22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

368 Lotus Security Handbook<br />

– Network DDE DSDM: This manages Dynamic Data Exchange (DDE)<br />

network shares, through the shared database of DDE connections.<br />

– TCP/IP NetBIOS Helper: This is NetBIOS over TCP/IP, which provides<br />

name-to-IP address mapping.<br />

Although convenient for remote server administration, it is best to not add<br />

additional services, including remote management services such as telnetd<br />

and FTP. Neither provides encryption, so accounts, passwords, and other<br />

information can be gleaned via the network. If these services must be<br />

enabled, system administrators should take other precautions, such as<br />

allowing access only through the firewall from the internal network and<br />

applying IP security filters on the servers running the services.<br />

► Enable IP security filters on the DMZ servers. Firewalls have their own IP<br />

filtering, and do not need or require native Windows NT IP filters. Choose<br />

Control Panel → Network → Protocols → TCP/IP Protocol →<br />

Properties → Advanced. Check “Enable Security” and then select<br />

Configure. Add the inbound ports that need to be accepted.<br />

► Remove the right for users to allow access to the server from the network;<br />

force console access only.<br />

► Assign individual admin accounts if there is a need for multiple admin<br />

accounts. This helps the auditing process.<br />

► Rename the Administrator account to another name.<br />

► Create a dummy Administrator account with no privileges. As intruders try to<br />

compromise this account, they will be logged in the audit logs.<br />

► Reduce the number of groups that have access to the server to only those<br />

necessary for operation and administration of the server. It should be possible<br />

to reduce the groups down to Administrators and Power Users.<br />

► Enable more secure system policies. User Manager should be used to modify<br />

the Account, User Rights, and Audit system policies, namely:<br />

– Account policies control user password and lockout settings. Passwords<br />

should expire according to the time frame set by corporate policy.<br />

Minimum password length should be at least eight characters, while 24<br />

previous passwords should be remembered. Account lockout should<br />

occur after three bad logon attempts. The counter can be reset after 30<br />

minutes.<br />

– All User Rights should have the Everyone group removed. Remove all<br />

groups and users from Access This Computer From the Network, and limit<br />

the users and groups that can Log on Locally. Make sure to pay special<br />

attention to Manage Auditing and Security Log.<br />

► Turn on auditing of success and failure of at least these events: Logon and<br />

Logoff; Security Policy Changes; and Restart, Shutdown, and System.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!