22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Administrator account has the privileges to do anything to the Windows<br />

system. Malicious hackers will search out workstations connected to the Internet<br />

where the Administrator account has no password, or a trivial password. Once<br />

the account has been compromised the hacker can take complete control of the<br />

workstation.<br />

Therefore, there are two choices: one is to keep the Administrator account in<br />

place, the other is get rid of it (though not entirely). Let’s take the time to <strong>cover</strong><br />

both.<br />

1. If the Administrator account is kept as is, it should have a non-trivial password<br />

that's difficult to guess. Some guidelines for this are:<br />

– It should have a minimum of 8 characters. (It should be considered as a<br />

passphrase and thus, could have many more characters than that.)<br />

– It should have at least 3 different character types (alphabetic, numeric<br />

and, if possible, punctuation characters).<br />

– It should be as random as possible and variations on dictionary entries<br />

should be avoided.<br />

2. A potentially more effective approach is to create an alternate administrative<br />

account, with a different name, which would be used for all administrative<br />

tasks and would have all the privileges of the Administrator account. As well,<br />

delete the original Administrator account and create a dummy Administrator<br />

account with no privileges. As intruders try to compromise this account, they<br />

will be logged in the audit logs.<br />

Installing and maintaining anti-virus protection<br />

It is important to ensure the workstation’s configuration is clean, that no files<br />

have been compromised during the normal course of utilization, and that if any<br />

files are introduced into the system, they do no damage.<br />

This is why it is crucial to have an anti-virus tool installed, which can perform<br />

periodic scans of the file system and the memory to spot virus, trojans, and<br />

worms that might have found a place there. Just as IT systems need continuous<br />

monitoring and improvements to keep them up to date, the anti-virus file is no<br />

different. For this security tool to be effective, it must include the most recent<br />

virus definitions. To maintain these virus definitions, the file containing them<br />

should be updated on a weekly basis.<br />

Most organizations have a licence for Norton Anti-Virus (NAV), McAffee’s<br />

VirusScan, or other anti-virus tool that <strong>cover</strong>s all workstations. There is no<br />

reason why it shouldn’t be used on all machines. Anti-Virus protection is a first<br />

line of defense for Windows workstations.<br />

Chapter 9. Server hardening 381

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!