SV-87467r1_rule
V-72821
AD.0016
AD.0016
CAT II
10
Windows Server 2016 with domain functional levels of Windows Server 2016:
Open "Active Directory Administrative Center".
Right-click on the domain name and select "Properties".
Select "Enable rolling of expiring NTLM secrets during sign on, for users who are required to use Microsoft Passport or smart card for interactive sign on".
Active Directory domains not at a Windows Server 2016 domain functional level:
Rotate the NT hash for smart card-enforced accounts every 60 days.
This can be accomplished with the use of scripts.
DoD PKI-PKE has provided a script under PKI and PKE Tools at http://iase.disa.mil/pki-pke/Pages/tools.aspx. See the User Guide for additional information.
NSA has also provided a PowerShell script with Pass-the-Hash guidance at https://github.com/iadgov/Pass-the-Hash-Guidance. Running the "Invoke-SmartcardHashRefresh" cmdlet in the "PtHTools" module will trigger a change of the underlying NT hash. See the site for additional information.
Manually rolling the NT hash requires disabling and re-enabling the "Smart Card required for interactive logon" option for each smart card-enforced account, which is not practical for large groups of users.
Windows Server 2016 with a domain functional level of Windows Server 2016:
Open "Active Directory Administrative Center".
Right-click on the domain name and select "Properties".
If the "Domain functional level:" is not "Windows Server 2016", another method must be used to reset the NT hashes. See below for other options.
If the "Domain functional level:" is "Windows Server 2016" and "Enable rolling of expiring NTLM secrets during sign on, for users who are required to use Microsoft Passport or smart card for interactive sign on" is not checked, this is a finding.
Active Directory domains with a domain functional level below Windows Server 2016:
Verify the organization rotates the NT hash for smart card-enforced accounts every 60 days.
This can be accomplished with the use of scripts.
DoD PKI-PKE has provided a script under PKI and PKE Tools at http://iase.disa.mil/pki-pke/Pages/tools.aspx. See the User Guide for additional information.
NSA has also provided a PowerShell script with Pass-the-Hash guidance at https://github.com/iadgov/Pass-the-Hash-Guidance. Running the "Invoke-SmartcardHashRefresh" cmdlet in the "PtHTools" module will trigger a change of the underlying NT hash. See the site for additional information.
Manually rolling the NT hash requires disabling and re-enabling the "Smart Card required for interactive logon" option for each smart card-enforced account, which is not practical for large groups of users.
If NT hashes for smart card-enforced accounts are not rotated every 60 days, this is a finding.
V-72821
False
AD.0016
Windows Server 2016 with a domain functional level of Windows Server 2016:
Open "Active Directory Administrative Center".
Right-click on the domain name and select "Properties".
If the "Domain functional level:" is not "Windows Server 2016", another method must be used to reset the NT hashes. See below for other options.
If the "Domain functional level:" is "Windows Server 2016" and "Enable rolling of expiring NTLM secrets during sign on, for users who are required to use Microsoft Passport or smart card for interactive sign on" is not checked, this is a finding.
Active Directory domains with a domain functional level below Windows Server 2016:
Verify the organization rotates the NT hash for smart card-enforced accounts every 60 days.
This can be accomplished with the use of scripts.
DoD PKI-PKE has provided a script under PKI and PKE Tools at http://iase.disa.mil/pki-pke/Pages/tools.aspx. See the User Guide for additional information.
NSA has also provided a PowerShell script with Pass-the-Hash guidance at https://github.com/iadgov/Pass-the-Hash-Guidance. Running the "Invoke-SmartcardHashRefresh" cmdlet in the "PtHTools" module will trigger a change of the underlying NT hash. See the site for additional information.
Manually rolling the NT hash requires disabling and re-enabling the "Smart Card required for interactive logon" option for each smart card-enforced account, which is not practical for large groups of users.
If NT hashes for smart card-enforced accounts are not rotated every 60 days, this is a finding.
M
870