Thank you for participating.
- Your AD is not located in a DMZ and the AD Servers usually have internet access
- Every local administrator's password on every machine is the same and the local administrator accounts are never disabled.
- Still people remote into Domain controllers to get work done in AD
- Its a practice to add users to local administrative group at the time of user on-boarding.
- Possibility of NTLM authentication being used! Trusting it to be secure.
- Trust the existing AD password conditions, no black listing passwords for AD and other applications
- Permission once given in AD/FS/workgroup machines, stays forever. No one audits such activities
- Ghost accounts appeared suddenly as AD/local accounts were not clean.
- Does your organization come under the purview of compliance mandates such as SOX, HIPAA, PCI DSS, FISM, GLBA, and GDPR?
- Are you worried about privilege creep, i.e., users gaining excessive access rights?