Charlie Sullivan
Principal Windows Systems Administrator
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CAEuHzzny5L7_av%2B%2B%3D6MSGZ-C1_DgjBMERAF0RqqYK1TvAf7kvQ%40mail.gmail.com.
On Jun 11, 2025, at 4:06 PM, Kurt Buff <kurt...@gmail.com> wrote:
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce5v5OSNW9hwYQ-HscTA_b%3DnKff9e4z4mZt6yZm5L_yPYQ%40mail.gmail.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/82360C27-B398-4652-B740-344D11EF4873%40gmail.com.
Classification: Public
| EXTERNAL SENDER:
Do not click any links or open any attachments unless you trust the sender and know the content is safe. EXPÉDITEUR EXTERNE: Ne cliquez sur aucun lien et n’ouvrez aucune pièce jointe à moins qu’ils ne proviennent d’un expéditeur fiable, ou que vous ayez l'assurance que le contenu provient d'une source sûre. |
Hi
AD is based on Kerberos. You can log in with user+password or certificates. The only solutions I am aware of to log in using "password+something else" only protect specific workstations: You require a successfull AD login and then MFA to log in on console or via RDP.
So... if you want real MFA for your users, you will need to use certificate based authentication using smartcards or something with smartcard emulation (I have experience using some models of Yubikeys with PIV support) and dont tell the users the password.
Once you are logged into the workstation, if it is domain joined, Windows cares about SSO to other domain joined machines or any system using Kerberos like Omnissa (vmware) Horizon for VDI or ADFS.
Best regards
Seve
Von: 'Charles F Sullivan' via ntsysadmin <ntsys...@googlegroups.com>
Gesendet: Mittwoch, 11. Juni 2025 21:12
An: ntsys...@googlegroups.com
Betreff: [ntsysadmin] 2FA for AD?
-!-!-!- EXTERNAL EMAIL -!-!-!- This email originated from outside of SKAN. Do not click links or open attachments unless you recognize the sender and know the content is safe
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
ntsysadmin+...@googlegroups.com.
To view this discussion visit
https://groups.google.com/d/msgid/ntsysadmin/CAEuHzzny5L7_av%2B%2B%3D6MSGZ-C1_DgjBMERAF0RqqYK1TvAf7kvQ%40mail.gmail.com.
Looked into this recently and it's not simple and certainly not part of native windows, they think Windows hello PIN is a secure method.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/DBBP189MB1340E7870A4CBD32AF1D6862E974A%40DBBP189MB1340.EURP189.PROD.OUTLOOK.COM.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CADnfctzL2ZwebuL9m1R-4hAXR5FB0RhSq4VSVq2YiD0JiL6_xw%40mail.gmail.com.
DUO.
Philip Elder MCTS
Senior Technical Architect
Microsoft High Availability MVP
MPECS Inc.
E-mail: Phili...@mpecsinc.ca
Phone: +1 (780) 458-2028
Web: www.mpecsinc.com
Blog: blog.mpecsinc.com
Twitter: Twitter.com/MPECSInc
Skype: MPECSInc.
Please note: Although we may sometimes respond to email, text and phone calls instantly at all hours of the day, our regular business hours are 8:00 AM - 5:00 PM, Monday thru Friday.
--
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/efd4673f3bf14e888841c76eb571459b%40MPECSInc.Ca.
We have DUO set up to prompt on:
This last one can be a struggle for admins if not used to managing servers with UAC prompting on the Secure Desktop.
We use a local password manager with auto-type for those prompts. It makes it easier to get through the first few with a couple of quick clicks.
For RDP sessions always Window the RDP session never full-screen as UAC on the Secure Desktop will refuse paste in for the auto-type credentials.
Group Policy and Privileged Access Workstation are also key in the security matrix.
Philip Elder MCTS
Senior Technical Architect
Microsoft High Availability MVP
MPECS Inc.
E-mail: Phili...@mpecsinc.ca
Phone: +1 (780) 458-2028
Web: www.mpecsinc.com
Blog: blog.mpecsinc.com
Twitter: Twitter.com/MPECSInc
Skype: MPECSInc.
Please note: Although we may sometimes respond to email, text and phone calls instantly at all hours of the day, our regular business hours are 8:00 AM - 5:00 PM, Monday thru Friday.
From: 'Charles F Sullivan' via ntsysadmin <ntsys...@googlegroups.com>
Sent: Monday, June 16, 2025 13:50
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] 2FA for AD?
We actually use DUO here for AnyConnect VPN second factor. It does authenticate against AD, but it's not "for AD". Another group is responsible for it and we mostly give them guidance for connecting it to AD.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CAEuHzzkLsZWo5jTRgCMFj98vDDNYatz86YVFjyTcJ7o54BeLFg%40mail.gmail.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CAEuHzzkLsZWo5jTRgCMFj98vDDNYatz86YVFjyTcJ7o54BeLFg%40mail.gmail.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/7b287aba39cd416c9ac2d942a1b4e61b%40MPECSInc.Ca.
This is the biggest black-eye against both Microsoft and the G00g for destroying the Trustworthy Computing (TwC) initiative by installing into %AppData% where no elevation, or restrictions out of the box, is required.
Group Policy Software Restrictions are needed to block this behaviour.
It really p*ssed me off when they did that.
How did I find out?
User: My desktop is really slow this morning.
Me: I'll check.
* After logging on to the Session Host (RDS) I saw one user with a crap load of Chrome instances opened.
A bit of investigation brought about the realization that the buggers were slipping it into a location that was never meant to host .EXEs! 😝
Da'Bums
Philip Elder MCTS
Senior Technical Architect
Microsoft High Availability MVP
MPECS Inc.
E-mail: Phili...@mpecsinc.ca
Phone: +1 (780) 458-2028
Web: www.mpecsinc.com
Blog: blog.mpecsinc.com
Twitter: Twitter.com/MPECSInc
Skype: MPECSInc.
Please note: Although we may sometimes respond to email, text and phone calls instantly at all hours of the day, our regular business hours are 8:00 AM - 5:00 PM, Monday thru Friday.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/69C4763312FB4BAC90E62B200189106E%40Firefly.