Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Privileged Access Workstation (PAW): Sichere Admin-Arbeitsplätze für privilegierte Zugriffe

Privileged Access Workstations (PAWs) are dedicated, hardened workstations used exclusively for administrative tasks. Microsoft’s recommendation for protecting privileged identities in Active Directory and Azure. PAWs separate administrative activities from everyday web browsing, email, and other sources of risk. This article explains PAW deployment models (physical, virtual, cloud), hardening configuration, integration into a tiered administration model, and an alternative LAPS-based clean-source principle.

Table of Contents (5 sections)

Administrators use the same workstation for email, web browsing, and managing domain controllers. This practice is the most common entry point for privileged attacks: A phishing link opens a document that executes macros running in the context of the logged-in administrator—who also happens to be a domain administrator. PAWs solve this problem through physical or logical separation.

Clean Source Principle

Microsoft Clean Source Principle:
  "The security of a system cannot exceed
   the security of the systems that manage it"

  Consequence:
  Domain controller security ≤ security of the admin workstation
  Admin workstation security ≤ security of the admin laptop
  Admin laptop security ≤ security of the network segments with access

  Problem with a standard admin laptop:
  → Internet access with risks: phishing, drive-by downloads
  → Email client: malware vectors
  → Browser with plug-ins: attack surface
  → USB access: BadUSB, infected devices
  → Other software: Office, Teams, Zoom (all vulnerable)

  Attack path without PAW:
  1. Attacker: Phishing email to admin (admin@firma.de)
  2. Admin opens attachment on standard laptop
  3. Malware loads in admin context
  4. Admin logs into DC simultaneously (remote)
  5. Malware uses DC connection for Pass-the-Hash
  6. Domain compromised!

  PAW interrupts this path:
  → PAW has no email client
  → PAW has no internet browser (or severely restricted)
  → PAW is configured only for admin tools
  → Even if normal laptop is compromised: PAW disconnects access

PAW Deployment Models

Model 1: Physically Dedicated Device (Classic):

  Hardware:
  → Separate laptop/desktop exclusively for admin tasks
  → Physically separated from the normal work PC
  → Recommended: no network adapters for Wi-Fi (wired only!)
  → TPM 2.0 + Secure Boot + BitLocker (full encryption)

  Usage:
  → Admin laptop: EXCLUSIVELY for DC/server administration
  → Regular laptop: Email, Teams, browser, Office
  → Never: Admin tools on the regular laptop
  → Never: Personal use on the admin laptop

  Advantages:
  ✓ Maximum security (complete separation)
  ✓ Easy to understand and enforce
  Disadvantages:
  ✗ Two devices (cost, complexity for admins)
  ✗ For remote work: difficult to take with you

Model 2: VM-based PAW (more practical for remote work):

  Setup:
  → Host system: Standard Windows laptop (email, internet)
  → PAW: Hyper-V/VMware VM with strict isolation rules

  Hyper-V configuration for PAW VM:
  □ Disable Enhanced Session Mode (prevents clipboard sharing!)
  □ Shared Folder: NONE
  □ Network: separate virtual network (admin network access only)
  □ Internet access: BLOCKED (via firewall rule in vSwitch)
  □ USB passthrough: DISABLED

  Limitations:
  ✗ VM escape vulnerabilities exist (theoretically)
  ✗ Host compromise = PAW compromise possible
  ✗ Clipboard/drag-and-drop must be explicitly disabled

Model 3: Cloud-based PAW (Azure Virtual Desktop/Windows 365):

  Azure Virtual Desktop as PAW:
  → Admin connects via AVD client
  → AVD session runs in Azure (not on local device!)
  → Local device: only AVD client allowed for admin connection

  Advantages:
  ✓ Device-independent (even from a personal laptop)
  ✓ Azure Conditional Access can protect PAW sessions
  ✓ Centralized management + logging
  Disadvantages:
  ✗ Dependence on the internet
  ✗ Azure compromise = PAW compromise

PAW Hardening Configuration

Windows hardening for PAW:

Basic configuration via GPO:

1. Software restriction (AppLocker/WDAC):
   # Only allowed programs:
   Allowed:
   → Windows system programs (C:\Windows\*)
   → Admin tools (RSAT, PowerShell, MMC)
   → AV/EDR agent
   Blocked: EVERYTHING else!
   → No browser, no Office, no Teams, no Notepad++

2. Network firewall rules:
   # Outbound:
   ALLOW → Admin networks (192.168.100.0/24)
   ALLOW → Domain controller IPs
   ALLOW → DNS (Corporate)
   ALLOW → Windows Update
   DENY ALL → Internet (no HTTP/HTTPS to external IPs!)
   DENY ALL → User networks (VLANs for regular employees)

3. Enable Credential Guard:
   HKLM\SYSTEM\CurrentControlSet\Control\Lsa\LsaCfgFlags = 1
   # → Virtualization-based protection for LSA credentials
   # → Pass-the-hash attacks from credential dumps made extremely difficult

4. Attack Surface Reduction (ASR) Rules:
   # Via Intune or GPO:
   Block credential stealing from LSASS: ENABLE
   Block process injections: ENABLE
   Block untrusted executables from USB: ENABLE
   Block Office apps from creating child processes: ENABLE

5. Windows Defender Application Guard (WDAG):
   # If browser is REQUIRED: only in WDAG sandbox
   # WDAG: isolated Hyper-V container for browser sessions
   # Malware in the browser container cannot access host resources

6. Disable USB access:
   HKLM\SYSTEM\CurrentControlSet\Services\USBSTOR\Start = 4 (disabled)
   # Via GPO: Computer Configuration → Administrative Templates → System → Removable Storage
   # "All Removable Storage: Deny all access"

7. Enforce SMB signing:
   # Prevents NTLM relay from PAW:
   GPO: Network security: LAN Manager authentication level
   → "Send NTLMv2 response only. Refuse LM & NTLM"

Recommended admin tools on PAW:
  ✓ Remote Server Administration Tools (RSAT)
  ✓ Active Directory Users and Computers
  ✓ Group Policy Management Console
  ✓ Microsoft Management Console (MMC)
  ✓ PowerShell (with script signing enforcement)
  ✓ Azure/Entra ID Admin Center (via WDAG browser)
  ✓ PAM tool client (CyberArk, BeyondTrust)

Integration into Tiered Administration Model

Active Directory Tier Model + PAWs:

Tier 0 - Control Plane (Domain Controllers, PKI):
  Admins: 2–5 people maximum
  PAW Type: Physically dedicated device
  Permitted on this PAW:
  → DC Administration (Active Directory)
  → PKI administration
  → NOT: Tier 1/2 administration!

  Privileged accounts: DA, EA (Enterprise Admin)
  → Log in only on Tier 0 PAW!
  → Never on normal workstations!

Tier 1 - Server level:
  Admins: IT team
  PAW type: VM or physical (depending on risk classification)
  Permitted on this PAW:
  → Windows Server administration
  → VMware/Hyper-V administration
  → Database server, application server

  Privileged accounts: Server admins
  → Must NOT administer domain controllers!

Tier 2 - Workstations/Endpoints:
  Admins: Helpdesk, Desktop Support
  PAW Type: Strict standard workstation with restricted rights
  Permitted:
  → Endpoint management (Intune, SCCM)
  → LAPS management

  NO Tier 2 admins are allowed to touch servers or DCs!

Enforcement with Restricted Access Management (RAMs):
  GPO: Deny log on locally (Tier-0 DCs):
  → Group: Tier-1 admins
  → Group: Tier-2 admins
  → Prevents Tier-1/2 admins from logging on to DCs!

  Authentication Policy Silos (Windows 2012R2+):
  → Tier-0 accounts: may ONLY authenticate on Tier-0 computers
  → If a Tier-0 account attempts to log in on a regular PC: DENIED!

LAPS (Local Administrator Password Solution):
  □ All workstations receive unique local admin passwords
  □ Rotates automatically (every 30 days)
  □ Stored in AD (Tier-2 admins can view via LAPS)
  □ Prevents lateral Pass-the-Hash for local accounts!

Monitoring PAW Activities

PAW-Specific SIEM Alerting:

Critical events on PAW computers:
  Event 4624 (Logon): Logon of non-admin accounts on PAW → Alert!
  Event 4648 (Explicit Credentials): Credentials changed on PAW
  Event 7045 (New Service): New service on PAW (suspicious!)
  Event 4698 (Scheduled Task): New task on PAW → Alert!

Anomaly Detection:
  → Admin account logging in from a location NOT known as a PAW → Alert!
  → PAW connecting to an Internet IP → Alert!
  → Unplanned process on PAW → Alert!

KQL in Microsoft Sentinel:
  // Admin login not from PAW:
  SecurityEvent
  | where EventID == 4624
  | where Account contains "admin" or Account contains "svc"
  | where Computer !in (known_paw_hostnames)
  | where LogonType in (3, 10)  // Network + RemoteInteractive
  | project TimeGenerated, Account, Computer, IpAddress

  // PAW connects to the Internet:
  DeviceNetworkEvents
  | where DeviceName in (paw_devices)
  | where RemoteIPType == "Public"
  | where RemotePort in (80, 443, 8080)
  | project Timestamp, DeviceName, RemoteIP, RemotePort, InitiatingProcessFileName

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
This article was last edited on 04.03.2026. Responsible: Chris Wojzechowski, Geschäftsführender Gesellschafter at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung