Configure an AD decoy account
You can configure a decoy Active Directory (AD) account that appeals to threat actors by appearing as a legitimate user.
- Do not start this procedure if you are in the deployment phase. Your Concierge Security® Team (CST) will determine if this is appropriate for your organization.
- Arctic Wolf does not recommend using the AD decoy account settings for all AD accounts. The AD decoy account is specifically configured to entice threat actors. Configure other AD accounts with the appropriate security measures.
These actions are required:
- Make sure your deployment phase is complete.
- Discuss this feature with your CST to determine if it is right for your organization.
Create an AD decoy account
If you have any old disabled accounts, you can reuse them as decoy accounts because attributes have populated data, for example, LastLogon and badPwdCount. If not, you can proceed with creating a new account to use as a decoy.
Configure AD decoy account properties
Configure Azure AD Connect sync filtering
Do not complete these steps if:
- You are using an OU for the AD decoy account that is not set to sync.
- You do not use a hybrid Microsoft Entra ID.
If you use a hybrid Microsoft Entra ID, you must configure filtering with Azure AD Connect sync to prevent syncing the decoy account with Microsoft Entra ID. Microsoft Entra ID does not support the Logon Hours setting configured for the decoy account. If the decoy account is synced between Microsoft Entra ID and on-prem AD, the logon restriction is ignored and the account can be accessed. See Azure AD Connect sync: Configure filtering for more information.
Configure a service principal name
Arctic Wolf recommends setting up a service principal name (SPN) that is not actively used within your organization. No legitimate connections should ever request a ticket for this service.
When configuring the SPN, choose a service class that matches the type of account you are creating. For example, for a temporary web administrator account, choose HTTP.
To configure the SPN, you must choose a service class name. In general, this can be any unique string. We recommend using a name that fits the naming convention of other services in your environment. Adding svc as a prefix or suffix to an arbitrary unique name can be a sufficient target that looks attractive for threat actors. If you do not have any services that have a generic name such as MSSQLsvc, you can add TERMSRV, HOST or pssvc as a prefix or suffix.
For more information about setting an SPN or creating a name, see Setspn and Name Formats for Unique SPNs - Win32 apps.
Configure an SPN using the command line
setspn -U -S <service_class>/<hostname> <username>
Where:
- service_class is the unique string that identifies the general class of service. For example,
HTTP. - hostname is the name of the host. If the host is a server, use the fully qualified name.
- username is the username for the decoy account.
setspn -U -S HTTP/webtemp.mydomain.local admin-webtemp
Configure an SPN using the attribute editor
Verify AD decoy account configuration
Arctic Wolf recommends running this from the DC.