Skip to main content

Active Directory - Privilege Escalation Attack Mitigation

Summary

The dataview is created to verify the workaround applied and the installation of all necessary patches in order to mitigate and detect Active Directory privilege escalation attacks. It will present the names of the computer accounts with non-compliant sAMAccountNames as well. Essentially, it populates the information fetched by the Workaround - Active Directory Privilege Escalation Attack [DV] script.

Dependencies

Workaround - Active Directory Privilege Escalation Attack [DV]

Columns

ColumnDescription
Client NameName of the Client.
Location NameName of the Location.
Computer NameName of the Computer or Domain Controller.
DomainName of the Domain.
Operating SystemOperating System of the Machine.
KB5008602 StatusOnly applicable for Windows Server 2019. "Installed" or "Missing" depending on the installation status of KB5008602 or its superseded version KB5008218.
KB5008380 Status"Installed" or "Missing" depending on the installation status of the CVE-2021-42287 patches or their superseded version.
KB5008102 Status"Installed" or "Missing" depending on the installation status of the CVE-2021-42278 patches or their superseded version.
Missing PatchesPatches that are needed by the machine in order to apply the mitigation as per KB5008380 Status and KB5008102 Status.
CVE-2021-42287 WorkaroundStatus of the PacRequestorEnforcement registry key.
Non-compliant sAMAccountNameTo find computer accounts that have a non-compliant sAMAccountName.
Non-compliant UAC sAMAccountTypeTo find computer accounts that have a non-compliant UAC sAMAccountType.
Information Update TimeRun-time of the script.
Last ContactLast contact of the Computer.