Hardening Active Directory Windows 2000/20003 Network Infrastructure Presented by: James Placer Senior Security Analyst, ISG.

Slides:



Advertisements
Similar presentations
Planning and Administering Windows Server® 2008 Servers
Advertisements

Security Features in Microsoft® Windows® XP James Noyce, Senior Consultant Security Solutions Team, Business Critical Services Microsoft Security Solutions,
File Server Organization and Best Practices IT Partners June, 02, 2010.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Telstra in Confidence Managing Security for our Mobile Technology.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Chapter 7 HARDENING SERVERS.
Microsoft Security Resources. URL’s for this talk All URL’s mentioned in this talk can be found here: All URL’s mentioned in this talk can be found here:
Windows 2003 SP1 Member Server in ASU Active Directory WNUG/CCC February 2, 2006 Sharon Bushart CLAS Information Technology.
Implementing Server Security on Windows 2000 and Windows Server 2003 Steve Lamb Technical Security Advisor
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Module 8: Implementing Administrative Templates and Audit Policy.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Clinic Security and Policy Enforcement in Windows Server 2008.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Working with Workgroups and Domains
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Module 14: Configuring Server Security Compliance
Security Planning and Administrative Delegation Lesson 6.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Dirty-Dozen: Top 12 Issues in Windows 2000 Security Roberta Bragg Security Evangelist Have Computer Will Travel, Inc.
NT4 SP4 Security Jack Schmidt - Fermilab
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Module 11: Designing Security for Network Perimeters.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 2 Establishing and maintaining baseline security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Module 7: Implementing Security Using Group Policy.
Module 10: Implementing Administrative Templates and Audit Policy.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Implementing Server Security on Windows 2000 and Windows Server 2003
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
Module Overview Installing and Configuring a Network Policy Server
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
HARDENING CLIENT COMPUTERS
Securing the Network Perimeter with ISA 2004
Implementing a Secure ISA Server
امنیت اطلاعات و ضرورت آن
Operating System Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Designing IIS Security (IIS – Internet Information Service)
Security Planning and Administrative Delegation
Presentation transcript:

Hardening Active Directory Windows 2000/20003 Network Infrastructure Presented by: James Placer Senior Security Analyst, ISG

James Placer Over 17 years of IT and Security experience. Certifications: Cisco CCSP, CCDP, CCNP Checkpoint CCSE, NSA InfoSec 4011, Microsoft MCSE 2000 and is a contributing author to two Cisco certification books. Authored and contributed to numerous trade magazine articles in the security field.

Agenda Current State of Network Security Security Policy Development Security Application Architecture and Security Configuring AD Hardening Servers and Clients Questions

Cert Coordination Center Statistics

Threat Capabilities: More Dangerous & Easier To Use Sophistication of Hacker Tools Packet Forging/ Spoofing Password Guessing Self Replicating Code Password Cracking Exploiting Known Vulnerabilities Disabling Audits Back Doors Sweepers Sniffers Stealth Diagnostics Technical Knowledge Required High Low 2000 DDOS Internet Worms

2002 FBI Security Survey Results 92% of surveyed companies were hacked in % of surveyed companies have firewalls in place 82% of the companies hacked suffered financial losses totaling over $464 million 70% of hacks are internal

External Exploitation External Exploitation 75% Vulnerable (95+% Vulnerable Externally with Secondary Exploitation) 75% Vulnerable (95+% Vulnerable Externally with Secondary Exploitation) Internet Vulnerabilities to Network Attack 100% Vulnerable Internal Exploitation Internal Exploitation Dial-In Exploitation Dial-In Exploitation 65+% Vulnerable

Security Policy Development 70% of companies who reported that they were hacked also stated that they lacked a current security policy, and that the lack of a security policy was the primary contributor.

W5 WHAT do you need to protect? WHO needs access to it? WHY do they need access? From WHERE do they need access to it? WHEN do they need access?

State and Federal Statutes affecting Security Feingold / California Break Law - Expect federal statute in eight months Sarbanes Oxley Act Gramm Leach Bliley Act HIPAA FDA 21CFR11 ISO 17999

Security is a process not a Product or a Reaction!

Security Policy Application Appropriate Design and Architecture Appropriate Monitoring and Accountability Appropriate Change Management Appropriate Technology Appropriate User Awareness Training

Architecture Is Fundamental to Security Domain Controllers Authentication Servers Web Servers File and Print Servers Bastion Hosts, IAS servers, etc

Ultimate Architecture Goal One Service One System One Appropriately Secured System Practically speaking. May not be possible More Services lead to More Vulnerabilities

Architecture Steps Define Physical Architecture Define Server Roles Define Server Services Define Security Levels Required Define Physical Security Guidelines

Determine Appropriate Security Level

Windows Security Windows 2003 / 2000 is Common Criteria Certified Extreme levels of security are possible but compatibility and performance will be degraded Level of Hardening is a business decision based or business requirements.

Securing AD Organizational Unit Design Organizational Unit permissions Inheritance Server Security Network Security

Windows Policy Precedent

Define OU’s for all Functional Server Groups Include Administration and Infrastructure

Apply OU Policies 2003 ships with extensive default OU policies. Store on single Domain Controller Member Servers, Domain Controllers, File Servers, print Servers Infrastructure, IIS, Bastion, Etc

Secure User Groups Create appropriate User OU’s Apply default templates if appropriate Create Custom templates as needed Review Microsoft “Threats and Countermeasures Guide” for appropriate settings

Hardening Servers Windows 2003 / 2000 is Common Criteria Certified Extreme levels of security are possible but compatibility and performance will be degraded Level of Hardening is a business decision based or business requirements.

Hardening Servers Cont. Configurations beyond the default hardening settings in the MMC settings May involve third party products, ie IPS systems. Determine what level of service is acceptable.

Bastion Hosts Externally accessible Servers, IE Web, DNS High Attack Probability Must be Tightly Controlled

Bastion Hosts cont. DELETE, not disable, any extra services Use DEPENDS from the resource kit to determine dependencies Should be one service to one server Not published or integrated into AD, No internal access ideally.

Bastion Hosts cont. Rename all accounts Create dummy administrator account with no rights for logging USE EFS if possible Use IP security and log. Enable local logon only. Lock down further as appropriate. Scan for vulnerabilities regularly, ie.Languard, Nessus, NMAP

Internal Server Hardening Security rests on 6 items 1.Secure the system 2. Secure the database 3. Securing the replication 4. Securing normal access methods 5. Securing the objects 6. Audit Scan for changes. ie. Tripwire Scan for vulnerabilities regularly, ie.Languard, Nessus, NMAP, MCC

Internal Server Hardening cont. USE EFS WHERE POSSIBLE USE XCACLES and MCC Audit TO VERIFY FILE PERMISSIONS AND RIGHTS Use root forest controller as NTP server Use Ipsec filtering Tighten the system drive Audit the critical operations such as policy data and critical file access Block access to ports that can be used to access the AD if not required.

Internal Server Hardening cont. Install service packs and hotfixes Remove OS2 and Posix registry values Delete associated files Enable DNS scavenging and do it rigorously Clean up anonymous registry access Tighten the system drive Use NTLM v2 only for authentication Test and retest ( Tripwire for baseline, languard, nmap, nessus, MBSA, MCC).

Client Hardening Eliminate Win 9X from environment Use NTFS / EFS exclusively on hard drives Use NTLM v2 authentication only. Disable file and print sharing Do not allow local administrative rights! Pay attention to remote VPN clients! Scan network frequently Use internal client IPS if available

Tools and References NSA Server Security Guides Microsoft “Threats and Countermeasures Guide” “Windows Server 2003 Security Guide” “ Windows 2000 Common Criteria Guide” Windows 2000 / 2003 resource kit Vulnerability Scanner

Tools and References cont. vulnerabiltiy and device scanner. NMAP Fport from Foundstone.com Tripwire. File integrity checker. Commercial but excellent product

Q&A Contact Information: Phone: (616)