Securing WinRM over HTTPS [Windows Server 2019]

preview_player
Показать описание
Securing WinRM over HTTPS [Windows Server 2019]
I (tobor), cover how to configure WinRM over HTTPS in an Windows environment using Group Policy on Windows Server 2019 domain environment consisting of a Domain Controller and a Certificate Authority. If you like what you see please Subscribe!

0:00 Intro Summary
0:52 BTPS SecPack policy settings that will be covered
1:00 Create a group policy
1:21 Assign Group Policy to OU
1:30 Edit Group Policy settings
1:47 Security Filtering permissions on GPO policy
2:05 Delegation permission on GPO Policy
2:18 Policy Setting Services WinRM
3:00 Permissions required to start a service using "Log on as service"
3:41 Recovery Tab on Services
3:54 Policy Setting Create Registry Value
5:22 Policy Setting Network Connections for WMI (optional)
6:04 Policy Setting Allow inbound remote administration exception (optional)
6:24 Policy Setting Allow ICMP Exceptions (optional)
6:41 Policy Setting Credential Delegation
6:52 CredSSP Summary Example Windows Admin Center
7:23 Policy Setting Encryption Oracle Remediation
7:52 Policy Setting Allow Delegate Fresh Credentials
9:08 Policy Setting Allow Delegate Fresh Credentials using NTLM-only Server Authentication
9:30 Windows Components Remote Management
9:58 Policy Setting WinRM Client
12:30 Policy Setting Trusted Hosts
13:07 Policy Setting WinRM Service
13:21 Policy Setting Allow Remote Server Management with WinRM
15:17 Policy Setting Disallow WinRM from storing runas credentials
15:51 Turn on Compatibility HTTP/HTTPS Listener
16:35 Create WinRM SSL Certificate Template
17:02 Duplicate Web Server Cert Template
17:10 Compatability Tab
17:25 General Tab
17:40 Request Handling Tab
18:12 Cryptography Tab
18:27 Security Tab
19:09 Subject Name Tab
20:11 DC Replication to access new template quicker
20:41 Sites and Services
20:52 Force Replication
21:10 Local Computer Cert Manager
21:19 Request New Certificate for WinRM
21:51 Enumerate WinRM cert used with port 5986
22:07 Change Listener Certificate for WinRM
22:20 Delete current certificate associated with port 5986
22:45 Assign certificate to WinRM over HTTPS
24:00 Verify cert assigned to port
24:20 BTPS Secpack command reference
24:39 If incorrect CN name on cert is set, this happens
25:32 Loopback listener is not configured for WinRM service to attach to on my instance
26:00 Invoke-Command Example using WinRM over HTTPS
26:25 WinRM port 5985 is disabled in my instance

View my Verified Certifications!

Follow us on GitHub!

Official Site

Give Respect on HackTheBox!

Like us on Facebook!

View PS Gallery Modules!

The B.T.P.S. Security Package
Рекомендации по теме
Комментарии
Автор

Much Appreciated! Just something to note, that registry key on that website, the website is down. I had to manually type it in LOL.

TheOneWhiteST
Автор

Thank you your video helped so much :)

brittanysikora
Автор

You skipped New > Certificate Template to Issue under Certsrv after creating the template.

TayschrennSedai
Автор

Hi, I don't understand what the registry key is for. Can you elaborate?

rob-ktyl
Автор

Hi, what I don't understand, does the GPO only need to be linked to the DCs?

morothan