De4sec
De4sec Technology
de4sec.technology
๐ŸŒ AU + KE

On-Premise Infrastructure Security Guide

Securing on-premise servers, Active Directory, network infrastructure, and physical access โ€” for businesses with server rooms or data centre presence.

Prepared by
De4sec Technology
Contact
support@de4sec.technology
Edition
2026 ยท March
CONFIDENTIAL ยท FOR CLIENT USE ONLY
Contents
  1. On-Premise Infrastructure in 2026
  2. Active Directory Security
  3. Privileged Access Workstations and Jump Hosts
  4. Patch Management for On-Premise Systems
  5. Network Security for On-Premise
  6. Physical Security
01

On-Premise Infrastructure in 2026

On-premise infrastructure is not obsolete. Many businesses have valid reasons for keeping servers on-site: latency requirements, software licensing constraints, regulated data localisation, or capital equipment already deployed.

What has changed is the attack surface. On-premise servers that are directly internet-accessible, running end-of-life software, or managed without proper privileged access controls are among the most compromised infrastructure in existence.

The most dangerous on-premise configuration in 2026: Windows Server 2008/2012 (end of support), RDP exposed to the internet, shared admin credentials, no audit logging. This combination is actively targeted 24 hours a day.

02

Active Directory Security

AD Tiering Model

The Tier Model separates admin accounts into three tiers to prevent credential theft from spreading:

TierControlsAdmin Accounts
Tier 0Domain Controllers, AD admin toolsTier 0 admin accounts only โ€” no daily use
Tier 1Member servers (file, app, email)Tier 1 server admin accounts
Tier 2WorkstationsTier 2 desktop support accounts

Critical AD hygiene

โœ“Audit Admin group membership โ€” who is in Domain Admins? Review monthly
โœ“Disable and clean up stale user and computer accounts โ€” disable accounts 30 days post-departure
โœ“Remove users from Domain Admins who don't require it โ€” use delegated permissions instead
โœ“Enable AD audit logging โ€” logon events, privilege use, object access
โœ“Protect Domain Controller tier โ€” DCs should never browse the internet or run standard applications
03

Privileged Access Workstations and Jump Hosts

Admin tasks performed from a compromised workstation expose admin credentials to the attacker. Privileged Access Workstations (PAWs) or Jump Hosts create an isolated, hardened environment for admin activity.

Jump host configuration

โœ“Dedicated server or VM โ€” not a general-purpose server running other workloads
โœ“No internet browsing from the jump host
โœ“Access only from within the corporate network or via VPN โ€” not directly from the internet
โœ“RDP to servers only from the jump host โ€” not from user workstations
โœ“MFA required to access the jump host
โœ“All admin sessions logged โ€” keystroke logging or session recording for regulated environments

Local admin passwords

โœ“Microsoft LAPS (Local Administrator Password Solution) โ€” randomise and manage local admin passwords on all workstations and servers
โœ“LAPS passwords stored in Active Directory, retrievable only by authorised accounts
โœ“Eliminates lateral movement via shared local admin credentials
04

Patch Management for On-Premise Systems

End-of-life operating systems

โœ“Windows Server 2008/2012 โ€” out of mainstream support. Patch Tuesday updates no longer released. Must be migrated or isolated
โœ“Windows Server 2019/2022 โ€” current, receive regular updates
โœ“Windows 10 โ€” end of support October 2025. Windows 11 required for continued patch support

Patch deployment

โœ“WSUS (Windows Server Update Services) โ€” for environments without Microsoft cloud integration
โœ“Azure Arc + Azure Update Manager โ€” manage on-premise server patching from Azure portal
โœ“SCCM / Microsoft Endpoint Configuration Manager โ€” for larger environments
โœ“Monthly patching schedule โ€” test patches in staging, deploy to production within 7 days
โœ“Emergency patch procedure โ€” critical vulnerabilities (CVSS 9+) patched within 48 hours

An unpatched server running an internet-accessible service is a matter of 'when', not 'if'. Attackers actively scan for known vulnerable services within hours of patch disclosure.

05

Network Security for On-Premise

Firewall and edge security

โœ“Dedicated hardware firewall (Fortinet, Palo Alto, Cisco, SonicWall) โ€” not just Windows Firewall
โœ“Default deny inbound from internet โ€” only explicitly required ports open
โœ“No RDP (3389) directly to the internet โ€” use VPN or Azure Bastion
โœ“IDS/IPS capability โ€” detect and block known attack patterns at the network level
โœ“Logging โ€” all firewall events to SIEM

Network segmentation

โœ“Server VLAN isolated from user workstations
โœ“Management VLAN for network devices and admin access โ€” only accessible from jump host
โœ“Guest Wi-Fi completely isolated โ€” no access to internal resources
โœ“POS/payment systems on isolated segment if applicable

VPN for remote access

โœ“Site-to-site VPN for branch offices
โœ“User VPN with MFA for remote access โ€” not split tunnel where possible
โœ“Consider migrating user remote access to Zero Trust Network Access (ZTNA) / Entra Private Access
06

Physical Security

โœ“Server room or rack access logged โ€” badge access with audit trail
โœ“Server room CCTV โ€” recorded, minimum 30-day retention
โœ“Environmental monitoring โ€” temperature and humidity alerts
โœ“UPS (Uninterruptible Power Supply) for all servers and network gear
โœ“Cable management โ€” labelled, documented, locked patch panels where possible
โœ“Hardware disposal โ€” secure wipe or physical destruction of decommissioned drives

De4sec On-Premise Security Assessment

Infrastructure Audit
Physical visit and remote assessment of all on-premise infrastructure. Identify EOL systems, network gaps, AD vulnerabilities.
Remediation Implementation
Patch management, AD hardening, PAW/jump host deployment, firewall configuration.
Hybrid Management
Azure Arc integration for unified management and monitoring of on-premise and cloud systems.
// NEXT STEP

Ready to implement this?

De4sec provides hands-on implementation. Book a free discovery call โ€” we assess your environment at no cost.

Book a Free Discovery Call โ†’de4sec.technology
De4sec
ยฉ 2026 DE4SEC TECHNOLOGY. ALL RIGHTS RESERVED.