KrisKennyJulieGroupPolicy

advertisement
MS Windows 2000 Group Policy:
Security Configuration Toolset
Presented by
Kris Daley, Julie Evans and Kenneth Fitch
Security Configuration
Toolset - Outline
• Security Templates
• NSA Guidelines
–
–
–
–
–
–
–
–
Account Policy
Local Policy
Event Log
Restricted Groups
System Services
Registry Security Services
File System Security
Security Configuration and Analysis
Copyright, University of Tulsa, 2002
Points to Consider
• Do not attempt to install any of the settings in
this guide without first testing in a nonoperational environment
• These recommendations are not meant to replace
well-structured policy or sound judgment
• These settings are specific to Windows 2000 and may
work differently on other Windows platforms
• Currently, no Undo function exists for deletions made
within the Windows 2000 registry – make sure that
Confirm On Delete is selected from the options
menu to avoid accidental deletion
• Care should be taken when applying this document’s
recommended settings to on Exchange 2000 servers
(see the NSA Exchange 2000 security guide)
Copyright, University of Tulsa, 2002
The Security
Configuration Toolset
• The tool set allows system administrators to
consolidate many security-related system
settings into a single configuration file (called
a template or an inf file)
• The toolset consists of two MMC snap-ins
– Security Templates
– Security Configuration and Analysis
Copyright, University of Tulsa, 2002
Templates
• Templates
– are files containing a set of security
configurations
– provide an easy way to standardize
security across a platform or domain
– can be applied by
• importing into a Group Policy Object (GPO)
• directly applying to the local computer policy
Copyright, University of Tulsa, 2002
Templates, the MMC,
and You
• Viewing/Configuring Templates
– In the MMC, use the Security Templates snap-in
• Adding Templates
– The default template directory is
C:\WINDOWS\security\templates
– New templates can be added by placing them in
this directory
• Creating Templates
– Right-click on the template folder in the MMC and
select New Template…
Copyright, University of Tulsa, 2002
Templates, the MMC,
and You
• Microsoft Default Security Templates
– Defltdc.inf – Windows 2000 Server/Advanced
Server Domain Controller Default
– Defltsv.inf – Windows 2000 Server/Advanced
Server Default
– Defltwk.inf – Windows 2000 Professional Default
– basicwk/dc/sv.inf – Basic workstation/domain
controller/server
– securedc/ws.inf – Secure domain
controller/workstation
– hisecdc/ws.inf – High Security domain
controller/workstation
Copyright, University of Tulsa, 2002
Templates Checklist
• When installing the NSA security
templates, it is recommended to follow
the checklist available in the NSA Guide
to Securing Microsoft Windows 2000
Group Policy: Security Configuration
Tool Set (pp. 19-20)
Copyright, University of Tulsa, 2002
NSA Security
Configuration Templates
• The NSA has released a set of templates containing
recommended security settings for workstations,
servers, and domain controllers
• They include
–
–
–
–
–
–
SCEReglV.INF
W2KDC.INF
W2K Domain Policy.INF
W2K Server.INF
W2K Workstation.INF
ISA.INF
• They can be downloaded at
http://nsa1.www.conxion.com/win2k/download.htm
Copyright, University of Tulsa, 2002
Chapter 3
Account Policy
• Account policy consists of
– Password Policy
– Lockout Policy
– Kerberos Policy
• In Windows 2000 domains, account policy is set and
enforced in the domain’s Group Policy
• Attempts to configure domain account policies in
other GPOs are ignored
• Configuring account policies directly on workstations
and member servers only impacts the local password
or lockout policy on the machine
Copyright, University of Tulsa, 2002
Account Policy –
Password Policy
Enforce password history
Prevents users from toggling between their favorite passwords
24 passwords
Maximum password age
The period of time that a user is allowed to have a password before being
required to change it
90 days
Minimum password age
Prevents more clever users from toggling between their favorite passwords
1 day
Minimum password length
Longer password are more difficult to guess
12 characters
Passwords must meet complexity requirements
Passwords must contain three of the following four: upper case letters, lower
case letters, numbers, and punctuation
Enabled
Store passwords using reversible encryption for all users in the
domain
Exists to provide password information to certain applications and is similar to
storing clear-text passwords - do NOT do it
Disabled
Copyright, University of Tulsa, 2002
Account Policy –
Lockout Policy
Account lockout duration
Number of minutes an account will be locked out
15 minutes
Account lockout threshold
Prevents brute-force password cracking
3 invalid login
attempts
Reset account lockout counter
Sets the number of minutes before the invalid login count is reset
15 minutes
Copyright, University of Tulsa, 2002
Account Policy –
Kerberos Policy
Enforce user logon restrictions
Enabled
Maximum lifetime for service ticket
600 minutes
Maximum lifetime for user ticket
10 hours
Maximum lifetime for user ticket renewal
7 days
Maximum tolerance for computer clock synchronization
5 minutes
Copyright, University of Tulsa, 2002
Chapter 4
Local Policy
• Local policy includes
– Auditing Policy
– User Rights Assignment
– Security Options
Copyright, University of Tulsa, 2002
Local Policy –
Auditing Policy
Audit account logon events
Success, Failure
Audit account management
Success, Failure
Audit directory service access
Audits users’ access to AD objects that have their system access control list
defined. Has no meaning on workstations and member servers
No auditing (workstations
and member servers)
Failure (domain controllers)
Audit logon events
Differs from ‘Audit account logon events’ in that it records where the logon
occurred versus where the logged-on account lives
Success, Failure
Audit object access
Audits directory, file, printer, etc… access - individual object auditing is not
automatic and must be enabled in the object’s properties
Failure
Audit policy change
Success, Failure
Audit privilege use
Failure
Audit process tracking
Can be used when system is believed to be under attack
No auditing
Audit system events
Success, Failure
Copyright, University of Tulsa, 2002
Local Policy – User
Rights Assignment
Workstations
Domain Controllers and
Member Servers
Access this computer from network
Administrators
Users
Administrators
Authenticated Users (DCs only)
ENTERPRISE DOMAIN
CONTROLLERS (DCs only)
Users (Member Servers only)
Act as part of the operating system
(No one)
(No one)
Add workstations to domain
(No one)
(No one)
Backup files and directories
Administrators
Administrators
Bypass traverse checking
Users
Authenticated Users (DCs)
Users (Member servers)
Change the system time
Administrators
Administrators
Create a pagefile
Administrators
Administrators
Create a token object
(No one)
(No one)
Create permanent shared objects
(No one)
(No one)
Copyright, University of Tulsa, 2002
Local Policy – User
Rights Assignment
Workstations
Domain Controllers and
Member Servers
Debug programs
(No one)
(No one)
Deny access to this computer from the
network
(No one)
(No one)
Deny logon as batch job
(No one)
(No one)
Deny logon as service
(No one)
(No one)
Deny logon locally
(No one)
(No one)
Enable computer and user accounts to be
trusted for delegation
(No one)
Administrators (domain controllers)
(No one) (member servers)
Force shutdown from a remote system
Administrators
Administrators
Generate security audits
(No one)
(No one)
Increase quotas
Administrators
Administrators
Increase scheduling priority
Administrators
Administrators
Load and unload device drivers
Administrators
Administrators
Copyright, University of Tulsa, 2002
Local Policy – User
Rights Assignment
Workstations
Domain Controllers and
Member Servers
Lock pages in memory
(No one)
(No one)
Log on as batch job
(No one)
(No one)
Log on as a service
(No one)
(No one)
Log on locally
Administrators
Users
Administrators
Manage auditing and security log
Administrators
Administrators
Modify firmware environment variables
Administrators
Administrators
Profile single process
Administrators
Administrators
Profile system performance
Administrators
Administrators
Remove computer from docking station
Administrators
Users
(No one)
Replace a process-level token
(No one)
(No one)
Restore files and directories
Administrators
Administrators
Copyright, University of Tulsa, 2002
Local Policy – User
Rights Assignment
Workstations
Domain Controllers and
Member Servers
Shutdown the system
Administrators
Users
Administrators
Synchronize directory service data
(No one)
(No one)
Take ownership of files or other objects
(No one)
(No one)
Copyright, University of Tulsa, 2002
Local Policy –
Security Options
Workstations
Domain Controllers and
Member Servers
Additional restrictions on anonymous
access
No access without
specific anonymous
permissions
No access without specific
anonymous permissions
Allow automatic administrator logon
Disabled
Disabled
Allow system to be shut down without
having to log on
Disabled
Disabled
Allowed to eject removable NTFS
media
Administrators
Administrators
Amount of idle time allowed before
disconnecting session
30 minutes
30 minutes
Audit the access of global system
objects
Enabled
Enabled
Audit use of backup and restore
privledge
Enabled
Enabled
Copyright, University of Tulsa, 2002
Local Policy –
Security Options
Workstations
Domain Controllers
and Member Servers
Automatically log off users when
logon time expires (local)
Enabled
Enabled
Clear virtual memory page file when
system shuts down
Enabled
Enabled
Disable CRTL+ALT+DEL requirement
for login
Disabled
Disabled
Disable Media Autoplay
All Drives
All Drives
Do not display last user name in logon
screen
Enabled
Enabled
LAN Manager authentication level
Send NTLMv2
response only/refuse
LM & NTLM
Send NTLMv2
response only/refuse LM
& NTLM
Copyright, University of Tulsa, 2002
Chapter 5
Event Log Settings
Maximum application log size
Maximum security log size
Maximum system log size
4194240 Kbytes
Restrict guest access to application Log
Restrict guest access to security Log
Restrict guest access to system Log
Enabled
Retain application log
Retain security log
Retain system log
It is not recommended that any event logs be
overwritten when they become full
Not defined
Retention method for application log
Retention method for security Log
Retention method for system Log
Manually
Shut down the computer when the security
audit log is full
Enabled
Copyright, University of Tulsa, 2002
Event Log Settings
• Managing the Event Logs
– Use the Event Viewer to clear and reset audit logs
– If the system halts as a result of a full log, an
administrator must restart the system and clear
the log
– After clearing the logs, set the registry key
HKEY_LOCAL_MACHINE\System\CurrentControlSet
\Control\Lsa\CrashOnAuditFail to 1 to return the
system to normal status
Copyright, University of Tulsa, 2002
Chapter 6
Restricted Groups
• Restricted groups allow the administrator to
manage the membership of sensitive groups
• For example:
– Add the Administrators group to the list of
Restricted Groups and the Administrator account to
Members of Administrators to disallow any other
accounts from gaining Administrator privileges
• It is recommended that only sensitive groups
be configured through security templates
Copyright, University of Tulsa, 2002
Chapter 7
System Services
• Allows the configuration of startup modes and access
control lists for all system services
• Permissions include
–
–
–
–
–
–
–
read
execute
write to
delete
start
pause
stop
• Because of the broad nature of this area, system
service configuration is environment specific and is
not configured in the NSA templates
Copyright, University of Tulsa, 2002
Chapter 8
Registry Security Settings
• Tool set can be used to configure
discretionary access control lists for registry
keys
• WARNING: Incorrectly denying access to
registry keys can make a system unusable
and even unrecoverable
• Regedt32.exe can also be used to modify
registry key access lists
• See guide for specific key recommendations
Copyright, University of Tulsa, 2002
Registry Security Settings
– Key Permissions
Query Value
Allows querying the registry for a specific value
Set Value
Allows new values to be created for a key and old values to
be overwritten
Create Subkey
Allows the creation of subkeys
Enumerate
Subkeys
Allows viewing of a list of subkeys under a registry key
Notify
Allows registration of a callback function that is triggered
when the value changes
Create Link
Allows the creation of a link to a specific key
Delete
Allows deletion of a value or key
Write DAC
Allows modification of access controls on the key
Write Owner
Allows a user to take ownership of a key
Read Control
Allows reading of the key’s access control list
Copyright, University of Tulsa, 2002
Chapter 9
File System Security Settings
• Allows setting permissions for specific files
and folders
• This could also be accomplished by setting the
permissions for each file individually, but
would be much less convenient
• Specific files/folder can be excluded from
inheriting the template permissions
• See NSA guidelines for recommended settings
Copyright, University of Tulsa, 2002
Chapter 10
Security Configuration and Analysis
• Once the appropriate security templates have
been modified, security analysis and
configuration can and should be performed
before applying a security configuration to the
local system
• This is accomplished by adding the Security
Configuration and Analysis snap-in
Copyright, University of Tulsa, 2002
Security Configuration and
Analysis - Databases
• The Security Configuration and Analysis snapin uses a database to store settings for an
analysis or configuration
• Databases can be opened and templates
applied through this snap-in
Copyright, University of Tulsa, 2002
Security Configuration and
Analysis - Analysis
• A security analysis is performed against a database,
which acts as a baseline for the analysis
• Security settings within the configuration file(s) are
compared to the current system security settings, and
the results are stored back into a database
• To perform an analysis
– Create a database
– Select Analyze Computer Now…
– The results will be displayed with the current value compared
to the database value
Copyright, University of Tulsa, 2002
Security Configuration and
Analysis - Configuration
• Configuring a system consists of applying a
template to the current configuration
• To configure a system
– From the Database node select Configure
Computer Now…
– A log file containing resulting changes can be
specified
– NOTE: When a system is configured using the
MMC, only the entire template can be applied
Copyright, University of Tulsa, 2002
Group Policy Tools
(Microsoft)
• GPResult
• GPOTool
• Secedit
Copyright, University of Tulsa, 2002
GPResult
• This command-line tool displays information
about the result Group Policy has had on the
current computer and logged-on user.
• GPResult provides the following general
information:
–
–
–
–
Operating System
User Information
Computer Information
Group Policy Information
Copyright, University of Tulsa, 2002
GPResult
• Operating System
– Type (Professional, Server, Domain Controller).
– Build number and Service Pack details.
– Whether Terminal Services is installed and, if so, the mode it is using.
• User Information
–
–
–
–
–
User name and location in Active Directory (if applicable).
Domain name and type (Windows 2000 or Windows NT).
Site name.
Whether the user has a local or roaming profile and location of the profile.
Security group membership.
– Security privileges.
• Computer Information
– Computer name and location in Active Directory (if applicable).
– Domain name and type (Windows 2000 or Windows NT).
– Site name.
Copyright, University of Tulsa, 2002
GPResult
• Group Policy Information
– The last time policy was applied and the domain controller that
applied policy, for the user and computer.
– The complete list of applied Group Policy objects and their details,
including a summary of the extensions that each Group Policy object
contains.
– Registry settings that were applied and their details.
– Folders that are re-directed and their details.
– Software management information detailing assigned and published
applications.
– Disk quota information.
– IP Security settings.
– Scripts.
Copyright, University of Tulsa, 2002
GPResult Report
D:\Resource Kit\GPResult>gpresult /v
Microsoft (R) Windows (R) 2000 Operating System Group Policy Result tool
Copyright (C) Microsoft Corp. 1981-1999
Created on Saturday, October 19, 2002 at 3:04:59 PM
Operating System Information:
Operating System Type:
Professional
Operating System Version:
5.3.2915.Service Pack 3
Terminal Server Mode:
Not supported
###############################################################
User Group Policy results for:
OCENIA\julie
Domain Name:
OCENIA
Domain Type:
Windows NT v4
Roaming profile:
(None)
Local profile:
C:\WINNT\Profiles\julie.OCENIA
The user is a member of the following security groups:
•
OCENIA\Domain Users
•
\Everyone
•
BUILTIN\Users
•
BUILTIN\Administrators
•
BUILTIN\Power Users
•
OCENIA\Domain Admins
•
\LOCAL
•
NT AUTHORITY\INTERACTIVE
•
NT AUTHORITY\Authenticated Users
Copyright, University of Tulsa, 2002
GPResult Report (cont.)
The
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
user has the following security privileges:
Bypass traverse checking
Shut down the system
Remove computer from docking station
Manage auditing and security log
Back up files and directories
Restore files and directories
Change the system time
Force shutdown from a remote system
Take ownership of files or other objects
Debug programs
Modify firmware environment values
Profile system performance
Profile single process
Increase scheduling priority
Load and unload device drivers
Create a pagefile
Increase quotas
•
•
###############################################################
Last time Group Policy was applied: Saturday, October 19, 2002 at 1:55:04 PM
Copyright, University of Tulsa, 2002
GPOTool
• This command-line tool allows you to
check the health of the Group Policy
objects on domain controllers.
Copyright, University of Tulsa, 2002
GPOTool can:
1. Check Group Policy object consistency.
2. Check Group Policy object replication.
3. Display information about a particular Group
Policy object, including properties that can't
be accessed through the Group Policy snapin such as functionality version and
extension GUIDs.
4. Browse Group Policy objects.
5. Provide cross-domain support.
6. Run in verbose mode.
Copyright, University of Tulsa, 2002
secedit
• The secedit.exe command line tool,
when called from a batch file or
automatic task scheduler, can be used
to automatically create and apply
templates and analyze system security.
It can also be run dynamically from a
command line.
Copyright, University of Tulsa, 2002
secedit Syntax
secedit /analyze [/DB filename ] [/CFG filename ] [/log logpath] [/verbose] [/quiet]
•
/DB filename
– Provides the path to a database that contains the stored configuration against which the
analysis will be performed. This is a required argument. If filename specifies a new
database, the CFG filename argument must also be specified.
•
/CFG filename
– This argument is only valid when used with the /DB parameter. It is the path to the
security template that will be imported into the database for analysis. If this argument is
not specified, the analysis is performed against any configuration already stored in the
database.
•
/log logpath
– The path to the log file for the process. If this is not provided, the default file is used.
•
/verbose
– Requests more detailed progress information during the analysis.
•
/quiet
– Suppresses screen and log output. You will still be able to view analysis
results using Security Configuration and Analysis.
Copyright, University of Tulsa, 2002
Group Policy Tools
(3rd Party)
• Comprehensive Group Policy Management
with FAZAM 2000 (by Full Armor) –
http://www.fullarmor.com/solutions/group
• BV-Admin for Windows 2000 (by Bindview) –
http://www.bindview.com/products/Admin/wi
n2000.cfm
• Fastlane ActiveRoles (by Quest Software) –
http://www.quest.com/fastlane/activeroles/
Copyright, University of Tulsa, 2002
Fazam 2000 Highlights
• Life-Cycle Management for Group Policy
– 4 Ws of GPO Change: Version history for any
GPO is available on-line and shows who made the
change, what was changed, when the change was
made, and why the change was made. For any
entry in the GPO history, FAZAM 2000 can produce
a full report of the GPO as it existed at that point
in time. The report may be viewed online, printed,
saved as an HTML file or saved as a MS Access
file.
Copyright, University of Tulsa, 2002
Fazam 2000 Highlights
– Delegation: Authority to create and change GPOs can
be limited precisely so that GPO administration can be
delegated with reduced risk.
– Rollback: GPO rollback allows a prior version of a GPO
can be put back in production.
– Replication and Synchronization: GPOs can be easily
replicated and synchronized from domain to domain and
across forests - even disconnected forests - for
consistency.
– GPO Health: Administrators can determine the health of
their Group Policy environment by running reports to
discover GPO corruptions and replication problems.
Copyright, University of Tulsa, 2002
Fazam 2000 Highlights
– GPO Reporting: Allows IT Administrators to view detailed reports
on GPOs in Active Directory through the MMC console or Web
Browser.
– Resultant Set of Policies: Provides the set of effective policies that
apply to a user when logging on to a machine. Also allows for
enhanced 'What/if' Scenarios.
– Policy-centric view of AD: Provides a view of Active Directory with
Group Policy links and filters.
– Backup/Restore: Allows administrators to backup and restore
individual GPOs on a domain including filters and links.
– Troubleshooting and Diagnostics: Provides administrators with
the ability to perform remote diagnostics from a central administrator
console.
– Search: Provides searching for GPOs and settings within GPOs.
– Scripting: Provides scripting of the backup, import, andCopyright,
reporting
of
University of Tulsa, 2002
GPOs.
Free Fazam Software
• The Windows Resource Kit provides a limited version of Fazam. This
reduced-function version of the tool offers the following features:
– Central user interface for managing Group Policy objects (GPOs) that provides
a hierarchical view of policies associated with organizational units (OUs) and
domains.
– Resultant Set of Policies (RSoP) feature that enables the display of applicable
policies for software installation, registry settings, folder redirection, and scripts.
– Simulation of scenarios in which a computer or a user moves from one OU to
another and analysis of the RSoPs.
– Diagnostics that show the histories of applied GPOs.
– Search feature for GPOs based on the globally unique identifier (GUID) and
GPO name.
– Backup and Restoration of GPO settings for a single domain.
– Partial reporting of registry settings.
This version of FAZAM 2000 is designed for small enterprises, Windows 2000 deployment test labs,
Copyright, University of Tulsa, 2002
and single domains with fewer than 500 users or computers.
Group Policy Management
Console (GMPC)
• What is the GPMC?
– New admin tool for managing Group Policy:
• Set of scriptable objects for managing GP
• MMC Snap-in, built on these objects
• GPMC Design goals
–
–
–
–
Unify management of Group Policy
Address key deployment issues
Provide better UI for visualization
Enable programmatic access to GP
Copyright, University of Tulsa, 2002
GMPC Features
• New User Interface for managing GPOs
• Reporting:
– HTML view of GPO settings and RSoP data
– Enables read-only access to GPO settings
• Search capabilities
• Backup/Restore of GPOs
• Import/Export, Copy/Paste
– For GPOs and WMI Filters
• Resultant Set of Policy (RSoP) Integration
• Scripting of GPO operations
– Note: not settings within GPO
Copyright, University of Tulsa, 2002
GPMC Notes
• GPMC is in beta testing now.
• Due for shipping sometime in December.
• There is a powerpoint by Microsoft that
describes its features in detail at
http://msruniv.corp.bcentral.com/Shared%20Documents/GPMC_TechEd_Europe.ppt
• Will be comparable in features to the Group
Policy Fazam 2000 Tool
Copyright, University of Tulsa, 2002
Group Policy
Reference
• Guide published by the NSA to inform
the reader about the available settings
in Group Policy in an Active Directoryenabled domain updated with Service
Pack 1.
• Is a map-like reference to help the
reader locate specific policies within the
Group Policy Snap-in for a given Active
Directory container.
Copyright, University of Tulsa, 2002
Group Policy
Reference Structure
• The organization of each Policy Explanation is
as follows:
– The Policy Title as it appears in the Microsoft
Management Console Group Policy snap-in.
– Next, the default configuration, or default settings
of the policy are listed, followed by all possible
settings available to the administrator.
– Finally, an explanation of the policy is provided.
In many instances this is taken directly from the
Explanation Tab for the policy itself. Additional
comments have been provided for policies where
the MMC explanation was determined lacking.
Copyright, University of Tulsa, 2002
Group Policy Reference
Document Contents
• Chapter 1, “Computer Configuration,” delineates
policy settings available for computers within an
Active Directory-enabled domain, including Software
Settings, Windows Settings, Administrative Templates
and all respective sub-nodes.
• Chapter 2, “User Configuration,” delineates policy
settings available for users within an Active
Directory-enabled domain, including Software
Settings, Windows Settings, Administrative Templates
and all respective sub-nodes.
• Index, a collection of the most useful/common
keywords in the Group Policy snap-in.
and ……….
Copyright, University of Tulsa, 2002
Should remind you of:
Copyright, University of Tulsa, 2002
Table of Contents
Copyright, University of Tulsa, 2002
Group Policy Ref
Contents Example
Copyright, University of Tulsa, 2002
Group Policy Ref
Contents Example
Copyright, University of Tulsa, 2002
Group Policy Ref
Contents Example
Copyright, University of Tulsa, 2002
Summary
• Security Configuration Toolset - Outline
– Security Templates
– NSA Guidelines
•
•
•
•
•
•
•
•
Account Policy
Local Policy
Event Log
Restricted Groups
System Services
Registry Security Services
File System Security
Security Configuration and Analysis
• Group Policy Tools by Microsoft and 3rd Parties
• Group Policy Reference Document by the NSA
Copyright, University of Tulsa, 2002
The End
I dare you to ask a
question.
Copyright, University of Tulsa, 2002
Download