22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

380 Lotus Security Handbook<br />

versions of the Windows operating system, it is not possible to write a list that<br />

includes all configuration recommendations. The idea is to offer the base<br />

information to foster awareness and reduce the risk of compromise as much as<br />

possible.<br />

We recommend that you read Microsoft’s 7 Steps to Personal Computing<br />

Security, which is available from their corporate site at the following URL:<br />

http://www.microsoft.com/security/articles/steps_default.asp<br />

Finally, here we try to focus our attention on the more secure configurations of<br />

Windows, namely those built around the Windows NT kernel (NT 4.0, 2000, and<br />

XP). This section ignores configurations built around the Windows “9x” kernel,<br />

namely: 95, 98, 98SE and ME because these are not built with security in mind<br />

and are too easy to compromise. Organizations that are serious about their IT<br />

security and have 9x kernel-based workstations should consider upgrading them<br />

to one of the Windows NT kernel-based configurations.<br />

Using the Administrator account<br />

To maintain a Windows NT, 2000, or XP workstation, you need to have access to<br />

the “Administrator” account. (This differs from the case in Windows 95, 98, and<br />

ME, where all users have complete access to the entire system. In fact, this is<br />

one of the main reasons why the 9x systems are insecure by design). In this<br />

section we discuss the privileges granted to end users in relation to the<br />

Administrator account and then we discuss securing this account.<br />

Conversely, it is best to architect Windows workstation configurations which do<br />

not provide end-users with Administrator access (or grant them Administrator<br />

privileges) to their machines. Restricting what software the end users can install<br />

on their workstations and the manner in which they can install it prevents many<br />

security vulnerabilities from creeping up and makes the whole IT infrastructure<br />

more secure.<br />

This generally does not sit well with most users. Most of them feel they should<br />

have the same degree of freedom with their corporate workstation (or even<br />

laptop) that they do at home. This is understandable to a certain degree, but the<br />

machines are not the property of the end user, they are the property of the<br />

organization. As well, the organization should have a security policy in place<br />

whereby end users don’t have administrator access to their machines. (If the<br />

organization doesn’t, then this would be an auspicious time to review Chapter 2,<br />

“Security methodologies” on page 43 and write a set of proper security policies,<br />

as well as end user compliance documents). With this policy in place, the topic is<br />

not open for discussion and you won’t have to spend a lot of time explaining it to<br />

users.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!