Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Planning a Secure Baseline Installation - Identifying Client and Server Default Security Settings

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/31/2011 3:02:01 PM
When you install an operating system, the Setup program includes default configuration settings for security features; these settings might or might not be suitable for your needs. When you create a secure baseline installation for your computers, you have to be familiar with the operating system’s default security settings, understand the effects of those settings on your overall security strategy, and determine whether you want to change them on your computers.

Evaluating Security Settings

Windows Server 2003 and Windows XP Professional are the current operating systems that Microsoft has designated for use on network servers and clients. Security was a major concern to their designers, and the systems contain many configurable security features. The following sections examine some of these features and their default settings and discuss how to manipulate these settings to modify the security of your baseline installation.

File System Permissions

File system permissions constitute one of the basic security tools in any network operating system; one that network administrators are likely to use every day. Access permissions are a feature of the Windows NTFS file system that enables you to specify which users and groups are given access to a specific folder or drive and what degree of access they have. To modify the permissions for a drive or folder, you display its Properties dialog box, and then click the Security tab (see Figure 1). When you install Windows Server 2003 or Windows XP Professional on a network that uses Active Directory and format the system drive using NTFS, the Setup program automatically assigns the file system permissions shown in Table 1.

Figure 1. The Security tab in a folder’s Properties dialog box


Table 1. Default Windows File System Permissions for System Drive
 System Drive (Root)Documents And Settings FolderProgram Files FolderWindows Folder
AdministratorsFull ControlFull ControlFull ControlFull Control
Users GroupRead & ExecuteRead & ExecuteN/AN/A
 List Folder ContentsList Folder Contents  
 ReadRead  
 Create Folders / Append Data   
 Create Files / Write Data (in subfolders only)  
Everyone GroupRead & Execute (in root only, not subfolders)Read & ExecuteN/AN/A
  List Folder Contents  
  Read  
Authenticated Users GroupN/AN/ARead & ExecuteRead & Execute
   List Folder ContentsList Folder Contents
   ReadRead
Server Operators GroupN/AN/AModifyModify
   Read & ExecuteRead & Execute
   List Folder ContentsList Folder Contents
   ReadRead
   WriteWrite

Caution

File system permissions are available only when you format your computer’s drives using NTFS. If you format your drives using the FAT file system, there are no permissions and all users have full access to the drive.


As you can see in the table, the Windows operating system assigns almost all file system permissions to groups, not to users, which makes the task of managing permissions much easier. Not surprisingly, the Windows operating system assigns the Administrators group the Full Control permission over the entire drive, enabling members of this group to perform any action on existing files and folders, as well as create new ones. The Windows operating system grants the members of the Users group permission to read and execute files anywhere on the drive, but Users members cannot modify or delete existing files or folders anywhere except in their home folders. Users can create folders and write to files in those home folders, which makes it possible for them to install applications. The Everyone group receives only the ability to execute, list, and read files.

Note

In addition to the permissions in the table, the Windows operating system grants each user the Full Control permission for the subfolder named after that user in the Documents And Settings folder. This is the location of the user’s profile and home folder.


Off the Record

Technically speaking, groups like Authenticated Users and Everyone are not really groups at all, in the accepted sense of the word; instead, they are called special identities. Although you can choose a special identity group when you are assigning permissions, you cannot manage the group in the usual manner. The Windows operating system creates the special identity groups automatically, and you cannot delete them or modify their member lists. The Windows operating system also creates a number of Built-in groups, such as Administrators and Users, but these are actual groups that you can modify or delete.


The Server Operators group is intended for system support personnel who need more access to the file system than normal users, but who are not yet trusted with the Full Control permission. Server operators have full access to the key Program Files and Windows folders. Their only limitation is that without the Full Control permission, they cannot grant their permissions to other users.

Warning

If you have NTFS drives other than the system drive on the computer running a Windows operating system, the Setup program does not create any special permissions there. The program grants the Everyone group Full Control over the entire drive, so that anyone can perform any action, including modifying or deleting existing files. It is up to the administrators to implement a system of permissions on these drives once users have populated them with files and folders.


Share Permissions

Share permissions constitute an access control mechanism that enables you to specify which users and groups are permitted to access a shared resource over the network, and what degree of access they should have. By default, when the Windows Server 2003 operating system is installed, the Windows Setup program creates only administrative shares. Each drive on the computer has a hidden administrative share, named with the drive letter followed by a dollar sign ($). These are special shares that you cannot delete, and you cannot modify their permissions.

Tip

When creating a file system share, appending a dollar sign to the share name causes the Windows operating system to keep the share hidden. You cannot see hidden shares when you browse the network using My Network Places, but you can still access them by typing the share name in the Run dialog box. For example, to access the administrative share on drive C on a computer called Server01, you would type \\Server01\C$ in the Open text box in the Run dialog box.


When you create a new file system share on a computer running Windows Server 2003, by default the Everyone group receives only the Read permission. You must modify the defaults to give users greater access to the share. The Permissions dialog box you use to modify the share permissions is shown in Figure 2. This default is new to Windows Server 2003. On computers running the Windows XP and Windows 2000 operating systems, the Everyone group receives the Full Control permission on all newly created shares. You must modify or remove this permission to control access to the shares.

Figure 2. The Permissions dialog box for a file share


Real World: File System and Share Permissions

Share permissions are completely separate from file system permissions. File system permissions affect all users, whether they are accessing the drive over the network or sitting at the computer console. Share permissions affect only users who are accessing the resource over the network. A network user must therefore have both the appropriate file system permissions and the appropriate share permissions to access a shared drive or folder on a remote computer.

Many network administrators use either file system permissions or share permissions to secure their drives, but not both, to avoid confusion. Keep in mind, however, that securing a share does not prevent users from accessing the share’s files from the computer’s console. For this reason, it is common practice among many administrators to rely entirely on file system permissions and not to use share permissions for access control.


Registry Permissions

The registry of the Windows operating system contains a great deal of configuration data for many applications and many elements of the operating system. Installing applications and configuring operating system settings modifies registry elements. It is also possible to modify the registry manually, but this is a dangerous practice because even the slightest incorrect setting can cause a catastrophic malfunction. To protect the registry, the Windows operating system includes a separate system of permissions that enable you to specify who has access to the registry and to what degree. You modify registry permissions using the Registry Editor (Regedit.exe) program, using a Permissions dialog box like the one shown in Figure 3.

Figure 3. A Permissions dialog box for a registry key


By default, members of the Administrators group have the Full Control permission for all the keys in the registry. The Everyone group has the Read permission only for the HKEY_LOCAL_MACHINE and HKEY_USERS keys, and the Server Operators group has permissions that enable them to read, add, and modify certain registry keys, without giving them full control. In most cases, there is no need to modify registry permissions manually, but if you want to create a class of administrative users that has limited access, you might want to modify the permissions of the Server Operators group.

Active Directory Permissions

Windows Server 2003 has yet another system of permissions, which you can use to specify who can access and manage objects in the Active Directory database. On a large network, working with Active Directory objects is a common administrative task.

Administrators frequently have to create or delete user objects or modify the properties of existing objects. To delegate these tasks to other people, you might want to modify the default permissions for all or part of the Active Directory database.

When you create a new Active Directory domain by assigning a computer running Windows Server 2003 the role of domain controller, the system creates default permissions for the following groups:

  • Enterprise Admins Enterprise Admins is the only group that receives the Full Control permission over the entire domain.

  • Domain Admins and Administrators The Domain Admins and Administrators groups both get a selection of permissions that enable them to perform most Active Directory object maintenance tasks. They can create objects and modify their properties, for example, but they cannot delete objects.

  • Authenticated Users The Authenticated Users group receives the Read permission for the entire domain, plus a small selection of very specific Modify permissions. For example, members of this group receive the Unexpire Password permission, which enables them to change their own passwords after an expiration period specified by an administrative policy.

There are two ways to modify the default permissions that the Windows operating system assigns to Active Directory objects. You can use the Delegation Of Control Wizard in the Active Directory maintenance snap-ins for the Microsoft Management Console (MMC), or you can modify the permissions directly. The Delegation Of Control Wizard simplifies the process of delegating responsibility for a part of the Active Directory database to a user or group (see Figure 4).

Figure 4. The Delegation Of Control Wizard


The drawback of using the Delegation Of Control Wizard is that you cannot view the permissions you have set once you have assigned them. To do this, you must work with the permissions directly. By default, Windows directory service tools such as Active Directory Users And Computers do not provide direct access to the permissions. To modify this default, you select the Advanced Features option from the console’s View menu. Once you do this, the Properties dialog box for each Active Directory object displays a standard Security tab, as shown in Figure 5.

Figure 5. The Security tab in a domain’s Properties dialog box


Account Policy Settings

Group policies are among the most powerful security features included with Windows Server 2003. You can create Group Policy Objects (GPOs) that do everything from distributing new software to configuring system security settings to remapping directories. You then associate the Group Policy Object with an Active Directory container object, such as a domain, a site, or an organizational unit, and the Windows operating system applies the policy to all the objects in that container.

One of the security modifications that Microsoft has made in Windows Server 2003 is to enable some of the most commonly used policies by default. These are the account policies, which you can find in the Computer Configuration\Windows Settings\Security Settings heading in the Group Policy Object Editor console (see Figure 6).

Figure 6. Account policies in the Group Policy Object Editor console

In previous versions of the Windows operating system, these policies are undefined by default. However, Windows Server 2003 enables the following account policies by default and applies them to each domain:

  • Enforce Password History Specifies the number of unique passwords that users have to supply before the Windows operating system permits them to reuse an old password. The default value is 24.

  • Maximum Password Age Specifies how long a single password can be used before the Windows operating system forces the user to change it. The default value is 42 days.

  • Minimum Password Age Specifies how long a single password must be used before the Windows operating system permits the user to change it. The default value is one day.

  • Minimum Password Length Specifies the minimum number of characters the Windows operating system permits in user-supplied passwords. The default value is seven.

  • Password Must Meet Complexity Requirements Specifies criteria for passwords, such as length of at least six characters; no duplication of all or part of the user’s account name; and inclusion of characters from at least three of the following four categories: uppercase letters, lowercase letters, numbers, and symbols. By default, the Windows operating system enables this policy.

  • Store Passwords Using Reversible Encryption Specifies whether the Windows operating system should store user passwords in an encrypted form that specific applications or protocols can decrypt as needed. This policy weakens the security of the authentication system; you should not enable it unless you are forced to use an application or protocol that requires it. By default, this policy is disabled.

  • Account Lockout Threshold Specifies the number of failed logon attempts that causes the Windows operating system to lock out users from future attempts until an administrator resets the account. The default value is zero, which means that users are allowed unlimited failed logon attempts.

  • Enforce User Logon Restrictions Specifies whether the Kerberos Key Distribution Center (KDC) should validate every request for a session ticket against the user rights policy of the requesting user’s account. By default, this policy is enabled.

  • Maximum Lifetime For Service Ticket Specifies the amount of time that clients can use a Kerberos session ticket to access a particular service. The default value is 600 minutes.

  • Maximum Lifetime For User Ticket Specifies the maximum amount of time that users can utilize a Kerberos ticket-granting ticket (TGT) before requesting a new one. The default value is ten hours.

  • Maximum Lifetime For User Ticket Renewal Specifies the amount of time during which users can renew a Kerberos TGT. The default value is seven days.

  • Maximum Tolerance For Computer Clock Synchronization Specifies the maximum time difference that Kerberos allows between the client computer and the authentication server. The default value is five minutes.

Tip

Windows account policies have three possible states: enabled, disabled, and undefined. The difference between disabled and undefined comes into play when multiple Group Policy Objects apply to the same objects and the Windows operating system must resolve policy conflicts. An enabled policy always overrides an undefined instance of the same policy, but a policy that is explicitly disabled might override an enabled instance of the same policy.


This default configuration forces users to change their passwords every six weeks, and compels them to use passwords that are not easy to guess. Policies like Minimum Password Age and Enforce Password History prevent the users from working around the password requirements by reusing the same few passwords and repeatedly changing passwords over a short time. If you want to increase the password security on your network, you can modify these defaults by requiring longer passwords and more frequent changes. You can also relax security by disabling some or all of these policies.

Tip

Be sure to understand the functions of the security configuration parameters in a Group Policy Object.


Audit Policies

Group Policy Objects can contain audit policies specifying the activities that the system should record in a log. You find the audit policies in the Computer Configuration/ Windows Settings/Security Settings/Local Policies header in the Group Policy Object Editor console (see Figure 7). By default, domain objects do not have any audit policies defined, but the GPO for the Domain Controllers organizational unit in each domain does have audit policies.

Figure 7. Audit policies in the Group Policy Object Editor console


By default, Windows Server 2003 enables the following audit policies for the Domain Controllers organizational unit:

  • Audit Account Logon Events

  • Audit Account Management

  • Audit Directory Service Access

  • Audit Logon Events

  • Audit Policy Change

  • Audit System Events

For each of these policies the default setting is to record only successful events in the log. For example, with these settings, the system logs all successful logons, but not the logon failures. If you are concerned about people trying to penetrate account passwords using the brute force method (trial and error), you might want to audit unsuccessful logon attempts as well.

Tip

To prevent brute force attacks, in addition to auditing unsuccessful logons, you should consider modifying the default value of the Account Lockout Threshold policy. This policy limits the number of unsuccessful logon attempts by locking the account for a specified period or until an administrator releases it.

Other -----------------
- Windows Server 2003 : Planning a Secure Baseline Installation - Planning a Security Framework
- Windows Server 2003 : Planning a Secure Baseline Installation - Selecting Computers and Operating Systems
- BizTalk 2010 Recipes : Messaging and Pipelines - Configuring Port Maps
- BizTalk 2010 Recipes : Messaging and Pipelines - Configuring Send Ports
- BizTalk 2010 Recipes : Messaging and Pipelines - Configuring Receive Ports and Locations
- Windows Server 2008 Server Core : Managing Active Directory with the DSQuery Utility (part 3)
- Windows Server 2008 Server Core : Managing Active Directory with the DSQuery Utility (part 2)
- Windows Server 2008 Server Core : Managing Active Directory with the DSQuery Utility (part 1)
- Using Operations Manager to Monitor Exchange Server 2010 : Outlining OpsMgr Architecture
- Using Operations Manager to Monitor Exchange Server 2010 : Explaining How OpsMgr Works
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server