Securing IIS Servers. Securing IIS Servers. Securing IIS Servers. Securing IIS Server. Securing IIS Servers. Securing IIS Servers.



Similar documents
A Roadmap for Securing IIS 5.0

Windows IIS Server hardening checklist

Hardening IIS Servers

Security Guidelines for MapInfo Discovery 1.1

IIS Deployment Procedures

Internet Information TE Services 5.0. Training Division, NIC New Delhi

SHARING FILE SYSTEM RESOURCES

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Windows Operating Systems. Basic Security

IIS Web Server Hardening

Chapter 2 Editor s Note:

Understanding Microsoft Web Application Security

By Citrix Consulting Services. Citrix Systems, Inc.

70-685: Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Guide to the Secure Configuration and Administration of Microsoft Internet Information Server 4.0

Reference and Troubleshooting: FTP, IIS, and Firewall Information

FTP, IIS, and Firewall Reference and Troubleshooting

Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2008R2

WEBCONNECT INSTALLATION GUIDE. Version 1.96

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

StruxureWare Power Monitoring 7.0.1

Security IIS Service Lesson 6

Sysax Multi Server User manual

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Guide to the Secure Configuration and Administration of Microsoft Internet Information Services 5.0

PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE

Using Logon Agent for Transparent User Identification

CHARON-VAX application note

Exam: QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4

FILE TRANSFER PROTOCOL (FTP) SITE

Version 5.12 December P Xerox CentreWare Web Installation Guide

Hardening Windows Philip Cox

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

Windows Server 2003 default services

Troubleshooting CallManager Problems with Windows NT and Internet Information Server (IIS)

Windows 7, Enterprise Desktop Support Technician

ilaw Installation Procedure

Installation Instruction STATISTICA Enterprise Server

SellerDeck. IIS6 Setup Guide. Detailing the setup Windows 2003 (IIS6) Server

Server Installation Manual 4.4.1

NETWRIX FILE SERVER CHANGE REPORTER

Configuring Web services

Web Security School Entrance Exam

IIS 6: The Complete Reference

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

Sentinel Installation Guide

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Click Studios. Passwordstate. Installation Instructions

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

3M Command Center. Installation and Upgrade Guide

CA Nimsoft Monitor Snap

Managing and Maintaining a Windows Server 2003 Network Environment

Microsoft Internet Information Services Solution 1.0

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

SteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit. Administration Guide

intertrax Suite resource MGR Web

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Administrators guide to the Matrix Control Panel

Installation and Deployment

XIA Configuration Server

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Microsoft Exchange 2010 and 2007

Table of Contents. Introduction. Audience. At Course Completion

MCTS Self-Paced Training Kit (Exam ): Configuring Windows Server 2008 Application Platform

Networking Best Practices Guide. Version 6.5

MCSE TestPrep: Windows NT Server 4, Second Edition Managing Resources

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Kaseya Server Instal ation User Guide June 6, 2008

Access It! Universal Web Client Integration

Description of Microsoft Internet Information Services (IIS) 5.0 and

To install the SMTP service:

Black Viper's Windows XP Home and Professional Service Pack 2 Service Configurations (Posted because his site went down inexplicably)

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

Chapter 4 Managing Your Network

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

MCTS Self-Paced Training Kit (Exam ): Configuring Windows Server 2008 Application Platform

Troubleshooting Citrix MetaFrame Procedures

Configuring Security Features of Session Recording

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version Fix Pack 2.

Security. TestOut Modules

Microsoft" Windows8 Home Server

Microsoft Security Bulletin MS Important

GlobalSCAPE DMZ Gateway, v1. User Guide

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Transcription:

Presented to WNUG Nov. 1, 2001 By Mehran Yahya & Pat Schneider Installation Authentication Permissions and Authorization Web Applications Protect the Metabase Monitoring and Logging Utilities Miscellaneous Web sites, products, training Securing IIS Server Installation Only install necessary components Do not have server connected to ethernet during the installation Apply all service packs and hot fixes Remove printer and file support Disable unnecessary services and subsystems DHCP Client DFS Fax Service FTP Publishing Indexing Service NNTP Print Spooler NNTP Service IPSec Policy Agent RunAs Smart Card Smart Card Helper Telephony Telnet Terminal Services WMI WMI Driver Extensions NetMeeting Messenger SMTP Service Installation (cont.) Delete sample files Delete or move sample scripts Remove Internet Explorer Security Templates Remove any resource kits or SDKs that were installed Secure dangerous executables ARP.EXE AT.EXE ATTRIB.EXE CMD.EXE COMMAND.EXE CSCRIPT.EXE FTP.EXE NET.EXE NET1.EXE TFTP.EXE WSCRIPT.EXE HYPERTERM.EXE HTIMAGE.EXE IPCONFIG.EXE NBSTAT.EXE PING.EXE POLEDIT.EXE QBASIC.EXE REGEDIT.EXE REGEDIT32.EXE RUNAS.EXE XCOPY.EXE 1

Authentication Anonymous access Use of SSL NTFS permissions for website content volumes Set initial NTFS permissions settings on the root of the volume Administrators : Full control (Apply onto: This folder, subfolders, and files) System: Full control (Apply onto: This folder, subfolders and files) Check the box on the Permissions tab to Reset permissions on all child objects and enable propagation of inheritable permissions NTFS permissions for website content volumes Set initial NTFS audit settings on the root of the volume Everyone: Failed Everyone: Successful Create File/Append Data Create Folders/Append Data Delete Subfolders and Files Delete Change Permissions Take Ownership Check the box on the Auditing tab to Reset auditing entries on all child objects and enable propagation of inheritable auditing entries NTFS permissions for IIS files Anonymous access Read only System, Administrators & Operators Full Control Authors Modify (includes all permissions as Full Control except Take Ownership, Change Permissions, and Delete Subfolders and Files) Individual Groups Whatever permissions are necessary for the roles determined for the groups IIS Permissions Four IIS permissions for the contents of folders; control what HTTP commands the server will accept from the browser Read Write Script Source Access Directory Browsing Three application permissions (Execute) None Scripts Only Scripts and Executables Best Practices for Website Folders Physical folder structure /root starting point of the website Home page /scr stores scripts Don t call it scripts as this is a tip -off for hackers /exe executables Don t call it bin or cgi-bin as this is a tip-off for hackers; may not even want to call it exe /images graphics Reduces clutter in other folders and can be removed from logging 2

Best Practices for Website Folders Write IIS permission should not be assigned to any folder unless that folder has been specially created and secured for content authors. Write and Execute IIS permissions should never be assigned to any folder accessible to anonymous users. Script Source Access IIS permission should not be assigned to any folder unless that folder has been specially created and secured for content authors. No folder should have more IIS or NTFS permissions than necessary to allow legitimate browsing and authoring by the appropriate groups. Do not enable Directory Browsing IIS permission on a folder unless you specifically want anonymous users to see every file and subfolder. Avoid using folder names that are obvious as this makes them vulnerable to attacks. Web Applications ISAPI Filters vsisapi Extensions Filters are DLLs which register hooks with IIS so that they will be invoked when certain internal IIS events occur. Event triggers pass control of a request or response to an ISAPI filter DLL (Example: SSL encryptions) Extensions are DLLs or programs which are associated with files of a certain filename extensions so that when a browser makes a request to such a file, the program is automatically executed. Typically script engines or command interpreters Unmap Unused ISAPI Extensions and HTTP Verbs Map.HTM files to the ASP.DLL Conceal the fact that you are using Active Server Pages by associating.htmfiles with ASP.DLL and leave.html files as regular static pages Remove unused HTTP verbs Most pages usually only need GET and POST Mappings will reappear any time you change a Windows Component using Add/Remove Programs in the Control Panel ADSUTIL.VBS script installed with IIS can be used to show or set values in the metabase ISAPI Filters Four default filters SSPIFILT.DLL implements SSL encryption for all websites using HTTPS COMPFILT.DLL implements HTTP compressions of requested files using GZIP and DEFLATE protocols MD5FILT.DLL used with Digest authentication FPEXEDLL.DLL provides compatibility with FrontPage Delete Unused ISAPI Filters All ISAPI filters are loaded into the process space INETINFO.EXE and run with System context. Remove filters in both the Master-Level property sheet for the WWW Service and in the property sheet of each website. Remove FPEXEDLL.DLL if you re not using FrontPage Remove MD5FILT.DLL if you re not using Digest authentication Remove SSPIFILT.DLL if you re not using SSL encryption or certificate authentication Remove COMPFILT.DLL to disable HTTP compression if security is more important than performance. Protect the Metabase The metabase is IIS s configuration database (like the system registry) Location is determined by a registry value which can be modified (not recommended unless you re paranoid!) Hive: HKEY_LOCAL_MACHINE Key: \Software\Microsoft\InetMgr\Parameters Value Name: MetadataFile Value Type: REG_SZ Value Data: <drive letter, path, and filename of the metabase> 3

Protect the Metabase(cont.) Move the HTTP/FTP root folders off the %systemroot % volume Secure the registry key which determines the metabaselocation Audit all failed access to the metabasefile Set NTFS permissions on the metabasefile to the following: Administrators: Full Control System: Full Control Protect the Metabase (cont.) After configuring IIS, backup the metabase Use the official backup method using the IIS snap-in Right-click the computer, select Action, Backup/Restore Configuration, Create Backup Secure the default backup file %systemroot%\system32\inetsrv\metaback\.mdo Monitoring and Logging Use performance monitor Log monitor output to a data file Determine an appropriate period of time for monitoring activity Get a baseline set of statistics What to Monitor? Active Server Pages Errors/Sec Request Not Authorized Disk Logical Disk\% of Free Space IP Datagrams Received Header Errors Datagrams Received Unknown Protocol Fragment Re-Assembly Failures What to Monitor? (cont.) Memory Available Mbytes Network Interface Packets Received Errors Packets Received Unknown Paging File % Usage Processor % Processor Time What to Monitor? (cont.) Server Errors Access Permissions Errors Granted Access Errors Logon TCP Connection Failures Connections Reset UDP Datagrams No Port/Sec 4

What to Monitor? (cont.) Web Service Anonymous Users/Sec NonAnonymous User/Sec Connection Attempts/Sec Logon Attempts/Sec Not Found Errors/Sec Other Request Methods/Sec Service Uptime Event Viewer Logs Enable Auditing Account Logon Events: Success, Failure Account Management: Success, Failure Directory Service Access: Failure Logon Events: Success, Failure Object Access: Success, Failure Policy Change: Success, Failure Privilege Use: Success, Failure Process Tracking: None System Events: None Event Viewer Logs NTFS File Access Audit Audit all the different types of failed access for the entire file system Audit successful actions for Everyone for: Create Files / Write Data Create Folder / Append Data Delete Subfolders and Files Delete Change Permissions Take Ownership IIS Protocol Logging Enable logging at the website Disable logging for each folder/file you don t want to log Set the location for the log files Secure the log files using NTFS permissions Date Time Client IP Address User Name Method URI System URI Query Protocol Status Win32 Status Service Name Service Name Server IP Server Port Bytes Sent Bytes Retrieved Time Taken Protocol Version Host User Agent Cookie Referrer Utilities Resource Kit METAEDIT.EXE IIS configuration tool PLAYBACK.EXE Records incoming traffic on an IIS 5.0 server then allows it to be played back on another server Stress test utility IIS Permissions Wizard Template Maker 5

Utilities (cont.) Command Line ADSUTIL.VBS Metabase configuration IISRESET.EXE stop/start IIS services; reboot the server SECEDIT.EXE Applies security templates HFNETCHK.EXE Network security hotfixchecker QCHAIN.EXE Installs multiple hotfixes QFECHECK.EXE Verifies successful installation of hotfixes SFC.EXE Windows file protection; checks for corrupt system files NETSTAT.EXE many uses; one to determine if system is being SYN-flooded Miscellaneous Throttling IIS Limit connections Set connection timeouts Administration Website (HTMLA) Secure the site with SSL, authentication, IP address restrictions Miscellaneous FrontPage Keep current with updates Require SSL and IP filtering when authoring See the chapter in the FrontPage Resource Kit on security (Online version can be found at http://www.microsoft.com/frontpage/wpp/serk) Refer to TechNet for additional FrontPage security topics References Web Sites Microsoft Sites http://microsoft.com/security http://microsoft.com/technet/iis http://microsoft.com/technet/iis/frontpg.asp http://webtool.rte.microsoft.com References Web Sites (cont.) Other Sites http://packetstormsecurity.com http://www.securityfocus.com http://nsa1.www.conxion.com http://www.15seconds.com/focus/security.htm http://staff.washington.edu/dittrich/misc/ddos http://www.insecure.org/nmap http://www.ietf.org http://www.iisfaq.com References E-Mail Bulletins http://www.sans.org http://www.microsoft.com/security http://www.securityfocus.com http://www.ntshop.net 6

References Books & Magazines Windows 2000 Magazine http://www.win2000mag.com Designing Secure Web-Based Applications for Microsoft Windows 2000 by M. Howard, M. Levy and R. Waymire (Microsoft Press) Hacking Exposed Windows 2000by Joel Scambray, Stuart McClure (McGraw-Hill) Securing Windows NT/2000 Servers for the Internet by Stefan Norberg, Deborah Russell (O Reilly) Windows 2000 Security by Roberta Bragg (New Riders) References Third Party Products ISS References Training SANS Institute Securing Internet Information Server 5.0 This course is available as a classroom course or online http://www.sans.org 7