620 likes | 800 Views
Implementing Client Security on Windows 2000 and Windows XP. Session Prerequisites. Hands-on experience with Windows 2000 or Windows XP management tools Knowledge of Active Directory and Group Policy. Level 200. Agenda. Introduction Core Client Security
E N D
Session Prerequisites • Hands-on experience with Windows 2000 or Windows XP management tools • Knowledge of Active Directory and Group Policy Level 200
Agenda • Introduction • Core Client Security • Securing Clients with Active Directory • Using Group Policy to Secure Clients • Securing Applications • Local Group Policy Settings for Standalone Clients • Software Restriction Policy • Antivirus Software • Client Firewalls
The Importance of Security • Protect information • Protect communication channels • Reduce downtime • Protect revenues • Protect worker processes 2003 CSI/FBI Computer Crime and Security Survey
Defense in Depth • Using a layered approach: • Increases an attacker’s risk of detection • Reduces an attacker’s chance of success Policies, Procedures, & Awareness Physical Security ACL, encryption Data Application Application hardening, antivirus OS hardening, update management, authentication, HIDS Host Internal Network Network segments, IPSec, NIDS Firewalls, VPN quarantine Perimeter Guards, locks, tracking devices User education
Agenda • Introduction • Core Client Security • Securing Clients with Active Directory • Using Group Policy to Secure Clients • Securing Applications • Local Group Policy Settings for Standalone Clients • Software Restriction Policy • Antivirus Software • Client Firewalls
Managing Software Updates • Implement an update management solutionto protect against vulnerabilities • Attend Patch Management training session or review prescriptive guidance at: http://www.microsoft.com/technet/security
Password Best Practices Educate users about good password practices Use pass phrases with spaces, numbers, and special characters instead of passwords Use different passwords for different resources, and protect password list Configure screen savers to use password protection, and lock workstations when away Use multifactor authentication for extra levels of security
Data Protection • Use EFS to restrict access to data • Sign e-mail and software to ensure authenticity • Use Information Rights Management to protect digital information from unauthorized use
Mobile Computing • The use of mobile computing devices introduces further security considerations • Mobile devices extend the perimeter when connected to corporate assets • Additional layers of defenseare required: • BIOS passwords • Network Access Quarantine Control • Wireless authentication protocols • Data protection
Agenda • Introduction • Core Client Security • Securing Clients with Active Directory • Using Group Policy to Secure Clients • Securing Applications • Local Group Policy Settings for Standalone Clients • Software Restriction Policy • Antivirus Software • Client Firewalls
Active Directory Components • Forest • A security boundary in Active Directory • Domain • A collection of computer, user, and group objects defined by the administrator • Organizational Unit • An Active Directory container object used within domains • Group Policy • The infrastructure that enables the implementation and management of network security
Root Domain Domain Controller OU Department OU Secured XP Users OU Windows XP OU Desktop OU Laptop OU Establishing an OU Hierarchy • Group Policy simplifies the application of client security settings • Split hierarchy model • Windows XP Security Guide • Separates user andcomputer OUs • Applies appropriatepolicy settings to each OU
Demonstration 1 ModifyingActive Directory for Client Security Viewing Default Domain PolicyCreating an OU HierarchyCreating an OU PolicyMoving the Client
How to Create an OU Hierarchy • Create OUs for each department • Create OUs in each department for users and for various operating system versions • Create OUs under each operating system OU for each computer type (for example, laptops) • Move each client computer object into the appropriate OU
Create OU structure for client security Create OU hierarchy to separate user and computer objects based on role Apply Group Policy with appropriate security settings for each computer role Best Practices for Using Active Directory to Implement Security
Agenda • Introduction • Core Client Security • Securing Clients with Active Directory • Using Group Policy to Secure Clients • Securing Applications • Local Group Policy Settings for Standalone Clients • Software Restriction Policy • Antivirus Software • Client Firewalls
Using Security Templates • Security templates are preconfigured sets of security settings • Windows XP Security Guide templates include: • Two domain templates that contain settings for all computers in the domain • Two templates that contain settings for desktop computers • Two templates that contain settings for laptop computers • Each templates has an enterprise and high-security version • The settings in a security template can be edited, saved, and imported into a GPO
Using Administrative Templates • Administrative templates contain registry settings that can be applied to users and computers • Windows XP SP1 administrative templates have over 850 settings • The Windows XP Security Guide includes ten additional administrative templates • Third-party software companies might supply additional templates • You can import additional templates when editing a GPO
Top Eight Client Security Settings • The most commonly modified client computer security settings include: • Allowed to Format and eject removable media • Anonymous enumeration of SAM accounts • Enable auditing • Everyone includes anonymous • LAN Manager authentication Level • Password Policy • Remove LM hashes • SMB signing
Demonstration 2Using Group Policy Viewing Windows XP Security SettingsViewing Administrative TemplatesViewing the Available Security TemplatesApplying Security TemplatesImplementing the Security Templates
Root Domain Domain Policy Domain Controller OU Department OU Enterprise Client Domain.inf Desktop Policy Enterprise Client Desktop.inf Secured XP Users OU Windows XP OU Desktop OU Secured XP Users Policy Enterprise Client Laptop.inf Laptop Policy Laptop OU How to Apply Security Templatesand Administrative Templates
Best Practices for Using Group Policy to Secure Clients Use enterprise client templates as a baseline and modify them to suit your needs Implement strict account and audit policies Test templates thoroughly before deployment Use additional administrative templates
Agenda • Introduction • Core Client Security • Securing Clients with Active Directory • Using Group Policy to Secure Clients • Securing Applications • Local Group Policy Settings for Standalone Clients • Software Restriction Policy • Antivirus Software • Client Firewalls
Internet Explorer Administrative Templates • Enforces security requirements for Windows XP workstations • Prevents the exchange of unwanted content • Use settings included in the enterprise client templates • Use Internet Explorer Maintenance (IEM) in Group Policy to configure security zones for trusted sites
Microsoft Outlook • Use the Outlook Administrator Pack to customize Outlook security • Use the Outlook Administrative Template to configure Outlook security • Outlook 2003 security enhancements • Warns user before opening potentially dangerous file types • Runs executable content in the Restricted Sites zone • Does not automatically load HTML content
Microsoft Office Administrative Templates • Templates for Office XP ship with the Windows XP Security Guide • Templates for Office 97 and later are available when you download the applicable version of the Office Resource kit
Best Practices for Securing Applications Educate users about how to safely download files from the Internet and how to safely open e-mail attachments Only install applications that are required for users to do their jobs Implement a policy for updating applications
Agenda • Introduction • Core Client Security • Securing Clients with Active Directory • Using Group Policy to Secure Clients • Securing Applications • Local Group Policy Settings for Standalone Clients • Software Restriction Policy • Antivirus Software • Client Firewalls
Local Group Policy Settings • When clients are not members of an Active Directory domain, use local Group Policy to configure standalone client computers • Standalone Windows XP clients use a modified version of the security templates • Each Windows XP Professional client uses a local GPO and the Group Policy Object Editor orscripts to apply settings
Predefined Security Templates • If clients connect to a Windows NT 4.0 domain, use: • If clients do not connect to a Windows NT 4.0 domain, use standalone security templates
Demonstration 3Securing Standalone ClientsModifying a Security TemplateDeploying a Security TemplateViewing Example ScriptsViewing Security Settings
How To Use Local Security Policy to Secure Standalone Clients • Load the Local Group Policy MMC (Gpedit.msc) • Navigate to Computer Settings/Windows Settings and then right-click the Security Settings node and select Import Policy • Browse to the location that contains the appropriate security template (for example, Legacy High Security – Desktop) • Configure additional security settings as per prescriptive guidance
Best Practices for Applying Local Group Policy Settings Use the standalone template from the Windows XP Security Guide as a baseline Use the secedit tool to automate standalone template distribution Develop procedures to deploy policies Implement mechanisms to update clients
Agenda • Introduction • Core Client Security • Securing Clients with Active Directory • Using Group Policy to Secure Clients • Securing Applications • Local Group Policy Settings for Standalone Clients • Software Restriction Policy • Antivirus Software • Client Firewalls
What Is Software Restriction Policy? • Policy-driven mechanism that identifies and controls software on a client computer • Default security level has two options: • Unrestricted – all software except specifically denied software can be run • Disallowed – only specifically allowed software can be run
How Software Restriction Works Define policy for the domain using Group Policy Editor 1 Download policy by Group Policy to the computer 2 Enforced by operating system when software is run 3
Certificate Rule • Checks for digital signature on application (for example, Authenticode) • Use when you want to restrict both win32 applications and ActiveX content Hash Rule • Compares the MD5 or SHA1 hash of a file to the one attempting to run • Use when you want to allow or prohibit a certain version of a file from being run Path Rule • Compares path of file being run to an allowed path list • Use when you have a folder with many files for the same application • Essential when SRPs are strict Internet Zone Rule • Controls how Internet Zones can be accessed • Use when in high security environments to control access to Web applications Four Rules for Identifying Software
Demonstration 4Applying aSoftware RestrictionPolicyCreating a Software Restriction PolicyRestarting the Virtual MachineSetting Administrator OverrideTesting the Software Restriction Policy
How to Apply Software Restrictions • Open the Group Policy object for the OU in which you want to apply the software restriction policy • Navigate to the Computer Settings/Windows Settings/Security Settings node • Right-click Software Restriction Policies and then click Create New Policies • Configure Hash, Certificate, Path, and Internet Zone rules to accommodate your organization’s needs
Best Practices for Applying Software Restriction Policies Create a rollback plan Use a separate Group Policy object to implement software restrictions Use in conjunction with NTFS for defense in depth Never link to another domain Thoroughly test new policy settings
Agenda • Introduction • Core Client Security • Securing Clients with Active Directory • Using Group Policy to Secure Clients • Securing Applications • Local Group Policy Settings for Standalone Clients • Software Restriction Policy • Antivirus Software • Client Firewalls
The Virus Problem • Virus costs now exceed $10 billion dollars • Direct cost • IT staff or consultants • Indirect IT costs • Loss of productivity, data, or goodwill
Antivirus Updates • Desktop computers • Local servers store virus updates for distribution • The best solution is a push model, in which the definitions are immediately copied to the clients • Do not rely on users todownload updates • Laptop computers • Use Internet updateswhen away from office
Best Practices for Virus Protection Apply vendor updates regularly Use a central deployment strategy Use client-specific software on clients