There a few other  ways to get to a hack of this sort.  These also assume a 
compromised DC in one domain of a multidomain Forest.

In the organization I work for we have not discovered a satisfactory resolution to 
these exposures.  We may be heading towards the implementation of multiple forests.

Some partial resolutions are as follows:

Use DNProtect to keep site-connection objects secured against access by SYSTEM 
context.  Problem is, you need to rerun DNProtect every time any change occurs to the 
object and it isn't offiially supported.  Additionally, the only published info on 
this utility seems to be a mention of it in "Notes from the Field"

Promote Replica DCs using the Domain Admin of that domain, not  Domain Admin of the 
empty root domain.  This prevents some issues with ownership of objects being marked 
as the BUILTIN\Administrator account.  If ownership is flagged to this account Admins 
in other DCs can manipulate the objects.  This is easy to prevent but runs counter to 
MS's recommendations.

It appears that keeping separate domains from sharing the same sites has some positive 
effect, but that is ridiculous.  Unfortunately, the only means of clearly providing 
the fault isolation one would expect from separate domains appears to actually be 
separate forests.  Maybe we just don't get this product.  It seems fine for smaller 
organizations, or organizations which already use a single centralized group for all 
IT administration.  In a decentralized environment, it appears to demand either a 
change in the administrative structure or separate forests.

Reply via email to