Andrew Windows Server Guidelines - Andrew.cmu.edu

advertisement
DRAFT
Getting Started – Setting up a Windows 2000 Member Server in Andrew Windows
Carnegie Mellon University
A Computing Services Publication
June 10, 2002
Introduction
This document provides information on configuring and administering a Windows 2000 Member
Server in Andrew Windows and includes the following sections.
1. Overview: Andrew Windows 2000 and Microsoft Active directory
2. Installation and Configuration
2.1. Windows 2000 Server Licensing
2.2. Installing Windows 2000 Server
2.3. Upgrade to the Latest Windows 2000 Service Pack
2.4. Shutdown Non-Essential Services
2.5. Install the Latest Security Patches and Hot-Fixes
2.6. Network Registration
2.7. NTFS Disk Format
2.8. RAID
2.9. Install Required Applications
2.10.
Macintosh Services
2.11.
Printing
2.12.
Backups/Restorations
2.13.
Internet Information Services (IIS)
3. Andrew Domain Configuration
3.1. Creating a Server Organizational Unit (OU)
3.2. Blocking Inheritance
3.3. Custom GPO for the Server
3.4. Joining the Domain
3.5. Local Administration Access for Accounts and Groups
3.6. Local vice Andrew Domain Accounts
3.7. Local Logon Access
3.8. Restricting Server Access
4. Security
4.1. Physical Security
4.2. Registry Security
4.3. File/Share Access Permissions
4.4. Disable Guest Account
4.5. Virus Software
4.6. Auditing
DRAFT
4.7. Vulnerability Scanners
4.8. Other Security Links
5. On-Going Support Activities
5.1. User Privacy/Confidentiality
5.2. Restrict Administrator Privileges
5.3. Keep the Patches Current
5.4. Review Event Logs
5.5. Disk Defragmenting
6. Trouble-shooting
6.1. Resource Kit
6.1.1. Group Policy Object (GPO) Processing
6.1.2. Group Memberships
DRAFT
1.0 Overview: Windows Member Server Guide
This document is a guide to assist you in setting up a Windows 2000 Member Server within the
Andrew Windows Service. Readers should have a general knowledge of Windows 2000 and
Active Directory terminology.
This guide is not meant to be a comprehensive resource for configuring a Windows 2000 Server.
In order to become familiar with Windows 2000 Server, Computing Services recommends that
Computing Administrators complete a course similar to MS Course 2154: Implementing and
Administering Microsoft Windows 2000 Directory Services, from a Certificated Microsoft
trainer. In addition, many good books exist for Windows 2000 Administration. A book that we
recommend is, Mastering Windows 2000 Server, by Mark Minasi.
2.0 Installation and Configuration
2.1 Windows 2000 Server Licensing
The Windows 2000 Server license is not covered under the Microsoft Campus License
Agreement. Departments must purchase Windows 2000 Server licenses in order to run Member
Servers. Windows 2000 Server licenses and media are available from the CMU Computer Store.
Client Access Licenses (CALs) are currently covered under the Microsoft Campus License
Agreement and do not need to be purchased separately.
2.2 Installing Windows 2000 Server
Install Windows 2000 from a Windows 2000 installation CD. The CD media can be purchased
from the CMU Computer Store. It is recommended that the media be stored in a safe place, as it
may be required at a later time.
Until the Windows 2000 Server is patched and secured, the server should not be run on the open
campus network. Therefore, it is recommended that the network connectivity be disconnected
during the installation process.
DRAFT
2.3 Upgrade to the Latest Windows 2000 Service Pack
Upgrade the Windows 2000 Server to the latest Microsoft Service Pack. The current Service
Pack available is Service Pack 2.
2.4 Shutdown Non-Essential Services
You should limit the number of applications that your machine is running to essential services.
Services that must be removed for installation in the CMU Campus include WINS and DNS.
Services that should be considered for removal include FTP, WWW and SNMP.
Examine the existing services via:
Control Panels->Administrative Tools ->Services.
OR
Start menu->Run…->type “services.msc”
Check out the Microsoft website or a detailed description of the Windows 2000 Services.
It is a good security practice is to limit the amount of critical services that are running on any one
machine. Try to avoid running all of your critical departmental services on one server.
2.5 Install the Latest Security Patches and Hot-Fixes
Install Hot-Fixes appropriate to your server while the server is still offline. To stay up to date on
Microsoft patches, visit the MS Technet security site where you can join an e-mail list to notify
you of new security fixes. The "Windows Update" function allows you to download many
patches and updates, and allows you to be informed of critical updates, but it does not contain all
security patches.
Microsoft has a number of tools that help with installing security patches. Several that we
recommend include:
MS Network Security HotFix Checker (HFNetchk) is a tool that allows you to check for missing
security HotFixes.. It must first be run on a computer with network access to download a current
list of HotFixes, but then it can be copied to unsecured computers not yet connected to the
network. This tool checks for HotFixes related to the operating system and other core
components like Internet Explorer. It will not notify the user of Hot-Fixes for applications like
Microsoft Office.
A graphical tool, similar to hfnetchk, is the Microsoft Security Baseline Analyzer (MBSA).
MBSA will keep a history or scans as well as search for vulnerabilities in the operating system.
Qchain is a tool that allows you to install multiple HotFixes sequentially without requiring
multiple reboots.
DRAFT
2.6 Network Registration
The Windows 2000 Server should be registered to use the Campus Network via NetReg. After
registration, the Server should be configured to run DHCP. It will receive the IP Configuration
information after a reboot.
2.7 NTFS Disk Format
Hard disks should be formatted with the NTFS file system. This format allows the most
flexibility in security and audit policies and it reduces exposure to boot attacks. Windows 2000
allows the capability to upgrade to NTFS partitions without damaging data. However, when a
disk that was installed with FAT/FAT32 is converted to NTFS that the Everyone group has Full
Control of all the files/folders on the entire disk, including the \winnt directory.
2.8 RAID
RAID (Redundant Array of Independent Disks) technology allows for high availability and
increased performance for disk drives. RAID has become very popular throughout server
technology and it is recommended for critical File Servers. Windows 2000 has built-in software
RAID functionality that should be considered if hardware RAID is not cost-efficient.
2.9 Install Required Applications
It is a good idea to install all of the necessary Application Software to the Member Server prior
to releasing it as a production server. As was mentioned with services, it is recommended that
Application Software be limited to essential programs.
2.10 Macintosh Services
To provide File and/or Print Sharing to Macintosh Clients, you will need to install and configure
the bundled Windows 2000 product “Services for Macintosh”. Services for Macintosh requires
the disk(s) be NTFS-formatted. Since AppleTalk routing is being eliminated at CMU, this
service will need to be run natively under TCP/IP. The latest Microsoft UAM will need to be
installed on your client computer in order to support the more secure NTLMv2 client. Please see
the Client Guide for Andrew Windows for specific instructions.
Microsoft discusses Services for Macintosh on its’ website.
2.11 Printing
Windows 2000 Server has the native ability to create Print Spools. Although this capability has
been tested and works sufficiently, Computing Services will not support departmental print
spoolers.
2.12 Backups/Restorations
DRAFT
In order to protect against data loss, it is strongly recommended that routine backups be
performed on critical file systems. Computer Operations has a fee-based backup service. It is
also recommended that recoveries be performed periodically in order to guarantee the integrity
of the data backups.
2.13 Internet Information Services (IIS)
The IIS application provides access to Web, FTP, SMTP, and NNTP, and is bundled with
Windows 2000 Server. Unfortunately, IIS has been the target of numerous security
vulnerabilities. If you decide to run IIS on your server, be sure to install core security patches
and stay up to date on new security advisories.
The National Security Agency has produced a guide for securing IIS. The University of
Colorado at Boulder also has an informative site.
3.0 Andrew Domain Configuration
3.1 Creating a Server Organizational Unit (OU)
In order to control your Server configuration for your Department in the Andrew Windows
environment, we recommend that you have an Organizational Unit (OU) delegated to your
department. If you do not have an OU already, please send email to advisor@andrew.cmu.edu
requesting an OU. Please include the name and Andrew User ID of the primary point of contact
for the OU administration.
After the OU has been created, we recommend that you create a sub-OU for your Member
Server. Please see the Administration Guide for Andrew Windows for specific instructions.
3.2 Blocking Inheritance
In order to ensure that software packages and GPO Settings from parent objects do not propagate
to your Member Server, we recommend that inheritance for the Server OU be blocked. Please
see the Administration Guide for Andrew Windows for instructions on blocking inheritance.
3.3 Custom GPO for Server OU
We recommend that a custom GPO be configured for this Server OU. To request the GPO
creation, send email to advisor@andrew.cmu.edu. This GPO can then be linked to the Server
OU and configured with custom software packages. Custom Security settings can also be
adjusted via this GPO.
The core Andrew software installers are currently available from \\dist.andrew.ad.cmu.edu.
They are distributed as .MSI files, which utilize Microsoft’s, Microsoft Installer technology.
License permitting, these MSI’s can be copied and then linked to the local GPO. If you do not
have access to a desired MSI, please send email to advisor@andrew.cmu.edu.
DRAFT
We strongly suggest that you do not link GPO’s directly to the MSI’s on the Dist Server. This
core distribution is maintained for Computing Services Computer Clusters and may change
without notice. As an alternative, consider copying the MSI’s to a local file share.
In addition, many of the software MSI’s were custom built for cluster configurations and may
not work as expected in your environment. We will not support applications installed with these
MSI’s. Use them at your own risk. At some point in the future, we hope to be able to offer
stable and supportable MSI’s.
3.4 Joining the Domain
At this point, you should have a customized OU for your Member Server and can add the Server
to the Domain with the NETDOM utility. NETDOM is a powerful tool for automating domain
membership activity on client systems. Please see the Administration Guide for Andrew
Windows for specific instructions.
Do not attempt to add the machine to the Domain via the “My Computer” -> Network
Identification method. By default, this will place the server into the Active Directory Computer
Container. If the server is mistakenly added to this container, upon reboot it will unintentionally
pick up the Andrew GPO’s.
The Microsoft Knowledge-base article Q222525 describes automating the
creation of computer accounts within a domain.
3.5 Local Administration Access from Andrew Accounts and Groups
One of the first server changes you should consider is the addition of your departmental OU
administrators group to the local administrators group on your Member Server. This will enable
you to perform local Server administration tasks without logging in as the local administrator.
Please see the Administration Guide for Andrew Windows for specific instructions.
3.6 Local vice Andrew Domain Accounts
When Member Servers join the Andrew Domain, resources can then be adjusted to give
permissions to Andrew Users. In addition, Member Servers still have the ability to host local
accounts for resource control. Server administrators are responsible for local machine accounts.
For security reasons, it is recommended that these accounts be minimized.
3.7 Local Logon Access
We recommend that departments customize their local logon policies to restrict access to nondepartmental Administrators. Please see the Administration Guide for Andrew Windows for
specific instructions.
DRAFT
3.8 Restricting Server Access
By default, when a computer is joined to a domain, several domain groups are added to local
machine groups. The Domain Users group is joined to the Local Users group and the Domain
Administrators group is joined to the local computer's Administrators group. These domain
groups can be removed from the local groups to increase the security of your computers.
Directions for customizing local machine access can be found in the Administration Guide for
Andrew Windows.
4.0 Security
4.1 Physical Security
The most basic and important security measure for any operating system is regulating who has
physical access to the machine. Software exists to read NTFS data if the drive is connected to a
non-NT system (Linux or MS-DOS). It is also possible to reset the built-in administrator's
password with a boot floppy. Because data and passwords can be extracted from media, System
Repair Disks and Backup Tapes should also be highly guarded.
A limited access, climate-controlled, locked room is an ideal environment for the server. A
locked CPU cabinet is another viable option. If either of these can’t be obtained, a locked
computer chassis should be used. The system BIOS should be secured to disable booting from
floppy or CD-ROM drives and the BIOS password should be enabled.
The server should be protected from power surges and short outages with a UPS device.
4.2 Registry Security
Windows 2000 registry permissions are secure by default. Normal users do not have permission
to change any registry settings.
4.3 File/Share Access permissions
The standard permissions on files and shares are secure in Windows 2000 and they do not allow
a standard user to make changes to system files
Windows 2000 uses a concept of inherited permissions instead of explicitly changing the Access
Control List (ACL) of each Directory/File to propagate a security change. In the Graphical User
Interface (GUI), an ACL inherited from a parent is shown grayed out. You cannot remove them
without blocking ACL inheritance. Be especially careful of this when setting permissions at a
drive root.
When creating a share, you can just leave default permission of "Everyone" "Full Control". In
general, disk ACLs are secure and the combined restrictions apply. It is still recommended that
you first verify this setting on your system.
DRAFT
“Authenticated Users” is a built-in group that contains all user accounts. This does not contain
anonymous connections, as the “Everyone” group does. For better file protection, use
"Authenticated Users" instead of "Everyone”.
4.4 Disable Guest Account
The local Guest Account provides a potential door into your system for hackers and hence it
should be disabled.
4.5 Virus Software
A Virus Scanner should be installed on the Member Server. CMU has a site license for Norton
Antivirus and it can be downloaded from the MyAndrew website.
The Virus Definition (DAT) files should be set to automatically update. The automatic update
times should be modified to be different than the default time. The entire file system should be
scanned on a routine basis.
4.6 Auditing
Auditing is an effective security measure because it can help you track what an attacker (or
errant user) is attempting to do and help provide insights on how to stop it. To enable auditing,
your file system must be formatted as NTFS (see above).
Auditing can be configured with:
Group Policy ->Computer Configuration\Windows Settings\Security Settings\Local
Policies\Audit Policy
One suggested auditing configuration is:
Event
Account logon events
Success Failure
X
X
Account management
X
X
Directory service access
Logon Events
X
Object access
X
Policy change
X
Privilege use
X
Restart, Shutdown, and System X
Process Tracking
X
X
DRAFT
The University of Colorado at Boulder also has some information on logging on its’ website.
4.7 Vulnerability Scanners
After the server has been configured, it should be tested for vulnerabilities with a Network and
Vulnerability Scanner. The Retina scanner is a robust, but pricey tool. Foundstone’s SuperScan
is a free scanning tool. Gibson Research produces the ShieldsUp utility. Microsoft has produced
the MBSA tool that assesses weaknesses and helps guide administrators in securing their
systems.
4.8 Other Good Security Links:
NSA Win20000 Security guides
University of Colorado at Boulder Windows 2000 Security
NIST System Administration Guide for Windows 2000
5.0 On-Going Support Activities:
After the initial server configuration and deployment, it is still essential to conduct periodic
maintenance of the Member Server in order to verify its reliable and secure operations. Several
areas of concern are addressed below.
5.1 User Privacy/Confidentiality
Administrators carry advanced computer privileges. With these privileges, comes the
responsibility to ensure privacy in accordance with the University Computer Code of Ethics and
the University Privacy Policy.
5.2 Restrict Administrator Privileges
Since Administrator access is critical to the security of the Member Server, it is important to
protect this access. Several suggestions for protecting the Administrator Account:
 Use Strong Passwords as recommended by the Computer Services Guidelines.
 Change your passwords regularly.
 Do NOT share passwords with multiple users.
 Limit the number of people with Administrator Access.
 Run as a non-privileged user for daily procedures. Elevate procedures with the “Run As”
option when necessary.
5.3 Keep the Patches Current.
DRAFT
Most security compromises are caused by administrators failing to apply security patches. As
mentioned above, there are a number of good tools and resources for ensuring the security of the
Member Server. It is essential that security is an on-going activity and patches should be
updated weekly or more frequently when critical vulnerabilities are announced.
5.4 Review Event Logs
A good administrative practice is to become familiar with the logs by checking them routinely.
The security logs can provide insights into potential vulnerabilities. The Application and System
logs can point out configuration or hardware issues. Check your Event Logs as part of an ongoing routine. The event logs can be viewed using the event viewer tool via:
Start Menu->Run…->eventvwr.msc
5.5 Disk Defragmenting
The nature of hard disk storage often leads to data fragmentation because files are frequently
being created and removed from the storage device. Windows 2000 has a built in defragmenting
tool that can reduce the file fragmentation and increase disk performance. It is important to
defragment your Server Disks periodically.
6.0 Trouble-shooting
Windows 2000 and Active Directory is a powerful environment and can lead to complicated
trouble-shooting issues. This section attempts to provide some suggestions, and tools that can
help trouble-shoot these issues.
6.1 Resource Kit
The Microsoft Windows 2000 Resource Kit contains a number of utilities that are very important
for computer management in a Windows environment. Some of the Resource Kit tools are
available for free download, but most are bundled with the purchased manuals as available via
Amazon.com.
6.2 Group Policy Object (GPO) Processing
Group Policy Objects are a powerful tool for deploying applications and controlling machine
configuration. However, GPO processing can be complicated and confusing. The Resource Kit
contains a useful tool called GPResult that can help identify how a collection of policies can
affect a user. Yale has an example output from GPResult available at their website. Stanford has
an excellent write-up detailing Loop-Back Processing within Windows 2000.
6.3 Group Memberships
DRAFT
Because Groups can be nested, trouble-shooting group membership can be difficult. Several
Resource Kit tools (local.exe, findgrp.exe. and showmbrs.exe) are very helpful at enumerating
group memberships.
Download