120 likes | 252 Views
This talk provides an in-depth overview of security configurations and best practices for Active Directory, IIS, and SQL Server. Topics include automating client security settings, IPSec implementation, and utilizing Software Update Services for efficient patch management. The presentation also covers vital measures for IIS and SQL security, including the use of IIS Lockdown Wizard and SQL password management. Furthermore, it addresses incident response strategies for compromised systems, emphasizing the importance of proactive protection and proper recovery processes.
E N D
URL’s for this talk • All URL’s mentioned in this talk can be found here: http://www.cs.cmu.edu/~help/security/pc_talk.html
Active Directory / Group Policy • Windows 2000, XP clients only • Automate client security settings • Policies at the Site, Domain, OU, local level • Delegation of Organizational units
Local Policy Settings • Most of the same functions as Active Directory based policy, but applied on a per machine basis. • IPSec based TCP/IP filtering for common types of network traffic (Netbios, HTTP, etc.) • IPSEC Policies can be downloaded from: http://www.cs.cmu.edu/~help/security/pc/windows_security.html
Software Update Services • Local version of Windows Update • Ability to block patches • Patches download from a local server • Client must initiate installation • Settings applied via a Domain Group Policy • Evaluating Shavlik HFnetChkPro for automated patch management for infrastructure servers
IIS Security • IIS Lockdown Wizard – removes legacy components and tightens folder security on the IIS directory structure. • URLScan - ISAPI filter which reads incoming http requests and filters requests which do not meet the proper criteria. • Configurable via .INI file
SQL Security • Reset the “SA” password • Apply Service packs and critical security hotfixes • Proper validation of form fields that access SQL databases.
Terminal Services Security • Port 3389 is blocked • Requires Cisco VPN client to access a workstation/server running Terminal Services
Microsoft Baseline Security Analyzer • Checks for security misconfiguration and missing security patches. • Developed by Shavlik technologies (HFnetchk). • Output from the tool should be kept in a secure area or external media.
Anti-Virus Software • All PC’s should have Symantec’s Anti-virus corporate edition installed. • Machines installed by SCS facilities have the following settings pre-applied (via GRC.DAT): • Weekly scan • Nightly Live Update • Application requires a password to remove • Real-time scan settings are locked
Help! I’ve been hacked … • Clauss will usually provide port information (where a malicious process is listening) • Process to port mapping. Use “netstat –aon” (XP only). • Fport (available from Foundstone) • TCPview(available from Sysinternals.com) • Kill the malicious process(es). Patch the machine, reset passwords, remove artifacts.
Help! Iv’e been hacked (cont.) • In a lot of cases, it is easier to just wipe and reinstall the machine, rather than doing a detailed analysis. • Domain and Unix passwords should still be reset, since keystroke loggers are fairly common. • Detailed help on cleaning hacked machines: http://www.cs.cmu.edu/~help/security/pc/break_ins.html