1 / 45

TechNet Build’06

TechNet Build’06. “The Secure Well Managed Infrastructure Tour”. Desktop Management. Bruce Cowper Rick Claus Canadian IT Pro Advisors Microsoft Canada. Session Goals. Introduce you to Desktop hardening Discuss common scenarios of locking down a desktop

angus
Download Presentation

TechNet Build’06

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TechNet Build’06 “The Secure Well Managed Infrastructure Tour”

  2. Desktop Management Bruce Cowper Rick Claus Canadian IT Pro Advisors Microsoft Canada

  3. Session Goals • Introduce you to Desktop hardening • Discuss common scenarios of locking down a desktop • Look at some of the tools available to help you take control • Examine common scenarios for effective Desktop Management.

  4. Top Ten Immutable Laws for Security • Nobody believes anything bad can happen to them, until it does. • Security only works if the secure way also happens to be the easy way. • If you don't keep up with security fixes, your network won't be yours for long. • It doesn't do much good to install security fixes on a computer that was never secured to begin with. • Eternal vigilance is the price of security. • There really is someone out there trying to guess your passwords. • The most secure network is a well-administered one. • The difficulty of defending a network is directly proportional to its complexity. • Security isn't about risk avoidance; it's about risk management. • Technology is not a panacea.

  5. What Can I do? • Focus on security concerns. • Make it easier to deploy secure desktops and servers. • Introduce methods for deploying updates and service packs from the start, and maintaining them. • Emphasis on securing computers from the start. • Focus personnel on need for ongoing vigilance. • Complex passwords from the start. • Focus on standard, well documented desktops and servers. • Simplify desktop/server creation and maintenance. • Introduce risk assessment; focus on how to weigh and consider security risks. • Embed security policies and procedures into builds and maintenance.

  6. Establishing Hardened Baselines for Workstations

  7. Workstation HardeningGeneral Rules • Deploy secure systems, don’t try to make them secure after the fact • If you don’t know what you have, you can’t protect it • Keep it Simple • Make it easy to deploy (images, scripts) • Make it easy to maintain (automatic updates, SMS) • Eliminate unneeded applications and services • Develop change procedures for desktop image builds; track and justify all edits to the defaults • Establish your baseline, benchmark typical performance, monitor against that

  8. Workstation Hardening8 Basic Steps to Hardened Baselines • Decide upon baseline applications • Enterprise-wide: what goes on every desktop? Every server? • Check for known security problems with those applications • Decide which Components to include • Add/Remove Programs options

  9. Workstation Hardening8 Basic Steps to Hardened Baselines • Decide which Features to enable • Technologies beyond what is available in Add/Remove Programs (such as Windows Update) • Decide what Security Template settings to include • Use Security Guides as the foundation • Don’t forget custom settings beyond out-of-the-box (sceregvl.inf)

  10. Workstation Hardening8 Basic Steps to Hardened Baselines • Decide on Additional Lockdowns • Drawn from Product Group recommendations, security alerts, security experts, best practices • Group Policy beyond Security Templates (Internet Explorer, Outlook, etc.) • Services (varies according to role) • Access Control Lists (ACLs) • Windows Firewall can be configured as part of build (new in Windows XP SP2)

  11. Workstation Hardening8 Basic Steps to Hardened Baselines • Automate / Document the entire build • Even if bit-copy images are the end result • Scripts are accountable; people are not so easily queried (Examples:) • Answer File for Operating System • Silent non-interactive installations • Security Template INF • Windows Scripting Host (WSH) and Windows Management Instrumentation (WMI) • Custom Installation Wizard for Office • Internet Explorer Administrative Kit for IE

  12. Workstation Hardening8 Basic Steps to Hardened Baselines • Test Logged in as Normal User (workstations) • By far the greatest numbers of application failures occur logged in as Normal User • Even developers should run as Normal User and elevate privileges only when and if required • Must solve incompatibilities before deployment • Scope out Administrator and Service Account Access

  13. Security Templates

  14. Use a Security Guideline • Microsoft Security Solutions (MSS) Security Guidelines and Guides • A standard • Auditors like them • They are tough, thorough, and accepted • Variants of these security templates have been used in some of the strictest security environments known • Developed by personnel who simulate attacks on networks for a living • MSS Security Templates for Government Security replacing NSA Templates

  15. Available Scenario Templates • “Implementing Common Desktop Management Scenarios with the Group Policy Management Console” • Lightly Managed • Mobile • Multi-User • AppStation • TaskStation • Kiosk • Used with the GPMC

  16. Group Policy Beyond Security Templates

  17. Group PolicyGroup Policy Management Console • Security decisions should not stop with security templates • Windows Update • Secure Terminal Services • Office Preferences • Prior to GPMC, only third party options for exporting Group Policy settings beyond the security template INF file • Custom ADM files can be built • Extension of Group Policy choices to include customer’s own registry edits

  18. Group Policy – Common Desktop Scenarios

  19. Services

  20. Locking Down Services • Dump running services from a typical baseline • Net start > services.txt • Study results for the following: • Which services require an account to start? • Will a local account work? • Narrowly define permissions account requires • Audit for activity against that account in the future • Which services are unnecessary? • Start with Security Guides list of services to disable • Maintain settings in security template

  21. Access Control Lists

  22. Access Control Lists (ACLs) • Extensive ACL edits have been done in the past to harden systems • Particularly on NT and 2000 • NSA led the way • File and Registry Permissions • Not as necessary with Windows 2003 (if it doesn’t have to support legacy trusts); Security Guide does not recommend ACL edits for W2K3 • Rough summary of typical edits: • Substitute Authenticated Users for Everyone (Anonymous SID exposure) • Remove unused or more exposed groups such as Power Users from all ACLs • Remove Batch or Interactive ACLs on particularly vulnerable executables

  23. Limit AccessAdministrator and Service Accounts

  24. Limit and Control Access • All the protection in the world can be circumvented by poor Administrator and Service Account maintenance and monitoring • Most attacks are internal • Most users and even administrators do NOT require full administrator status to get their jobs done • Example: developers can do most of their development logged in as a Normal User, and should be encouraged to do so • Use of Run As to elevate privileges ONLY when required for a specific task

  25. Limit and Control AccessAdministrators • Train Administrators to use passwords with more than 15 characters • Phrases are easy to remember (spaces allowed in 2000 and 2003) • Make sure all Administrators have at least two accounts • Normal User for daily tasks (e-mail, word processing) • Separate account with Administrator permissions (audit this account closely) • Consider using local groups on individual servers to limit who can administrate

  26. Limit and Control AccessService Accounts • Use passwords with more than 15 characters and extended characters (Alt + Numbers) • Limit the damage if the account is compromised • See if a local account can be used instead of a domain account • However, won’t work for accounts that must communicate with other servers • SQL agents, for instance, often require connectivity to other servers • Narrow permissions of what the account can do • Audit these accounts closely

  27. Workstation Applications

  28. How to Choose Secure Applications • Keep the focus on the lowest common denominator: what must be on every desktop? Every server? • Research for security breaches on all software planned for installation (not just the operating system) • Gather the necessary updates and patches • Windows Update Catalog • Microsoft Security Alerts • Vendor sites for third-party applications • Forums and sites like http://www.securityfocus.com and http://Groups.google.com

  29. Choosing Components • Choose as few components as possible • Set to No (do not install) even if that is the default (for accountability later) • Avoid installing IIS on the workstations • Avoid commonly attacked components, such as FTP, Simple TCP/IP, and SNMP

  30. Commonly Encountered Problems

  31. Applications Won’t Run • Biggest problem with desktops • Usually legacy applications that are unaware of security contexts • Symptom: Runs as administrator, fails as Normal User • Doesn’t understand profiles • Often due to more restrictive file and/or registry permissions in the new OS • Occasionally due to hard-coded calls to previous operating system APIs

  32. Applications Won’t Run (cont) • Windows XP SP2 introduced new, secure-by-default changes • RPC Interfaces no longer allow anonymous remote connections by default • DCOM Remote Launch and Activation limited to administrators by default • Windows Firewall on by default • Access to system services using RPC blocked by default

  33. SolutionApplications Won’t Run • Ideally, upgrade or re-develop, but this can be prohibitively expensive • Use Application Compatibility Toolkit on Windows XP • Construct a custom SDB fix • Work with Compatibility Modes to emulate other operating systems • Use Sysinternal’s regmon.exe and filemon.exe to isolate permissions • Develop a custom INF to loosen the necessary settings • Goal: Figure out the minimal settings necessary to get the application running

  34. Filemon & Regmon

  35. Configuration Management of Security Templates • Ongoing changes will be inevitable, particularly to manage desktop application requirements • Security settings should evolve as the environment does • Example: NT 4.0 trusts go away • Complexity and number of settings makes this a challenge

  36. Solution Configuration Management of Security Templates • Layer security template deltas • Start with standard MSS template • Overlay Customer Delta from security standard • Overlay Application specific loosening of ACLs • Make it clear what was adjusted for each application • Can remove template if application goes away later • Merge everything at the end; but maintain original files to provide accountability • Auditors receive deltas with justifications for the changes; much faster certification

  37. Challenge: INFs Don’t Capture all Security Related Settings • Security Template INF files have limited scope • Need to extend Group Policy into other areas such as: • Secure e-mail settings • Internet Explorer settings • Windows Update client settings • Need to be able to transport these settings to other systems easily

  38. SolutionINFs Don’t Capture all Security Related Settings • Extend choices through use of ADMs • Run Group Policy (gpedit.msc) • Right click Administrative Templates, choose Add/Remove Templates, pick the ADM file (e.g. Outlook ADM file) • Can be added as part of the build (locally) OR • Distributed via GPOs and AD • Can add custom settings

  39. Rollback Security Settings • Need to be able to confirm whether a reported problem is due to the security templates • If Access Control List (ACL) edits have been made, these “tattoo” the system permanently, even when a GPO is used • How to roll back to out-of-the-box permissions? • Need to be able to do this on a standalone system

  40. SolutionRollback Security Settings • Utilize INF files that are applied as part of the original setup of the operating system: • Defltwk.inf • Defltdc.inf • Delftsv.inf • Can be loaded like any other security template: via MMC Security Configuration Editor or secedit.exe

  41. Security Analysis tool

  42. Microsoft Security Solutions (MSS) Security Guides • Windows 2000 Hardening Guide, Windows XP and Windows 2003 Security Guides available • Threats and Countermeasures • Security Templates • Custom sceregvl.inf • Guides coming out for all key Microsoft enterprise systems, such as Exchange 2003 • Best common sense, field testedsource for security lockdowns

  43. Secure Configuration Resources: Tools • Setup Manager • Security Template Snap-In • Security Configuration Editor Snap-In • Secedit.exe • Group Policy Management Console • Security Configuration Wizard • Application Compatibility Toolkit • Sysinternals Regmon and Filemon

  44. Questions and Answers blogs.technet.com/canitpro

  45. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

More Related