Windows Hardening
Windows Hardening
Windows Hardening
http://technet.microsoft.com/security/bb977553( en-us).aspx
Windows XP Security Guide Windows Vista Security Guide Windows Server 2003 Security Guide Windows Server 2008 Security Guide
The Center for Internet Security (CIS) The National Security Agency (NSA) The Defense Information Systems Agency (DISA) The National Institute of Standards and Technology (NIST)
Microsoft provides guidance for how to help secure our own operating systems. We have developed three levels of security settings:
Legacy Enterprise Specialized Security, Limited Functionality
As part of an overall defense in depth approach, including multiple layers of security, Microsoft recommends that you implement server security measures tailored to the role or purpose of each server in your organization.
Vulnerability, risk, and exposure analysis with regard to security informs you of the tradeoffs between security and usability that all computer systems are subject to in a networked environment.
Domain Controllers
Infrastructure Servers
Hardening Procedures
RADIUS Servers
PKI Servers
Bastion Servers
Administrative distinctions
Enterprise Administrators are just that Delegate administration Structuring Support for Administration & Group Policy
8
Security Options
Event Logs
System Services
Most important server role, physical isolation needed DC baseline policy GP template
Duplicates most member server policies Further lockdown on user rights assignments Configure DC specific system services ensure consistency Relocating DC database and logs Increasing event log sizes Protecting DNS: Blocking ports with ipsec filters
Secure dynamic updates Limiting zone transfers
10
Providing DNS & WINS Services Foundation: Member Server Baseline Policy Incremental Infrastructure Group Policy
Adjusting Infrastructure System Services
12
Dedicating a disk for content Setting file level permissions IPSec port filtering
Tip: configure outbound filtering for IIS servers on external interface
13
PKI Servers
14
Bastion Servers
15
Visit the following Microsoft Web sites to download guides: Windows XP Security Guide Windows Server 2003 Security Guide Windows 2000 Security Hardening Guide
16
DCOM Vulnerabilities IPSec Mitigation Tools This free tool kit contains two IPSec tools to help prevent exploitation of vulnerabilities in DCOM. Group Policy Management Console (GPMC) with Service Pack 1 GPMC is a free tool that lets administrators manage Group Policy for multiple domains and sites within one or more forests, all in a simplified user interface (UI) with dragand-drop support. IIS Lockdown Wizard 2.1 IIS Lockdown Wizard is a free tool that works by turning off unnecessary IIS features, thereby reducing attack surface available to attackers. ISA Server 2000 Feature Pack 1 ISA Server 2000 Feature Pack 1 delivers enhanced security and ease of use beyond that of traditional firewalls for email server, Web server and Exchange Outlook Web Access (OWA) deployments. Microsoft Baseline Security Analyzer (MBSA) MBSA is a free tool that aids in identifying the status of your operating system and application security configuration, including the presence or absence of security updates. Microsoft Software Update Services Solution Accelerator This solution accelerator provides guidance for deploying critical updates and security updates to Microsoft Windows XP, Windows 2000, and Windows Server 2003 operating systems using Microsoft Software Update Services. It describes how Microsoft Software Update Services should be designed and configured to support patch management and provides details of the operational processes and procedures that need to be followed for patch management to be successful.
17
MyDoom Worm Cleaner This free tool removes variants of the MyDoom worm from infected computers. Additionally, it removes associated backdoor components from infected computers. Outlook Administrator Pack You can use the Outlook Administrator Pack to control the types of attached files blocked by Outlook, modify and specify user- or group-security levels. Outlook Administrator Pack is a free tool. Security Risk Self-Assessment for Midsize Organizations This free application is designed to help organizations with fewer than 1,000 employees assess weaknesses in their current IT security environment. SQL Critical Update Kit The SQL Critical Update Kit is a free tool that helps update editions of SQL Server 2000 and MSDE 2000 that are vulnerable to the 'Slammer' worm. Systems Management Server 2.0 Software Update Services Feature Pack The SMS 2.0 Software Update Services Feature Pack contains the following tools: the Security Update Inventory Tool, the Microsoft Office Inventory Tool for Updates, the Distribute Software Updates Wizard, and the SMS Web Reporting Tool with Web Reports Add-in for Software Updates. UrlScan 2.5 UrlScan version 2.5 is a free security tool that restricts the types of HTTP requests that Internet Information Services (IIS) will process. IIS Lockdown Tool
IIS Lockdown Tool functions by turning off unnecessary features, thereby reducing attack surface available to attackers. To provide in-depth defense or multiple layers of protection against attackers, URLscan, with customized templates for each supported server role, has been integrated into the IIS Lockdown Tool.
18
Patch management mitigates and lessens the impact from threats in the Window of Exposure
19
DAY
00
30
60
90
120
150
180
210
240
270
300
330
360
VULNERABILITY IDENTIFIED
INFORMATION PROTECTED
WINDOW OF EXPOSURE
ON AVERAGE, BUSINESSES CAN BE EXPOSED FROM 90 TO 360 DAYS
20
DAY
00
30
60
90
120
150
180
210
240
270
300
330
360
VULNERABILITY IDENTIFIED
INFORMATION PROTECTED
WINDOW OF EXPOSURE
MOST BUSINESSES WERE EXPOSED TO RPC VULNERABILITY (BLASTER) FOR 180 360 DAYS
21
DAY
00
30
60
90
120
150
180
210
240
270
300
330
360
VULNERABILITY IDENTIFIED
VULNERABILITY PATCH DEVELOPED VERIFIED BY MICROSOFT AND RELEASED APRIL 13, 2004 (188 DAYS) OCTOBER 2003
INFORMATION PROTECTED
WINDOW OF EXPOSURE
MOST BUSINESSES WERE EXPOSED TO LSASS VULNERABILITY (SASSER) FOR 190 260 DAYS
22
Microsoft recommends you implement a process for managing and distributing security updates within your organization. Patch Management:
Assess
Inventory existing computing assets. Assess security threats and vulnerabilities. Determine the best source for information about new software updates. Assess the existing software distribution infrastructure. Assess operational effectiveness.
Identify
Evaluate and Plan Deploy WSUS SMS (see http://msdn.microsoft.com/library/default.asp?url=/library/enus/secmod/html/secmod108.asp for full guidance on Patch Management)
The goal for the Identify phase is to: Discover new software updates in a reliable way. Determine whether software updates are relevant to your production environment. Obtain software update source files and confirm that they are safe and will install successfully. Determine whether the software update should be considered a normal change or an emergency, and submit a request for change (RFC) to deploy it. Submitting an RFC is the trigger for the next patch management phase, which is Evaluate and Plan.
23
Helps assess the vulnerability of Windows systems Scans for missing security patches / updates and common security misconfigurations Scans local or multiple remote systems via GUI or command line invocation Scans various versions of Windows, IIS, IE, SQL, Exchange, and other Microsoft applications Generates XML scan reports on each scanned system Runs on Windows Server 2003, Windows 2000 and Windows XP Works with SUS and SMS
24
Windows 2000, Windows XP, or Windows Server 2003 IE v5.01 or greater Machine being remotely scanned IIS v4.0, 5.0 (required for IIS vulnerability checks) SQL 7.0, 2000, MSDE (required for SQL vulnerability checks) Microsoft Office 2000, XP, Office 2003 (required for desktop application vulnerability checks) Server service, Remote registry service, File & Print Sharing User must have local admin rights on computer being scanned
26
Password weaknesses Guest account not disabled Auditing not configured Unnecessary services installed IIS vulnerabilities IE zone settings Automatic Updates configuration Internet Connection Firewall configuration
27
MSSECURE.XML An XML file containing the latest security update information, constantly updated by Microsoft Contains data about each hotfix, including:
Operating system and service pack (SP) applicability. Details about all files in the patch File version File checksum File location Registry key applied by the patch. Patch Superseding information
28
1 2 3 4 5 6
Run MBSA on Admin system, specify targets Downloads CAB file with MSSecure.xml and verifies digital signature Scans target systems for OS, OS components, and applications Parses MSSecure to see if updates are available Checks if required updates are missing Generates time-stamped report of missing updates
Windows
MBSA Computer
29
Additional Language Support MBSA v1.2 Additional Product Support Alternate File Support
QFE vs GDR release of a security update Multi-processor vs uni-processor release of a security update Non-security bulletin updates to security bulletin updates Revised (updated) security bulletins Previous versions of MBSA reported these updates with a yellow X, with a warning message file version greater than expected Exchange Server 2003, Microsoft Office (local scans only), MDAC v2.5-2.8, MVM, MSXML, BizTalk Server, Commerce Server, Content Management Server, SNA Server, HIS
Check for New Version of MBSA Additional Windows Vulnerabilities Checks Custom IE Zones Interpretation
31
32
34
35
Always get approval of management before running assessment Consider potential side effects of running assessment tool, which may cause computer lockouts and network bandwidth problems, on production computers during business hours Run on regularly scheduled basis. Use comparative results between assessments as an empirical measurement of improving security policies and procedures Never run without first alerting end-users
36