Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Deploying Security Configurations - Introducing Security Templates

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
4/12/2011 11:37:10 AM

Understanding Security Templates

Security templates consist of policies and settings that you can use to control a computer’s security configuration using local policies or group policies. You can use security templates to configure any of the following types of policies and parameters:

  • Account Policies Enables you to specify password restrictions, account lockout policies, and Kerberos policies

  • Local Policies Enables you to configure audit policies, user rights assignments, and security options policies

  • Event Log policies Enables you to configure maximum event log sizes and rollover policies

  • Restricted Groups Enables you to specify the users who are permitted to be members of specific groups

  • System Services Enables you to specify the startup types and permissions for system services

  • Registry permissions Enables you to set access control permissions for specific registry keys

  • File System permissions Enables you to specify access control permissions for NTFS files and folders

You can deploy security templates in a variety of ways, using Active Directory directory service Group Policy Objects, the Windows Server 2003 Security Configuration And Analysis snap-in, or the Secedit.exe command-line utility. When you associate a security template with an Active Directory object, the settings in the template become part of the GPO associated with the object. You can also apply a security template directly to a computer, in which case the settings in the template become part of the computer’s local policies.

There are several advantages to storing your security configuration parameters in security templates. Because the templates are plain text files, you can work with them manually as with any text file, cutting and pasting sections as needed. Second, templates make it easy to store security configurations of various types, so that you can easily apply different levels of security to computers performing different roles.

Tip

Storing your security settings in templates also provides an adequate backup of a computer’s security configuration that you can use to quickly and easily restore the system to its original configuration. For example, when working with GPOs, it is easy to forget what changes you have made, and manually restoring the GPO to its original configuration can be difficult. If you have a security template containing your original settings, you can simply apply it to the GPO to return to your default settings.


Using the Security Templates Console

To work with security templates, you use the Security Templates snap-in for Microsoft Management Console. By default, the Windows Server 2003 Administrative Tools menu does not include an MMC console containing the Security Templates snap-in, so you have to create one yourself using the MMC Add/Remove Snap-in function. When you do this, the console provides an interface like the one shown in Figure 1.

Figure 1. The Security Templates snap-in

The scope pane of the Security Templates snap-in contains a list of all the template files the program finds in the Windows\Security\Template folder on the system drive. The snap-in interprets any file in this folder that has an .inf extension as a security template, even though the extensions do not appear in the console.

Tip

You can add security templates in other folders to the console by selecting New Template Search Path from the Action menu and then browsing to the folder containing your templates. Please note, however, that not all the files with .inf extensions on a computer running Windows Server 2003 are security templates. The operating system uses files with .inf extensions for other purposes as well.


When you expand one of the templates in the scope pane, you see a hierarchical display of the policies in the template (see Figure 2), as well as their current settings. You can modify the policies in each template just as you would using the Group Policy Object Editor console.

Figure 2. The contents of a security template

Tip

It is important to gain a familiarity with the functions and the interface of the Security Templates snap-in.



Using the Supplied Security Templates

Windows Server 2003 includes a selection of predefined security templates that you can use as is or modify to your needs. These templates provide different levels of security for servers performing specific roles. The predefined templates are as follows:

  • Setup Security.inf Contains the default security settings created by the Windows Server 2003 Setup program. The settings in the template depend on the nature of the installation, such as whether it was an upgrade or a clean install. You can use this template to restore the original security configuration to a computer that you have modified.

    Important

    When you use a security template to restore a computer’s default settings, remember that the template might overwrite existing permissions modified by the installation of other applications. After you restore the default settings, you might have to reinstall your applications or modify certain file system or registry permissions manually.


  • DC Security.inf A computer running Windows Server 2003 creates this template only when you promote the computer to a domain controller. The template contains the default file system and registry permissions for domain controllers, as well as system service modifications.

    Caution

    The “Setup Security.inf” and “DC Security.inf” templates contain a large number of settings, and in particular a long list of file system permission assignments. For this reason, you should not apply these templates to a computer using group policies. Computers running Microsoft Windows operating systems periodically refresh group policy settings by accessing the GPOs on the network’s domain controllers, and a template of this size can generate a great deal of Active Directory traffic on the network. Instead of using group policies, you should apply the template using the Security Configuration And Analysis snap-in or the Secedit.exe utility.


  • Compatws.inf By default, the members of the local Users group on a computer running a Windows operating system can only run applications that meet requirements of the Designed for Windows Logo Program for Software. To run applications that are not compliant with the program, a user must be a member of the Power Users group. Some administrators want to grant users the ability to run these applications without giving them all the privileges of the Power Users group. The Compatws.inf template modifies the default file system and registry permissions for the Users group, enabling the members to run most applications, and also removes all members from the Power Users group.

    Caution

    The Compatws.inf template is not intended for domain controllers, so you should not apply it to the default domain GPO or the Domain Controllers container’s GPO.


  • Securedc.inf This template contains policy settings that increase the security on a domain controller to a level that remains compatible with most functions and applications. The template includes more stringent account policies, enhanced auditing policies and security options, and increased restrictions for anonymous users and LanManager systems.

  • Securews.inf This template contains policy settings that increase the security on a workstation or member server to a level that remains compatible with most functions and applications. The template includes many of the same account and local policy settings as Securedc.inf, and implements digitally signed communications and greater anonymous user restrictions.

  • Hisecdc.inf This template contains policy settings that provide an even greater degree of security for domain controllers than the Securedc.inf template. Applying this template causes the computer to require digitally-signed communications and encrypted secure channel communications, instead of just requesting it, as Securedc.inf does.

  • Hisecws.inf This template contains policy settings that provide higher security than Securews.inf on a workstation or member server. In addition to many of the same settings as Hisecdc.inf, the template remove all members from the Power Users group and makes the Domain Admins group and the local Administrator account the only members of the local Administrators group.

    Tip

    The Securedc.inf, Securews.inf, Hisecdc.inf, and Hisecws.inf templates are all designed to build on the default Windows security settings, and do not themselves contain those default settings. If you have modified the security configuration of a computer substantially, you should first apply the “Setup Security.inf” template (and the “DC Security.inf” template as well, for domain controllers) before applying one of the secure or highly secure templates.


  • Rootsec.inf This template contains only the default file system permissions for the system drive on a computer running Windows Server 2003. You can use this template to restore the default permissions to a system drive that you have changed, or to apply the system drive permissions to the computer’s other drives.

Tip

If you want to make changes to any of the policies in the pre-defined templates, it is a good idea to make a backup copy of the template file first, to preserve its original configuration. You can copy a template by simply copying and pasting the file in the normal manner using Microsoft Windows Explorer, or you can use the Security Templates snap-in by selecting a template and, from the Action menu, choosing Save As and supplying a new file name.


Tip

Be sure to familiarize yourself with the security templates supplied with Windows Server 2003 and what settings they use to provide different levels of security.

Other -----------------
- Windows Server 2003 : Deploying Security Configurations - Creating a Testing and Deployment Plan
- Windows Server 2003 : Hardening Servers - Deploying Role-Specific GPOs
- Empowering Users Through SharePoint 2010 Libraries (part 2) - A Brief Tour of a Document Library & Adding Documents to a Document Library
- Empowering Users Through SharePoint 2010 Libraries (part 1) - Using the View All Site Content Page in SharePoint 2010
- Exchange Server 2010 : Prioritizing and Scheduling Maintenance Best Practices
- Exchange Server 2010 : Best Practices for Performing Database Maintenance
- BizTalk 2010 Recipes : Orchestrations - Using the Loop Shape
- BizTalk 2010 Recipes : Orchestrations - Using the Parallel Action Shape
- BizTalk 2010 Recipes : Orchestrations - Receiving Untyped Messages
- Windows Server 2008 R2 : File System Management and Fault Tolerance - Using the Volume Shadow Copy Service
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server