Auditing Networks, Perimeters and Systems Audit Checklists, Unit 6 Windows The SANS Institute Copyright 2001 Marchany 1 W2K CIS Rulers CIS Rulers are being developed for Windows 2000 and NT systems Format is similar to the Unix rulers (levels 1-3) Work has just started on it You’re getting a very ROUGH preview of the rulers. Copyright 2001 Marchany 2 Sample W2K level 1 Ruler – Physical Data Security Enable the end user to protect laptops. Physically secure servers. Protect the server from Unattended Reboot. – Protect the SAM with SYSKEY Protect the Backup Tapes. Use NTFS disk partitions. Use Encrypting File System Copyright 2001 Marchany 3 Sample W2K Level 1 Ruler – Security Policy Configuration Configure the Local Security Policy. Configure the Account Policy. Secure Administrator/Guest accounts. Configure Local Policies. Enable Audit Policies. Customize User Rights. Copyright 2001 Marchany 4 Win2k Audit (Run MMC -> CTRL M -> Security Templates -> Setup Security) Copyright 2001 Marchany 5 User Rights Copyright 2001 Marchany 6 Sample W2K Level 1 Ruler – Security Policy Configuration Customize Security Options – Restrict Anonymous Connections – Allow server operators to schedule tasks (DC only). – Clear virtual Memory Pagefile on shutdown. – Audit access of Global System Objects. – Do Not Display last username in login screen. Configure Public Key Policy. Configure IP Security Policy. Copyright 2001 Marchany 7 File System Configuration. (__) Define System Configuration and Service Pack Level (__) During Audit, set browser to see all files (__) System is configured as NTFS file system? (__) System Administrator has a current Emergency Recovery Disk in a locked storage area. (__) Wiping of system page file occurs at system shutdown. Copyright 2001 Marchany 8 Sample W2K Level 1 Ruler Group Policy MMC Snap-In System Tools – Configure Event Log Settings – System Information – Performance Logs & Alerts – Local Users & Groups Lock out unauth’d Floppy Disk use Copyright 2001 Marchany 9 Sample W2K Level 1 Ruler Disable unused services – Remove OS2 and POSIX subsystems Secure Remote control programs (PC Anywhere) Disable Microsoft Network Client Additional Utilities – W2K Suppot tools – Resource Kit tools Copyright 2001 Marchany 10 Sample W2K Level 1 Ruler Freeware, Shareware and Commercial Tools – Use Access Control List Auditing Tools – Audit SP and HotFix levels – Consider installing nmap, WinDump, PGP, Anti-Trojan, L0phtCrack 3, snort Copyright 2001 Marchany 11 Sample W2K Level 1 Ruler – The Registry Disable auto-run on CD ROM Drives. Control Remote Registry Access. Restrict Null User access to named pipes and shares. Disable Router discovery. Disable ICMP Redirects. Remove Administrative Shares. Copyright 2001 Marchany 12 Sample W2K Level 1 Ruler File Folder and Registry Permissions Security Analysis and Configuration Tool – Apply standard Incremental Security Templates – Create Custom Policies – Perform analysis of computer Recovery Options – Baseline System backup – Regular System backup – Remote System backup – NTBackup.exe Copyright 2001 Marchany 13 Sample W2K Level 1 Ruler Recovery Options (Continued) – Emergency Repair Disks – Safe Mode with or without networking – Safe Mode with command prompt – Recovery Console Active Directory Services – Domain Controllers and Trust – The Trees vs. the Forest – Enterprise Admins and Schema Admins Copyright 2001 Marchany 14 Sample W2K Level 1 Ruler Application Security – IIS v5 – CRITICAL! – Telnet Server – File and Printer Sharing – Windows Services for Unix 2.0 – Exchange, Outlook, Outlook Express – SQL These may be more suited to Level 2 Copyright 2001 Marchany 15 A Sample NT Level 1 Ruler Installation Networking User Accounts Services/System Files/Directories Registry Applications Developed by Marc Debonis, VA Tech Copyright 2001 Marchany 16 Sample VT Level 1 NT Ruler Installation – Physically secure machine – Enable BIOS boot password, user/admin levels – Install NT on C:, no dual boot, use NTFS – Put bogus name for install – Select only TCP/IP to install – Do NOT install IIS – Do NOT use DHCP – Do NOT use WINS server entries Copyright 2001 Marchany 17 Sample VT Level 1 NT Ruler Installation – Disable LMHOSTS lookup – Login as Administrator • Delete MyBriefCase, Install IIS, IE, Inbox icons – Install post SP5/SP6 hotfixes • Install in this order: Winhlp-I, Nddefixi, Lsareqi, Q234351I, Csrssfxi, Loctlfxi, Ntfsfix1, Igmpfix1, Ipsrfixi Copyright 2001 Marchany 18 (__) Define Service Pack Level Start -> Run -> WINVER (works the same for NT 4.0) Copyright 2001 Marchany 19 Checking for Service Packs Copyright 2001 Marchany 20 Copyright 2001 Marchany 21 (__) System does not have un-necessary devices Start -> Settings -> Control Panel -> Devices. Copyright 2001 Marchany 22 Sample VT Level 1 Ruler Networking – Use network control panel to remove RPC Configuration, NetBIOS Interface, Workstation, Server. – Set service TCP/IP NetBIOS Helper to disabled – Disable Windows NT Networking – Disable WINS Client (TCP/IP) binding – Disable WINS Client (TCP/IP) device Copyright 2001 Marchany 23 Sample VT Level 1 Ruler Accounts – Set minimum password length to 8 – Lockout after 3 bad attempts – Under Policies-> User Rights • Select Right/Access this computer from Network and remove ALL groups listed in the Grant To box • Under Show Advanced Rights, select Bypass Traverse Checking, remove Everyone • Select Log on Locally and disable guest Copyright 2001 Marchany 24 Sample VT NT Level 1 Ruler Accounts – Select Policies -> Audit • Enable audit events: logon/logoff, user/group mgt, security policy changed, restart, shutdown and system – Open User Manager for Domains • • • • Rename Administrator account to Master Remove Description for Master Account Set Master account password to something VERY strong Rename Guest account to DEFUNCT – Allow remote lockout of administrator account only Copyright 2001 Marchany 25 (__) Auditing is Enabled User Manager, Policies,Audit http://www.geek-speak.net/products/ntaudit1.html Copyright 2001 Marchany 26 Audit Best Practice Copyright 2001 Marchany 27 Audit Best Practice (2) Copyright 2001 Marchany 28 Passwords (__) NT password policies comply with Best Practices for NT Passwords. (__) User passwords are known only by the user. (__) Users are required to maintain unique passwords for each AIS. (__) Passcrack for Windows NT or other password tester is run at least yearly. (__) Password database (SAM) is encrypted. (__) Administrator password is protected to the same level as the data contained on the computer. (__) Password is enabled for screen saver. (Control Panel, Desktop) Copyright 2001 Marchany 29 Passfilt Copyright 2001 Marchany 30 NT 4.0 Start -> Programs -> Administrative Programs -> User Manager Copyright 2001 Marchany 31 Win2k, My Computer -> Control panel, Administrative Tools -> Local Security Policy -> Password Policy Copyright 2001 Marchany 32 Sample VT NT Level 1 Ruler Services/System – Disable unnecessary system services • Network DDE, Network DDE DDSM, Schedule, Spooler, Telephony service, distributed DCOM – From System Control Panel, click Startup/Shutdown tab • Uncheck Overwrite any Existing File? • Uncheck Write debugging info to: • Uncheck Automatically Reboot? Copyright 2001 Marchany 33 Sample VT NT Level 1 Ruler Services/System – Click Display Control Panel • Click Screen Save Tab, enable Blank Screen Screen Saver, modify wait to 5 minutes, check the Password Protected box. – Event Logs • Open Log->Log settings and increase max size of logs > 2048K Copyright 2001 Marchany 34 Log--> Log Settings Copyright 2001 Marchany 35 Event View 2000 My Computer -> Control Panel -> Administrative Tools -> Event Viewer Copyright 2001 Marchany 36 Using dumpel for audit logs Copyright 2001 Marchany 37 Sample VT NT Level 1 Ruler For the rest of the ruler, go to http://security.vt.edu and look in the Checklists section for Marc’s document Some may consider his requirements to be really strict but some may like them. Copyright 2001 Marchany 38 Sample Windows 2000 Level 2 Ruler Rules of Engagement for Active Directory Developed at VA Tech for our AD structure – Marc Debonis, www.w2k.vt.edu Allows lower level admins to control their own domains Not for everyone Somewhat draconian Copyright 2001 Marchany 39 Sample VT Level 2 Ruler: Active Directory ROE The Child domain must have at least 1 fulltime peer BDC for the child domain The child domain controllers must meet Microsoft’s minimum computer hardware requirements No 3rd party of Microsoft add-on software are allowed on child domain controllers – IIS, Certificate Services, Indexing Service, Windows Media Services, DNS, DHCP, WINS, printer/file services Copyright 2001 Marchany 40 Sample VT Level 2 Ruler: Active Directory ROE The child domain controllers must be in a backup program and have full recoverability tested The child domain controllers must allow and not block global policy objects replicated from the root All W2K hosts must follow prescribed DNS naming conventions (xxx.yyy.vt.edu) Copyright 2001 Marchany 41 Sample VT Level 2 Ruler: Active Directory ROE All W2K hosts within the child domain will use root AD DDNS server settings. Child DC will use static IP and not run DHCP servers Child domain will not attempt to create child domains “below” theirs. They will use OU to do this. Copyright 2001 Marchany 42 Sample VT Level 2 Ruler: Active Directory ROE No non-administrative local logins will be allowed to the child domain controllers. The CDC will be housed in secure areas with controlled access 2 week backups of event/audit logs will be kept and access to them will be given to the AD enterprise admins for security/debugging purposes. Copyright 2001 Marchany 43 Sample VT Level 2 Ruler: Active Directory ROE All service packs will be installed in a timely manner, coordinated with root AD controller upgrades Will people buy into this? – Some will, some won’t but those that do are more secure. Copyright 2001 Marchany 44 Whew! You’ve got a basic strategy for building security checklist/audit plans for – – – – Perimeter Unix NT Windows 2000 Please fill out your comment sheets! Copyright 2001 Marchany 45 Today’s Course Goals Construct a high level Security Checklist from the CIS rulers for your site. – Unix. NT, Windows 2000 Use TBS to provide a response to your internal auditors and secure your systems. Use STAR to define the $$$ cost of implementing security features at your site. – This method can be used over time to show trends Develop a set of reports/matrices that can be used to quickly identify the security status of a host at your site. Copyright 2001 Marchany 46 URLs referred to in this course STAR Matrices http://courseware.vt.edu/marchany/STAR Sample R/A Documents http://security.vt.edu Top Ten Vulnerabilties http://www.sans.org/topten.htm Top Ten Blocking http://www.sans.org/giactc/gcfw.htm Egress Filtering http://www.sans.org/y2k/egress.htm CVE http://cve.mitre.org GIAC Practicals http://www.sans.org/giactc/cert.htm RFC 2196 http://www.ietf.org/rfc/rfc2196.txt Center for Internet Security http://www.cisecurity.org Copyright 2001 Marchany 47 Course Revision History Copyright 2001 Marchany 48