250 likes | 313 Views
Learn how to properly configure secure Windows and Linux systems, apply operating system and application patches, and secure web browsers. Discover key tasks like disabling unnecessary services, setting up firewalls, and configuring the registry on Windows. Enhance security with password policies, account lockout policies, and registry editing caution. Secure the registry by restricting access, disable needless services, and use encryption tools like EFS. Understand security templates and best practices for Linux configuration. Keep your systems up-to-date by patching the OS and configuring browsers for enhanced privacy and security.
E N D
Operating System Hardening Based on slides accompanying the book NetworkDefense and Countermeasures by Chuck Easttom (2018)
Objectives • Properly configure a secure Windows system • Properly configure a secure Linux system • Apply appropriate operating system patches to Windows • Apply application patches • Securely configure a web browser
Introduction • Securely configuring the operating system and its software is a critical step in system security that is often neglected. • It is not enough to just implement firewalls and proxy servers, it is also important to secure internal machines and the applications and information they house.
Configuring Windows Properly • Key configuring tasks include • Disable unnecessary services • Configure the Registry • Enable the firewall • Configure the web browser
Windows Accounts and Users • Disable default user accounts and groups • Disabling the default administrator account is better than renaming it. • Other accounts to disable if not used • IUSR_MachineName • ASP.NET • Database accounts • Assign each account the least privileges needed to perform the job The principle of least privileges
Windows Security Policies • Password policies • History, age, length, complexity • Account lockout policies • Other issues • Users should not write passwords down • Users should not share passwords • Users should have the least privileges required • Have separate admin accounts and standard user accounts • Only use the admin accounts for tasks that require admin privileges
Registry Basics • Hierarchical Database • Edit using regedit • Top-level sections • HKEY_CLASSES_ROOT • HKEY_CURRENT_USER • HKEY_LOCAL_MACHINE • HKEY_USERS • HKEY_CURRENT_CONFIG
Registry Editing Caution Incorrect editing of your registry can render parts of your operating system unusable. If you are new to registry editing, do not practice on a production machine that has critical data.
Securing the Registry • Restrict Null session access • Restrict Null session access over named pipes • Restrict anonymous access • Change TCP/IP stack settings • Disable default administrative shares • Disable remote access to the Registry • Restrict anonymous access to the Registry
Working with Window Services • Services run without direct user intervention • Referred to as daemons in Linux/Unix • Disabling unneeded services can increase security • Use the Services.msc console to manage services • Be careful not to disable a service that’s needed; Use the Dependencies tab to see whether other services depend on the one you are about to disable
Encrypting File System (EFS) • Encrypts files and folders for greater security • Uses a method based on public key encryption • Virtually transparent to the user • Built into Windows and easy to use
Security Templates • A security template contains hundreds of possible settings that can control a single or multiple computers • Settings include user rights, permissions, and password policies • Enable administrators to deploy settings with Group Policy Objects (GPOs)
Security Templates • Hisecdc.inf: Domain controllers (more secure) • Securedc.inf: Domain controllers (less secure) • Hisecws.inf: Client computers and member servers • Securews.inf: Client computers and member servers • Setup security.inf: Reapplies the default security settings of a freshly installed computer
Configuring Linux Properly • Many security principles apply in Linux as they do in Windows • Commonalities between Windows and Linux • Default users and policies (names are different) • All services not in use should be shut down • Browser must be configured securely • Routinely patch the OS
Configuring Linux Properly cont. • Differences between Linux and Windows • No application should run as the root user • Root password must be complex and changed frequently • Disable all console-equivalent access for regular users • Hide your system information
Patching the Operating System • Allow Windows Update to run automatically in Windows to keep the OS up to date • In Linux, open up a terminal window and type sudo apt-get upgrade.
Configuring Browsers • Privacy settings • Block third-party cookies • Prompt for first-party cookies • Always allow session cookies • Security settings • Limit what can run • Unsigned components • ActiveX • Java
Configuring Browsers • Each browser has its own way of changing settings • General principles: • Limit cookies • Do not allow ActiveX to run without your knowledge • Do not allow any scripts to execute without your knowledge
Summary • Hardening of operating systems is a critical part of network security • Proper security configuration can make hacking more difficult • Encrypted File System (EFS) can secure information on the local computer • Disable unneeded services in Windows • Proper Registry settings are also key in a Windows environment
Summary • Failure to properly configure Registry settings will greatly reduce the security of the computer • Securing the browser can limit exposure to malware