19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

the subsequently created accounts possessing administrator rights, for<br />

example, after these accounts have been blocked due to repeated attempts to<br />

log in with an incorrect password.<br />

It is also advisable to subsequently create a new account named<br />

"Administrator", provide it with a password, deactivate it, and only include it<br />

in the group titled "Guests". No special system rights should be assigned to<br />

this account, as it is only meant to put potential intruders on the wrong track.<br />

Furthermore, the security log should regularly be checked for login attempts<br />

into accounts possessing administrator rights (refer to S 4.54 Logging under<br />

Windows NT).<br />

Special destructive software exists which allows a user who has logged in<br />

locally to add any number of user accounts to the group titled<br />

"Administrators". To prevent this, the hot fix "getadmin-fix" should be<br />

installed on all computers running on Windows NT 4.0 with service pack 3.<br />

This hot fix can be obtained free-of-charge from Microsoft. When service<br />

pack 4 has been installed, it is no longer necessary to install the hot fix<br />

mentioned above.<br />

In addition, to prevent the administrator password from being extracted, the<br />

rights to access the directories %SystemRoot%\SYSTEM32\Config and<br />

%SystemRoot%\SYSTEM32\Repair should be set as recommended in S 4.53<br />

Restrictive allocation of access rights to files and directories under Windows<br />

NT. Start-up diskettes and any existing backup tapes should be stored under<br />

lock and key.<br />

Depending on the degree of protection required by the data processed on<br />

Windows NT Workstations, a decision must be made as to whether the same<br />

password should be used for all local administrator accounts. A general<br />

recommendation cannot be made here. However, if the decision goes in favour<br />

of using the same password for all workstations, it must be noted that an<br />

intruder who is able to crack this password will gain administrative access to<br />

all the corresponding workstations.<br />

<strong>The</strong> following measures should also be implemented on Windows NT<br />

Servers. <strong>The</strong> administrator accounts on the various servers should not all be<br />

assigned the same password. Furthermore, remote administration via the<br />

network should be avoided wherever possible. This is achieved by denying the<br />

"Administrators" group the right designated "Access to this computer from the<br />

network". If remote administration is indispensable, for example, due to the<br />

given spatial environment, the resulting possibilities of intrusion should be<br />

minimised. For this purpose, login via the network for user accounts with<br />

administrative rights should only be allowed via Windows NT computers<br />

specified in the account guidelines. If possible, these computers should be<br />

installed in secure areas. It is vital that LAN-manager compatibility is<br />

deactivated on these computers, in order to prevent the passwords of user<br />

accounts with administrative rights from being transmitted through the<br />

network in unencrypted or only poorly-encrypted form. For this purpose, it is<br />

necessary to install the hot fix "lm-fix" if Windows NT 4.0 with service pack 3<br />

is used. If service pack 4 has already been installed on the system, it is not<br />

necessary to install the hot fix. In the registry, however, it is necessary to add<br />

the key HKEY_LOCAL_MACHINE\System\CurrentControlSet\control\Lsa by<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!