ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Domaing Joining Windows Servers

    IT Discussion
    windows server infrastructure active directory domain
    6
    20
    2.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • EddieJenningsE
      EddieJennings
      last edited by

      So after my fellow MLs gave me pause about WSUS and suggested using GPO for managing patches for my Windows servers, I'm reminded of something I asked (surprisingly only a year ago) in SpiceWorks about domain joining servers. A year later, I'm a bit wiser, and am ready to explore this again (and have more authority to make infrastructure decisions).

      My hesitation about domain joining the local office servers is based on the fact this would open more ports for attack. However, the servers that are public facing (Spiceworks and the two VMs with IIS) are behind a firewall with NAT, and no ingress traffic would be allowed to them through the firewall that isn't HTTP/HTTPS. So perhaps it would be reasonable to think these servers wouldn't be as susceptible to attacks from the outside world. Since I've never compromised a server before, I'm not sure exactly how an attack would happen and spread over my network simply because a server is domain joined -- other than the fact some kind of malware gets installed that tries to communicate to other devices over X port.

      My hesitation about joining the data center servers (living behind a firewall with NAT) is the same with the added caveat that the connection between those servers and the local office is a site-to-site VPN. If those servers were to be domain joined, perhaps it would be best to have a read-only domain controller at the data center site.

      On the other hand, we've got by without having these servers as a part of a domain; however, I'm wary about simply saying "if it's not broke, don't fix it" or perhaps saying "if it works, why look at something different." No time like the present to start improving infrastructure.

      Below are the servers in question, should you want to opine about the merits and flaws of domain-joining your Windows servers.

      Local Office
      All workstations are domain-joined.
      Two physical servers

      • Sage server (is also a domain controller, DHCP, and print server) -- soon to become a VM and will only be the Sage server, no other roles
      • Hyper-V 2016 server (domain-joined)*
        1. Domain controller VM (has FSMO roles, is also a file server, NPS, and CA)
        2. Spiceworks VM
        3. Windows Server 2012 R2 VM (mimics production IIS server)
        4. Windows Server 2012 R2 VM (mimics production SQL server)
        5. Windows Server 2012 R2 VM (mimics production REDIS server)
        6. Windows Server 2012 R2 VM (used a demo site, has IIS / SQL / REDIS on it)
        7. Windows 7 VM
        8. CentOS 7 VM (wiki)
          *only the hypervisor and the DC VM are a part of the domain.

      Data Center
      Physical Servers (yes, you're reading right, few VMs -- decisions made before my rise to power)

      • Server 2012 R2 (IIS server)
      • Server 2012 R2 (SQL server)
      • Server 2012 R2 with Hyper-V role installed
        1. On the physical server itself Yosemite backup server is running
        2. Server 2012 R2 VM (REDIS)
        3. Ubuntu Server VM (Postfix)
      scottalanmillerS 1 Reply Last reply Reply Quote 0
      • coliverC
        coliver
        last edited by

        Wait... so nothing is part of the domain in your environment? Only the domain controller and the Hyper-V host?

        EddieJenningsE 1 Reply Last reply Reply Quote 1
        • EddieJenningsE
          EddieJennings @coliver
          last edited by

          @coliver said in Domaing Joining Windows Servers:

          Wait... so nothing is part of the domain in your environment? Only the domain controller and the Hyper-V host?

          The workstations are as is the Sage server / 2nd DC. But correct nothing else is and methinks despite the hesitation, that needs to change.

          1 Reply Last reply Reply Quote 0
          • coliverC
            coliver
            last edited by

            Yes, it should probably change. Central authentication/authorization is one of the key components of Active Directory (or LDAP). You'll be able to work with Group Policies, etc, etc. You will even have a decent password management platform.

            I really can't think of a single reason, outside of maybe internet facing servers (and then it's a stretch), that you wouldn't join your servers to the domain.

            EddieJenningsE 1 Reply Last reply Reply Quote 2
            • DashrenderD
              Dashrender
              last edited by

              Wow - I've rarely seen someone have so many server not be domain joined.

              WSUS wouldn't really help you in your current setup (at least not normally). WSUS is typically applied to devices through GPO. Since those servers are in AD, they don't have GPO. So you could manually put the WSUS info in, and those servers I guess could get managed by WSUS, I've never tried.

              The biggest reason to not domain join them in my mind, is personal security, not hacker security. i.e. your domain admins aren't allowed to access the box.
              Assuming they are - I'd join them up personally.

              EddieJenningsE 1 Reply Last reply Reply Quote 1
              • EddieJenningsE
                EddieJennings @coliver
                last edited by

                @coliver said in Domaing Joining Windows Servers:

                Yes, it should probably change. Central authentication/authorization is one of the key components of Active Directory (or LDAP). You'll be able to work with Group Policies, etc, etc. You will even have a decent password management platform.

                I really can't think of a single reason, outside of maybe internet facing servers (and then it's a stretch), that you wouldn't join your servers to the domain.

                That's why I linked the question from a year ago on SW. Now that I think about it, if I have good control over the traffic coming into my network from the Internet, it seems the opening of the ports necessary for AD isn't really a problem.

                coliverC 1 Reply Last reply Reply Quote 0
                • coliverC
                  coliver @EddieJennings
                  last edited by

                  @eddiejennings said in Domaing Joining Windows Servers:

                  @coliver said in Domaing Joining Windows Servers:

                  Yes, it should probably change. Central authentication/authorization is one of the key components of Active Directory (or LDAP). You'll be able to work with Group Policies, etc, etc. You will even have a decent password management platform.

                  I really can't think of a single reason, outside of maybe internet facing servers (and then it's a stretch), that you wouldn't join your servers to the domain.

                  That's why I linked the question from a year ago on SW. Now that I think about it, if I have good control over the traffic coming into my network from the Internet, it seems the opening of the ports necessary for AD isn't really a problem.

                  I guess I'm not understanding. Why would you open up ports? Your firewall should be closed to all inbound connections and you should approve things as they come up. Is your network wide open?

                  EddieJenningsE 1 Reply Last reply Reply Quote 2
                  • EddieJenningsE
                    EddieJennings @Dashrender
                    last edited by

                    @dashrender said in Domaing Joining Windows Servers:

                    Wow - I've rarely seen someone have so many server not be domain joined.

                    WSUS wouldn't really help you in your current setup (at least not normally). WSUS is typically applied to devices through GPO. Since those servers are in AD, they don't have GPO. So you could manually put the WSUS info in, and those servers I guess could get managed by WSUS, I've never tried.

                    The biggest reason to not domain join them in my mind, is personal security, not hacker security. i.e. your domain admins aren't allowed to access the box.
                    Assuming they are - I'd join them up personally.

                    Yeah, considering WSUS made me take a step back and ask "Why am I still following the design of [insert predecessor] and keeping these machines off the domain?"

                    DashrenderD 1 Reply Last reply Reply Quote 1
                    • DashrenderD
                      Dashrender @EddieJennings
                      last edited by

                      @eddiejennings said in Domaing Joining Windows Servers:

                      Yeah, considering WSUS made me take a step back and ask "Why am I still following the design of [insert predecessor] and keeping these machines off the domain?"

                      Right, Again there can be reasons to not put them on the domain, but look at all the big deployments - I know you can't really - they do domain join everything they can. Using AD as the central authentication, along with the AD suite is one of the major advantages of the MS ecosystem (of course, nix also has these features/functions). Not domain joining just makes everything an island.

                      1 Reply Last reply Reply Quote 0
                      • EddieJenningsE
                        EddieJennings @coliver
                        last edited by

                        @coliver said in Domaing Joining Windows Servers:

                        @eddiejennings said in Domaing Joining Windows Servers:

                        @coliver said in Domaing Joining Windows Servers:

                        Yes, it should probably change. Central authentication/authorization is one of the key components of Active Directory (or LDAP). You'll be able to work with Group Policies, etc, etc. You will even have a decent password management platform.

                        I really can't think of a single reason, outside of maybe internet facing servers (and then it's a stretch), that you wouldn't join your servers to the domain.

                        That's why I linked the question from a year ago on SW. Now that I think about it, if I have good control over the traffic coming into my network from the Internet, it seems the opening of the ports necessary for AD isn't really a problem.

                        I guess I'm not understanding. Why would you open up ports? Your firewall should be closed to all inbound connections and you should approve things as they come up. Is your network wide open?

                        The opening of ports refers to the servers themselves, not the firewall. A non-domain joined server isn't going to be listening for traffic on X ports that would be open on a server that's part of a domain.

                        DashrenderD scottalanmillerS 2 Replies Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @EddieJennings
                          last edited by

                          @eddiejennings said in Domaing Joining Windows Servers:

                          @coliver said in Domaing Joining Windows Servers:

                          @eddiejennings said in Domaing Joining Windows Servers:

                          @coliver said in Domaing Joining Windows Servers:

                          Yes, it should probably change. Central authentication/authorization is one of the key components of Active Directory (or LDAP). You'll be able to work with Group Policies, etc, etc. You will even have a decent password management platform.

                          I really can't think of a single reason, outside of maybe internet facing servers (and then it's a stretch), that you wouldn't join your servers to the domain.

                          That's why I linked the question from a year ago on SW. Now that I think about it, if I have good control over the traffic coming into my network from the Internet, it seems the opening of the ports necessary for AD isn't really a problem.

                          I guess I'm not understanding. Why would you open up ports? Your firewall should be closed to all inbound connections and you should approve things as they come up. Is your network wide open?

                          The opening of ports refers to the servers themselves, not the firewall. A non-domain joined server isn't going to be listening for traffic on X ports that would be open on a server that's part of a domain.

                          This is true, but these ports are pretty locked down just like port 80 and 443 are locked down. Short of finding a vulnerability, there's not that much to worry about. Of course, don't have open ports just to have open ports either.

                          1 Reply Last reply Reply Quote 1
                          • coliverC
                            coliver
                            last edited by

                            IIRC, and it's been awhile, but I'm pretty sure that LDAP clients reach out to domain servers. So the only thing that would need additional ports open would be the domain controller, which already has those ports open. The only ones that need to be opened are 389 and maybe 636 if you're doing LDAPS.

                            EddieJenningsE scottalanmillerS 2 Replies Last reply Reply Quote 2
                            • EddieJenningsE
                              EddieJennings @coliver
                              last edited by

                              @coliver said in Domaing Joining Windows Servers:

                              IIRC, and it's been awhile, but I'm pretty sure that LDAP clients reach out to domain servers. So the only thing that would need additional ports open would be the domain controller, which already has those ports open. The only ones that need to be opened are 389 and maybe 636 if you're doing LDAPS.

                              Which is further drawing into question my hesitations of the past, and I'd of course not have domain controllers receiving any traffic from the outside world that doesn't travel over some kind of tunnel.

                              1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @EddieJennings
                                last edited by

                                @eddiejennings said in Domaing Joining Windows Servers:

                                So after my fellow MLs gave me pause about WSUS and suggested using GPO for managing patches for my Windows servers...

                                I'd look at Salt or Ansible for this. Or wait for Sodium, as they plan to do it.

                                1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller
                                  last edited by

                                  No need to domain join Spiceworks. You could just leave that out.

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @EddieJennings
                                    last edited by

                                    @eddiejennings said in Domaing Joining Windows Servers:

                                    @coliver said in Domaing Joining Windows Servers:

                                    @eddiejennings said in Domaing Joining Windows Servers:

                                    @coliver said in Domaing Joining Windows Servers:

                                    Yes, it should probably change. Central authentication/authorization is one of the key components of Active Directory (or LDAP). You'll be able to work with Group Policies, etc, etc. You will even have a decent password management platform.

                                    I really can't think of a single reason, outside of maybe internet facing servers (and then it's a stretch), that you wouldn't join your servers to the domain.

                                    That's why I linked the question from a year ago on SW. Now that I think about it, if I have good control over the traffic coming into my network from the Internet, it seems the opening of the ports necessary for AD isn't really a problem.

                                    I guess I'm not understanding. Why would you open up ports? Your firewall should be closed to all inbound connections and you should approve things as they come up. Is your network wide open?

                                    The opening of ports refers to the servers themselves, not the firewall. A non-domain joined server isn't going to be listening for traffic on X ports that would be open on a server that's part of a domain.

                                    A domain joined one isn't either. AD does not reach out to clients. The clients reach out to the servers, and the servers are already opened up.

                                    1 Reply Last reply Reply Quote 1
                                    • scottalanmillerS
                                      scottalanmiller @coliver
                                      last edited by

                                      @coliver said in Domaing Joining Windows Servers:

                                      IIRC, and it's been awhile, but I'm pretty sure that LDAP clients reach out to domain servers. So the only thing that would need additional ports open would be the domain controller, which already has those ports open. The only ones that need to be opened are 389 and maybe 636 if you're doing LDAPS.

                                      Correct, the clients do not "listen" in any way.

                                      1 Reply Last reply Reply Quote 0
                                      • ObsolesceO
                                        Obsolesce
                                        last edited by

                                        Seems odd you'd have the least secure systems on the domain, the client computers... and not have the most secure systems on the domain, the servers. With your DC and hypervisor being on the domain, how many times have those been compromised? Do you not update your servers? Do they all have internet access

                                        EddieJenningsE 1 Reply Last reply Reply Quote 0
                                        • EddieJenningsE
                                          EddieJennings @Obsolesce
                                          last edited by

                                          @tim_g said in Domaing Joining Windows Servers:

                                          Seems odd you'd have the least secure systems on the domain, the client computers... and not have the most secure systems on the domain, the servers. With your DC and hypervisor being on the domain, how many times have those been compromised? Do you not update your servers? Do they all have internet access

                                          1. To my knowledge they haven't been.
                                          2. No. All servers receive Windows updates.
                                          3. Yes.

                                          And I agree, this is odd. This, and so many other things, are being fixed one bite at a time.

                                          J 1 Reply Last reply Reply Quote 0
                                          • J
                                            Jimmy9008 @EddieJennings
                                            last edited by

                                            @eddiejennings said in Domaing Joining Windows Servers:

                                            @tim_g said in Domaing Joining Windows Servers:

                                            Seems odd you'd have the least secure systems on the domain, the client computers... and not have the most secure systems on the domain, the servers. With your DC and hypervisor being on the domain, how many times have those been compromised? Do you not update your servers? Do they all have internet access

                                            1. To my knowledge they haven't been.
                                            2. No. All servers receive Windows updates.
                                            3. Yes.

                                            And I agree, this is odd. This, and so many other things, are being fixed one bite at a time.

                                            Set your firewall to drop outbound traffic from servers that don't need Internet access. Point those servers to a local WSUS server for updates. Allow the WSUS server to get out to Internet. You can set local policy and point servers to WSUS, if they aren't domain joined. That way, servers can be updated but lower attack vector as they cannot get online.

                                            1 Reply Last reply Reply Quote 0
                                            • 1 / 1
                                            • First post
                                              Last post