In Windows 2000 and AD, groups have the same function that they have in Windows NT or other OSs: You put a user in a group to control that user's access to resources. You put a user in an OU to control who has administrative authority over that user.
To understand the difference between groups and OUs, consider this: Objects with SIDs (i.e., users, groups, and computers) can act on objects and be granted authority. Groups have a SID, and OUs don't.
KeyName : Software\Policies\Microsoft\Windows\SrpV2\Exe\a61c8b2c-a319-4cd0-9690-d2177cad7b51
ValueName : Value
ValueType : REG_SZ
ValueLength : 700
ValueData : <FilePathRule Id="a61c8b2c-a319-4cd0-9690-d2177cad7b51" Name="(Default Rule) All files located in the
Windows folder" Description="Allows members of the Everyone group to run applications that are located
in the Windows folder." UserOrGroupSid="S-1-1-0" Action="Allow"><Conditions><FilePathCondition
Path="%WINDIR%\*"/></Conditions></FilePathRule>
PS C:\Users\Administrator> Get-ChildItem "HKLM:Software\Policies\Microsoft\Windows\SrpV2\Exe"
Hive: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\SrpV2\Exe
Name Property
---- --------
921cc481-6e17-4653-8f75-050b80 Value : <FilePathRule Id="921cc481-6e17-4653-8f75-050b80acca20" Name="(Default Rule) All files located in the Program Files folder" Description="Allows
acca20 members of the Everyone group to
run applications that are located in the Program Files folder." UserOrGroupSid="S-1-1-0" Action="Allow"><Conditions><FilePathCondition
Path="%PROGRAMFILES%\*"/></Conditions></FilePathRule>
a61c8b2c-a319-4cd0-9690-d2177c Value : <FilePathRule Id="a61c8b2c-a319-4cd0-9690-d2177cad7b51" Name="(Default Rule) All files located in the Windows folder" Description="Allows members
ad7b51 of the Everyone group to run
applications that are located in the Windows folder." UserOrGroupSid="S-1-1-0" Action="Allow"><Conditions><FilePathCondition
Path="%WINDIR%\*"/></Conditions></FilePathRule>
Logging
Requires advanced auditing configs to be enable. Found in security.evtx
Event ID
Description
5136
A directory service object was successfully modified
5136
A directory service object was successfully created
5138
A directory service object was successfully undeleted
5139
A directory service object was successfully moved
5141
A directory service object was successfully deleted
Event Viewer (default config?)
Microsoft-Windows-GroupPolicy/Operational
Investigate
When a scheduled task or file execution is seen on multiple machines, it indicates remote execution or the use of Group Policy. When system logs indicating the use of software deployment tools or Windows Management Instrumentation are not present, it serves as an indication that Group Policy was likely compromised.
Look for last modified in GPO policies:
C:\Windows\sysvol\miko.local\Policies\
PowerShell query to get last modified/created GPOs.
#GetGPO by modified time
Get-GPO -All | Sort-Object ModificationTime -Descending | Format-Table DisplayName, ModificationTime, CreationTime
Output:
PS C:\Users\Administrator> Get-GPO -All | Sort-Object ModificationTime -Descending | Format-Table DisplayName, ModificationTime, CreationTime
DisplayName ModificationTime CreationTime
----------- ---------------- ------------
DoD Windows Defender Firewall Computer v2r2 12/3/2023 11:41:08 PM 12/3/2023 8:03:36 PM
DoD Google Chrome Computer v2r8 12/3/2023 10:58:42 PM 12/3/2023 8:04:16 PM
DoD Windows 10 Computers v2r8 12/3/2023 10:50:04 PM 12/3/2023 8:04:00 PM
DoD WinSvr 2019 DC Computers v2r8 12/3/2023 9:29:10 PM 12/3/2023 8:19:36 PM
DoD WinSvr 2019 MS Computers v2r8 12/3/2023 9:26:48 PM 12/3/2023 8:19:09 PM
DoD Microsoft Defender Antivirus STIG Computer v2r4 12/3/2023 9:01:48 PM 12/3/2023 8:03:22 PM
DodMozilla Firefox Computer v6r5 12/3/2023 9:01:26 PM 12/3/2023 5:13:59 PM
Enable LocalAccountTokenFilterPolicy 12/3/2023 8:57:26 PM 4/30/2023 8:57:50 PM
DoD Windows 10 Users v2r8 12/3/2023 8:24:54 PM 12/3/2023 8:08:41 PM
DoD WinSvr 2019 DC Users v2r8 12/3/2023 8:24:20 PM 12/3/2023 8:03:48 PM
DoD WinSvr 2019 MS Users v2r8 12/3/2023 8:24:12 PM 12/3/2023 8:19:01 PM
Disable Defender 12/3/2023 8:05:52 PM 4/30/2023 8:58:40 PM
Default Domain Controllers Policy 11/22/2023 1:44:32 AM 3/5/2023 10:58:28 PM
Default Domain Policy 3/5/2023 11:04:48 PM 3/5/2023 10:58:28 PM
ADMX (and their associated, language-specific ADML files) are XML files that allow Group Policy to render UI within the Group Policy Editor, in the Administrative Templates namespace.
Hijacking ADMX:
Changing the location of the of the registry key will essentially hijack a registry key. If one were to change the location of the below "SyncForegroundPolicy" key to another location like "EnableLUA", then whenever the "SyncForegroundPolicy" key is disabled, then it would actual disable the "EnableLUA" key instead.
Gotcha's:
If one were to replace the ADMX files, you would need to manually modify the status of the GPO for it to take affect.
Once an ADMX file is hijacked there is no visual notification of it for the administrator who’s in GP Editor