870 likes | 1.27k Views
SIM307. Securing Your Windows Platform. Mark Simos , William Dixon Microsoft Consulting Services. Solomon Lukie Trustworthy Computing. Securing your Windows Platform Objectives. Demonstrate how to create a secure and usable administrative desktop using SCM, EMET, Applocker, and ASA
E N D
SIM307 Securing Your Windows Platform Mark Simos, William Dixon Microsoft Consulting Services Solomon Lukie Trustworthy Computing
Securing your Windows PlatformObjectives • Demonstrate how to create a secure and usable administrative desktop using SCM, EMET, Applocker, and ASA • How to adapt the configuration to protect enterprise workstations • Awareness of Cybersecurity threats, motivations, and trends
Securing your Windows PlatformAgenda • Cybersecurity perspectives • Tools and technology • Enhanced Mitigation Experience Toolkit (EMET) • Applocker • Security Compliance Manager (SCM) • Attack Surface Analyzer (ASA) • Group Policy - User account least/lesser privilege • All Technology in presentation free download or included in Windows 7
Why lock down administrative desktops? • Active Directory compromise is bad! • 100% cleanup assurance is difficult • Rebuild is expensive, embarrassing for IT (& for Organization) • Malware is a profit driven industry, increasing sophistication • Sophisticated techniques getting more efficient (toolkits) • Compromise and obfuscation techniques constantly evolving • Symantec reported 286 million variants just in 2010
What Attackers Want • Ingress • Gain Beachhead • Install User Malware • Escalation of Privilege • Expand Presence • Redundant administrative access • Ongoing Surreptitious Remote Access • Implement Goals • Data Exfiltration • Other nefarious actions
Cybersecurity Economics Goal: Make Defenses cheaper/easier to achieve Threat: Attacker tools always getting cheaper, more sophisticated Commercial Reasonability Due Diligence Goal: Better defenses require attacks to be sophisticated (expensive and difficult) to be effective • Defender Benefit(Db) DiminishingReturns • Defender Cost (Dc)
Fighting Back (Due Diligence) • Least Privilege • Limit Domain Admin privileges (use lesser admin roles!) • Limit Local Administrator (even on admin workstations!) • Reduce Risky Behavior • Don't allow email or Internet browsing from admin workstations! • Hardened Client • Run 64-bit version of latest operating systems • Patching, AV, anti-malware, and firewall • Security Compliance Manager (SCM) – Apply high security baseline for OS and Application security settings
Fighting Back (Commercial Reasonability) • Require 2 factor authentication for administrators • Smartcards • RSA Tokens • Other solutions • EMET– Protect against exploits by unknown malware • Applocker– Whitelist applications that can launch • ASA - Identify and reduce attack surface
Microsoft Cybersecurity Team Approach Protect Detect Defend Recover Respond
Trusted Virtual Client for Management William Dixon demo
Trusted Virtual Machine Client • Goals: • Avoid/minimize risk • Prevent infection • Limiting damage • Easy to use ! • Dedicated VM for management • Windows 7 running as Virtual PC (x32) • Windows 7 or Server 2008 R2 x64 running as Hyper V VM • Ease of use tradeoff: joined to domain which is being managed • Member of “hardened workstations” OU • SSLF - Specialized Security, Limited Functionality
Server Admin Accounts – Limit Risk • Server Admin accounts • Not domain admin • Not local admin of client • Log onto management client only, privileges to perform job • Administrative Workstations • Browser limited to intranet browsing only • Only server administrators can login to workstation • 2 factor authentication ideal • Regular User Workstations • Only regular users can login (no server or domain admins allowed)
Security Compliance Manager (SCM) William Dixon demo
Demo: SCM Getting Started http://social.technet.microsoft.com/wiki/contents/articles/microsoft-security-compliance-manager-scm-getting-started.aspx
Demo: SCM Policy Edit, Informed decisions Ooops, did not realize a value of 0 disabled password history enforcement ! Hmmmm….
Demo: Deployment Steps Summary • Duplicate, review, edit security baseline if needed • Create GPO backup of baseline • Duplicate, review, edit additional GP settings in “Settings Pack” • Create GPO backup of settings pack • Move GPO backup files to admin workstation • Start GPMC • Create GPO in domain for Hardened Workstations OU • Import GPO from {guid} file location • Gpupdate on client to apply • Test ! NOTE: unapplying registry policy does not reset registry
Enhanced Mitigation Experience Toolkit (EMET) Mitigate applications against exploit techniques
EMETBenefits • Protects against unknown vulnerabilities • Blocks exploit techniques against applications • New and old applications • Microsoft and third party software • Line of business applications • No source code requirements • GUI Configuration of OS Mitigation features • Free Download
EMETMitigating Vulnerabilities • Mar 17 - Blocking Exploit Attempts of the Recent Flash 0-Day • Mar 14 – Adobe Bulletin CVE-2011-0609 • Dec 22 – New Internet Explorer vulnerability affecting all versions of IE • Nov 3 – DEP, EMET protect against attacks on the latest Internet Explorer vulnerability • Sep 10 – Adobe Reader/Acrobat 0-day exploit • http://blogs.technet.com/b/srd/
Enhanced Mitigation Experience Toolkit (EMET) Mark Simos demo
EMETNotes • Limited info on what EMET did • Event 1001 in Application Log (EMET.DLL as faulting) • Some OS protections crash on STATUS_ACCESS_VIOLATION • Disable/Enable EMET to troubleshoot user issues • Enterprise Management Challenges • No centralized control or status of EMET • No native reporting of EMET actions/events • OS Mitigations support varies with pre-Windows 7 clients
EMETScenarios and Use Cases • Admin and Enterprise Workstations • Command-line installation & configuration • Test applications for compatibility first (issues are rare) • Configure Error Reporting to Desktop Error Monitoring (MDOP) or Application Exception Monitoring (SCOM) • Personal Laptop/Desktop (geeks like us!) • Add *.exe from C:\Program Files\ & C:\Program Files (x86)\ • Set system settings to maximum
Applocker Whitelist Launch of Windows Applications
ApplockerBenefits • Whitelisting of software launch • Only known-good applications can launch • Unknown applications blocked (Good and bad) • Publishing rules simplify use! • Windows 7 feature managed by Group Policy Applocker Signature
Applocker Mark Simos demo
ApplockerScenarios and Use Cases • Administrative Workstations • Allow Administrative applications only • Enterprise Workstations • Basic - Allow all users to run any application in ruleset • Advanced - Restrict applications by user/group • Exceptions for Administrators & PC Techs
ApplockerNotes • Applockeronly controls application launch • Understand application portfolio (small for admin workstation) • Test your rule set prior to deployment • Plan how to handle ‘emergencies’ • RDP to servers • Change GPO • Create a process to handle AppLocker policy maintenance • New tools/applications coming online
Attack Surface Analyzer Identify the changes in system state, runtime parameters, and securable objects on the Windows operating system.
Useful for • IT Professionals / System Administrators • IT department development teams • Independent software vendors (ISVs) • IT Security Auditors • IT Security Incident Responders
Microsoft Security Development Lifecycle (SDL) The industry-leading software security assurance processCombining a holistic and practical approach, the SDL introduces security and privacy throughout all phases of the development process. Download the Simplified Implementation of the Microsoft SDL to learn more about the Security Development Lifecycle process and practices.
Attack Surface Code within a computer system that can be run by unauthenticated users. Attack surface reduction reduces security risk by giving attackers less opportunity to exploit a potential weakness or vulnerability: DID
Attack Surface Analyzer It’s FREE and a unique industry leading tool • Enables you to really improve security of systems • 5+ years of real world use within Microsoft • Trusted and robust: used on all Microsoft products • Saves you time – a manual attack surface audit would take hours and require numerous tools / utilities
Securable objects An object is securable if it can have unique security permissions associated with it. The security permissions of a securable object can be unique or can be inherited from a parent. All non-securable objects inherit the security permissions of their parent. Each securable object has its security permissions set by its ACL and other security metadata.
Security privileges privilege: • The right of a user to perform system-related operations, such as debugging the system. A user's authorization context specifies what privileges are held by that user. • The capability of a security principal to perform a type of operation on a computer system regardless of restrictions placed by discretionary access control.
ASA Supported Platforms • Windows 7 & Server 2008 R2 • Collection and analysis (analysis requires .Net 3.5) • Windows Vista & Server 2008 • Command line / collection only • Newer versions of Windows will require the next version