Protected Users is a global security group for Active Directory (AD) designed to protect against credential theft attacks. The group triggers non-configurable protection on devices and host computers to prevent credentials from being cached when group members sign-in.
Your system must meet the following prerequisites before you can deploy a Protected Users group:
The built-in domain Administrator, S-1-5--500 , is always exempt from Authentication Policies, even when they're assigned to an Authentication Policy Silo. For more information, see How to Configure Protected Accounts.
Becoming a member of the Protected Users group means AD automatically applies certain pre-configured controls that the users won't be able to change unless they stop being group members.
When the signed in user is a member of the Protected Users group, the group provides the following protections:
After you add a new user account to the Protected Users group, these protections will activate when the new Protected User signs in to their device.
Protected User accounts that authenticate to a domain running Windows Server 2012 R2 or later are unable to do the following:
The Protected Users group applies non-configurable settings to TGT expiration for every member account. Normally, the domain controller sets the TGT lifetime and renewal based on the following two domain policies:
For Protected Users members, the group automatically sets these lifetime limits to 600 minutes. The user can't change this limit unless they leave the group.
You can add users to the Protected Users group using the following methods:
Members of the Protected Users group can only authenticate using Kerberos with Advanced Encryption Standards (AES). This method requires AES keys for the account in Active Directory. The built-in Administrator doesn't have an AES key unless the password for the domain running Windows Server 2008 or later changes. Any account who has their password changed by a domain controller running an earlier version of Windows Server is locked out of authentication.
To avoid lockouts and missing AES keys, we recommend you follow these guidelines:
Domain controllers that run an operating system earlier than Windows Server 2012 R2 can support adding members to the new Protected User security group. This way, these members can benefit from device protections before you upgrade the domain.
Domain controllers running earlier versions of Windows Server 2012 R2 don't support domain protections.
To create a Protected Users group on a domain controller running an earlier version of Windows Server:
After that, users can benefit from device protections before you upgrade the domain.
The following table specifies the Active Directory properties of the Protected Users group.
Attribute | Value |
---|---|
Well-known SID/RID | S-1-5-21--525 |
Type | Domain Global |
Default container | CN=Users, DC=, DC= |
Default members | None |
Default member of | None |
Protected by ADMINSDHOLDER? | No |
Safe to move out of default container? | Yes |
Safe to delegate management of this group to non-service admins? | No |
Default user rights | No default user rights |
Two operational administrative logs are available to help troubleshoot events that are related to Protected Users. These new logs are located in Event Viewer and are disabled by default, and are located under Applications and Services Logs\Microsoft\Windows\Authentication.
To enable capturing these logs: