# hardening

## Document and audit&#x20;

* Naming conventions of OUs, computers, users, groups.&#x20;
* DNS, network, and DHCP config&#x20;
* GPOs&#x20;
* A list of enterprises hosts&#x20;
* Any trust relationship&#x20;
* Users who have elevated permissions.&#x20;

## AD hardening categories&#x20;

* People&#x20;
* Processes&#x20;
* Technology&#x20;

## Additional AD hardening techniques&#x20;

**Creating an AD snapshot with AD explorer**&#x20;

* Use valid domain credentials to login&#x20;

**PingCastle**&#x20;

It is a powerful to evaluates the security posture of an AD environment and provides several different maps and graphs. PingCastle can be a great resource to help you gather one in a nice user-readable map of the domain and it also provides a detailed report of the target domain's security level using a methodology based on a risk assessment framework.&#x20;

```
.\PingCastle.exe -h
```

[**Group3r**](https://github.com/Group3r/Group3r)&#x20;

* This tool can find vulnerabilities in Active Directory associated Group Policy. Group3r must run from domain-joined host with a domain user.&#x20;

[**ADRecon**](https://github.com/adrecon/ADRecon)**.ps1**&#x20;

It is useful to gather large amount of data from AD at once&#x20;

```
.\ADRecon.ps1
```
