account:
To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.
Microsoft thanks the following for working with us to help protect customers:
The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Page generated 2017-08-07 15:55-07:00.
Documentation
Replicating Directory Changes permission - Windows Server
Describes how to grant the "Replicating Directory Changes" permission for the Microsoft Metadirectory Services ADMA service account.
Training
Module
Secure Windows Server user accounts - Training
Protect your Active Directory environment by securing user accounts to least privilege and placing them in the Protected Users group. Learn how to limit authentication scope and remediate potentially insecure accounts.
Certification
Microsoft Certified: Information Security Administrator Associate (beta) - Certifications
As an Information Security Administrator, you plan and implement information security of sensitive data by using Microsoft Purview and related services. You’re responsible for mitigating risks by protecting data inside collaboration environments that are managed by Microsoft 365 from internal and external threats and protecting data used by AI services. You also implement information protection, data loss prevention, retention, insider risk management, and manage information security alerts and activities.