120 likes | 244 Views
Microsoft Security Resources. URL’s for this talk. All URL’s mentioned in this talk can be found here: http://www.cs.cmu.edu/~help/security/pc_talk.html. Active Directory / Group Policy. Windows 2000, XP clients only Automate client security settings
E N D
URL’s for this talk • All URL’s mentioned in this talk can be found here: http://www.cs.cmu.edu/~help/security/pc_talk.html
Active Directory / Group Policy • Windows 2000, XP clients only • Automate client security settings • Policies at the Site, Domain, OU, local level • Delegation of Organizational units
Local Policy Settings • Most of the same functions as Active Directory based policy, but applied on a per machine basis. • IPSec based TCP/IP filtering for common types of network traffic (Netbios, HTTP, etc.) • IPSEC Policies can be downloaded from: http://www.cs.cmu.edu/~help/security/pc/windows_security.html
Software Update Services • Local version of Windows Update • Ability to block patches • Patches download from a local server • Client must initiate installation • Settings applied via a Domain Group Policy • Evaluating Shavlik HFnetChkPro for automated patch management for infrastructure servers
IIS Security • IIS Lockdown Wizard – removes legacy components and tightens folder security on the IIS directory structure. • URLScan - ISAPI filter which reads incoming http requests and filters requests which do not meet the proper criteria. • Configurable via .INI file
SQL Security • Reset the “SA” password • Apply Service packs and critical security hotfixes • Proper validation of form fields that access SQL databases.
Terminal Services Security • Port 3389 is blocked • Requires Cisco VPN client to access a workstation/server running Terminal Services
Microsoft Baseline Security Analyzer • Checks for security misconfiguration and missing security patches. • Developed by Shavlik technologies (HFnetchk). • Output from the tool should be kept in a secure area or external media.
Anti-Virus Software • All PC’s should have Symantec’s Anti-virus corporate edition installed. • Machines installed by SCS facilities have the following settings pre-applied (via GRC.DAT): • Weekly scan • Nightly Live Update • Application requires a password to remove • Real-time scan settings are locked
Help! I’ve been hacked … • Clauss will usually provide port information (where a malicious process is listening) • Process to port mapping. Use “netstat –aon” (XP only). • Fport (available from Foundstone) • TCPview(available from Sysinternals.com) • Kill the malicious process(es). Patch the machine, reset passwords, remove artifacts.
Help! Iv’e been hacked (cont.) • In a lot of cases, it is easier to just wipe and reinstall the machine, rather than doing a detailed analysis. • Domain and Unix passwords should still be reset, since keystroke loggers are fairly common. • Detailed help on cleaning hacked machines: http://www.cs.cmu.edu/~help/security/pc/break_ins.html