19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

- System: Here the following restrictions can be laid down:<br />

- Deactivate programs for editing the registry<br />

- Only execute approved applications for Windows<br />

For normal users, access to the registry should not be possible, as changes<br />

to the registry can cause serious problems.<br />

Most users only have to discharge certain tasks with the <strong>IT</strong> system and<br />

accordingly only require certain applications. For this reason their access<br />

should also be restricted to these applications, such as, for example, a word<br />

processing program.<br />

- Windows NT Shell: Here the following restrictions can be laid down:<br />

- Use only permitted Shell extensions<br />

- Remove general program groups from the "Start" menu<br />

Under Windows NT, very sophisticated user profiles can be created. <strong>The</strong>se<br />

should be drawn up in accordance with the security policy of the authority or<br />

the company. This can be time-consuming, as for different user groups user<br />

profiles tailored to each of the groups should also be created. All user profiles<br />

must be tested beforehand to determine whether they neither leave open<br />

loopholes nor obstruct users in carrying out their tasks. Consideration should<br />

also be given to the fact that restrictions which are too far-reaching can not<br />

only lead to user dissatisfaction even to the point of the complete rejection of<br />

the system, but can also cause the administrators a great deal of work, if the<br />

latter continually have to implement users’ wishes such as, for example,<br />

setting another type size.<br />

<strong>The</strong> Windows NT environment is determined by the values of the current user<br />

profile, even if the current user has neither a prescribed nor a personal profile<br />

or even if no-one is currently logged in. <strong>The</strong> User Default Profile is loaded<br />

under the following conditions:<br />

- if the current user does not have his own (prescribed or personal) profile<br />

and has not yet logged in to the current computer;<br />

- if a user logs in to the guest account.<br />

In the first case, the current values of the user environment are stored in a<br />

newly-created local personal profile, in the second case they are lost when<br />

logging off.<br />

If no-one is logged in, the current values for the screen background and other<br />

environment variables are determined by the System Default Profile.<br />

Additional controls:<br />

- Is the guest account, provided it is not locked out, restricted by a profile to<br />

the minimum functionality required?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!