SECURITY SUBSYSTEM IN WINDOWS



Similar documents
Windows security for n00bs part 1 Security architecture & Access Control

Introduction to Computer Security

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

Computer Security: Principles and Practice

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Windows NT Server Operating System Security Features Carol A. Siegel Payoff

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

Windows Operating Systems. Basic Security

Windows Server 2008/2012 Server Hardening

Windows servers. NT networks

Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Windows Security Environment

Web. Security Options Comparison

Using. Microsoft Virtual PC. Page 1

Find the Who, What, Where and When of Your Active Directory

Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

CONNECT-TO-CHOP USER GUIDE

Windows Server 2003 Active Directory MST 887. Course Outline

New ehealth Computer Account User Information. July 2014

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices Edition Don Jones

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ILTA HANDS ON Securing Windows 7

Integrating LANGuardian with Active Directory

Installation Guide - Client. Rev 1.5.0

Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall Lake

AT&T Global Network Client Domain Logon Guide. Version 9.6

Objectives. At the end of this chapter students should be able to:

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Windows8 Internals, Sixth Edition, Part 1

CIS 551 / TCOM 401 Computer and Network Security

Windows Advanced Audit Policy Configuration

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006

SIEMENS. Sven Lehmberg. ZT IK 3, Siemens CERT. Siemens AG 2000 Siemens CERT Team / 1

TestElite - Troubleshooting

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Audit account logon events

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

Five Steps to Improve Internal Network Security. Chattanooga ISSA

VERITAS Backup Exec TM 10.0 for Windows Servers

Networking Best Practices Guide. Version 6.5

Windows XP Exchange Client Installation Instructions

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Module 8: Implementing Group Policy

[MS-GPAC]: Group Policy: Audit Configuration Extension

Belarc Advisor Security Benchmark Summary

About Microsoft Windows Server 2003

How to monitor AD security with MOM

EPM Performance Suite Profitability Administration & Security Guide

PLANNING AND DESIGNING GROUP POLICY, PART 1

[MS-GPAC]: Group Policy: Audit Configuration Extension

Windows Server Password Recovery Techniques Courtesy of Daniel Petri

June 20, Copyright 2012 by World Class CAD, LLC. All Rights Reserved.

Setting up an MS SQL Server for IGSS

High Availability Setup Guide

NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v

For Active Directory Installation Guide

BMC Performance Manager Windows Security White Paper DCOM / WMI

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Admin Report Kit for Active Directory

Dell InTrust 11.0 Best Practices Report Pack

nitrobit group policy

Goverlan Remote Control

EMC Celerra Network Server

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0

Migrating helpdesk to a new server

Deployment of Keepit for Windows

Password Changer for DOS User Guide

Running 4D Server as a Service on Windows

Step by step guide for connecting PC to wired LAN at dormitories of University of Pardubice

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

Security Options... 1

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

KETS Enterprise VPN. Client Installation and Configuration Guide. Version 2.3

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Check Point FDE integration with Digipass Key devices

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Security Explorer 9.5. User Guide

Objectives I. IY5512 Computer Security. Agenda. Objectives II. Chris Mitchell. Final part of the course covers:

The Institute of Internal Auditors Detroit Chapter Presents

Citrix Access Gateway Plug-in for Windows User Guide

Tutorial: How to Use SQL Server Management Studio from Home

Table of Contents WELCOME TO ADAUDIT PLUS Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

BestSync Tutorial. Synchronize with a FTP Server. This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server.

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

Pass-the-Hash: How Attackers Spread and How to Stop Them

INSTALLATION AND CONFIGURATION GUIDE

FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI

70-685: Enterprise Desktop Support Technician

Transcription:

Operating Systems SECURITY SUBSYSTEM IN WINDOWS Zoltán Micskei http://www.mit.bme.hu/~micskeiz Budapesti Műszaki és Gazdaságtudományi Egyetem Neeraj Suri Méréstechnika és Információs Rendszerek Tanszék EU-NSF ICT March 2006

Copyright Notice These materials are part of the Windows Operating System Internals Curriculum Development Kit, developed by David A. Solomon and Mark E. Russinovich with Andreas Polze Microsoft has licensed these materials from David Solomon Expert Seminars, Inc. for distribution to academic organizations solely for use in academic environments (and not for commercial use) http://www.academicresourcecenter.net/curriculum/pfv.aspx?id=6191 2000-2005 David A. Solomon and Mark Russinovich 2

Questions SID HKLM BSOD 3

Security tasks in Windows Authentication Has / Knows / Is E.g. logon screen, password popup Authorization Principle: Role based access control E.g. access control lists Auditing Audit logging 4

Security tasks in Windows Authentication Has / Knows / Is E.g. logon screen, password popup Authorization Principle: Role based access control E.g. access control lists Auditing Audit logging 5

Security entities in Windows 6

Security Identifier (SID) Unique identifier E.g. SID of a machine: S-1-5-21-2052111302-1677128483-839522115 Users, groups: <Machine SID>-<RID> RID: relative identifier Well-known SIDs Everyone: S-1-1-0 Administrator: S-1-5-domain-500 Vista: services also get their own SIDs 7

DEMO Security identifier (SID) psgetsid.exe machinename psgetsid.exe administrator psgetsid.exe <user>

Authentication Login Through Winlogon s own desktop Secure Attention Sequence: Ctrl + Alt + Del Windows 8: Microsoft account, picture password Storing passwords: Hash in the registry Network authentication NTLM: NT LAN Manager Kerberos: since Windows 2000, in domain environment 9

Authentication Access token Impersonation 10

Security tasks in Windows Authentication Has / Knows / Is E.g. logon screen, password popup Authorization Principle: Role based access control E.g. access control lists Auditing Audit logging 12

Categorizing authorization (see prev. lecture) Compulsoriness Mandatory Discretionary Authorization categories Level System level Resource level Types Integrity control Access control lists 13

Authorization methods in Windows Mandatory Integrity Control System level privileges and rights Discretionary Access Control 17

DEMO Mandatory Integrity Control Vista feature icacls /setintegritylevel H M L Trying No write up psexec l cmd.exe: starts with low integrity e.g. Internet Explorer uses MIC

Authorization methods in Windows Mandatory Integrity Control System level privileges and rights Discretionary Access Control 19

System level authorization Privilege operating system level E.g.: shutdown machine, load device driver Name: SeShutdownPrivilege, SeLoadDriverPrivilege Account right who / how can or cannot login E.g.: interactive, network logon 20

DEMO Privileges Local Security Policy Privileges whomai /priv Local Policy: User rights Local Security Policy Password policy Account locking Security options

Authorization methods in Windows Mandatory Integrity Control System level privileges and rights Discretionary Access Control 22

Access control lists 23

Access control lists Windows object E.g. file, registry key, pipe 24

Access control lists High level structure 25

Access control lists Can change the object s permissions even if no access is defined 26

Access control lists Discretionary Access Control List Access control 27

Access control lists System Access Control List Security auditing 28

Access control lists Type allow, deny, audit Flag E.g. inheritance SID who to apply Mask execute delete write owner 29

Access control lists - Example Object C:\temp Descriptor Owner: Administrator DACL ACE1: allow, inherits, Administrators, list folders create files ACE2: allow, not inherited, Users, list folders read attributes SACL 30

Access control lists Inheritance flag For container type objects (e.g. folder) Child object inherits the ACE Evaluation method Several ACE can apply to a given SID UNION of all the permission from the ACEs Exception: deny ACE, it overcomes everything 31

DEMO Authorization Access control lists Basic permissions Inheritance Limiting inheritance Take ownership Effective permissions Union, except Deny ACE Debugging: Process Monitor

Security tasks in Windows Authentication Has / Knows / Is E.g. logon screen, password popup Authorization Principle: Role based access control E.g. access control lists Auditing Audit logging 33

Eventlog System, application, security events Event: Type, time, source, ID, description Overwrite events: Never, x day older, circular 34

DEMO Auditing Auditing policy Content of the security log Use of permissions

DEMO User Account Control, Runas Dangers of running as Administrator Working limited user Windows XP: Run as and runas command Showing Run as..: left SHIFT + right click Vista solution: UAC

DEMO Group Policy Computer settings Security options System componets, e.g. Windows Update User settings Applications Windows interface Templates Administrative templates ~2500 settings

Troubleshooting

DEMO Blue Screen of Death (BSOD) If there is no other choice Don t hate the messenger KeBugCheckEx function, Bugcheck.h Error reporting Creating memory dump Analyzing minidump in WinDgb

DEMO Problem solving Event log errors: Help & Support EventID.net Knowledge Base articles

Special startup modes Hit F8 before the Windows logo 41