12.11.2013 Views

Tweaking Optimizing Windows.pdf - GEGeek

Tweaking Optimizing Windows.pdf - GEGeek

Tweaking Optimizing Windows.pdf - GEGeek

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

To configure security zone settings:<br />

- On the Tools menu of Internet Explorer, click Internet Options, and then click the Security tab.<br />

- Click a security zone to select it and view its current settings.<br />

- Change the following settings as necessary:<br />

- Security Level. To change the security level for the selected zone to High, Medium, Medium-low, or Low, move the slider. The onscreen<br />

description for each level can help you decide which level to select.<br />

Sites. To add or remove Web sites from the zone, click the Sites button, and then click the Add or Remove button to customize your<br />

list of sites for the selected zone.<br />

Custom Level. For more precise control of your security settings, click the Custom Level button, and then select the options you<br />

want. For more detailed instructions, please see Setting up Security Zones.<br />

63. Be Paranoid<br />

Don't panic, but be paranoid all the time. Take every security concern or oddball alert seriously.<br />

SECURING INTERNET INFORMATION SERVER (IIS)<br />

1. Get these tools<br />

MS IIS lockdown tool<br />

Microsoft has released a new security tool that makes it simple to secure an IIS 4.0 or 5.0 web server. The tool, known as the IIS<br />

Lockdown Tool, allows web servers to quickly and easily be put into the right configuration - in which the server provides all of the<br />

services the administrator wants to provide, and no others. Customers can use this tool to instantly protect their systems against<br />

security threats that target web servers.<br />

The tool offers two operating modes. The default is Express Lockdown which, with a single mouse click, configures the server in a<br />

highly secure way that is appropriate for most basic web servers. For administrators who want to pick and choose the technologies<br />

that will be enabled on the server, the tool offers an Advanced Lockdown mode. A comprehensive help system provides information<br />

and recommendations for selecting the best configuration, and an undo facility allows the most recent lockdown to be reversed.<br />

Wondering whether it’s worth the time to use the tool? Consider this: a web server configured using the Express Lockdown would be<br />

completely protected against Code Red and virtually all known security vulnerabilities affecting IIS 4.0 and 5.0 - even without the<br />

patches for these vulnerabilities. I do, of course, recommend that all customers, even those running locked-down servers, continue<br />

to stay current on all security patches, but this vividly illustrates the value of the tool.<br />

http://search.microsoft.com/<br />

Urlscan Security Tool<br />

Urlscan is a powerful security tool that works in conjunction with the IIS Lockdown Tool to give IIS Web site administrators the<br />

ability to turn off unneeded features and restrict the kind of HTTP requests that the server will process. By blocking specific HTTP<br />

requests, the Urlscan security tool prevents potentially harmful requests from reaching the server and causing damage.<br />

www.microsoft.com/technet/treeview/default.asp?url=/technet/security/tools/tools/urlscan.asp<br />

2. Set appropriate ACLs on virtual directories<br />

Although this procedure is somewhat application-dependent, some rules of thumb apply:<br />

File Type<br />

CGI (.exe, .dll, .cmd, .pl)<br />

Script files (.asp)<br />

Include files (.inc, .shtm, .shtml)<br />

Access Control Lists<br />

Everyone (X)<br />

Administrators (Full Control)<br />

System (Full Control)<br />

Everyone (X)<br />

Administrators (Full Control)<br />

System (Full Control)<br />

Everyone (X)<br />

Administrators (Full Control)<br />

System (Full Control)<br />

Static content (.txt, .gif, .jpg, .html)<br />

Everyone (R)<br />

Administrators (Full Control)<br />

System (Full Control)<br />

3. Recommended default ACLs by file type<br />

Rather than setting ACLs on each file, you are better off creating new directories for each file type, setting ACLs on the directory,<br />

and allowing the ACLs to inherit to the files. For example, a directory structure might look like this:<br />

C:\inetpub\wwwroot\myserver\static (.html)<br />

C:\inetpub\wwwroot\myserver\include (.inc)<br />

C:\inetpub\wwwroot\myserver\script (.asp)<br />

C:\inetpub\wwwroot\myserver\executable (.dll)<br />

C:\inetpub\wwwroot\myserver\images (.gif, .jpeg)<br />

Also, be aware that two directories need special attention:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!