Symantec Enterprise Security Manager Baseline Policy Manual for NERC Standard 1200



Similar documents
Symantec Enterprise Security Manager Policy Manual for Visa Cardholder Information Security Program (CISP) For Windows

Symantec Enterprise Security Manager Baseline Policy Manual for NERC CIP. For Windows

Symantec Critical System Protection. Symantec Software License Agreement

SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360

LiveUpdate Administrator's Guide

Symantec AntiVirus /Filtering for Domino for AIX Implementation Guide

Symantec Enterprise Security Manager Policy Manual for Visa Cardholder Information Security Program (CISP) For UNIX

LiveUpdate Administrator's Guide

Symantec Enterprise Security Manager Administrator's Guide

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Mobile Management for Configuration Manager

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

Symantec Enterprise Security Manager Patch Policy Release Notes

SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED

Symantec Protection for SharePoint Servers Implementation Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

/ WMS / LITE INDUSTRIAL)

MDM Zinc 3.0 End User License Agreement (EULA)

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services.

DME-N Network Driver Installation Guide for LS9

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

NORTON ONLINE SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 Online

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D

AB SCIEX LLC END USER SOFTWARE LICENSE AGREEMENT and LIMITED PRODUCT WARRANTY MarkerView Software, version 1.2.1

Copy Tool For Dynamics CRM 2013

SMARTDRAW SOFTWARE LICENSE AGREEMENT

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS

Symantec Response Assessment module Installation Guide. Version 9.0

Commonwealth of Pennsylvania Software License Requirements Contract # Tab Software

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

Symantec AntiVirus Business Pack Administrator s Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

APPLIED BIOSYSTEMS END USER SOFTWARE LICENSE AGREEMENT FOR INSTRUMENT OPERATING AND ASSOCIATED BUNDLED SOFTWARE AND LIMITED PRODUCT WARRANTY

Symantec AntiVirus Corporate Edition Patch Update

RockWare Click-Wrap Software License Agreement ( License )

FME SOFTWARE LICENSE AGREEMENT

ZIMPERIUM, INC. END USER LICENSE TERMS

FILEMAKER PRO ADVANCED SOFTWARE LICENSE

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

PointCentral Subscription Agreement v.9.2

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases User s Guide and Reference

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

END USER LICENSE AGREEMENT

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

TERMS AND CONDITIONS FOR NORTON VIRUS PROTECTION PROMISE

ZENworks Patch Management. Your license to use ZENworks Patch Management is also subject to the terms and conditions in the attached Appendix.

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Symantec AntiVirus Corporate Edition Installation Guide

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

bv-control for Active Directory v8.50 User Guide

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

Database Client/Server

Symantec Enterprise Security Manager Modules. Release Notes

SOFTWARE LICENSE AGREEMENT (Site License Version) A. Xerox grants to customer ( you ) a non-exclusive, non-transferable license to:

Symantec AntiVirus for Linux Implementation Guide

Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement)

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Symantec Security Information Manager 4.6 Administrator's Guide

Sun Microsystems, Inc. ("Sun") ENTITLEMENT for SOFTWARE. Licensee/Company: Entity receiving Software.

Symantec NetBackup Vault Operator's Guide

REPAIRING THE "ORACLE VM VIRTUALBOX" VIRTUAL MACHINE PROGRAM

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

THE SOFTWARE MAY NOT BE SOLD, TRANSFERRED, OR FURTHER DISTRIBUTED EXCEPT AS AUTHORIZED BY LICENSOR.

Symantec Security Information Manager 4.8 Release Notes

Terms of Service MANAGED FIREWALL Service

Symantec Protection Engine for Cloud Services 7.0 Release Notes

CORE TECHNOLOGIES CONSULTING, LLC SOFTWARE UNLIMITED ENTERPRISE LICENSE AGREEMENT

TOOLS for CC121 Installation Guide

END USER LICENSE AGREEMENT ( EULA )

SYNERGIS SOFTWARE LICENSE AGREEMENT

Symantec Client Firewall Policy Migration Guide

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011

Veritas Cluster Server Getting Started Guide

Dell InTrust 11.0 Best Practices Report Pack

INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User)

Self Help Guides. Create a New User in a Domain

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Software Hosting and End-User License Subscription Agreement

SOFTWARE LICENSE AGREEMENT

Specific Program Documentation ( License SPD )

Transcription:

Symantec Enterprise Security Manager Baseline Policy Manual for NERC Standard 1200 For Windows NT Servers, Windows 2000 Servers and Windows 2000 domain controllers

Baseline Policy Manual for NERC/Windows The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 1.0 Copyright Notice Copyright 2003 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec, the Symantec logo, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America.

3 Technical support Licensing and registration Contacting Technical Support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world. The Technical Support group s primary role is to respond to specific questions on product feature/ function, installation, and configuration, as well as to author content for our Web-accessible Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering as well as Symantec Security Response to provide Alerting Services and Virus Definition Updates for virus outbreaks and security alerts. Symantec technical support offerings include: A range of support options that gives you the flexibility to select the right amount of service for any size organization Telephone and Web support components that provide rapid response and up-to-the-minute information Upgrade insurance that delivers automatic software upgrade protection Content Updates for virus definitions and security signatures that ensure the highest level of protection Global support from Symantec Security Response experts, which is available 24 hours a day, 7 days a week worldwide in a variety of languages Advanced features, such as the Symantec Alerting Service and Technical Account Manager role, that offer enhanced response and proactive security support Please visit our Web site for current information on Support Programs. The specific features that are available may vary based on the level of support purchased and the specific product that you are using. If the product that you are implementing requires registration and/or a license key, the fastest and easiest way to register your service is to access the Symantec licensing and registration site at www.symantec.com/certificate. Alternatively, you may go to www.symantec.com/techsupp/ent/enterprise.htm, select the product that you wish to register, and from the Product Home Page, select the Licensing and Registration link. Customers with a current support agreement may contact the Technical Support group by phone or online at www.symantec.com/techsupp. Customers with Platinum support agreements may contact Platinum Technical Support by the Platinum Web site at www-secure.symantec.com/platinum/.

4 When contacting the Technical Support group, please have the following: Product release level Hardware information Available memory, disk space, NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description Error messages/log files Troubleshooting performed prior to contacting Symantec Recent software configuration changes and/or network changes Customer Service To contact Enterprise Customer Service online, go to www.symantec.com, select the appropriate Global Site for your country, then choose Service and Support. Customer Service is available to assist with the following types of issues: Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information (features, language availability, local dealers) Latest information on product updates and upgrades Information on upgrade insurance and maintenance contracts Information on Symantec Value License Program Advice on Symantec's technical support options Nontechnical presales questions Missing or defective CD-ROMs or manuals

Symantec Software License Agreement Symantec Enterprise Security Manager SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES ( SYMANTEC ) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS AN INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS YOU OR YOUR ) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND THE LICENSOR. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING THE AGREE OR YES BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE I DO NOT AGREE OR NO BUTTON OR OTHERWISE INDICATE REFUSAL AND MAKE NO FURTHER USE OF THE SOFTWARE. 1. License: The software and documentation that accompanies this license (collectively the Software ) is the proprietary property of Symantec or its licensors and is protected by copyright law. While Symantec continues to own the Software, You will have certain rights to use the Software after Your acceptance of this license. This license governs any releases, revisions, or enhancements to the Software that the Licensor may furnish to You. Except as may be modified by an applicable Symantec license certificate, license coupon, or license key (each a License Module ) that accompanies, precedes, or follows this license, and as may be further defined in the user documentation accompanying the Software, Your rights and obligations with respect to the use of this Software are as follows. You may: A. use that number of copies of the Software as have been licensed to You by Symantec under a License Module. Permission to use the software to assess Desktop, Server or Network machines does not constitute permission to make additional copies of the Software. If no License Module accompanies, precedes, or follows this license, You may make one copy of the Software you are authorized to use on a single machine. B. make one copy of the Software for archival purposes, or copy the Software onto the hard disk of Your computer and retain the original for archival purposes; C. use the Software to assess no more than the number of Desktop machines set forth under a License Module. Desktop means a desktop central processing unit for a single end user; D. use the Software to assess no more than the number of Server machines set forth under a License Module. Server means a central processing unit that acts as a server for other central processing units; E. use the Software to assess no more than the number of Network machines set forth under a License Module. Network means a system comprised of multiple machines, each of which can be assessed over the same network; F. use the Software in accordance with any written agreement between You and Symantec; and G. after written consent from Symantec, transfer the Software on a permanent basis to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this license. You may not: A. copy the printed documentation which accompanies the Software; B. use the Software to assess a Desktop, Server or Network machine for which You have not been granted permission under a License Module; C. sublicense, rent or lease any portion of the Software; reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software, or create derivative works from the Software; D. use the Software as part of a facility management, timesharing, service provider, or service bureau arrangement; E. continue to use a previously issued license key if You have received a new license key for such license, such as with a disk replacement set or an upgraded version of the Software, or in any other instance; F. continue to use a previous version or copy of the Software after You have installed a disk replacement set, an upgraded version, or other authorized replacement. Upon such replacement, all copies of the prior version must be destroyed; G. use a later version of the Software than is provided herewith unless you have purchased corresponding maintenance and/or upgrade insurance or have otherwise separately acquired the right to use such later version; H. use, if You received the software distributed on media containing multiple Symantec products, any Symantec software on the media for which You have not received a permission in a License Module; nor I. use the Software in any manner not authorized by this license. 2. Content Updates: Certain Software utilize content that is updated from time to time (including but not limited to the following

Software: antivirus software utilize updated virus definitions; content filtering software utilize updated URL lists; some firewall software utilize updated firewall rules; and vulnerability assessment products utilize updated vulnerability data; these updates are collectively referred to as Content Updates ). You shall have the right to obtain Content Updates for any period for which You have purchased maintenance, except for those Content Updates that Symantec elects to make available by separate paid subscription, or for any period for which You have otherwise separately acquired the right to obtain Content Updates. Symantec reserves the right to designate specified Content Updates as requiring purchase of a separate subscription at any time and without notice to You; provided, however, that if You purchase maintenance hereunder that includes particular Content Updates on the date of purchase, You will not have to pay an additional fee to continue receiving such Content Updates through the term of such maintenance even if Symantec designates such Content Updates as requiring separate purchase. This License does not otherwise permit the licensee to obtain and use Content Updates. 3. Limited Warranty: Symantec warrants that the media on which the Software is distributed will be free from defects for a period of sixty (60) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software. Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error-free. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY. 4. Disclaimer of Damages: SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT, OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO CASE SHALL SYMANTEC'S LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The disclaimers and limitations set forth above will apply regardless of whether or not You accept the Software. 5. U.S. Government Restricted Rights: RESTRICTED RIGHTS LEGEND. All Symantec products and documentation are commercial in nature. The software and software documentation are Commercial Items, as that term is defined in 48 C.F.R. section 2.101, consisting of Commercial Computer Software and Commercial Computer Software Documentation, as such terms are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R. section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and 48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R. section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section 227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other relevant sections of the Code of Federal Regulations, as applicable, Symantec's computer software and computer software documentation are licensed to United States Government end users with only those rights as granted to all other end users, according to the terms and conditions contained in this license agreement. Manufacturer is Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014, United States of America. 6. Export Regulation: Export or re-export of this Software is governed by the laws and regulations of the United States and import laws and regulations of certain other countries. Export or re-export of the Software to any entity not authorized by, or that is specified by, the United States Federal Government is strictly prohibited. 7. General: If You are located in North America or Latin America, this Agreement will be governed by the laws of the State of California, United States of America. Otherwise, this Agreement will be governed by the

laws of England and Wales. This Agreement and any related License Module is the entire agreement between You and Symantec relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals, and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment, or similar communications between the parties. This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and damages and limitations on liability shall survive termination. Software and documentation is delivered Ex Works California, U.S.A. or Dublin, Ireland respectively (ICC INCOTERMS 2000). This Agreement may only be modified by a License Module that accompanies this license or by a written document that has been signed by both You and Symantec. Should You have any questions concerning this Agreement, or if You desire to contact Symantec for any reason, please write to: (i) Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A., (ii) Symantec Authorized Service Center, Postbus 1029, 3600 BA Maarssen, The Netherlands, or (iii) Symantec Customer Service, 1 Julius Ave, North Ryde, NSW 2113, Australia.

8

Contents Symantec ESM baseline policy for NERC Standard 1200/Windows Introducing the policy...11 Installing the policy...12 Prerequisites...12 Procedure...12 Complying with NERC standards...13 Account Information...13 Account Integrity...13 Active Directory...14 File Attributes...15 File Watch...16 Login Parameters...16 Network Integrity...17 Object Integrity...17 OS Patches...17 Password Strength...18 Registry...19 Startup Files...19 System Auditing...20

10 Contents

Symantec ESM baseline policy for NERC Standard 1200/Windows This document includes the following topics: Introducing the policy Installing the policy Complying with NERC standards Introducing the policy Urgent Action Standard 1200 Cyber Security from the North American Energy Reliability Council (NERC) is designed to reduce risks to North America s bulk electric systems and associated critical computer assets. Review Urgent Action Standard 1200 Cyber Security (NERC Standard 1200) to identify security issues in your organization. The standard is available at the NERC Web site (www.nerc.com). At the time this document was prepared, the standard could be accessed directly at ftp://ftp.nerc.com/nerc Standard 1200pub/sys/all_updl/standards/Draft-Urgent-Req-CyberStnd-3-3121.pdf. The Symantec ESM baseline policy for NERC Standard 1200 assesses compliance with the standard s minimum requirements. It runs on Symantec ESM 6.0 and 5.5 managers and agents with Security Update 16 or later on Windows NT 4.0 servers, Windows 2000 Servers and Windows 2000 domain controllers.

12 Symantec ESM baseline policy for NERC Standard 1200/Windows Installing the policy Installing the policy Decide which agents need the NERC policy, and install it on the managers they are registered to. Prerequisites Before you run the executable program that installs the policy, download the executable file from the Symantec Security Response website, https://security response.symantec.com. Do the following: Upgrade all Symantec ESM managers and agents that will use the policy to version 5.5 or later. Upgrade the Windows modules to Security Update 16 or later. Identify the Symantec ESM account name, password, and communication port on the Symantec ESM managers that require the policy installation. Procedure To install the policy on a Symantec ESM manager 1 On a computer running Windows NT/2000/XP/Server 2003 that has network access to the manager, run the executable that you downloaded from the Symantec Security Response Web site. 2 Click Next to close the Welcome dialog box. 3 Click Yes to accept the Symantec Corporation Software License Agreement. 4 Click Yes to continue installation of the best practice policies. 5 Type the requested manager information. 6 Click Next. If the manager s modules have not been upgraded to Security Update 16 or later, the install program returns an error message and aborts the installation. Upgrade the manager to SU16 or later for the new template, then rerun the install program. 7 Click Finish.

Symantec ESM baseline policy for NERC Standard 1200/Windows Complying with NERC standards 13 Complying with NERC standards Account Information The policy includes the following modules to ensure compliance with the NERC Standard 1200. The enabled checks of each module are listed with the standards they address. Associated templates are are also listed. See the current Security Update User s Guide for Windows for check and message information. The Account Information module reports requested account information, such as a list of locked out accounts, account folder permissions, or users in specified security groups. Table 2-1 Account Information checks Locked-out accounts 1212.1.6 Expired accounts 1212.1.3 Account Integrity The Account Integrity module reports new, changed, and deleted accounts, and account and account privilege information. Table 2-2 Account Integrity checks Accounts that never expire 1212.1.3 Accounts that must be disabled 1204.1 New users 1204.2.2.2 Deleted users 1204.2.2.2 Changed users 1204.2.2.2 New groups 1204.2.2.2 Deleted groups 1204.2.2.2 Changed groups 1204.2.2.2 Access this computer from network 1204.1, 1212.1.2 Act as part of the operating system 1212.1.2 Add workstations to domain 1212.1.2

14 Symantec ESM baseline policy for NERC Standard 1200/Windows Complying with NERC standards Table 2-2 Account Integrity checks Back up files and directories 1210.1.2, 1212.1.2 Change the system time 1212.1.10 Generate security audits 1212.1.10 Load and unload device drivers 1204.1 Manage auditing and security log 1212.1.10 Restore files and directories 1210.1, 1212.1.2 Active Directory The Active Directory module for Windows 2000 domain controllers reports group policy objects (GPOs) that apply to users, groups, and computers in the Active Directory Service (ADS). GPOs are active directory objects that contain group policies such as the Windows security policy. GPO settings can be applied to sites, domains, and organizational units. Table 2-3 Active Directory checks Computers without applied GPOs 1212.1.2 Users without applied GPOs 1212.1.2 Security groups without applied GPOs 1212.1.2

Symantec ESM baseline policy for NERC Standard 1200/Windows Complying with NERC standards 15 File Attributes The File Attributes reports changes to file creation and modification times, file sizes, and CRC/MD5 checksum signatures. It also reports violations of the file permission settings that are specified in template files. Table 2-4 File Attributes checks File ownership and attributes 1204.1, 1212.1.2 Changed file (times, size, signature) 1204.1 File ACL 1204.1 Files giving all users Full Control 1204.1 Do not notify if file permissions are increased in security 1204.1 The File Attributes module uses the following template files. Table 2-5 OS File Attributes templates Template Windows 2000 primary domain controller Windows 2000 server Windows NT server All Windows windirw2kdc.s50 windirw2kdc.s50 windirnt4srv.s40 windows.fkl

16 Symantec ESM baseline policy for NERC Standard 1200/Windows Complying with NERC standards File Watch The File Watch module reports new, deleted, and changed files. Table 2-6 File Watch checks Changed files (ownership) 1204.1, 1209.2.2, 1210.1, 1210.2, 1212.1.2, and 1212.1.6 Changed files (signature) 1204.1, 1209.2.2, 1210.1, 1210.2, 1212.1.2, and 1212.1.6 New files 1204.1, 1209.2.2, 1210.1, 1210.2, 1212.1.2, and 1212.1.6 Removed files 1204.1, 1209.2.2, 1210.1, 1210.2, 1212.1.2, and 1212.1.6 Malicious files 1209.2.2, 1212.1.6 and 1212.1.9 The File Watch module module uses the following template files. Table 2-7 File Watch templates OS File name Template name All Windows 2000 w2k.fw File Watch All Windows 2000 w2k.fw Malicious File Watch NT 4 server nt.fw File Watch NT 4 server nt.mfw Malicious File Watch Login Parameters The Login Parameters module reports weaknesses in the account lockout system, such as accounts that not locked after a specified number of failed logon attempts. It also reports inactive accounts. Table 2-8 Login Parameter checks Account lockout threshold 1212.1.6 Account lockout duration 1212.1.6 Shutdown without logon 1204.1 Inactive accounts 1212.1.3

Symantec ESM baseline policy for NERC Standard 1200/Windows Complying with NERC standards 17 Network Integrity The Network Integrity module reports domain trusts, including global security groups and folder and printer shares. The module also reports CD_ROM and floppy disk drives that can be accessed by network users, and it evaluates Microsoft s Routing and Remote Access Service (RRAS), which is called Remote Access Service (RAS) on Windows NT. Table 2-9 Network Integrity checks Trusted domains 1204.1, 1212.1.2, 1212.1.4 Shared folders giving all users Full Control 1204.1 Anonymous LANMan access disabled 1212.1.2 Plain text authentication 1204.1 RRAS enabled 1212.1.5 Object Integrity The Object Integrity module reports volumes that do not have Access Control Lists (ACLs). Table 2-10 Object Integrity checks Volumes without ACL control 1204.1 OS Patches The OS Patches module reports Windows patches that been released by Microsoft Corporation but are not installed on the agent. Table 2-11 OS Patches check Consider file dates and versions 1212.1.8

18 Symantec ESM baseline policy for NERC Standard 1200/Windows Complying with NERC standards The OS Patch module uses the following template files. New template files are available every two weeks through LiveUpdate. Table 2-12 OS Patch templates OS File name Template name All Windows windows.pkl Patch All Windows 2000 patch.ps5 Patch NT 4 server patch.ps4 Patch Password Strength The Password Strength module reports weak passwords such as those that match their users user names, any user name in the system, and any word in word list files. Accounts that have no passwords are reported and accounts with a maximum password age greater than a specified value. Table 2-13 Password Strength checks Accounts without passwords 1212.1.1 Password = username 1212.1.1 Password = any username 1212.1.1 Password = wordlist word 1212.1.1 MD4 hashes 1212.1.1 Password must expire 1212.1.1 Maximum password age 1212.1 Password uniqueness 1212.1.1 Syskey encryption 1212.1.1

Symantec ESM baseline policy for NERC Standard 1200/Windows Complying with NERC standards 19 Registry The Registry template reports violations of registry key settings that are specified in template files and registry key changes. Table 2-14 Registry checks Key ownership 1204.1, 1210 Changed key (time, size, permissions, signature) 1204.1, 1210, 1212.1.6 Key and value existence 1204.1, 1210 Allow any privileged account 1204.1, 1210 Do not notify if key permissions are increased in security 1204.1, 1210 The Registry module uses the following template files to specify registry settings. Table 2-15 OS Patch templates OS File name Template name All Windows 2000 w2kservh.rs5 Registry NT 4 server ntservh.rs4 Registry Startup Files The Startup Files module reports information about system services, run keys, and remote registry access. Table 2-16 Startup Files checks Required services 1212.1.4 Disallowed services 1212.1.4 Changed services 1212.1.4 Deleted services 1212.1.4 New services 1212.1.4 Unknown services 1212.1.4 Remote Procedure Call (RPC) disabled 1212.1.4

20 Symantec ESM baseline policy for NERC Standard 1200/Windows Complying with NERC standards Table 2-16 Startup Files checks Remote registry access 1204.1 Remote registry access (non-administrators) 1204.1 System Auditing System auditing identifies unauthorized users and provides valuable tracking information during or after a break-in. The module reports security events that are audited for failure or success and what happens when the log file is full. Table 2-17 System Auditing checks Security events success auditing 1212.1.10 Security events failure auditing 1212.1.10 Security events do not overwrite security log 1212.1.10 Security event log size 1212.1.10