Windows Security Environment



Similar documents
Windows security for n00bs part 1 Security architecture & Access Control

Introduction to Computer Security

Computer Security: Principles and Practice

Windows servers. NT networks

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

Windows Server 2008/2012 Server Hardening

About Microsoft Windows Server 2003

Windows Advanced Audit Policy Configuration

Web. Security Options Comparison

Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall Lake

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Windows NT Server Operating System Security Features Carol A. Siegel Payoff

Windows Operating Systems. Basic Security

SECURITY SUBSYSTEM IN WINDOWS

Windows NT. Chapter 11 Case Study 2: Windows Windows 2000 (2) Windows 2000 (1) Different versions of Windows 2000

How To Write A Windows Operating System (Windows) (For Linux) (Windows 2) (Programming) (Operating System) (Permanent) (Powerbook) (Unix) (Amd64) (Win2) (X

GINA Implementation in the RSA Authentication Agent 6.1

CIS 551 / TCOM 401 Computer and Network Security

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

Windows Server 2003 default services

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

Walton Centre. Document History Date Version Author Changes 01/10/ A Cobain L Wyatt 31/03/ L Wyatt Update to procedure

Windows8 Internals, Sixth Edition, Part 1

Objectives. At the end of this chapter students should be able to:

OPERATING. William Stallings

[MS-GPAC]: Group Policy: Audit Configuration Extension

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Agency Pre Migration Tasks

AdminToys Suite. Installation & Setup Guide

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Security Options... 1

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company

SQL Server Hardening

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Chapter 6, The Operating System Machine Level

Objectives I. IY5512 Computer Security. Agenda. Objectives II. Chris Mitchell. Final part of the course covers:

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright , CRYPTOCard Corporation, All Rights Reserved.

70-685: Enterprise Desktop Support Technician

XyLoc Windows7 Client Release Notes

[MS-GPAC]: Group Policy: Audit Configuration Extension

Run-Time Deep Virtual Machine Introspection & Its Applications

Remote Desktop Administration

Operating System Structures

Cloud Attached Storage 5.0

Windows network services for Samba folks

Pearl Echo Installation Checklist

GE Measurement & Control. Cyber Security for NEI 08-09

Windows 7, Enterprise Desktop Support Technician

Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations

Administration Guide ActivClient for Windows 6.2

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

Windows 7, Enterprise Desktop Support Technician

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Installation and Administration Guide

RSA SecurID Ready Implementation Guide

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix

Windows 7. Qing Liu Michael Stevens

Agent Configuration Guide

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

How To - Implement Single Sign On Authentication with Active Directory

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

ISO COMPLIANCE WITH OBSERVEIT

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Choosing an SSO Solution Ten Smart Questions

Module 10: Maintaining Active Directory

DIGIPASS Authentication for Windows Logon Product Guide 1.1

Windows" 7 Desktop Support

Session 17 Windows 7 Professional DNS & Active Directory(Part 2)

Navigating Endpoint Encryption Technologies

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Windows 7 Core Services: Application Experience. Application Information. Background Intelligent Transfer. Base Filtering Engine.

BMC Performance Manager Windows Security White Paper DCOM / WMI

Chapter 3: Operating Systems

Active Directory Compatibility with ExtremeZ-IP

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

NETWRIX IDENTITY MANAGEMENT SUITE

Security Testing. How security testing is different Types of security attacks Threat modelling

RSA SecurID Ready Implementation Guide

Installing Windows XP Professional

Liquid Machines Document Control Client Version 7. Helpdesk Run Book and Troubleshooting Guide

AT&T Global Network Client Domain Logon Guide. Version 9.6

What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team

RSA Authentication Manager 7.1 Basic Exercises

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

ANSYS EKM Overview. What is EKM?

VNC Upgrade Guide. Version 5.0. June 2012

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Transcription:

Motivation Popularity, widespread use of Windows Big surface, big impact Protection via user/kernel architecture and CPU modes Multiple-users environment, same physical resources Easy to install < security > easy to use 1

Basic concepts Principal must be authenticated Identification Challenging the user Most OS objects are secured Authorization Enforcing rights on objects Owner of an object defines its security Enforcing discretion Administrators define the security boundary Management Enforcing policy Administrators audit security-related events Accountability Tracking actions 2

Security Subsystem 3

Security System Components Security Reference Monitor (SRM) Secured objects accesses validation, Event log audit messages management Local Security Authority Subsystem (LSASS) Provide authentication Local system policy, privileges and password management Creation of local accounts Creation of the Shell - User environment initialization Security Account Manager (SAM) User names/groups accounts management Logon Process (Winlogon) Provide protected interactive logon SAS Remove any UI, Place GINA, Capture Keyboard Manage GINA Plug-ins Graphical Identification and Authentication (GINA) User interface authentication management Net Logon service (NetLogon) Domain locater Authentication forwarder 4

Security System Components 5

Objects - Protection OS is object oriented Objects are protected by the SRM Common, uniform mechanisms for using system resources Central location for important tasks on objects Provide human-readable names for system resources Share resources and data among processes Protect resources from unauthorized accesses Support of objects use and processes quota Uniform rules for object retention 6

Object - Types Type Description Process Program invocation, including the address space and resources required to run the program Thread Executable entity within a process Job Collection of processes manageable as a single entity Section Region of shared memory File Instance of an opened file or I/O device Port Destination for messages passed between process Access token Security profile (user SID, user rights, ) of a process or a thread Event Object with a persistent state (signaled, not signaled) used for synchronization or notification Semaphore Counter that regulates the number of threads that can use a resource Mutex Synchronize (serialize) access to a resource Timer Notify a thread when a fixed period of time elapses Symbolic link Indirectly referencing an object Key Index key for referring to records in the configuration database (registry) Window station Contains a clipboard, a set of global atoms, and a group of desktop objects Desktop Contains windows, menus and hooks Application object Application private object 7

Local Authentication Request Steps that are taking place during a local logon 8

Remote Authentication Request Steps that are taking place during a remote logon 9

Security Information Storages Local Users, Groups and passwords (encrypted) Trusted domains names and passwords (encrypted) Hive Name Description Files HKLM\SAM Security Access Manager data SAM, SAM.LOG, SAM.SAV HKLM\SECURITY Accounts and Passwords data SECURITY, SECURITY.LOG, SECURITY.SAV Hive Name HKLM\SECURITY\Policy\LSA\Secrets Sub-key $MACHINE.ACC GINA plugin Key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GinaDll Value MyGina.dll 10

Logon Sessions Motivations Access to a machine needs authentication Access to secured resource needs new authentication Access to remote secured resource needs new authentication Definitions Documents a successful principal authentication (badge) Represents principal appearance Allows a principal to use secured resources Contains principal credentials Determines lifetime of a process Benefits Comfort Performance 11

Logon Sessions Types System House of the TCB s (privileged) processes and boundary First created (compulsory) and unique (boot) Only one that can create other logon sessions Last removed Network Once per authenticated connection Does not cache user identification (credentials misuse) Cannot initiate a network authentication exchange (single hop) Batch and Services Created by the SCM House of the NT Services and DCOM objects Interactive Created (on demand) when user successfully logs-on Unique House of all user s processes Only one that can interact with the user (desktop/keyboard/mouse events) Caches user credentials to transparently respond to network authentication requests Resource expensive Removed when no more needed (user logs off) 12

Logon Sessions Types Windows is fully functional without an interactive user Creation Always Most of the time On demand Processes protection Processes boundaries 13

Viewing the Logon sessions 14

Access Token Motivation Single security settings container for all processes (badge) Allow process security customization without affecting other processes Allow processes autonomy - every program inherits a copy of the initial token winlogon created Definition Document privileges, accounts and groups associated with a process/thread Visible area of a Logon session Always associated with a single Logon session Benefits Use protected resource without caring about security Consistent security settings policy by keeping default settings centralized - CreateFile(...LPSECURITY_ATTRIBUTES...) 15

Anatomy of a Token User Account SID Principal behind the process/thread Group(s) SID(s) List of groups User s account is member of Privileges List of (collection) rights associated with the token Default DACL List of who can do what applied when a process/thread does not explicitly provide it Expiration Time Period of time before expiring Unused since NT3.1 No SACL! SACL are given at administrator s discretion 16

Window stations Motivation Windows message-based attack from another process Just as pointers are process relative, handles are window station relative Create sandbox Windows objects are living in Advantage Increases the programming comfort. Windows are objects and yet CreateWindowEx( ) API does not need a reference to a Security Descriptor.. CreateWindowStation(..) API references a Security Descriptor! 17

Desktops A desktop contains all screens of a specific session. 18

Profiles Principals using system resources are associated with a profile 19

Links Programming NT Security (Addison-Wesley, Keith Brown) Windows NT Security (R&D Books Miller Freeman, N.Okuntseff) Windows NT Security Guide (Addison Wesley, Stephen A. Sutton) Windows Internals (Microsoft Press, Russinovich) Secure Networking with Windows 2000 and Trust Services (Addison Wesley, Jalal Feghhi and Jalil Feghhi) Modern Operating Systems Second Edition (Prentice Hall, Tanenbaum) 20