84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff



Similar documents
Objectives. At the end of this chapter students should be able to:

ExhIBIT 1 User Manager and Users Group

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Windows Server 2008/2012 Server Hardening

Windows Operating Systems. Basic Security

EMC Celerra Network Server

Log Management and Intrusion Detection

MCSE TestPrep: Windows NT Server 4, Second Edition Managing Resources

White Paper. PCI Guidance: Microsoft Windows Logging

APPENDIX I Basic Windows NT Server 4.0 Installation and Configuration

SQL Server Automated Administration

Setting Up, Managing, and Troubleshooting Security Accounts and Policies

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

ChromQuest 5.0 Chromatography Data System

About Microsoft Windows Server 2003

Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change

How to monitor AD security with MOM

Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations

Windows 2000/XP DSS Auditing Written by: Darren Bennett - CISSP Originally Written 08/04/04 Last Updated 08/07/04

How to Manage a Windows NT Server Computer Remotely

ProficyTM. HMI/SCADA - ifix I MPLEMENTING S ECURITY

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Department of Information Technology Active Directory Audit Final Report. August promoting efficient & effective local government

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

Walton Centre. Document History Date Version Author Changes 01/10/ A Cobain L Wyatt 31/03/ L Wyatt Update to procedure

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

SOLAARsecurity. Administrator Software Manual Issue 2

WHITE PAPER. Best Practices for Configuring PATROL for Microsoft Exchange Servers

Application Security Policy

Web. Security Options Comparison

Using Windows Administrative Tools on VNX

Workflow Templates Library

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide

System Administration and Log Management

QUANTIFY INSTALLATION GUIDE

Matisse Installation Guide for MS Windows

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Certification review procedure for standalone systems or peer-to-peer networks with Windows NT, 2000, and XP

TROUBLESHOOTING INCORRECT REPORTING OF THE WHO CHANGED PARAMETER

Windows 2000/Active Directory Security

Find the Who, What, Where and When of Your Active Directory

3 Setting up Databases on a Microsoft SQL 7.0 Server

How To Set Up Dataprotect

PLANNING AND DESIGNING GROUP POLICY, PART 1

AVALANCHE MC 5.3 AND DATABASE MANAGEMENT SYSTEMS

Courseware Samples Complete Training Courses available for FREE preview

Advanced Event Viewer Manual

Joining. Domain. Windows XP Pro

NETASQ SSO Agent Installation and deployment

ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client

EVENT LOG MANAGEMENT...

SIEMENS. Sven Lehmberg. ZT IK 3, Siemens CERT. Siemens AG 2000 Siemens CERT Team / 1

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

Windows Server 2003 Logon Scripts Paul Flynn

Introduction. Activating the CFR Module License. CFR Configuration

Active Directory Change Notifier Quick Start Guide

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

Server Manager Help 10/6/2014 1

TROUBLESHOOTING GUIDE

Application Note - JDSU PathTrak Video Monitoring System Data Backup and Restore Process

Copyright. Disclaimer. Introduction 1. System Requirements Installing the software 4

4cast Server Specification and Installation

Integrating LANGuardian with Active Directory

Installation Guide - Client. Rev 1.5.0

SQL Server Hardening

Experion LX System Administration Guide

ILTA HANDS ON Securing Windows 7

Table of Contents WELCOME TO ADAUDIT PLUS Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

NETWRIX WINDOWS SERVER CHANGE REPORTER

1 of 10 1/31/2014 4:08 PM

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Lepide Software

Matisse Installation Guide for MS Windows. 10th Edition

Changing Passwords in Cisco Unity 8.x

EPM Performance Suite Profitability Administration & Security Guide

11 NETWORK SECURITY PROJECTS. Project Understanding Key Concepts. Project Using Auditing and Event Logs. Project 11.3

NovaBACKUP. User Manual. NovaStor / November 2011

VERITAS Backup Exec TM 10.0 for Windows Servers

Chapter 12 Network Administration and Support

Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6

Group Policy 21/05/2013

MS SQL Server Database Management

Hands-On Microsoft Windows Server 2008

How To Restore An Org Server With Anor Backup For Windows (Oracle)

NetWrix SQL Server Change Reporter

S m a r t M a s t e B T E C O R P O R A T I O N USER MANUAL

Connecting to the Remote Desktop Service

Activity 1: Scanning with Windows Defender

Belarc Advisor Security Benchmark Summary

Upgrading Centricity Electronic Medical Record Service Packs on Microsoft Windows Server

Dell Active Administrator 8.0

TrueEdit Remote Connection Brief

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Columbus Police Division Directive. I. Definitions. May 15, REVISED. Division Computer Systems

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

Events Forensic Tools for Microsoft Windows

Transcription:

84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff This article is designed to provide security administrators with a security checklist for going live with Windows NT. Each of the basic security and audit features of the Windows NT operating system is explained, and recommended values for these features are suggested. The security administrator can use these values to create a security baseline when the operating system is initially configured. Introduction The Windows NT operating system offers substantial security and audit features that have earned it the C2 evaluation for auditing and authentication from the National Computer Security Center (NCSC). The features described in this article should be implemented according to the policies and standards of the organization. Windows NT uses a client/server architecture in which clients and servers are grouped together to form domains. Each domain contains one or more servers, shares common data bases and security policies, and has a unique name. How the domains interact should be determined before the operating system is installed. The trust relationships between these domains must be based on the business needs of the organization in conjunction with its security policies. Creating the Security Access Token The interactive log-on process is unique to Windows NT and offers certain built-in security controls. In order to log on, the user has to press three keys simultaneously: Ctrl + Alt + Del. By requiring this particular key combination, the operating system terminates any background process, thus preventing any Trojan horse program (e.g., a password grabber) from executing. After these keys are correctly pressed, a valid user log-on is requested. The user must enter a user name and password. The security subsystem passes this input to the Security Account Manager, thereby identifying and authenticating the user. security account manager (SAM) compares this information to a security data base that contains the individual user profile. After it is authenticated, this profile is downloaded from the server and a security access token is created for that user. This access token is then passed to the Win32 subsystem and the log-on is now complete. The access token is an object that contains such specific information as the user security ID (SID), which uniquely identifies the user, the group security IDs, which are the group SIDs of which a user is a member, and the privileges assigned to the user. It is this access token that is used to determine whether or not a user is permitted to access an object. Implementing User Security User security is established through the Policies menu in User Manager. The two policies in this menu are account policy and user rights policy. Account policy is a global policy and is applicable to all users in the specified domain (as shown in Exhibit 1).

Account Policy Dialog Box The account policy comes with certain default settings. Exhibit 2 indicates the default settings and the suggested values. Account Policy Default Settings and Suggested Values ACCOUNT POLICY DEFAULT RECOMMENDED VALUE VALUE Passport expires in X days 30 Days 30, 60* Days Passport change permitted after X days 14 days 7 days Minimum password length 6 characters 8 characters Password uniqueness-prohibit users from reusing last passwords 3 passwords 5 passwords Account lockout after n bad login attempts 5 attempts 3 attempts Reset the lockout count after n minutes 20 minutes 120 minutes Account lockout for n minutes 60 minutes 120 minutes Disconnect remote users Do not disconnect Disconnect** when log-on hours expire User must log on to change password Log-on required Log-on required NOTES: * This means 30 days for privileged users, 60 days for non privileged users ** Disconnecting will terminate any background processes as well. The user rights policy defines what rights are granted to each system user or group of users. A right is an authorization for a user to perform a certain action on the system. These rights may affect systemwide resources, and they should be assigned with care. Exhibit 3 illustrates how rights are assigned. Exhibit 4 shows the user rights that can be assigned. User Rights Policy Dialog Box User Rights

RIGHT* Access this computer from network Back up files and directories Change the system time. PERMITS A USER: Connect over the network to a computer. Back up files and directories. This right overrides file and directory permissions. Set the time of the internal clock. Force shutdown from a remote system Not currently implemented. Log on locally Manage auditing and security log Restore files and directories Shut down the system Take ownership of files or other objects Local log-on Specify what types of events and resource access are to be audited; view and clear the security log. Restore files and directories; overrides file and directory permissions Shut down Windows NT server. Assume ownership of files, directories, and other objects in the system. Note: * There are an additional 18 advanced rights. These are listed in the Windows NT Resource Kit, Microsoft Press. In addition to rights that may be assigned to individual users or groups, each user or group of users can have a profile which may be defined in the User Properties screen, accessible through User Manager for Domains. Exhibit 5 indicates the default values of the User Properties menu and suggested values. In addition to the User Properties that can be selected, buttons can specify what groups a user belongs to, specific user log-on scripts, the hours in which the user is permitted to log on, what individual workstations the user is permitted to use, and the expiration date of the account. These features should also be used in conjunction with the overall security policies of the organization. Default Values of the User Properties Menu

USER PROPERTIES DEFAULT VALUE RECOMMENDED VALUE User must change Selected for Select for new accounts password at next log-on new accounts or password changes User cannot change Not selected for Not selected, except for his password all accounts GUEST account except GUEST accounts Password never expires Not selected Not selected* Account disabled Not selected Selected for GUEST account. Selected by the security administrator for various reasons NOTE: *This may be selected on a case-by-case basis. For example, if a group of accounts were required to change their passwords on a specific day for a legitimate business reason, this feature could be used in conjunction with a manually forced password change by the security administrator for each member of the group. Group Security Concerns Local and global are the two types of groups. Local groups are defined on a node-by-node basis. They may be composed of both user accounts and global groups. In general, they set groupwide access permissions to resources on a local domain. Global groups are defined at the domain level. They set groupwide access permissions across multiple domains. Both local and global groups are created through User Manager for Domains. Individual members can then be added to each group. In addition, built-in local groups (e.g., administrators, users, guests, everyone, backup operators, server operators, account operators, and print operators) come with the operating system. These groups have preassigned rights, built-in abilities, and members, but they can be assigned additional members. Exhibit 6indicates the rights of the built-in groups. The rights assigned to these groups are alterable, the built-in abilities are not. Rights and Built-in Abilities for Default Local Groups Valid uses for local groups include the following: They can be used only in the domain in which they were created. They can be used to give access to users for objects in one domain only. They can be composed of global groups and individual users. They can include users from multiple domains. Valid uses for global groups include the following: They can be used to group individual users of a domain together.

They can be included in local groups, and by this inclusion they can be assigned rights or permissions to resources. They cannot contain local groups. They cannot contain other global groups. In general, local groups should be used as a way of setting groupwide access permissions on resources on the local domain, whereas global groups should be used as a way of setting groupwide access permissions across multiple domains. Directory and File Permissions File and directory permissions and their ownership determine the manner in which they can be accessed. File permissions are set through File Manager by first selecting a file, then selecting thepermissions command from the Security menu. This will display the name of the file, its owner, and a list of users or groups and their corresponding access to the file. These users or groups can be added or deleted, or their access can be changed. Special access can be granted to files according to the chart in Exhibit 7. Special Access Permissions and the Associated Actions Directory permissions are set through File Manager by selecting a directory, and then selecting the Permissionscommand from the Security menu. Here users and groups can be granted permissions. Special permissions on directories and some or all files in those directories can also be assigned according to the chart in Exhibit 8. Special Access permissions and the Associated Actions In terms of ownership, the creator of the file or directory is the owner by default. The owner of the file can, however, grant ownership to another user by either changing its permissions or selecting Owner from the Security menu in File Manager and selecting the Take Ownership button. The target user can only take ownership if that ability has been granted. The administrator can, of course, take ownership at any time. Permissions on shared files or directories can be defined through the Disk menu in File Manager. Through New Share, users or groups can be given access to shared files or directories and their permissions can be specified. However, permissions applied to directories include all subdirectories and their files. Auditing Features Windows NT auditing features can record events to show what users access what object, what type of access is being attempted, and whether or not the access attempt was successful. Windows NT provides auditing at the system-event level and at the object level. Auditing at the system-event level can be set by selecting Audit Policy under User Manager. Any user holding the Manage Auditing and Security Log right can set auditing at this level. Selecting User Manager or User Manager for Domains, choosing theaudit command from the Policies menu, and selecting the Audit These Events option turns on auditing. If the Do Not Audit option is highlighted, all auditing is completely turned off. This is the default

setting, but it is not recommended in any circumstance. If Do Not Audit is selected, system level auditing and file and directory auditing are both turned off. When selecting audit events, all events should be turned on for both successes and failures (or according to company policy). However, the Log on and Log off option may cause a significant number of Log entries, depending on the number of user accounts and frequency of log-ons. Other areas that can be audited are: Directories and files. Registry changes. Printer use. User activity for Remote Access Servers. Clipbook page use. All auditing is turned off by default. Therefore, for directory and file auditing to occur, file and object access must be turned on as part of the Audit Policy screen under User Manager or User Manager for Domains. Then for each directory or file, specific users or groups must be defined. Security events can be viewed through the Event Viewer by selecting Security from the Log menu. For domains, all auditable events are written to the security log on the domain controller and refer to events that occur on the controller and all servers in the domain. Security Event Logging Windows NT has a security log that records valid and invalid log-on attempts and events related to resource such use as creating, opening, or deleting files or other objects. System administrators or users with the manage auditing and security log right can view the security log events in the Event Viewer by selecting Security from the Log menu. By double clicking on any one event, a more detailed breakdown of that event can be displayed for analysis. The security log is protected by an Audit Command Language that restricts access to all but the administrator. The security log[systemroot]\system32\config\secevent.evtmust be secured using NT file system so that the audit command language (ACL) can be used. The security log contains a header and version number that is placed at the beginning of each log file. This header can be used to ensure that the file being read or written to is a valid log file. The Event Log service validates an existing file before writing events to it, and it uses the Alert feature to alert the administrator if the file is not a valid event log file. When a log file gets full (e.g., the next record to be overwritten is within the retention period), an Alert is sent to the administrator, and the record is not written to the log. By selecting Log Settings from the Log menu, the system administrator can specify certain Event Log parameters relating to its size and event recording. Security Alert Messages As a special feature of the Windows NT operating system, it has the capability to send an alert message to a designated individual who can report on security related events (e.g., too many log-on violations)as they occur. Performance Monitor's Alert View can be used together with network alerts to send an alert for any of the counters in performance monitor. The user must first specify to whom the alert goes in network alerts then turn on

and specify the recipient of the message in Send Network Message in Alert Options. An alert message is sent to the designated receiver, and the results can be viewed in Performance Monitor's Alert View. Log recording starts at boot time. By default, the maximum log size is 512K bytes per log, but this number can be set in accordance with disk and memory capacities. An administrator cannot, however, set the log for a smaller size than the size of the present log; the log must be cleared first. There are three choices for Event Log Wrapping: Overwrite Events as Needed (the default). Overwrite Events Older Than X Days. Do Not Overwrite Events (Clear Log Manually). It is recommended that your system be benchmarked to determine the optimal maximum log size. This is a balance between storage constraints, the amount of auditing being done, and archiving strategies. The Do Not Overwrite Events (Clear Log Manually) option should be selected so that events are not lost. When the log is full an alert message is displayed to the system administrator. Prohibited Access Message Creation Through the string editor in the registry, the security administrator can create a message that is displayed to users after the Ctrl + Alt + Del keys are pressed at log-on time. This message appears in a dialog box and requires that the return key be pressed to continue. The text of this message should state the following: THESE COMPUTER SYSTEMS ARE PRIVATE. UNAUTHORIZED ACCESS IS PROHIBITED. VIOLATORS WILL BE PROSECUTED. To create this message, the registry editor should be accessed and the following subkey selected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindonwsNT\CurrentVersion\Winlogon To change the caption on the dialog box, double-click on the following: LegalNoticeCaption : REG_SZ : To change the text of the message, double-click on the following: LegalNoticeText : REG_SZ : Conclusion Before the security practitioner goes live with the Windows NT system, certain decisions regarding security should be made. Areas that should be addressed by the practitioner include: Account policy. Password controls. Account lockout controls. Log-on restrictions.

User rights policy. Previous screen Assignment to users. Assignment to groups. Create user properties. Create user profiles and restrictions. Groups. Create overall group architecture. Create local groups and assign users. Create global groups and assign users. Assign global groups to local groups. Directories and files. Set permissions on selected directories and files. Set ownership on selected directories and files. Create shared directories and files. Auditing. Turn on systemwide auditing. Select items to be audited. Consider auditing for other areas. Security event log. Set log parameters. Configure alert messages. Unauthorized access. Change legal notice caption. Change legal notice text. Author Biographies Carol A. Siegel Carol Siegel is vice-president and director of information security for Chemical Bank Global IRM in New York.