Hello,
Thank you for posting the question on Microsoft Windows forum!
Based on your issue description of standard users being allowed to elevate their privileges improperly. There might be some possible causes for that as following:
- Incorrect Group Permissions – If the “Authenticated Users” or “Everyone” group has been mistakenly granted permissions to modify the Domain Admins group, any user can add themselves to it.
- Faulty Group Policy (GPO) Settings – A misconfigured GPO could be granting users unintended administrative privileges.
- Privileged Accounts Delegation Misconfiguration – Delegation settings may allow users to modify security groups, including Domain Admins.
- Unrestricted Admin Rights on the Domain Controller – If users are granted local admin rights on Domain Controllers, they may have the ability to modify AD settings directly.
- Weak or Incorrect Access Control List (ACL) Permissions – The ACL settings for Domain Admins may be improperly configured to allow unintended modifications.
- Compromised Accounts – If an attacker has gained access to an account with elevated privileges, they can change permissions to grant themselves admin rights.
Steps to mitigate the issue
- Audit Group Memberships – Run
Get-ADGroupMember -Identity "Domain Admins"
to check for unauthorized members.
Review ACL Permissions on Domain Admins – Use tools like dsacls
or Active Directory Users and Computers (ADUC) to review and restrict permissions.
- Check Group Policy Settings – running the command gpresult /h report.html to generate a GPO report for verifying any unintended policies affecting domain security.
- Review Delegated Permissions – Check delegated control settings to ensure no unexpected privilege assignments.
Preventative Measures:
- Restrict Admin Rights – Ensure only specific accounts have permission to modify privileged groups.
- Implement Least Privilege Access – Remove unnecessary permissions and enforce role-based access control (RBAC).
- Use a Privileged Access Management (PAM) Solution – Consider implementing Microsoft Privileged Identity Management (PIM) to limit who can modify security groups.
- Regular Security Reviews – Conduct periodic audits to check for anomalies in AD permissions.
Hope the above steps are informative!