Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance

Size: px
Start display at page:

Download "Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance"

Transcription

1 Microsoft Windows Common Criteria Evaluation Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance Microsoft 2014 Page 1 of 30

2 Document Information Version Number 1.0 Updated On January 9, 2015 This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs-NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Visual Basic, Visual Studio, Windows, the Windows logo, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Microsoft 2014 Page 2 of 30

3 TABLE OF CONTENTS 1 INTRODUCTION CONFIGURATION EVALUATED CONFIGURATION UNSUPPORTED CONFIGURATION TERMS FOR REGULAR USER ADMINISTRATIVE GUIDANCE REFERENCES MANAGING ACCESS CONROL MANAGING DISCRETIONARY ACCESS CONTROL MANAGEMENT WEB ACCESS MANAGING MANDATORY INTEGRITY CONTROL MANAGING THE FIREWALL MANAGING DYNAMIC ACCESS CONTROL MANAGING IDENTIFICATION AND AUTHENTICATION MANAGING USER LOCKOUT MANAGING ACCOUNT LOCKOUT THRESHOLD MANAGING LOCKED USER ACCOUNTS MANAGING USERS AND GROUPS MANAGING IPSEC MANAGING AUTHENTICATION MANAGING LOGON MANAGING SMART CARDS MANAGING PASSWORD COMPLEXITY Microsoft 2014 Page 3 of 30

4 3.5 MANAGING USER ACCOUNT INFORMATION MANAGING PKI MANAGING TIME MANAGING SECURE CONNECTION PROTOCOLS MANAGING IPSEC ALGORITHMS MANAGING TLS MANAGING LOCKING MANAGING AUDITING AUDITS USER IDENTITY IN AUDITS AUDIT LOG PROTECTION MANAGING AUDIT POLICY MANAGING AUDIT LOG SIZE OTHER EVENT LOGS CRYPTOGRAPHIC APIS Microsoft 2014 Page 4 of 30

5 1 Introduction This document provides Administrator guidance for the following Windows operating systems as evaluated for Common Criteria based on the Windows 8.1 RT Server 2012 R2 Security Target: - Microsoft Windows 8.1 Pro (32-bit and 64-bit versions) - Microsoft Windows 8.1 Enterprise (32-bit and 64-bit versions) - Microsoft Windows Server 2012 R2 Standard - Microsoft Windows Server 2012 R2 Datacenter 1.1 Configuration Evaluated Configuration The Common Criteria evaluation includes a specific configuration of Windows, the evaluated configuration. To run Windows deployments using the evaluated configuration follow the deployment steps described here and ensure the security policy settings in the table below are set as indicated. The Security Target section 1.1 describes the Windows editions and security patches included in the evaluated configuration. The following TechNet articles describe how to install Windows 8.1 and Windows Server 2012 R2: - Install, Deploy, and Migrate to Windows 8.1: Installing Windows Server 2012 R2: 2 Security Policy Local Policies\Security Options\Audit: Shut down system immediately if unable to log security audits Local Policies\Security Options\System cryptography: Use FIPS 140 compliant cryptographic algorithms, including encryption, hashing and signing algorithm Administrative Templates\System\Logon\Turn on PIN sign-in Administrative Templates\System\Internet Communication Management\Internet Communication Settings: Turn off Windows Update device driver searching Administrative Templates\System\Driver Installation: Turn off Windows Update device driver search prompt Administrative Template\Windows Components\Credentials User Interface\Do not display the password reveal button Policy Setting Enabled Enabled Enabled Enabled Disabled Enabled 1 The evaluated configuration installed from media using this web page and followed the Windows Deployment Scenarios and Tools link (( and then followed the Windows 8.1 deployment scenarios link ( to the New Computer section. 2 The evaluated configuration installed from media using this web page. The evaluated configuration did not disable Driver Signature Enforcement. Microsoft 2014 Page 5 of 30

6 1.1.2 Unsupported Configuration The following list describes IIS web server configuration items that are not supported by the evaluated configuration. In the evaluated configuration execute permission of web content is not allowed. Read access to web content is allowed by default, the other access must be specifically assigned by the authorized administrator. ASP.Net, Basic authentication and Forms based authentication are unsupported configurations for IIS in the evaluation. 1.2 Terms for regular user The terms regular user, standard user, normal user and non-adminstrative user are all used to refer to a regular user. 1.3 Administrative Guidance References The content at the links to public Microsoft documentation for Windows 8 and Windows Server 2012 administrative guidance also apply as guidance for Windows 8.1 and Windows Server 2012 R2. In addition, all other administrative guidance references also apply to Windows 8.1 and Windows Server 2012 R2. 2 Managing Access Conrol 2.1 Managing Discretionary Access Control Complete Access Control for Discretionary Access (FDP_ACC.1(DAC)) Security Attribute Based Access Control for Discretionary Access (FDP_ACF.1(DAC)) Management of Security Attributes for Discretionary Access Control (FMT_MSA.1(DAC)) Static Attribute Initialization for Discretionary Access Control Policy (FMT_MSA.3(DAC)) Static Attribute Value Inheritance for Discretionary Access (FMT_MSA.4) Revocation for Object Access for DAC (FMT_REV.1(DAC)) The information provided in this section and the referenced articles is applicable to all Windows editions in the evaluated configuration with the exception of Active Directory objects. Active Directory objects are managed on Windows Server 2012 R2 editions configured with the Active Directory Domain Services role. The Discretionary Access Control (DAC) policy determines if access is allowed in accordance with a standard access check. The access check algorithm is described by the Security Target in section DAC Enforcement Algorithm. Microsoft 2014 Page 6 of 30

7 The DAC enforcement algorithm determines if subjects can access objects by applying a set of rules based upon their respective security attributes that are described in sections Subject DAC Attributes and Object DAC Attributes. Users can manage the security attributes of all types of objects covered by the Discretionary Access Control (DAC) policy subject to the controls identified in section Object DAC Attributes of the Security Target. Subject security attributes are managed through users, groups and group memberships as described in section 3.2 of this document. Object security attributes are stored and managed by their security descriptors. Some objects are created and managed by the system and cannot be directly managed by users, while other objects are created and managed by third party applications that may or may not expose mechanisms for users to manage their security attributes. The following objects named in the Security Target table 6-3 Named Objects may be directly managed by users via the indicated operating system utilities described on TechNet: - Registry keys Registry Editor: - NTFS files and folders File and Folder Permissions: - Printers Managing Printers and Print Servers: - Active Directory objects (these topics are only applicable on Windows Server 2012 R2 editions configured with the Active Directory Domain Services role) ADSI Edit (adsiedit.msc): How to Use ADSI Edit to Apply Permissions: Users can only manage the default security descriptor for Registry keys, Active Directory objects and NTFS files and folders, and then only in the case a new object s security descriptor is based upon its parent object s inheritable ACEs as described in section Default DAC Protection in the Security Target. Users may do so by modifying the permissions granted by inheritable ACEs of the suitable parent or container objects. The following TechNet topic describes best practices for managing DAC policy and to determine the current status of the subject and object security attributes: - Access Control: Microsoft 2014 Page 7 of 30

8 The DAC policy does not require or allow users to manage its initialization or activation. Modifications of object security attributes are applied by the DAC policy on the next access control decision for the given object. Modifications of subject security attributes are applied by the DAC policy on subjects that are created after the modification takes place for users this occurs the next time they are logged on and for processes the next time a given process is created. In the case of Active Directory objects in a domain with multiple domain controllers, brief periods of time may occur during which security attributes modified on one domain controller have not yet been replicated to other domain controllers receiving client requests for Active Directory object information that may be used by the DAC policy on the requesting client. The following TechNet topic describes how object owners may control management of object security attributes: - Managing Object Ownership: Object security attributes may be revoked by making DACL changes as described in section DAC Management of the Security Target. 2.2 Management Web Access Complete Access Control for Web Access (FDP_ACC.1(WA)) Complete Access Control for Web Publishing (FDP_ACC.1(WP) Security Attribute Based Access Control for Web Access (FDP_ACF.1(WA)) Security Attribute Based Access Control for Web Access (FDP_ACF.1(WA)) Management of Security Attributes for Web Access (FMT_MSA.1(WA)) Management of Security Attributes for Web Publishing (FMT_MSA.1(WP)) Static Attribute Initialization for Web Access Policies (FMT_MSA.3(WA)) Static Attribute Initialization for Web Publishing Policies (FMT_MSA.3(WP)) Static Attribute Value Inheritance (FMT_MSA.4) Revocation for Object Access (FMT_REV.1(OBJ)) The information provided in this section and the referenced articles is applicable to all Windows Server 2012 R2 editions in the evaluated configuration with the Web Server (IIS) role installed and all Windows 8.1 editions in the evaluated configuration with the Internet Information Services feature installed. Microsoft 2014 Page 8 of 30

9 The web access control and web publishing URL authorization algorithm is used to determine if access to web content by a given subject is allowed. The URL authorization algorithm is described in the Security Target section Web Access Control and Web Publishing Access Control. By default no URL Authorization rules are configured for web content and they cannot be managed. The administrator manages URL authorization rules by first installing the Web Server\Security\URL Authorization feature in the Web Server role service and restarting the IIS service. When URL Authorization is installed a default rule is created for the Web server that is inherited by all web content allowing access to all users. The following TechNet topic describes how the administrator manages the URL authorization rules to specify allow and deny rules that control access to site content: - Authorization Rules: The administrator manages the default URL authorization rule by starting the IIS Manager tool, navigating to the Web server node in the left pane and then double-clicking the Authorization Rules icon in the IIS features view this will display the list of all URL authorization rules that are applicable to the server and hence inherited by all web content. The default URL authorization providing web content access to all users is the first rule in the list and can be deleted or modified by the Remove or Edit operations shown in the Actions pane. By default only the administrator can manage the URL authorization rules. The administrator can authorize other users to manage the URL authorization rules by installing the Management Tools\Management Service feature in the Web Server role service and restarting the IIS service doing so populates the IIS Manager Permissions feature into the IIS Manager tool. The following TechNet topic describes how the administrator controls management of permissions: - IIS Manager Permissions: The following TechNet topic describes how the administrator controls management of authorization rules: - Configuring URL Authorization Rules in IIS 7: The following link includes a description of how IIS processes authorization rules (look towards the bottom of the page): - ASP.NET Authorization: URL authorization changes are enforced the next time an access check is made. HTTP status codes returned for web page requests indicate whether the request was successfuil or unsuccessful. The following Microsoft Support page describes the 401 and 403 status codes that are returned when access is denied due to Web access access control policy: - The HTTP status code in IIS 7.0, IIS 7.5, and IIS 8.0: Microsoft 2014 Page 9 of 30

10 The following TechNet topic describes how to configure IIS authentication, for example to configure accepting only anonymous, digest, certificate, and NT authentication schemes: - Configuring Authentication in IIS 7: As described in the above TechNet topic, the anonymous authentication scheme can be configured to set the security principal under which anonymous users will be assigned when requesting Web content. By default, for the anonymous authentication scheme IIS configures the IUSR_<web-server-machine-name> account to be used or alternatively the Web administrator can specifiy a different user account to be used this account is then impersonated on behalf of anonymous users before their web content request is satisfied The HTTP verbs are authorized by the Web Access Control and Web Publishing as follows: - Access URL: This web permission is also know as URL Authorization and is applicable to all HTTP verbs by default, or can be configured for a subset of verbs. The following TechNet topic explains how to manage the URL Authorization web permission: o Configuring URL Authorization Rules in IIS 7: - Directory Browsing: This web permission applies to the GET verb allowing IIS to return the list of children (NTFS files and folders) located within a URL that references a NTFS folder. The following topic TechNet topic describes how to manage the Directory Browsing permission: o Enable or Disable Directory Browsing in IIS 7: - Read, Write, Execute: These web permissions apply to URLs for a specified set of HTTP verbs based upon the file name extension in the request path as configured using Request Restrictions and as applied by the Web server s Feature Permissions policy both are part of IIS Handler Mappings. The following TechNet topics describe this further: o Configuring Handler Mappings in IIS 7: o Configure Request Restrictions for a Handler Mapping (IIS 7): o Edit Feature Permissions for the Handler Mappings Feature (IIS 7): Managing Mandatory Integrity Control Mandatory Integrity Control Functions (FDP_ACC.1(MIC)) Mandatory Integrity Control Functions (FDP_ACF.1(MIC) Management of Security Attributes for Mandatory Integrity Control (FMT_MSA.1(MIC)) Static Attribute Initialization for Mandatory Integrity Control Policies (FMT_MSA.3(MIC)) Revocation for Object Access (FMT_REV.1(OBJ)) Microsoft 2014 Page 10 of 30

11 The MIC access control algorithm is used to determine if access to objects by a given subject is allowed. The MIC access control algorithm is described in the Security Target section Mandatory Integrity Control. The MIC policy does not require activation or management to ensure it is secure and users cannot manage the default security attributes used to enforce the MIC policy. The MIC architecture is described in the following TechNet article: - Mandatory Integrity Control: Administrators can manage the MIC security attributes used in the MIC policy for file and directory objects by use of the icacls.exe utility according to the following TechNet topic (see the /setintegritylevel parameter): - Icacls: Modifications of object security attributes are applied by the MIC policy on the next access control decision for the given object. 2.4 Managing the Firewall Subset Information Flow Control (FDP_IFC.1(OSPP)) Simple Security Attributes for Network Information Flow Control Policy (FDP_IFF.1(OSPP)) Static Attribute Initialization for Network Information Flow Control (FMT_MSA.3(OSPP)) Management of TSF Data for Network Information Flow Control (FMT_MTD.1(OSPP)) Only the administrator user can access the firewall management interfaces listed in the Error! Reference source not found. of the Security Target in section Interfaces. The following TechNet topic includes and explanation of the firewall rule priority: - Understanding the Firewall: Microsoft 2014 Page 11 of 30

12 Only the administrator may modify the firewall s enabled state or modify other firewall settings. The following TechNet topic describes the PowerShell cmdlet to modify the firewall s enabled state by use of the Enabled parameter or to enable the administrator to modify the Inbound or Outbound firewall filtering rules via other parameters: - Set-NetFirewallProfile: Like all the PowerShell cmdlet interfaces identified for configuring the firewall, the Set-NetFirewallProfile PowerShell cmdlet includes the -Profile parameter that is used to indicate which firewall profile the command is relevant to, including one or more of Domain, Public, or Private. The following TechNet topic describes the firewall protection that is provided by each profile setting: - Windows Firewall Profiles: Managing Dynamic Access Control Complete Access Control for Discretionary Access (FDP_ACC.1(DYN)) Security Attribute Based Access Control for Discretionary Access (FDP_ACF.1(DYN)) (FMT_MSA.1(DYN)) Static Attribute Initialization for Discretionary Access Control Policy (FMT_MSA.3(DYN)) Static Attribute Value Inheritance for Discretionary Access (FMT_MSA.4) Revocation of Object Access (FMT_REV.1(OBJ)) The DYN access control algorithm is used to determine if access to objects by a given subject is allowed. The DYN access control algorithm is described in the Security Target section Dynamic Access Control. Dynamic Access Control applies only to NTFS objects. The following Technet topic provides an overview of the Dynamic Access Control scenarios with references for additional resources and is applicable to : - Dynamic Access Control: Scenario Overview: The security attributes used by the DYN access control algorithm are: - Central access rules: an expression of authorization rules that can include one or more conditions involving user groups, user claims, device claims, and resource properties. Microsoft 2014 Page 12 of 30

13 - User claims: attributes associated with a specific user stored in active directory or within a security token for the current process or thread. - Device claims: attributes associated with a specific computer object stored in active directory or being used by the current process or thread on behalf of the current user - Resource attributes: global resource properties marked for use in authorization and published in AD The following TechNet topic gives step-by-step instructions on how to create and deploy a Central Access Policy containing user claims and device claims (see To create claim types for instructions on how to manage claims): - Deploy a Central Access Policy (Demonstration Steps) : The demonstration steps in the above Deploy a Central Access Policy (Demonstration Steps) topic show the procedures for accomplishing the various deployment tasks via the Graphical User Interface (GUI) available in the Claim Types Editor in the Active Directory Administrative Center (ADAC) or alternatively via Windows PowerShell equivalent commands. Use of the Windows PowerShell equivalent commands is recommended to deploy Central Access Policy as described in the topic. For example, the To create and enable pre-created resource properties subtopic describes using the ADAC GUI or equivalently the procedure is also described by using the New-ADResourceProperty and Set-ADResourceProperty Windows PowerShell commands. Individual Files and folders may be manually classified on file servers as described in the following TechNet topic (that is also referenced in the above-mentioned scenarios review): Set up Manual File Classification: Conditional expressions of authorization rules are created and managed for a domain by the Central Access Rule Editor in ADAC. The Central Access Rules are combined to form a Central Access Policy stored in Active Directory. Group Policy then propogates the Central Access Policy to the files and folders on domain member servers. The above Deploy a Central Access Policy (Demonstration Steps) TechNet topic gives step-by-step instructions on how to create and deploy a Central Access Policy. Conditional expressions can also be managed for individual file or directory objects based on claims using the Advanced Security Settings dialog of the ACL Editor and are then stored as ACEs contained in the SACL for the given object. These expressions are propagated to child files and folders using Ntfs inheritance rules. The following TechNet topic describes the enhanced ACL Editor: - Access Control and Authorization Overview (see the heading Enhanced ACL Editor ): 3 Managing Identification and Authentication 3.1 Managing User Lockout Microsoft 2014 Page 13 of 30

14 Authentication Failure Handling (FIA_AFL.1) Management of TSF Data for Authentication Failure Handling (FMT_MTD.1(Threshold)) Management of TSF Data for Authentication Failure Handling (FMT_MTD.1(Re-enable)) The operational procedures require a local or domain administrator. The information provided in this section and subsections and the referenced articles for Active Directory users is applicable to all Windows Server 2012 R2 editions in the evaluated configuration. The remaining information and referenced articles applies to local users and is applicable to all Windows editions in the evaluated configuration Managing Account Lockout Threshold The following TechNet topic explains the net accounts command line utility for standalone computers (followed by command line options for managing account lockout policy): - Net Accounts: In addition to the parameters given in the referenced article, the following are also valid options: /lockoutthreshold: number : Sets the number of times a bad password may be entered until the account is locked out. If set to 0 then the account is never locked out. /lockoutwindow: minutes : Sets the number of minutes of the lockout window. /lockoutduration: minutes : Sets the number of minutes the account will be locked out for. Alternatively, domain policy for account lockout threshold is managed via the LockoutThreshold property on the Set-ADDefaultDomainPasswordPolicy PowerShell cmdlet: - Set-ADDefaultDomainPasswordPolicy: Managing Locked User Accounts The following TechNet topic describes the Properties dialog for managing local user accounts for the case of enabling a disabled account the case of unlocking a locked account is very similar where the Account is locked out checkbox must be changed from the checked to the unchecked state: - Disable or activate a local user account: Domain accounts are unlocked via the Unlock-ADAccount PowerShell cmdlet as explained in the following TechNet topic: - Unlock-ADAccount: Microsoft 2014 Page 14 of 30

15 3.2 Managing Users and Groups User Attribute Definition for Individual Users (FIA_ATD.1(USR)) Revocation for Authorized Administrators (FMT_REV.1(Admin) Management of TSF Data for Initialization of User Security Attributes (FMT_MTD.1(Init-Attr)) Management of TSF Data for Modification of User Security Attributes Other Than Authentication Data (FMT_MTD.1(Mod-Attr)) Management of TSF Data for Modification of Authentication Data (FMT_MTD.1(Mod-Auth)), Security Roles (FMT_SMR.1) The information provided in this section and the referenced articles for Active Directory users and groups is applicable to all Windows Server 2012 R2 editions in the evaluated configuration. The remaining information and referenced articles for local users and groups is applicable to all Windows editions in the evaluated configuration. The terms regular user, standard user, normal user and non-adminstrative user are all used to refer to a regular user. The following TechNet topics include instructions to create or delete local and domain users: - Net User: - New-ADUser: - Remove-ADUser: The following TechNet topics include instructions for an administrator to create or delete local and domain groups, and add or remove members: - Create a local group: - Delete a local group: - Add a member to a local group: - Remove a member from a local group: - Notice the Additional considerations heading modifies the instructions to accommodate removing a member from a local group in the user interface method. For the command-line method the same command is used as for adding a member with the exception of replacing the /add parameter with /delete (see the following TechNet topic for the syntax for the command line option: Net localgroup: - New-ADGroup : - Remove-ADGroup: - New-ADGroupMember: 3 Microsoft 2014 Page 15 of 30

16 - Remove-ADGroupMember: 3 The following Windows Help topic includes instructions for a user to change their own local or domain password or for an administrator to reset local and domain passwords and is applicable to all Windows editions in the evaluated configuration: - Change Password: Private/public keys are associated with a user account when the account is enrolled for a user certificate. Section 3.6 of this document includes information about how users enroll for certificates. Privileges allowing a local or domain user account to perform various system-related operations on the local computer are automatically assigned based on group membership (e.g. local or domain administrators). The following TechNet topic includes instructions to restrict the logon hours and logon workstations for a domain user: - Set-ADUser: Managing IPsec Timing of Authentication for OS Logon (FIA_UAU.1(RITE)) The guidance for FTP_ITC.1 includes instructions to configure IPsec for endpoint authentication of remote IT entities in section Error! Reference source not found. of this document. The referenced guidance includes information about configuring the remote authentication using machine certificates. Explicit instructions to configure the machine certificate authentication method is provided, including how to verify if authentication was successful. The Windows Firewall is used to configure the Network Flow Control Policy in order to allow specific types of network traffic between endpoints that need not be authenticated. Firewall Rules allow or block network traffic based on various criteria. The TOE then processes allowed network traffic. For example a rule allowing ICMP network protocol traffic results in the TOE processing that traffic according to the ICMP standard. Connection Security Rules configure the authentication of two computers before they begin communications using the IPsec protocol. The TOE then 3 The caller must be a domain administrator to execute this operation. Microsoft 2014 Page 16 of 30

17 processes IKE traffic to authenticate the two computers according to the IKE protocol. The following two TechNet topics explain the Windows Firewall Rules and Connection Security Rules in more detail: - Understanding Firewall Rules: - Understanding Connection Security Rules: Managing Authentication Managing Logon Multiple Authentication Mechanisms (FIA_UAU.5) The information provided in this section and the referenced articles for Set-ADDefaultDomainPasswordPolicy is applicable to all Windows Server 2012 R2 editions in the evaluated configuration. The rest of the information provided in this section and the referenced articles for local or domain users and groups is applicable to all Windows editions in the evaluated configuration.. The following Windows Help topic describes how to conduct initial logon authentication for users: - Sign in to or out of Windows: The following Windows Help topics describe how to change a user password: - Change your password: The following TechNet topic describes how to set maximum password age for local user accounts: - Net accounts: The following TechNet topic describes how to set maximum password age for domain user accounts: - Set-ADDefaultDomainPasswordPolicy: Managing Smart Cards The following TechNet topic describes how to configure smart card logon: Microsoft 2014 Page 17 of 30

18 - Administer Smart Cards: The following TechNet topic describes the group policy setting controlling what happens when the smart card for a logged-on account is removed from the smart card reader (see heading Additional smart card Group Policy settings and registry keys ): - Smart Card Group Policy and Registry Settings: Managing Password Complexity Management of Security Functions Behavior for Password Management (FMT_MOF.1(Pass)) The following TechNet topics describe the characteristics for passwords that are available, instructions for setting the enforcement mechanism and a discussion of strong passwords and recommended minimum settings: - Enforcing Strong Password Usage Throughout Your Organization: - Strong Password: - Password Best practices: Managing User Account Information Subject Binding for Individual Users (FIA_USB.1(USR)) The following Windows Help topic describes how to sign in to Windows: - How do I run an application once with a full administrator access token? Microsoft 2014 Page 18 of 30

19 The following Windows Help topic describes the default User Account Control setting providing restrictive defaults for security attributes of subjects created by administrator users in the evaluated configuration (see the Notify me only when apps try to make changes to my computer (default) setting): - What are User Account Control settings? The following Windows Help topic describes how an authorized administrator can disable or enable User Account Control Settings to take effect at the next user logon: - Turn User Account Control on or off: Managing PKI Public Key Based Authentication (FIA_PK_EXT.1) The following TechNet topic describes managing certificates (including the Obtain a Certificate sub-topic): - Manage Certificates : - Certutil: The guidance for setting up a trusted channel to communicate with a CA is described in the guidance for FTP_ITC.1 (OS)) IPSEC. The following TechNet topic describes how to manually import a certificate: - Import a Certificate: The TOE comes preloaded with root certificates for various Certificate Authorities. The following TechNet topic describes how to manage trust relationships: - Manage Trusted Root Certificates: 4 Swipe from the right-edge, select Search, select Settings and enter uac, and then select Change User Account Controls settings Microsoft 2014 Page 19 of 30

20 4 Managing Time Reliable Time Stamps (FPT_STM.1) The administrator sets the time using the Set-Date PowerShell cmdlet that is documented here: - The administrator configures the time service to synchronize time from a time server using the W32tm command that is documented here: - The administrator ensures the communication path between the TOE client and the time service provider is protected from attacks that could compromise the integrity of the time by establishing an IPsec policy using the Microsoft Windows 8 Microsoft Windows Server for IPsec VPN Clients (January ), where section 3 provides detailed instructions that can be used to configure the TOE client and the time service provider. The administrator ensures the NTP server is authenticated by verifying the IP address provided by the IT administrator for the NTP Server in the main mode and quick mode security associations according to the audit trail for the FTP_ITC.1 requirement outlined in section 4.1 Audit Policy for IPsec Operations of the IPsec VPN Client guidance. In particular, audits are provided when a trusted channel is established that includes the IP address of the channel s local and remote endpoints. If the integrity of the trusted channel is compromised, then this is indicated by the audit Id 4960 that is also discussed in section Managing Secure Connection Protocols 5.1 Managing IPsec Algorithms Inter-TSF Trusted Channel (FTP_ITC.1 (OS)) IPSEC Basic Internal TSF Data Transfer Protection (FPT_ITT.1) Remote Management Capabilities (FMT_SMF_RMT.1) Microsoft 2014 Page 20 of 30

21 The administrator ensures IPSEC is being used to establish a trusted channel by following the guidance in the links below: Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012, The following are links to Powershell cmdlets used to manage the IPSEC rules for establishing trusted channels (this includes how to configure IPSEC rules that use certificate authentication as well as those that use Pre-Shared Secrets): New-NetIPsecAuthProposal, New-NetIPsecPhase1AuthSet, New-NetIPsecMainModeCryptoProposal, New-NetIPsecMainModeCryptoSet, New-NetIPsecMainModeRule, New-NetIpsecQuickModeCryptoProposal, New-NetIpsecQuickModeCryptoSet, Microsoft 2014 Page 21 of 30

22 New-NetIPsecRule, Any machines being remotely managed must have IPsec configured to protect the network channels between the machines (FMT_SMF_RMT.1). 5.2 Managing TLS Inter-TSF Trusted Channel (FTP_ITC.1 (OS)) TLS Remote Management Capabilities (FMT_SMF_RMT.1) The information provided in this section and the referenced articles on configuring TLS is applicable to all Windows editions in the evaluated configuration. The information on IIS configuration is applicable to all Windows Server 2012 R2 editions in the evaluated configuration with the Web Server (IIS) role installed and all Windows 8.1 editions in the evaluated configuration with the Internet Information Services feature installed. The following ciphersuites are supported in the evaluated configuration: - TLS_RSA_WITH_AES_128_CBC_SHA - TLS_RSA_WITH_AES_256_CBC_SHA - TLS_RSA_WITH_AES_128_CBC_SHA256 - TLS_RSA_WITH_AES_256_CBC_SHA256 - TLS_DHE_DSS_WITH_AES_128_CBC_SHA - TLS_DHE_DSS_WITH_AES_256_CBC_SHA - TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 - TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 - TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 - TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 The administrator ensures TLS is being used to establish a trusted channel for web communications to a server by following the configuration instructions for the web server at the following link: Microsoft 2014 Page 22 of 30

23 Note that although the link indicates these instructions are for IIS 7 the same instructions apply to IIS8. On the client side the following link in the How to Control the Use of TLS section specifies how to configure the web browser to use TLS 1.2: The administrator configures the protocols used on a machine by following the configuration instructions at the following link: The administrator configures the cipher suites used on a machine by following the configuration instructions at the following link:. The following link specifies how enabling FIPS policy affects TLS: 6 Managing Locking TSF-initiated Session Locking (FTA_SSL.1) User-initiated Locking (FTA_SSL.2) The inactivity time period for TSF-initiated session locking is configured by the administrator via Windows security policy. The relevant security policy is Interactive logon: Machine inactivity limit as described in the following Technet topic in the section heading titled New and changed functionality : - Security Policy Settings Overview: The following Technet topics include guidance for administrators to open the Local Group Policy Editor tool or the Group Policy Management Console, respectively, that are used to configure the Windows security policy for standalone or domain-joined machines: - Local Group Policy Editor: - Group Policy Management Console: Microsoft 2014 Page 23 of 30

24 The following Windows topic describes how to configure screen savers 5 : - How to use screen savers: The following Windows topic describes how users can initiate a session lock: - How do I lock or unlock my PC?: 7 Managing Auditing 7.1 Audits Audit Data Generation (FAU_GEN.1(OSPP)) Audit events and the associated audit subcategories are listed in Error! Reference source not found. of the Security Target. The authorized administrator may review the audit log by use of the Get-EventLog PowerShell cmdlet. The following TechNet topic describes the syntax for using this cmdlet and also includes several examples demonstrating how to extract individual information from the audit records in order to verify that all records expected have been generated and that the audit records contain the expected information: - Get-EventLog: Event records displayed to the console by Get-EventLog utilze a numeric value for the audit category that can be correlated to a subcategory text value using the following table: Subcategory Name Hex category number Decimal category number Security State Change 0x Note selecting the On resume display logon screen checkbox shown below the Screen saver list discussed in the topic requires authentication in order to resume the session in response to user activity dismissing the screensaver Microsoft 2014 Page 24 of 30

25 Security System Extension 0x System Integrity 0x IPsec Driver 0x Other System Events 0x Logon 0x Logoff 0x Account Lockout 0x IPsec Main Mode 0x Special Logon 0x IPsec Quick Mode 0x IPsec Extended Mode 0x Other Logon/Logoff Events 0x Network Policy Server 0x User / Device Claims 0x File System 0x Registry 0x Kernel Object 0x SAM 0x Other Object Access Events 0x Certification Services 0x Application Generated 0x Handle Manipulation 0x File Share 0x Filtering Platform Packet Drop 0x Filtering Platform Connection 0x A Detailed File Share 0x B Removable Storage 0x C Central Policy Staging 0x D Sensitive Privilege Use 0x Microsoft 2014 Page 25 of 30

26 Non Sensitive Privilege Use 0x Other Privilege Use Events 0x Process Creation 0x Process Terminati 0x DPAPI Activity 0x RPC Events 0x Audit Policy Change 0x Authentication Policy Change 0x Authorization Policy Change 0x MPSSVC Rule-Level Policy Change 0x Filtering Platform Policy Change 0x Other Policy Change Events 0x User Account Management 0x Computer Account Management 0x Security Group Management 0x Distribution Group Management 0x Application Group Management 0x Other Account Management Events 0x Directory Service Access 0x Directory Service Changes 0x Directory Service Replication 0x Detailed Directory Service Replication 0x Credential Validation 0x Kerberos Service Ticket Operations 0x Other Account Logon Events 0x Kerberos Authentication Service 0x The Event Viewer administrator tool also provides a mechanism to review the audit trail as described in this TechNet topic that also includes information on creating custom views that filter the audit trail according to various criteria based on the individual information in the audit records: Microsoft 2014 Page 26 of 30

27 - Event Viewer How To : Withhe Fast Logon Optimization feature a Windows 8.1 computer enters hibernate state when a shutdown operation is conducted through the graphical user interface presented by the power icon in the lower right corner of the screen (e.g. by pressing Ctrl-Alt-Del). When enabled the feature skips the shutdown audit by default the feature is enabled in Windows 8.1 Enterprise and Professional editions. In order to ensure the shutdown audit is conducted on those editions the administrator must disable this feature as follows: - Open the Control Panel and choose Hardware and Sound / Power Options - Click on Choose what the power buttons do - Click on Change settings that are currently unavailable - Uncheck the Turn on fast startup (recommended) option under the Shutdown settings label - Click the Save Changes button and exit the Control Panel. 7.2 User Identity in Audits User Identity Association (FAU_GEN.2) As described in the Security Target section Audit Collection the security identifier that represents the user on whose behalf the event occurred is recorded with all audit events this occurs by default and cannot be configured. 7.3 Audit Log Protection Audit Review (FAU_SAR.1) Restricted Audit Review (FAU_SAR.2) The Security Target section Audit Log Restricted Access Protection describes how the security event log file is restricted such that only the system may open the security event log file and it opens it exclusively at boot so that no other process may open the file. The Security Target section Audit Collection explains the audit records format. Microsoft 2014 Page 27 of 30

28 7.4 Managing Audit Policy Selective Audit (FAU_SEL.1) Protected Audit Trail Storage (FAU_STG.1) Management of TSF Data for Audit Selection (FMT_MTD.1(Audit Sel)) Management of TSF Data for Audit Data (FMT_MTD.1(Audit)) Management of TSF Data for Audit Storage Threshold (FMT_MTD.1(AuditStg)) Only the administrator has access to the commands that may be used to manage the audit trail storage object, including the storage threshold configuration. Only the administrator for a given host identity has access to the commands that may be used to select the set of events to be audited for that host. Audits are generated on a given computer based upon operations that occur on that computer and record the computer name ( host identity ) as part of the audit data. Thus, selecting the set of audits on a given computer based upon the host identity is equivalent to enabling or disabling all audit event types on that computer. - Audits for specific file system and registry named object identities are configured using the Explorer and Registry Editor. These system utilities provide an administrator interface to modify the system access control list (SACL) of any file or registry key in order to include or exclude it for auditing. All named object types in the system are audited based upon the same SACL mechanism, however the system does not provide administrator management interfaces for other object types. The following topics describe how to select audits for file or registry key objects: Apply or Modify Auditing Policy Settings for a Local File or Folder: - Audit activity on a registry key: Audits may be included or excluded for specific user identities by use of the auditpol.exe utility as described by the following topic: Auditpol set: As noted in the topic the administrator may not be excluded from audit policy. Audits for specific user identities are also selected by managing the SACL of named objects, and thus is also configured using the Explorer and Registry Editor administrator interfaces as described above. Only the administrator has access to the commands that may be used to clear audit log of all audit records. It is not possible to delete individual audit records. 7.5 Managing Audit Log Size Microsoft 2014 Page 28 of 30

Windows Advanced Audit Policy Configuration

Windows Advanced Audit Policy Configuration Windows Advanced Audit Policy Configuration EventTracker v7.x Publication Date: May 6, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This document describes auditing

More information

Audit Policy Subcategories

Audit Policy Subcategories 668 CHAPTER 20 Windows Server 2008 R2 Management and Maintenance Practices These recommended settings are sufficient for the majority of organizations. However, they can generate a heavy volume of events

More information

Windows Server 2008/2012 Server Hardening

Windows Server 2008/2012 Server Hardening Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible

More information

Defense Security Service Office of the Designated Approving Authority

Defense Security Service Office of the Designated Approving Authority Defense Security Service Office of the Designated Approving Authority Baseline Technical Security Configuration of Microsoft Windows 7 and Microsoft Server 2008 R2 Version 1.0 Title Page Document Name:

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

[MS-GPAC]: Group Policy: Audit Configuration Extension

[MS-GPAC]: Group Policy: Audit Configuration Extension [MS-GPAC]: Group Policy: Audit Configuration Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Integrate Check Point Firewall

Integrate Check Point Firewall Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Step By Step Guide: Demonstrate DirectAccess in a Test Lab Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008

More information

Secure IIS Web Server with SSL

Secure IIS Web Server with SSL Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Introduction to DirectAccess in Windows Server 2012

Introduction to DirectAccess in Windows Server 2012 Introduction to DirectAccess in Windows Server 2012 Windows Server 2012 Hands-on lab In this lab, you will configure a Windows 8 workgroup client to access the corporate network using DirectAccess technology,

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

NETWRIX PASSWORD MANAGER

NETWRIX PASSWORD MANAGER NETWRIX PASSWORD MANAGER ADMINISTRATOR S GUIDE Product Version: 6.1 February/2012 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Microsoft Corporation. Status: Preliminary documentation

Microsoft Corporation. Status: Preliminary documentation Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving

More information

Web. Security Options Comparison

Web. Security Options Comparison Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.

More information

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft

More information

[MS-GPAC]: Group Policy: Audit Configuration Extension

[MS-GPAC]: Group Policy: Audit Configuration Extension [MS-GPAC]: Group Policy: Audit Configuration Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation

More information

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date 19.05.2010 Version V1.0

SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date 19.05.2010 Version V1.0 SECO Whitepaper SuisseID Smart Card Logon Configuration Guide Prepared for SECO Publish Date 19.05.2010 Version V1.0 Prepared by Martin Sieber (Microsoft) Contributors Kunal Kodkani (Microsoft) Template

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

Entrust Managed Services PKI

Entrust Managed Services PKI Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

McAfee Firewall Enterprise 8.2.1

McAfee Firewall Enterprise 8.2.1 Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security

More information

TS Gateway Step-By-Step Guide

TS Gateway Step-By-Step Guide TS Gateway Step-By-Step Guide Microsoft Corporation Published: December 2007 Modified: July 2008 Abstract Terminal Services Gateway (TS Gateway) is a new role service available to users of the Microsoft

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

High Availability Setup Guide

High Availability Setup Guide High Availability Setup Guide Version: 9.0 Released: March 2015 Companion Guides: The UniPrint Infinity Administrator s Guide, Cluster Guide and Mobile Setup Guide can be found online for your convenience

More information

Security IIS Service Lesson 6

Security IIS Service Lesson 6 Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the

More information

Module 8: Implementing Group Policy

Module 8: Implementing Group Policy Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

EventTracker: Support to Non English Systems

EventTracker: Support to Non English Systems EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to

More information

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

vtcommander Installing and Starting vtcommander

vtcommander Installing and Starting vtcommander vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on

More information

AD RMS Step-by-Step Guide

AD RMS Step-by-Step Guide AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to

More information

Managing Multi-Hypervisor Environments with vcenter Server

Managing Multi-Hypervisor Environments with vcenter Server Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent

More information

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4 Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 Domain Controllers Version: 3.0.0 Symantec Enterprise Security Manager Baseline Policy Manual for

More information

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection White Paper Deploying EUM SurfControl Web Filter for MS Windows rev. 1.1, January 2005 Enterprise Threat Protection ..... ACKNOWLEDGEMENTS SurfControl wishes to acknowledge the following people for their

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

File Auditor for NAS, Net App Edition

File Auditor for NAS, Net App Edition File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for

More information

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Windows 7 / Server 2008 R2 Configuration Overview. By: Robert Huth Dated: March 2014

Windows 7 / Server 2008 R2 Configuration Overview. By: Robert Huth Dated: March 2014 Windows 7 / Server 2008 R2 Configuration Overview By: Robert Huth Dated: March 2014 Expectations This Windows 7 / Server 2008 R2 (Win7-2K8) presentation is a general overview of the technical security

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008. Table of Contents Lab 1: Configuring Windows Server 2008 1

Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008. Table of Contents Lab 1: Configuring Windows Server 2008 1 Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008 Table of Contents Lab 1: Configuring Windows Server 2008 1 Information in this document, including URL and other Internet Web

More information

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc. Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Parallels Mac Management for Microsoft SCCM 2012

Parallels Mac Management for Microsoft SCCM 2012 Parallels Mac Management for Microsoft SCCM 2012 Administrator's Guide v3.0 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Microsoft Corporation Published: October 2007 Author: Dave Bishop Editor: Scott Somohano Technical Reviewers: Sarah

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

EventTracker Enterprise v7.3 Installation Guide

EventTracker Enterprise v7.3 Installation Guide EventTracker Enterprise v7.3 Installation Guide Publication Date: Sep 11, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help the users to install

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved.

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved. CRYPTOLogon Agent for Windows Domain Logon Authentication Deployment Guide Table of Contents 1. OVERVIEW... 1 1.1 SINGLE AUTHENTICATION MODE (MS-GINA REPLACEMENT)... 1 1.2 DUAL AUTHENTICATION MODE (MS-GINA

More information

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc. nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

How to Logon with Domain Credentials to a Server in a Workgroup

How to Logon with Domain Credentials to a Server in a Workgroup How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos johan@accessdenied.be Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using

More information

NTP Software File Auditor for NAS, EMC Edition

NTP Software File Auditor for NAS, EMC Edition NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,

More information

Upgrade Guide. Upgrading to EventTracker v6.0. Upgrade Guide. 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007.

Upgrade Guide. Upgrading to EventTracker v6.0. Upgrade Guide. 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007. Upgrading to EventTracker v6.0 Upgrade Guide 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007 Columbia MD 21046 877.333.1433 Abstract The purpose of this document is to help users

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Internet Authentication Service (IAS) Operations Guide

Internet Authentication Service (IAS) Operations Guide Internet Authentication Service (IAS) Operations Guide Microsoft Corporation Published: August 2005 Author: James McIllece Editor: Scott Somohano Abstract The Internet Authentication Service (IAS) Operations

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers) Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 (Domain Member Servers and Domain Controllers) Symantec Enterprise Security Manager Baseline Policy

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Laboratory Exercises V: IP Security Protocol (IPSec)

Laboratory Exercises V: IP Security Protocol (IPSec) Department of Electronics Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture (FESB) University of Split, Croatia Laboratory Exercises V: IP Security Protocol (IPSec) Keywords:

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

PLANNING AND DESIGNING GROUP POLICY, PART 1

PLANNING AND DESIGNING GROUP POLICY, PART 1 84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General Default Domain Default Domain Data collected on: 10/12/2012 5:28:08 PM General Details Domain Owner Created Modified User Revisions Computer Revisions Unique ID GPO Status webrecon.local WEBRECON\Domain

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

VT Technology Management Utilities for Hyper-V (vtutilities)

VT Technology Management Utilities for Hyper-V (vtutilities) VT Technology Management Utilities for Hyper-V (vtutilities) vtutilities provide a local graphical user interface (GUI) to manage Hyper-V. Hyper-V is supported on Windows Server 2008 R2 and Windows Server

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information