{"id":70193,"date":"2021-02-08T14:19:41","date_gmt":"2021-02-08T13:19:41","guid":{"rendered":"https:\/\/mwtsolutions.eu\/?p=70193"},"modified":"2021-03-31T11:38:07","modified_gmt":"2021-03-31T09:38:07","slug":"utok-na-active-directory-replikace-domenoveho-radice","status":"publish","type":"post","link":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/","title":{"rendered":"\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de"},"content":{"rendered":"<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>B\u00fdvaly doby, kdy byly kybernetick\u00e9 \u00fatoky na infrastrukturu identity a autentizace, jako je Active Directory, nesm\u00edrn\u011b n\u00e1ro\u010dn\u00e9. P\u0159i navrhov\u00e1n\u00ed pl\u00e1nu pe\u010dliv\u00e9ho prov\u00e1d\u011bn\u00ed \u00fatok\u016f bylo t\u0159eba v\u011bnovat hodn\u011b p\u0159edv\u00eddavosti a nutnost\u00ed byly pokro\u010dil\u00e9 technick\u00e9 znalosti dom\u00e9n a s\u00edt\u00ed. Postupem \u010dasu se v\u0161ak otev\u0159elo nespo\u010det mo\u017enost\u00ed, kter\u00e9 hacker\u016fm tyto \u00fatoky podstatn\u011b uleh\u010dily.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"dt-fancy-separator title-left h3-size style-disabled\">\n<h3 class=\"dt-fancy-title\">AD \u00fatoky: Pochopen\u00ed z\u00e1m\u011bru<\/h3>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>C\u00edl \u00fatok\u016f na AD nebo \u00fatok\u016f na jakoukoli infrastrukturu pro spr\u00e1vu identit je docela jednoduch\u00fd: z\u00edskat nejvy\u0161\u0161\u00ed p\u0159\u00edstup v co nejkrat\u0161\u00edm \u010dase. Bez ohledu na zdroj \u00fatoku nebo m\u00edsto vniknut\u00ed se \u00fato\u010dn\u00edci v\u017edy sna\u017e\u00ed eskalovat privilegia. A nejvy\u0161\u0161\u00ed \u00farove\u0148 p\u0159\u00edstupu ve slu\u017eb\u011b AD je p\u0159\u00edstup k \u0159adi\u010di dom\u00e9ny (DC), proto\u017ee pot\u00e9 \u00fato\u010dn\u00edci z\u00edskaj\u00ed okam\u017eit\u00fd p\u0159\u00edstup pro spr\u00e1vu ke ka\u017ed\u00e9mu kritick\u00e9mu prost\u0159edku v s\u00edti.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"dt-fancy-separator title-left h3-size style-disabled\">\n<h3 class=\"dt-fancy-title\">Posloupnost \u00fatoku<\/h3>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>AD \u00fatoky jsou prov\u00e1d\u011bny v n\u011bkolika f\u00e1z\u00edch; \u00fato\u010dn\u00edci obvykle infikuj\u00ed pracovn\u00ed stanici koncov\u00e9ho u\u017eivatele (proto\u017ee maj\u00ed m\u00edrn\u011bj\u0161\u00ed kontroly zabezpe\u010den\u00ed), prohled\u00e1vaj\u00ed dom\u00e9nu, zda neobsahuj\u00ed slab\u00e1 m\u00edsta nebo nespr\u00e1vn\u011b nakonfigurovan\u00e1 opr\u00e1vn\u011bn\u00ed, a vyu\u017e\u00edvaj\u00ed je k later\u00e1ln\u00edmu p\u0159esunu a z\u00edsk\u00e1n\u00ed p\u0159\u00edstupu k serveru v\u00fd\u0161e v s\u00ed\u0165ov\u00e9 hierarchii, jako je kritick\u00fd souborov\u00fd server nebo \u0159adi\u010d dom\u00e9ny.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p><img fetchpriority=\"high\" class=\"alignnone wp-image-70263 size-full\" src=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Posloupnost-utoku.png\" alt=\"\" width=\"860\" height=\"362\" srcset=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Posloupnost-utoku.png 860w, https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Posloupnost-utoku-300x126.png 300w, https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Posloupnost-utoku-768x323.png 768w\" sizes=\"(max-width: 860px) 100vw, 860px\" \/><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>Ale co kdybychom v\u00e1m \u0159ekli, \u017ee \u00fato\u010dn\u00edk by se mohl vyd\u00e1vat za samotn\u00fd dom\u00e9nov\u00fd \u0159adi\u010d a bez pov\u0161imnut\u00ed extrahovat citliv\u00e9 informace?<\/p>\n<\/div>\n<\/div>\n<div class=\"dt-fancy-separator title-left h3-size style-disabled\">\n<div><\/div>\n<h3 class=\"dt-fancy-title\">Replikace mezi \u0159adi\u010di dom\u00e9ny ve slu\u017eb\u011b AD<\/h3>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>IT infrastruktura organizace \u010dasto pot\u0159ebuje pro svou AD v\u00edce ne\u017e jeden dom\u00e9nov\u00fd \u0159adi\u010d. Aby byly informace mezi \u0159adi\u010di dom\u00e9ny konzistentn\u00ed, mus\u00ed b\u00fdt objekty AD replikov\u00e1ny.<\/p>\n<p>V\u011bt\u0161ina \u00fakol\u016f souvisej\u00edc\u00edch s replikac\u00ed je uvedena v protokolu Microsoft Directory Replication Service Remote Protocol (MS-DRSR). Rozhran\u00ed Microsoft API, kter\u00e9 implementuje protokol, se naz\u00fdv\u00e1 DRSUAPI.<\/p>\n<\/div>\n<\/div>\n<div class=\"dt-fancy-separator title-left h3-size style-disabled\">\n<div><\/div>\n<h3 class=\"dt-fancy-title\">Funkce DSGetNCChanges<\/h3>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>Prvn\u00ed dom\u00e9nov\u00fd \u0159adi\u010d ode\u0161le po\u017eadavek DSGetNCChanges, kdy\u017e chce z\u00edskat aktualizace objektu AD z druh\u00e9ho \u0159adi\u010de. Odpov\u011b\u010f obsahuje sadu aktualizac\u00ed, kter\u00e9 m\u00e1 prvn\u00ed \u0159adi\u010d pou\u017e\u00edt pro NC repliku (struktura, kter\u00e1 ukl\u00e1d\u00e1 informace o replikaci).<\/p>\n<p>&nbsp;<\/p>\n<p>Pod\u00edvejme se, jak \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00ed funkce replikace v AD, kterou nelze vypnout nebo deaktivovat.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"dt-fancy-separator title-left h3-size style-disabled\">\n<h3 class=\"dt-fancy-title\">Vyu\u017eit\u00ed opr\u00e1vn\u011bn\u00ed k replikaci pro p\u0159\u00edstup k citliv\u00fdm \u00fadaj\u016fm dom\u00e9ny<\/h3>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>V\u00a0dne\u0161n\u00ed dob\u011b existuje spousta open-source n\u00e1stroj\u016f, kter\u00e9 mohou vyu\u017e\u00edvat specifick\u00e9 p\u0159\u00edkazy v r\u00e1mci MS-DRSR k simulaci chov\u00e1n\u00ed \u0159adi\u010de dom\u00e9ny a na\u010d\u00edt\u00e1n\u00ed hash\u016f hesel u\u017eivatel\u016f.<\/p>\n<p>&nbsp;<\/p>\n<p>Takov\u00fdm \u00fatok\u016fm se \u0159\u00edk\u00e1 \u201epost-exploitation attacks\u201c, proto\u017ee \u00fato\u010dn\u00edci pot\u0159ebuj\u00ed p\u0159\u00edstup k u\u017eivatelsk\u00e9mu \u00fa\u010dtu, kter\u00fd m\u00e1 ve slu\u017eb\u011b AD opr\u00e1vn\u011bn\u00ed k replikaci. Administrators, Domain Admins, a Enterprise Admins zpravidla maj\u00ed po\u017eadovan\u00e1 pr\u00e1va. P\u0159esn\u011bji \u0159e\u010deno, jsou vy\u017eadov\u00e1na n\u00e1sleduj\u00edc\u00ed pr\u00e1va:<\/p>\n<p>&nbsp;<\/p>\n<p><img class=\"alignnone size-full wp-image-70266\" src=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Vyuziti-opravneni-k-replikaci-pro-pristup-k-citlivym-udajum-domeny.png\" alt=\"\" width=\"410\" height=\"466\" srcset=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Vyuziti-opravneni-k-replikaci-pro-pristup-k-citlivym-udajum-domeny.png 410w, https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Vyuziti-opravneni-k-replikaci-pro-pristup-k-citlivym-udajum-domeny-264x300.png 264w\" sizes=\"(max-width: 410px) 100vw, 410px\" \/><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<p>Jakmile je p\u0159\u00edstup z\u00edsk\u00e1n, jsou kroky k proveden\u00ed \u00fatoku pom\u011brn\u011b jednoduch\u00e9:<\/p>\n<ol>\n<li>\u00dato\u010dn\u00edk najde \u0159adi\u010d dom\u00e9ny a po\u017e\u00e1d\u00e1 o replikaci.\n<ul>\n<li>Pomoc\u00ed p\u0159\u00edkazu NLTEST \/dclist: [Domainname] zsjist\u00ed \u00fato\u010dn\u00edk podrobnosti o na\u0161\u00ed dom\u00e9n\u011b<\/li>\n<\/ul>\n<\/li>\n<li>Zm\u011bny replikace jsou po\u017eadov\u00e1ny pomoc\u00ed funkce GetNCChanges.<\/li>\n<li>\u0158adi\u010d dom\u00e9ny vrac\u00ed replika\u010dn\u00ed data, v\u010detn\u011b hash\u016f hesel, \u017eadateli.<\/li>\n<\/ol>\n<p>Pod\u00edvejte se na toto kr\u00e1tk\u00e9 video a pod\u00edvejte se, jak je \u00fatok proveden.<\/p>\n<p>&nbsp;<\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/WRWQy1Ej6RU\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<div class=\"dt-fancy-separator title-left h3-size style-disabled\">\n<h3 class=\"dt-fancy-title\">Zm\u00edrn\u011bn\u00ed replika\u010dn\u00edch \u00fatok\u016f s ManageEngine LOG360<\/h3>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p>N\u00e1stroj\u00a0<a href=\"https:\/\/www.mwtsolutions.cz\/komplexni-zmirneni-hrozeb-log360\/\" target=\"_blank\" rel=\"noopener\">LOG360<\/a>\u00a0kombinuje n\u011bkolik funkc\u00ed, pomoc\u00ed kter\u00fdch m\u016f\u017eete takov\u00fdto \u00fatok zachytit a zastavit je\u0161t\u011b p\u0159ed t\u00edm, ne\u017e nap\u00e1ch\u00e1 n\u011bjakou \u0161kodu. S\u00a0n\u00e1strojem LOG360 m\u016f\u017eete:<\/p>\n<ul>\n<li>Sledovat v re\u00e1ln\u00e9m \u010dase, zda nejsou opr\u00e1vn\u011bn\u00ed k replikaci p\u0159id\u011blena u\u017eivatel\u016fm bez va\u0161eho v\u011bdom\u00ed.<\/li>\n<li>Sledovat \u010dlenstv\u00ed v privilegovan\u00fdch skupin\u00e1ch, jako jsou Domain Admins a Enterprise Admins, kter\u00e9 maj\u00ed ve v\u00fdchoz\u00edm nastaven\u00ed opr\u00e1vn\u011bn\u00ed replikace dom\u00e9ny.<\/li>\n<li>Monitorovat v s\u00edti jak\u00e9koli nezn\u00e1m\u00e9 IP adresy DC, kter\u00e9 nemaj\u00ed povoleno prov\u00e1d\u011bt replikaci.<\/li>\n<li>Detekovat spu\u0161t\u011bn\u00ed \u0161kodliv\u00e9ho open-source softwaru sledov\u00e1n\u00edm proces\u016f a script\u016f Windows.<\/li>\n<\/ul>\n<p>D\u00edky mo\u017enosti konfigurovat upozorn\u011bn\u00ed, p\u0159\u00edpadn\u011b okam\u017eit\u00e9 reakce, jako je vypnut\u00ed za\u0159\u00edzen\u00ed, ukon\u010den\u00ed u\u017eivatelsk\u00e9 relace \u010di proveden\u00ed jin\u00e9 akce na z\u00e1klad\u011b p\u0159edp\u0159ipraven\u00e9ho scriptu, si m\u016f\u017eete b\u00fdt jisti, \u017ee budete v\u011bd\u011bt o ka\u017ed\u00e9m podobn\u00e9m pokusu zm\u011bny konfigurace \u2013 o cht\u011bn\u00e9 i necht\u011bn\u00e9.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>B\u00fdvaly doby, kdy byly kybernetick\u00e9 \u00fatoky na infrastrukturu identity a autentizace, jako je Active Directory, nesm\u00edrn\u011b n\u00e1ro\u010dn\u00e9. P\u0159i navrhov\u00e1n\u00ed pl\u00e1nu pe\u010dliv\u00e9ho prov\u00e1d\u011bn\u00ed \u00fatok\u016f bylo t\u0159eba v\u011bnovat hodn\u011b p\u0159edv\u00eddavosti a nutnost\u00ed byly pokro\u010dil\u00e9 technick\u00e9 znalosti dom\u00e9n a s\u00edt\u00ed. Postupem \u010dasu se v\u0161ak otev\u0159elo nespo\u010det mo\u017enost\u00ed, kter\u00e9 hacker\u016fm tyto \u00fatoky podstatn\u011b uleh\u010dily. &nbsp; AD \u00fatoky: Pochopen\u00ed z\u00e1m\u011bru [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":71051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_links_to":"","_links_to_target":""},"categories":[274,289],"tags":[335,336,337,338],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de - MWT Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de - MWT Solutions\" \/>\n<meta property=\"og:description\" content=\"B\u00fdvaly doby, kdy byly kybernetick\u00e9 \u00fatoky na infrastrukturu identity a autentizace, jako je Active Directory, nesm\u00edrn\u011b n\u00e1ro\u010dn\u00e9. P\u0159i navrhov\u00e1n\u00ed pl\u00e1nu pe\u010dliv\u00e9ho prov\u00e1d\u011bn\u00ed \u00fatok\u016f bylo t\u0159eba v\u011bnovat hodn\u011b p\u0159edv\u00eddavosti a nutnost\u00ed byly pokro\u010dil\u00e9 technick\u00e9 znalosti dom\u00e9n a s\u00edt\u00ed. Postupem \u010dasu se v\u0161ak otev\u0159elo nespo\u010det mo\u017enost\u00ed, kter\u00e9 hacker\u016fm tyto \u00fatoky podstatn\u011b uleh\u010dily. &nbsp; AD \u00fatoky: Pochopen\u00ed z\u00e1m\u011bru [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/\" \/>\n<meta property=\"og:site_name\" content=\"MWT Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-08T13:19:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-31T09:38:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Active-Directory-1024x310-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marketing@mwtsolutions.eu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"marketing@mwtsolutions.eu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/\"},\"author\":{\"name\":\"marketing@mwtsolutions.eu\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\"},\"headline\":\"\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de\",\"datePublished\":\"2021-02-08T13:19:41+00:00\",\"dateModified\":\"2021-03-31T09:38:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/\"},\"wordCount\":816,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"keywords\":[\"active directory\",\"AD\",\"LOG360\",\"security IT\"],\"articleSection\":[\"\u010cl\u00e1nky\",\"Novinky\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/\",\"name\":\"\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de - MWT Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\"},\"datePublished\":\"2021-02-08T13:19:41+00:00\",\"dateModified\":\"2021-03-31T09:38:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/i.mwtsolutions.eu\/cs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00datok na&nbsp;Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"name\":\"MWT Solutions\",\"description\":\"Kolejna witryna oparta na WordPressie\",\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"cs\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\",\"name\":\"MWT Solutions\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"contentUrl\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"width\":2825,\"height\":850,\"caption\":\"MWT Solutions\"},\"image\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pl.linkedin.com\/company\/mwt-solutions\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\",\"name\":\"marketing@mwtsolutions.eu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"caption\":\"marketing@mwtsolutions.eu\"},\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de - MWT Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/","og_locale":"cs_CZ","og_type":"article","og_title":"\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de - MWT Solutions","og_description":"B\u00fdvaly doby, kdy byly kybernetick\u00e9 \u00fatoky na infrastrukturu identity a autentizace, jako je Active Directory, nesm\u00edrn\u011b n\u00e1ro\u010dn\u00e9. P\u0159i navrhov\u00e1n\u00ed pl\u00e1nu pe\u010dliv\u00e9ho prov\u00e1d\u011bn\u00ed \u00fatok\u016f bylo t\u0159eba v\u011bnovat hodn\u011b p\u0159edv\u00eddavosti a nutnost\u00ed byly pokro\u010dil\u00e9 technick\u00e9 znalosti dom\u00e9n a s\u00edt\u00ed. Postupem \u010dasu se v\u0161ak otev\u0159elo nespo\u010det mo\u017enost\u00ed, kter\u00e9 hacker\u016fm tyto \u00fatoky podstatn\u011b uleh\u010dily. &nbsp; AD \u00fatoky: Pochopen\u00ed z\u00e1m\u011bru [&hellip;]","og_url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/","og_site_name":"MWT Solutions","article_published_time":"2021-02-08T13:19:41+00:00","article_modified_time":"2021-03-31T09:38:07+00:00","og_image":[{"width":1024,"height":310,"url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2021\/02\/Active-Directory-1024x310-1.png","type":"image\/png"}],"author":"marketing@mwtsolutions.eu","twitter_card":"summary_large_image","twitter_misc":{"Napsal(a)":"marketing@mwtsolutions.eu","Odhadovan\u00e1 doba \u010dten\u00ed":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/#article","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/"},"author":{"name":"marketing@mwtsolutions.eu","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe"},"headline":"\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de","datePublished":"2021-02-08T13:19:41+00:00","dateModified":"2021-03-31T09:38:07+00:00","mainEntityOfPage":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/"},"wordCount":816,"commentCount":0,"publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"keywords":["active directory","AD","LOG360","security IT"],"articleSection":["\u010cl\u00e1nky","Novinky"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/","url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/","name":"\u00datok na Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de - MWT Solutions","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/#website"},"datePublished":"2021-02-08T13:19:41+00:00","dateModified":"2021-03-31T09:38:07+00:00","breadcrumb":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/utok-na-active-directory-replikace-domenoveho-radice\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/i.mwtsolutions.eu\/cs\/"},{"@type":"ListItem","position":2,"name":"\u00datok na&nbsp;Active Directory: Replikace dom\u00e9nov\u00e9ho \u0159adi\u010de"}]},{"@type":"WebSite","@id":"https:\/\/i.mwtsolutions.eu\/#website","url":"https:\/\/i.mwtsolutions.eu\/","name":"MWT Solutions","description":"Kolejna witryna oparta na WordPressie","publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"cs"},{"@type":"Organization","@id":"https:\/\/i.mwtsolutions.eu\/#organization","name":"MWT Solutions","url":"https:\/\/i.mwtsolutions.eu\/","logo":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/","url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","contentUrl":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","width":2825,"height":850,"caption":"MWT Solutions"},"image":{"@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/mwt-solutions"]},{"@type":"Person","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe","name":"marketing@mwtsolutions.eu","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","caption":"marketing@mwtsolutions.eu"},"url":"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/"}]}},"_links":{"self":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/70193"}],"collection":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/comments?post=70193"}],"version-history":[{"count":1,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/70193\/revisions"}],"predecessor-version":[{"id":70269,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/70193\/revisions\/70269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media\/71051"}],"wp:attachment":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media?parent=70193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/categories?post=70193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/tags?post=70193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}