22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Windows 2000 policies<br />

If hardening Windows NT 4.0 seemed a little haphazard, this is true. There is no<br />

easy way to define and apply all Registry, file system, network, and user/group<br />

policy changes. Even worse, there is no easy way to audit the changes made to<br />

ensure that the policy changes have not been undone by intruders, installed<br />

software, or applied Service Packs.<br />

With the release of Windows 2000, Microsoft introduced a wonderful set of<br />

snap-in tools for the Microsoft Management Console (MMC). The Security<br />

Templates Tool allows system administrators to select, review, and even define<br />

custom security policy templates. The Security Configuration and Analysis Tool<br />

allows the system administrators to not only apply all those policies in one simple<br />

action, but it also allows them to audit those changes to see what has changed.<br />

By default, the Security Templates Tool and Security Configuration and Analysis<br />

Tool are not visible in the MMC. These two snap-ins should be added to manage<br />

the server's policies and settings.<br />

There are many bundled security templates, including High Security for<br />

Workstations, which is defined in the template HISECWS.INF. Additionally,<br />

Microsoft has made available a High Security Template targeted for Web<br />

servers. The security template includes most of the policy and Registry changes<br />

made previously for Windows NT 4.0. The HISECWEB.INF security template is<br />

available from Microsoft at the following URL:<br />

http://support.microsoft.com/support/misc/kblookup.asp?id=Q316347<br />

Perform the following steps to use the template:<br />

1. Copy the template to the %windir%\security\templates directory.<br />

2. Open the Security Templates tool, and look over the settings.<br />

3. Open the Security Configuration and Analysis tool, and load the template.<br />

4. Right-click the Security Configuration and Analysis tool, and choose “Analyze<br />

Computer Now” from the context menu.<br />

5. Wait for the work to complete.<br />

6. Review the findings, and update the template as necessary.<br />

Take some time to browse through and read the individual templates. You can<br />

do this by using the Security Templates Tool or manually using a text editor such<br />

as WordPad. Read through the suggested changes to determine if they make<br />

sense for the deployment of the particular application intended to run on the IT<br />

system. The Security Templates Tool can be used to develop an individual<br />

security template based on an existing template. After obtaining a template that<br />

Chapter 9. Server hardening 377

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!