Active Directory: Authentication Policies and Authentication Policy Silos

In this post we will be going through setting up a authentication policies / authentication policy silos.

Microsoft Active Directory (AD) Authentication Policies and Authentication Policy Silos are security features designed to enhance authentication processes and protect sensitive accounts in an Active Directory environment.

  • Authentication Policies provide granular control over authentication methods and restrictions, ensuring that only authorized users and devices can access resources.
  • Authentication Policy Silos, allow administrators to group sensitive accounts and applying specific authentication policies to these groups to mitigate the security risk.

With these policies set it will help with protecting from unauthorized access and reducing the potential impact of security breaches.

https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/authentication-policies-and-authentication-policy-silos

First to allow the use of these policies we need to enabled the KDC support for claims, compound authentication, and Kerberos armoring on all domain controllers.

The policy setting is under

Computer Configuration > Administrative Templates > System > KDC

This needs to be set to enabled and supported.

KDC Policy

We also need to enabled the Kerberos client support for claims, compound authentication, and Kerberos armoring on clients.

The policy setting is under

Computer Configuration > Administrative Templates > System > Kerberos

Kerberos Policy

We can either apply individually or at the root level of the domain. I applied at the root level of the domain and apply the KDC policy directly on the domain controller OU.

The clients and DC’s will require a reboot for the policy to apply.

Authentication policy and policy silos are configured using Active Directory Administrative center (ADAC).

The polices containers are located under Authentication.

ADAC Authentication

Authentication policies control the following:

  • The ticket granting ticket (TGT) lifetime for the account, which is set to be non-renewable.
  • The criteria that device accounts need to meet to sign in with a password or a certificate.
  • The criteria that users and devices need to meet to authenticate to run services as a specific account.

First step is we need to create a new authentication policy.

ADAC Creating Authentication Policy

Set a policy name, protect from accidental deletion and if the policy is in audit or enforced mode. In production in would use audit and review the event logs to confirm the restrictions work as expect before setting to enforce.

Authentication Policy

Next we need to set what the policy will be applied against. These can be

  • User Accounts
  • Service accounts
  • Computer accounts

In this example we will be using users sign on policy to reduce the ticket granting ticket lifetime (TGT) time to 90 minutes.

User TGT Lifetime

Next we will configure the Authentication Policy Silos,

ADAC Authentication Policy Silo

Give the Silo a

  • Name
  • Set to audit or enforce
  • Add the permitted accounts
  • Set the authentication policy
Create Authentication Policy Silo

Next we need to set the silo policy on the accounts. This can be done by selecting the accounts from ADAC and going to silo.

Then select the required silo policy to apply.

Setting Authentication Policy Silo

We can checked the msDS-AssignedAuthNPolicySilo & msDS-AuthNPolicySiloMembersBL attributes on the accounts that have the silo applied to confirm.

msDS attributes

Last step is to go back to the authentication policy and update the user sign on condition.


Access Conditions

Set to AuthenticationSilo, equals and set the silo name to the one we created.

Create control conditions
Access Conditions

The DC may also need to have the kerbros ticket purged before the policies will apply this can be done by using klist purge

List Kerberos tickets

Now when we try to logon to the server in the silo it should be allowed. We can also use whoami /claims to see if the claims is applied.

Whoami claims

If we try logon to another devices with the same account outside of the silo we should be blocked.

Windows 11 client blocking access

To troubleshoot or audit, we can enabled Audit user / device claims using group policy. The policy is setting is under Policies > Windows Settings > Security Settings > Advanced Auditing Policy Configuration > Logon/Logoff

Advanced Audit Policy

We can check under the security logs on the DC for Eventid 4626

Claims Event logs

We can also enabled Authentication policy failures and success, this will need to be done on all DC’s. The logs are under
Microsoft > Windows >Authentication/AuthenticationPolicyFailures-DomainController

This will then log the accounts that are failing to be issue a TGT.

Authentication User event logs

This has been a quick overview of creating an authentication silo, setting this up can be a bit tricky.

I did have issue getting the policy silo to work due to existing TGT but once configured it can really help with locking down access to tier 0 devices.

Azure Migrate VMware (Agentless) Replication ErrorID 181009

During a recent migration we have been having issues with Azure Migrate VMware (Agentless) where the replication would start failing intermittently with ErrorID 181009 and Error Message:

ErrorCode: ‘1028’ VM: ‘ServerName’. Appliance: ‘ApplianceName’. Disk Id: ”. Disk path: ‘vmdk’. Error: The operation VirtualDiskSnapshotOpen failed with the error ‘Unknown error’ [Unknown error]

Replication failures
  • We had checked all the correct permission had been applied.
  • Also confirmed that we were running the VDDK 7.0 for vSphere 7.
  • Confirm the password for the account didn’t contain unsupported special characters.

We used the troubleshooting link below but there was no issue listed that matched our issues.

https://learn.microsoft.com/en-us/azure/migrate/vmware/troubleshoot-changed-block-tracking-replication?context=%2Fazure%2Fmigrate%2Fcontext%2Fvmware-context#an-internal-error-occurred

During troubleshooting with VMware / Azure support we end up having to download the VMware VDDK 8.0, delete the existing VDDK from “C:\Program Files\VMware\VMware Virtual Disk Development\” and updating this with the VDDK 8.0 version.

The link to the VMware VDDK is https://developer.broadcom.com/sdks/vmware-virtual-disk-development-kit-vddk/latest/

This fixed the replication issues.