NT4 SP4 Security Jack Schmidt - Fermilab

Slides:



Advertisements
Similar presentations
Chapter Five Users, Groups, Profiles, and Policies.
Advertisements

MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 8 Chapter 8: Managing Accounts and Client Connectivity.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Chapter 3 – Creating and Managing User Accounts MIS 431 – Created Spring 2006.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Module 8: Implementing Administrative Templates and Audit Policy.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
70-270: MCSE Guide to Microsoft Windows XP Professional Second Edition, Enhanced Chapter 6: Windows XP Security and Access Controls.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Module 4: Add Client Computers and Devices to the Network.
Hands-On Microsoft Windows Server 2008
Guide to Operating System Security Chapter 4 Account-based Security.
User Manager for Domains.  Manages the user accounts in a domain  It is located in the PDC  While User Manager exists in each NT machine, but it is.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Chapter Six Windows XP Security and Access Controls.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Section 7: Implementing Security Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Hardening.
Windows Server 2003 Overview 1 Windows 2003 Server Overview Ayaz
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Understanding Group Policy James Michael Stewart CISSP, TICSA, CIW SA, CCNA, MCSE NT & W2K, iNet+
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
70-270: MCSE Guide to Microsoft Windows XP Professional 1 Windows XP Professional User Accounts Designed for use as a network client for: Windows NT Windows.
W2K and Kerberos at FNAL Jack Mark
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
CHAPTER Creating and Managing Users and Groups. Chapter Objectives Explain the use of Local Users and Groups Tool in the Systems Tools Option to create.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
W2K and Kerberos at FNAL Jack Schmidt Mark Kaletka.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
NetTech Solutions Security and Security Permissions Lesson Nine.
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
Module 10: Implementing Administrative Templates and Audit Policy.
Chapter 7 Server Management Policies –User accounts –Groups Rights and permissions Examples.
Windows NT ® Security Management: Extending Windows NT 5.0 Security Management Tools, Part 2 Praerit Garg Program Manager Windows NT Security Microsoft.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
LM/NTLMv1 Retirement Hosted by LSP Services.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Configuring Windows Firewall with Advanced Security
Lesson 16-Windows NT Security Issues
Greta Mameniskyte IV course 3rd group
Security Templates Lecture 7.
Presentation transcript:

NT4 SP4 Security Jack Schmidt - Fermilab

New Features F 3 new Event Log Messages F Security Log access locked down from Domain Admins F NTLMv2- new version of NTLM F Security Configuration Editor

3 New Event Log Messages Event Clean Shutdown Event “The Event log service was stopped.” Event Dirty Shutdown Event “The previous system shutdown at 7:01 AM on 11/12/98 was unexpected.” Event System Version Event “Microsoft (R) Windows NT (R) Service Pack 4 Uniprocessor Free.”

Security Log Viewing F Fixed so Security Rights need to be enabled in order to view and manage the Security event log- –Default allowed members of the Administrator group to view log but Security Advisor not always a System Admin –Message- “Required Privilege not held by the client”

NTLMv2 Security F Enhancements to the NTLM security protocols called NTLMv2 improves both authentication and session security. F Before SP4, NT Supported two kinds of challenge/response authentication: –LanManager (LM) challenge/response (WFW) –Windows NT challenge/response (also known as NTLM challenge/response) F To allow access to servers that only support LM authentication, Windows NT clients prior to SP4 always use both authentication methods, even to Windows NT servers that supported NTLM authentication.

NTLMv2 Security (cont) F SP4 systems can be configured to make use of the new authentication options –Level 0 - Send LM response and NTLM response; never use NTLMv2 session security –Level 1 - Use NTLMv2 session security if negotiated –Level 2 - Send NTLM response only –Level 3 - Send NTLMv2 response only –Level 4 - DC refuses LM responses –Level 5 - DC refuses LM and NTLM responses (accepts only NTLMv2) F See /q147/7/06.asp

Security Configuration Editor F Consolidates all security related settings into a single configuration file –User Manager, Server Manager, Resource Kit, Registry Settings, File Explorer F Settings can be applied to any number of NT machines (server and workstation) F Sample Configuration templates provided F Command line and GUI interface supported

A Peak at the SCE

Policies and Settings F Account Policies F Local Policies F Event Log F Restricted Groups F System Services F Registry F File System

Account Policies F Password settings such as length, uniqueness, minimum and max age, complexity, must logon to change. F Account lockout settings including lockout count, length of lockout time, reset account lockout after so many minutes

Local Policies F Audit Policy- audit settings (success/failure) of account management, logon events, object access, policy changes, privilege use, process tracking and system events F User Rights - such as add workstations to domain, change system time, take ownership of files F Security Options- such as rename Admin account, Logon messages, disconnect idle users, number of passwords to cache, restrict floppy and CDROM access

Settings F Event Log settings - maximum size for logs, restrict guest access, retention method for log files, shutdown when security log is full F Restricted Groups - ability to add and remove members from Domain Admin defined `sensitive’ groups. Designed for Windows 2000

Settings F System Services- In the future 3rd Party vendors can build in SCE attachments. Microsoft is planning attachments for services: spooler, TCP/IP, file sharing, etc… F Registry and File System - Provide ability to configure and analyze settings for object ownership, ACLs, and auditing information. Not fully implemented.

Predefined Configuration Templates F Templates can be used to configure systems and to perform security analysis of systems. F Templates are text-based.inf files. Configuration information is broken down into sections which can be applied as a full policy or in part. F Ability to exclude items from an audit. (shows as Not Configured) F Designed to allow new sections to be added. F GUI Interface allows modification of templates to provide customization.

Predefined Configuration Templates F Compatible Configuration –COMPDC4, COMPWS4 –Improvement over default security settings. Errs on the side of applications when making a tradeoff between functionality and security F Secure Configuration –SECURDC4, SECURWS4 –Improvement over compatible settings. Errs on the side of security when making a tradeoff between functionality and security

Predefined Configuration Templates F High Secure Configuration –HISECDC4, HISECWS4 –Enforces ideal security settings without consideration for application functionality. Most applications won’t work under this setting. Designed to promote the development of future “security conscious” applications. F Basic Configuration –BASICDC4,BASICSV4,BASICWK4 –Provided as a means to “undo” the application of a more secure configuration. Does NOT “rollback” settings!

SCE Adventures F `Out of the Box’ analysis based on Basic Configuration files. –Must apply a more secure configuration before attempting audit F Analysis results are easy to interpret F Remote Analysis not yet possible F Log files are useful for summarization but are not detailed.

SCE Adventures (cont) F Command line tool can be used for applying only certain sections of the policy or the full policy F SCE must be applied to all systems. F New users not always able to log on locally after SCE installed. F New file permission box F Password complexity box has correct message...

Security Analysis results

Configuration

New File Permissions View

Advanced File Permissions

Password Change Message

Suggestions F Edit either the COMP or SECUR.inf files and make changes based on your security plan (you do have a security plan don’t you?) F Save the file with a new name such as COMP4DC- FNAL.inf F Apply the Configuration file to your system. Password configurations applied to PDC will affect entire domain. F Do a security analysis and make sure items were changed. F Check servers monthly. Run audit to see if system has changed and why.

Command Line Tool F The command line tool (secedit.exe) is useful for applying predefined configuration files to many systems using distributed management tools (such as SMS).

WARNING! F Applying a secure configuration to an NT System may result in a loss of performance and functionality! –Many applications expect that all users have Change (Read, Write, Execute, Delete) permissions on root, systemroot, and systemroot\system32 directories

Further Information F tm (doesn’t work yet!) F

Any Questions?