SMB and LDAP Signing: Why It Matters
Why SMB and LDAP signing are critical for preventing relay attacks and man-in-the-middle attacks in Active Directory environments.
SMB and LDAP Signing: Why It Matters
SMB and LDAP signing prevent man-in-the-middle and relay attacks that could lead to credential theft and privilege escalation.
What Are Relay Attacks?
In a relay attack, an attacker intercepts authentication traffic and forwards it to another system, using the victim's credentials to authenticate. Without signing, the attacker can modify the traffic or redirect it to a system they control.
SMB Signing
SMB (Server Message Block) is used for file sharing and remote administration. Without SMB signing, attackers can:
- Intercept SMB traffic
- Relay authentication to other systems
- Access file shares or execute commands using stolen credentials
Configuration
On Domain Controllers: SMB signing should be required (not just enabled), which is the default nowadays.
On Member Servers: SMB signing should be required.
On Workstations: SMB signing should be required.
How to Enable
Via Group Policy:
- Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options
- "Microsoft network server: Digitally sign communications (always)" = Enabled
- "Microsoft network server: Digitally sign communications (if client agrees)" = Enabled
- "Microsoft network client: Digitally sign communications (always)" = Enabled
- "Microsoft network client: Digitally sign communications (if client agrees)" = Enabled
LDAP Signing
LDAP (Lightweight Directory Access Protocol) is used to query and modify Active Directory. Without LDAP signing, attackers can:
- Intercept LDAP queries
- Modify responses to redirect authentication
- Perform man-in-the-middle attacks
Configuration
LDAP Signing: Should be required for all LDAP traffic to prevent NTLM relay attacks to the LDAP service.
LDAP Channel Binding: Should be required to prevent NTLM relay attacks to the LDAPS service.
How to Enable
Via Group Policy:
- Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options
- "Domain controller: LDAP server signing requirements" = "Require signing"
- "Domain controller: Domain controller: LDAP server channel binding token requirements" = "Always"
For clients:
- "Network security: LDAP client signing requirements" = "Require signing"
Why It Matters
Without signing:
- Attackers can intercept and relay authentication
- Credentials can be stolen and reused
- Privilege escalation becomes easier
- Domain compromise risk increases
With signing:
- Traffic integrity is verified
- Relay attacks are prevented
- Credential theft is harder
- Security posture improves
Detection
Check current configuration:
- Use PowerShell:
Get-SmbServerConfigurationandGet-SmbClientConfiguration - Review Group Policy settings
- Check event logs for unsigned connection attempts
Remediation
- Enable SMB signing: Required on DCs, servers and workstations
- Enable LDAP signing: Required on all domain controllers
- Enable LDAP channel binding: Required on all domain controllers when LDAPS is configured
- Test compatibility: Ensure applications work with signing enabled
- Monitor for failures: Alert on unsigned connection attempts
- Document exceptions: If signing cannot be enabled, document why and plan mitigations until proper remediation can be implemented
Related Resources
AD Permissions and ACLs Explained
How Active Directory permissions and Access Control Lists work, common misconfigurations, and how to audit them effectively.
Active Directory Security Hardening & Hygiene Checklist
This Active Directory security hardening and hygiene checklist covers the most common misconfigurations we see during internal penetration tests, giving you a practical way to reduce identity-driven attack chains and domain compromise risk across Active Directory.
GPO Misconfigurations and Risk
Common Group Policy Object misconfigurations that create security risks: overly broad scope, permissive permissions, and legacy policies.
Need this validated in your environment?
Our Active Directory security assessment identifies these issues and provides prioritized remediation guidance.
Learn About AD Security Assessments