Lesson 16-Windows NT Security Issues

Slides:



Advertisements
Similar presentations
Chapter Five Users, Groups, Profiles, and Policies.
Advertisements

MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
Module 4: Implementing User, Group, and Computer Accounts
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 7 HARDENING SERVERS.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
F HEPNT/HEPIX Sept, 1999 Use of SPQuery and STAT At FNAL.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Chapter 8 Chapter 8: Managing the Server Through Accounts and Groups.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Module 8: Implementing Administrative Templates and Audit Policy.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Working with Workgroups and Domains
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
Enforcing Concurrent Logon Policies with UserLock.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 UNDERSTANDING USER ACCOUNTS  Local user accounts  stored in the Security.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
Overview Managing a DHCP Database Monitoring DHCP
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Windows NT Based Web Security COSC 573 By:Ying Li.
NT4 SP4 Security Jack Schmidt - Fermilab
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 10: Rights, User, and Group Administration.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
TCOM Information Assurance Management System Hacking.
Module 7: Implementing Security Using Group Policy.
NetTech Solutions Security and Security Permissions Lesson Nine.
Module 10: Implementing Administrative Templates and Audit Policy.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Understanding Security Policies
Chapter Objectives In this chapter, you will learn:
Configuring Windows Firewall with Advanced Security
Introduction to Operating Systems
CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
Operating System Security
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Operating System Hardening
Chapter 9: Managing Groups, Folders, Files, and Object Security
PLANNING A SECURE BASELINE INSTALLATION
Creating and Managing Folders
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Lesson 16-Windows NT Security Issues

Overview Set up the system. Manage users. Manage the system.

Set up the System Windows NT is not completely secure out of the box. Default configuration of Windows NT includes some settings that will make the system more secure.

Set up the System Configuration settings are divided into: Registry settings. System configuration settings.

Registry Settings Windows NT Registry is the internal system database that stores necessary system parameters and values. Proper care must be taken while making changes to the Registry since mistakes can make the system unusable. Regedit32 must be used to edit the Registry. Logon message must be used to display a legal notice prior to a user logging onto network.

Registry Settings User can force Windows NT to clear the system Pagefile, containing encryption keys or password hashes, on shutdown. Shutdown Without Logon key can be changed to force a user to log on to a system before being able to shut it down. LAN Manager Authentication system allows Windows NT servers to work with Windows 95 and Windows 98 clients.

Registry Settings Since LAN Manager is a weaker scheme than the NT authentication system, it should be disabled. The ability of anonymous (null) user session to access information should be restricted. Remote Registry access must be restricted to protect computers from an attack over local network or Internet.

System Configuration Settings Changes are required in the following areas to increase security of system: File systems. Network settings. Account settings. Service packs and hot-fixes.

File Systems FAT file systems should be converted to NTFS to allow for file permissions. NT policy editor or AUTOEXNT program must be used to disable administrative shares that can be used to brute-force administrator passwords. Emergency repair disk (ERD) provides recovery of Registry and user database in the case of system crash.

Network Settings Domains allow for a central user database and management and hence are better than workgroups. NetBIOS should be turned off for any system that will be accessed from the Internet. Simple TCP/IP services should not be enabled on a Windows NT system.

Account Settings Windows NT comes with administrator and guest accounts by default. The guest account should be disabled and its password must be changed to something long and random. Administrator account should be renamed. Password policy should be configured as per the organization’s security policy.

Account Settings Policy can be configured through Account Policy in User Manager. The Account Policy screen is used to define maximum password age, minimum password length, password uniqueness, and account lockout policy. Account lockout policy will not be enforced against the administrator account unless PASSPROP utility is used.

Service Packs and Hot-Fixes Service packs and hot-fixes are new versions of software that fix bugs and security vulnerabilities. Some of them do not work properly and hence are not implemented. They should be implemented within an organization after appropriate testing. If hot-fixes are installed in the wrong order it is possible that one will negate the effects of another.

Manage Users Proper procedures must be there to identify proper permissions received by new users. Procedures must make sure that an employee loses access rights to the organization’s systems after leaving the organization. Management of users on a Windows NT system is critical to the security of the system and the NT domain.

Manage Users Adding users to the system: Users are added through the User Manager. Each user should have a unique user ID and own account. Multiple users should not be given access to the same user ID. New users are forced to change the password the first time they log in.

Manage Users Setting file permissions: Groups should be used to set permission on files and shares. Everyone group is given default access to files and shares. It includes logged-on users and/or guest and null session users. If a file or share is accessible to all, Domain User group or Authorized User group should be used instead of Everyone group.

Manage Users Removing users from the system: When users leave an organization, their account must be disabled immediately using User Manager. In case the account contains any important files, the user’s superior should access and copy them within 30 days. After 30 days the account should be removed from the system.

Manage the System Security is important when a system is configured and set up as well as in day-to-day operations. The best security mechanism is an administrator who is paying attention to his systems. Auditing a system, using log files, and looking for suspicious signs enhances the administrator’s ability to detect security problems.

Manage the System Auditing a system - The audit policy should be set according to the organization’s security policy. Log files - Administrators should look at the log files and back them up on a regular basis.

Manage the System Looking for suspicious signs: Security Event Log show failed login attempt entries which indicate brute-force intrusion. File access failures may indicate an authorized user who is attempting to access sensitive files. Missing log files may indicate intrusion.

Manage the System Looking for suspicious signs (continued): If an intruder attempts to modify entries in log files, a gap would be found in the log file. System administrators should periodically examine the Task Manager to see if any unknown processes like CMD are running.

Summary Configuration settings like Registry settings and system configuration settings make the system more secure. Mistakes in Registry settings can make the system unusable. System configuration settings include file systems, network settings, account settings, and service packs and hot-fixes.

Summary Managing users in a system involves adding and removing users and setting file permissions. Managing a system includes auditing a system, using log files, and looking for suspicious signs to detect security problems.