SOLUTION: “This Is Microsoft Support” Telephone Scam – Computer Ransom Lockout

Total Page:16

File Type:pdf, Size:1020Kb

SOLUTION: “This Is Microsoft Support” Telephone Scam – Computer Ransom Lockout SOLUTION: “This is Microsoft Support” telephone scam – Computer ransom lockout Posted on April 10, 2013 A trend of the past couple of years has been for scammers to contact computer owners directly via telephone in the United States in an effort to convince them that there is a problem with their PC and they’ll need to pay to have it fixed. In general, these people cannot fix anything, and instead they merely charge exorbitant fees for absolutely nothing. In other words, they scam you. The call generally goes something like this: 1. A foreigner with a thick Indian accent identifies himself as a member of Microsoft Support or similar. 2. He informs you that you have a number of critical problems with your PC and that you will need to have it fixed. 3. To convince you, he offers to connect remotely and pulls up your Event Log (eventvwr.msc). He then filters for Warnings, Errors, and Critical events and uses that as evidence that your PC will soon fail to work correctly if you do not pay him to correct it. The astute among you have probably already sensed that something here is seriously wrong, and it’s not your PC. It’s the fact that someone is calling you to tell you there is a problem with your computer. No one will ever do that. The only way they could possibly know there is a problem is by hacking or guessing. In this case, it’s mere guesswork, and it’s not even correct most of the time. The Event Log is supposed to log warnings and errors, and even on the healthiest of PCs there are plenty of Error Events that can be safely ignored, as they often don’t amount to anything. The important thing to remember is to never trust someone who calls you about a problem with your PC, and never, EVER let them connect remotely to your PC. If you do make the mistake of letting them connect, but then you happen to get cold feet and refuse to pay the $180+ they request via credit card, the next thing that happens isn’t pretty. This scammer proceeded to actually follow through on his promise of the PC “not working” if they don’t agree to have him fix it, and so in a few quick steps, behind the user’s back, he enacted what is known as SysKey encryption on the SAM registry hive. SysKey encryption is a little­known feature of Windows which allows administrators to lock out access to the Security Accounts Manager (SAM) registry hive so that login specifics cannot be stolen and the PC cannot be accessed without knowing the proper credentials. The problem is, unlike other scams, there is no way around the problem; you can’t simply remove the password, as the actual SAM hive has been encrypted entirely by the process. If your Windows installation has had SysKey activated, you’ll see the following message: Startup Password This computer is configured to require a password in order to start up. Please enter the Startup Password below. The window which appears looks like this: The ONLY solution is to find a clean copy of the registry hives from before this occurred. This scammer knew this, however, and as such, he took an extra step to block any repair or recovery attempts: he deleted all System Restore points on the machine, which normally house backup copies of the registry hives. Unfortunately for him, I’m a much better technician. When the customer suspected foul play and decided to call me instead of proceeding, I immediately instructed them to power off the PC. Here’s how I fixed the problem without having to reinstall Windows. FIRST, ensure you don’t have any Restore Points to work with: 1. Check to ensure that the folder %SYSTEMROOT%\system32\config\RegBack exists. This is the folder which contains the last known good backup of the hives following a boot. If it exists, continue. If not, stop and consider contacting a technician instead. 2. Reboot the PC and repeatedly press F8 to reach the Advanced Startup Options menu. 3. Choose Repair your Computer from the menu. 4. Cancel the automatic repair attempt and instead instruct the system to perform a System Restore to a date prior to the incident occurring. If no Restore Points exist, your scammer intentionally removed them to prevent this from occurring. If this happens to you, follow these additional steps to resolve the problem: 1. POWER OFF your PC immediately. 2. Boot to external media of some sort (NOT your Windows installation) and navigate to the %SYSTEMROOT%\system32\config folder. 3. Backup the registry hives in this folder to a temporary location. The files are: A. SOFTWARE B. SYSTEM C. SAM D. SECURITY E. DEFAULT 4. Navigate to %SYSTEMROOT%\system32\config\RegBack as mentioned earlier. 5. Copy all registry hives from this folder (the same files as listed above) into the %SYSTEMROOT%\system32\config folder. 6. Reboot the PC. This solution only works if you have not already tried to reboot the PC subsequently. If you have, it may still work, but that is entirely dependent upon whether or not Windows created a new RegBack copy following a successful boot. In the case of my customer, it worked, and they were back in Windows, just like it never happened. Nice try, scammer. You’ll have to try harder to beat me though. Addendum A (update 6/26/2015): Thanks to FUScammers for pointing out this more involved, alternate method of actually removing the SAM encryption. 1. Download this file and burn the .iso to a CD. 2. Boot to the CD on the affected system. 3. Follow the instructions to select the proper system drive and partition (NTFS is the partition type you are looking for). 4. Type the path to the registry files (it’s most likely Windows/system32/config). 5. Choose option 1 for Password reset (sam system security). 6. Choose option 2 for Syskey status & change. 7. Confirm that you wish to disable Syskey, then quit and confirm writing the new changes to the hive. 8. Reboot the PC and check. For more detailed instructions, check out this link (scroll down to “How to disable Syskey startup password”): http://computernetworkingnotes.com/xp­tips­and­trick/remove­administrator­password.html In Windows 8, the GPT partition type makes the use of this utility impossible. However, you can still manually copy the hives to a supported filesystem (NTFS or FAT32), mount that filesystem instead, and follow the steps from there, then copy the hives back over the originals. I can confirm that this method does work and that even in Windows 8.1 recovery is possible using it. Donate to say "Thanks" if this post has helped save you time and money! This entry was posted in Case Studies, Malware and Security, Recovery by Steve Schardein. Bookmark the permalink [http://triplescomputers.com/blog/casestudies/solution­this­is­ microsoft­support­telephone­scam­computer­ransom­lockout/] . 199 THOUGHTS ON “SOLUTION: “THIS IS MICROSOFT SUPPORT” TELEPHONE SCAM – COMPUTER RANSOM LOCKOUT” Bryan on April 20, 2013 at 7:40 am said: Thank you for taking the time to discuss this scam. I have read several complaints posted at http://www.callercenter.com but I didn’t think it’s this complicated. One thing I know for sure, though, is that Microsoft never initiates a call. Greg on May 21, 2013 at 1:39 pm said: Thanks for this procedure! Fortunately, the RegBack files were intact and modified only a few days earlier. Booting into Linux, copying them back to the Config folder did the trick. After trying other measures, no other options were seemingly available. And YES, they trashed System restore. This scam occurred on a friends computer; however, he was not clear on just how they gained access to his system after walking him through various menus, etc., while on the phone. I still wonder if they have access to the system. Peter Browne on July 6, 2013 at 2:15 pm said: No RegBack – I now assume a new Windows must be installed? Even Renamed the SysKey.exe to SysKey.org – no difference. Still asks for a Password. Steve Schardein on July 6, 2013 at 2:58 pm said: Hey Peter, No restore points either? Renaming will not work as the problem is encryption of the SAM registry hive itself, which is required to boot into Windows. Del on July 12, 2013 at 8:43 pm said: Thanks for posting your solution. My friend was also a victim of this scam. Fortunately, she did have RegBack and I followed your example and got her computer backup and running. Saved us valuable time from reinstall. Thanks again. Del Lisa on July 24, 2013 at 10:11 pm said: This scam just happened to a family member of mine. Should they be concerned about identity theft and such or is this just a scam to get a credit card number and mess up the computer? Steve Schardein on July 24, 2013 at 10:14 pm said: Lisa, Unfortunately, there is no way to know for certain. Such unscrupulous individuals are likely just after quick money, but who is to say that once they’ve gotten control of your system, they haven’t found a way to transfer data to themselves or otherwise steal information? The best course of action is to change all passwords just to be safe. You can also alert your bank or credit card company to let them know to be on watch.
Recommended publications
  • Windows - Run/Kör Kommando
    Windows - Run/Kör kommando Accessibility Controls - access.cpl Network Connections - ncpa.cpl Add Hardware Wizard - hdwwiz.cpl Network Setup Wizard - netsetup.cpl Add/Remove Programs - appwiz.cpl Notepad - notepad Administrative Tools - control admintools Nview Desktop Manager - nvtuicpl.cpl Automatic Updates - wuaucpl.cpl Object Packager - packager Bluetooth Transfer Wizard - fsquirt ODBC Data Source Administrator - odbccp32.cpl Calculator - calc On Screen Keyboard - osk Certificate Manager - certmgr.msc Opens AC3 Filter - ac3filter.cpl Character Map - charmap Password Properties - password.cpl Check Disk Utility - chkdsk Performance Monitor - perfmon.msc Clipboard Viewer - clipbrd Performance Monitor - perfmon Command Prompt - cmd Phone and Modem Options - telephon.cpl Component Services - dcomcnfg Power Configuration - powercfg.cpl Computer Management - compmgmt.msc Printers and Faxes - control printers Control Panel - control panel Printers Folder - printers Date and Time Properties - timedate.cpl Private Character Editor - eudcedit DDE Share - ddeshare Quicktime (If Installed) - QuickTime.cpl Device Manager - devmgmt.msc Regional Settings - intl.cpl Direct X Control Panel -directx.cpl Registry Editor - regedit Direct X Troubleshooter - dxdiag Registry Editor - regedit32 Disk Cleanup Utility - cleanmgr Remote Desktop - mstsc Disk Defragment - dfrg.msc Removable Storage - ntmsmgr.msc Disk Management - diskmgmt.msc Removable Storage Operator Requests - ntmsoprq.msc Disk Partition Manager - diskpart Resultant Set of Policy (XP Prof)
    [Show full text]
  • Logs & Event Analysis and Password Cracking
    Logs & Event Analysis and Password Cracking MODULE 6 Page 1 of 29 Contents 6.1 Learning Objectives ............................................................................................................. 4 6.2 Introduction .......................................................................................................................... 4 6.3 Windows registry ................................................................................................................. 5 6.3.1 Registry and forensics ................................................................................................... 5 6.3.1.1 System information ................................................................................................ 5 6.4 Windows event log file ........................................................................................................ 9 6.4.1 Windows Event Log File Format .................................................................................. 9 6.4.2 Reading from Windows event log file ........................................................................ 11 6.4.3 Using Microsoft log parser ......................................................................................... 11 6.4.4 Understanding Windows user account management logs .......................................... 13 6.4.5 Understanding Windows file and other object Access sets ........................................ 14 6.4.6 Auditing policy change ..............................................................................................
    [Show full text]
  • Scribbler Windows Agent
    Reach us [email protected] | [email protected] www.syskeysoftlabs.com Follow us Copyright © 2020 Syskey Softlabs Pvt Ltd. Trademarks Windows and Windows Server are either trademarks or registered trademarks of their respective owners in the United States and/or other countries. Contents Scribbler Windows Agent ...................................................................................................... 2 Installing Scribbler Windows Agent ........................................................................................ 2 Configuring Scribbler Windows Agent .................................................................................... 3 How to configure Windows Event Logs ...................................................................................... 3 How to set Event Log Filter ......................................................................................................... 4 How to configure Windows Firewall Logs ................................................................................... 8 How to forward Windows logs to Syslog Server ......................................................................... 9 Reference Links ................................................................................................................... 10 Scribbler Windows Agent Scribbler Windows Agent is one of the easiest and light weighted tools for gathering Windows Logs from Windows machines. It enables system administrators to easily monitor key metrics and change activities over the
    [Show full text]
  • Windows 10 in Year Two – Creators Update Windows 10  Changes Expected in Near Future Two Years out – Fall Creators Update
    For the next 90 minutes… Major changes to Windows 10 in year two – Creators Update Windows 10 Changes expected in near future two years out – Fall Creators Update Chris Taylor Growth of Windows 10 Major “feature” releases Microsoft announcement date Monthly active devices Name Release date Version Build Codename July 29, 2015 (first 24 hours) 14 million Original release * 2015-07-29 1507 10240 Threshold 1 August 26, 2015 75 million November Update 2015-11-12 1511 10586 Threshold 2 October 6, 2015 110 million (2 months to 100 m) Anniversary Update 2016-08-02 1607 14393 Redstone January 4, 2016 200 million (+ 3 months to 200 m) Creators Update 2017-04-11 1703 15063 Redstone 2 March 30, 2016 270 million Fall Creators Update 2017-10-17 1709 Redstone 3 May 5, 2016 300 million (+ 4 months to 300 m) 2018-04 1803 Redstone 4 June 29, 2016 350 million September 26, 2016 400 million (+ 5 months to 400 m) May 10, 2017 500 million (+ 7 months to 500 m) * No longer receiving any updates Find your version/build Free upgrade ended Microsoft offered a free upgrade from Windows 7/8 Free upgrade ended July, 2016 1 … or did it? Clean install Creators Update using Win7/8.1 Version 1703 product key Build 15063 Upgrade for those who Released 2017-04-11 use assistive Codename “Redstone 2” technologies Settings More migrated from Control Panel to Changes to Settings Settings – not everything … yet New top level – Apps was under System – Gaming – Mixed reality If you have a VR headset Settings | System Settings | System | |Display Storage Custom scaling
    [Show full text]
  • Program Name Run Command About Windows Winver Add a Device
    List of Run Commands in Win7/8 to Windows Managment By Shree Krishna Maharjan in some commands need to use .msc Program Name Run Command About Windows winver Add a Device devicepairingwizard Add Hardware Wizard hdwwiz Advanced User Accounts netplwiz Authorization Manager azman Backup and Restore sdclt Bluetooth File Transfer fsquirt Calculator calc Certificates certmgr Change Computer Performance Settings systempropertiesperformance Change Data Execution Prevention Settings systempropertiesdataexecutionprevention Change Printer Settings printui Character Map charmap ClearType Tuner cttune Color Management colorcpl Command Prompt cmd Component Services comexp Component Services dcomcnfg Computer Management compmgmt.msc Computer Management compmgmtlauncher Connect to a Network Projector netproj Connect to a Projector displayswitch Control Panel control Create A Shared Folder Wizard shrpubw Create a System Repair Disc recdisc Credential Backup and Restore Wizard credwiz Data Execution Prevention systempropertiesdataexecutionprevention Default Location locationnotifications Device Manager devmgmt.msc Device Pairing Wizard devicepairingwizard Diagnostics Troubleshooting Wizard msdt Digitizer Calibration Tool tabcal DirectX Diagnostic Tool dxdiag Disk Cleanup cleanmgr Disk Defragmenter dfrgui Disk Management diskmgmt.msc Display dpiscaling Display Color Calibration dccw Display Switch displayswitch DPAPI Key Migration Wizard dpapimig Driver Verifier Manager verifier Ease of Access Center utilman EFS REKEY Wizard rekeywiz Encrypting File System
    [Show full text]
  • Microsoft Windows NT
    Microsoft Windows NT Securing Windows NT Installation October 23, 1997 Microsoft Corporation Contents Abstract Establishing Computer Security Levels of Security Off-the-Shelf vs. Custom Software Minimal Security Standard Security High-Level Security High-Level Software Security Considerations User Rights Protecting Files and Directories Protecting the Registry Secure EventLog Viewing Secure Print Driver Installation The Schedule Service (AT Command) Secure File Sharing FTP Service NetBios Access From Internet Hiding the Last User Name Restricting the Boot Process Allowing Only Logged-On Users to Shut Down the Computer Controlling Access to Removable Media Securing Base System Objects Enabling System Auditing Enhanced Protection for Security Accounts Manager Database Restricting Anonymous network access to Registry Restricting Anonymous network access to lookup account names and groups and network shares Enforcing strong user passwords Disabling LanManager Password Hash Support Wiping the System Page File during clean system shutdown Disable Caching of Logon Credentials during interactive logon. C2 Security Evaluation vs. Certification Setting up a C2-compliant System Abstract Microsoft® Windows NT® operating system provides a rich set of security features. However, the default out-of-the-box configuration is highly relaxed, especially on the Workstation product. This is because the operating system is sold as a shrink-wrapped product with an assumption that an average customer may not want to worry about a highly restrained but secure system on their desktop. This assumption has changed over the years as Windows NT gains popularity largely because of its security features. Microsoft is investigating a better secured default configuration for future releases. In the meantime, this white paper talks about various security issues with respect to configuring all Windows NT version 4.0 OS products for a highly secure computing environment.
    [Show full text]
  • Syskey Password Cracker Software Free Download Syskey.Exe Utility Is No Longer Supported in Windows 10, Windows Server 2016, and Later Versions
    syskey password cracker software free download Syskey.exe utility is no longer supported in Windows 10, Windows Server 2016, and later versions. Windows 10, version 1709, Windows Server, version 2004 and later versions of Windows no longer support the syskey.exe utility. Applies to: Windows 10 - all editions, Windows Server 2019, Windows Server 2016 Original KB number: 4025993. Changes detail. The following changes are made: The syskey.exe utility is no longer included in Windows. Windows will never prompt for a syskey password during startup. Windows will no longer support installing an Active Directory domain controller by using Install-From-Media (IFM) that was externally encrypted by the syskey.exe utility. If an operating system (OS) was externally encrypted by the syskey.exe utility, you can't upgrade it to Windows 10 version 1709, Windows Server version 2004, or a later version of Windows. Workaround. If you want to use boot-time OS security, we recommend that you use BitLocker or similar technologies instead of the syskey.exe utility. If you use Active Directory IFM media to install replica Active Directory domain controllers, we recommend that you use BitLocker or other file encryption utilities to protect all IFM media. To upgrade an OS that's externally encrypted by the syskey.exe utility to Windows 10 RS3 or Windows Server 2016 RS3, the OS should be configured not to use an external syskey password. For more information, see step 5 in How to use the SysKey utility to secure the Windows Security Accounts Manager database. More information. Syskey is a Windows internal root encryption key that's used to encrypt other sensitive OS state data, such as user account password hashes.
    [Show full text]
  • Use Syskey on Windows 7 to Encrypt the Sam to Hardening System
    USE SYSKEY ON WINDOWS 7 TO ENCRYPT THE SAM TO HARDENING SYSTEM Very few netbook computers support BitLocker, which means that they are Date: 25/10/2013 vulnerable to utilities that allow you to boot from a USB device and reset the local Source: LINK Permalink: LINK administrator password. The way to ensure that this type of attack doesn’t work is Document Version: 1.0 to use SYSKEY to encrypt the SAM database. Total Chars: 1937 Total Words: 369 Created by: HeelpBook Page: 1 Obviously this solution can be used even on laptops and desktop computers. SYSKEY is a tool that has been around for some time on Windows client operating systems, but most administrators don’t bother using it because it makes recovering a computer difficult in the event that auser forgets their password. In some cases you want to do all that you can do to protect the data on a netbook computer. To do this, you should use SYSKEY to encrypt the SAM database and use EFS to encrypt any locally stored files and folders. To accomplish this, perform the following steps: Log on to Windows 7 with an account that has local administrator access. Type SYSKEY into the textbox on the start menu. Click OK at the UAC prompt. Select the Encryption Enabled Option. Select the Password Startup Option. Enter the Startup Password that must be entered each time. Reboot the computer. From now on the Startup Password must be entered to unlock the SAM database before local logon will be allowed. Visit Us: http://www.heelpbook.net Follow Us: https://twitter.com/HeelpBook CHECK IF SYSKEY IS ENABLED The easiest way to find out whether an NT machine has Syskey enabled is to type… Date: 25/10/2013 syskey Source: LINK Permalink: LINK Document Version: 1.0 Total Chars: 1937 …at the command prompt (cmd.exe).
    [Show full text]
  • Advantages and Disadvantages of EFS and Effective Recovery of Encrypted Data Whitepaper
    advantages and disadvantages of efs and effective recovery of encrypted data whitepaper Copyright (c) 2007 ElcomSoft Co.Ltd. Contents What is eFs? 3 eFs advantages and disadvantages 4 Data can be lost for good 5 how can one lose access to eFS-encrypted data? what is the eFS recovery agent? What to do in case of system failure? 7 possible actions to take Data decryption scheme Advanced eFs Data Recovery 8 About elcomsoft 10 AdvAntAges And disAdvAntAges of efs whitepaper 2 WhAt is eFs? One of the innovations in the Microsoft Windows 2000 and the NTFS 5.0 file system was the Encrypting File System (EFS) technology, which is designed to quickly encrypt files on the com- puter hard drive. NTFS by itself has built-in protection. However, as is frequently the case, it very quickly required additional security. The reason was the wide-spread use of NTFSDos-type utilities, which made it easy to circumvent the NTFS security system, gaining access to it through DOS, thus ignoring the set access rights. The EFS system uses both public and private key encryption and CryptoAPI architecture. EFS can use any symmetrical file encryption algorithm from the following list: Microsoft Windows 2000 used DESX, Windows XP used 3DES, and Windows XP SP1, 2003 and the new Windows Vista use AES. File encryption does not require the user to execute any preliminary operations. During the first encryption of the file, an encryption certificate and a private key are automatically issued for the user. One of the distinguishing convenient features of EFS is that the files remain encrypted when they are transferred to a different folder or to a different NTFS drive.
    [Show full text]
  • Review NTFS Basics
    Australian Journal of Basic and Applied Sciences, 6(7): 325-338, 2012 ISSN 1991-8178 Review NTFS Basics Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh Bardsir Branch, Islamic Azad University, Bardsir, Iran Abstract: The Windows NT file system (NTFS) provides a combination of performance, reliability, and compatibility not found in the FAT file system. It is designed to quickly perform standard file operations such as read, write, and search - and even advanced operations such as file-system recovery - on very large hard disks. Key words: Format, NTFS, Volume, Fat, Partition INTRODUCTION Formatting a volume with the NTFS file system results in the creation of several system files and the Master File Table (MFT), which contains information about all the files and folders on the NTFS volume. The first information on an NTFS volume is the Partition Boot Sector, which starts at sector 0 and can be up to 16 sectors long. The first file on an NTFS volume is the Master File Table (MFT). The following figure illustrates the layout of an NTFS volume when formatting has finished. Fig. 5-1: Formatted NTFS Volume. This chapter covers information about NTFS. Topics covered are listed below: NTFS Partition Boot Sector NTFS Master File Table (MFT) NTFS File Types NTFS File Attributes NTFS System Files NTFS Multiple Data Streams NTFS Compressed Files NTFS & EFS Encrypted Files . Using EFS . EFS Internals . $EFS Attribute . Issues with EFS NTFS Sparse Files NTFS Data Integrity and Recoverability The NTFS file system includes security features required for file servers and high-end personal computers in a corporate environment.
    [Show full text]
  • Configuring Microsoft Windows 8.1
    MCSA 70-687 Cert Guide: Confi guring Microsoft Windows 8.1 Don Poulton Randy Bellet Harry Holt 800 East 96th Street Indianapolis, Indiana 46240 USA MCSA 70-687 Cert Guide: Confi guring Microsoft Windows 8.1 Associate Publisher Copyright © 2015 by Pearson IT Certifi cation Dave Dusthimer All rights reserved. No part of this book shall be reproduced, stored in a retrieval Acquisitions Editor system, or transmitted by any means, electronic, mechanical, photocopying, record- Betsy Brown ing, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although Development Editors every precaution has been taken in the preparation of this book, the publisher and Christopher Cleveland authors assume no responsibility for errors or omissions. Nor is any liability assumed Eleanor Bru for damages resulting from the use of the information contained herein. ISBN-13: 978-0-7897-4879-9 Managing Editor ISBN-10: 0-7897-4879-7 Sandra Schroeder Library of Congress Control Number: 2014944426 Project Editor Printed in the United States of America Seth Kerney First Printing: July 2014 Copy Editor Trademarks Chuck Hutchinson All terms mentioned in this book that are known to be trademarks or service marks Indexer have been appropriately capitalized. Pearson IT Certifi cation cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as Heather McNeill affecting the validity of any trademark or service mark. Proofreader Windows is a registered trademark of Microsoft Corporation. Anne Goebel Warning and Disclaimer Technical Editor Every effort has been made to make this book as complete and as accurate as pos- Chris Crayton sible, but no warranty or fi tness is implied.
    [Show full text]
  • Microsoft Solutions for Security and Compliance Windows Server 2003 Security Guide
    Microsoft Solutions for Security and Compliance Windows Server 2003 Security Guide April 26, 2006 © 2006 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-Non Commercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. Table of Contents iii Contents Chapter 1: Introduction to the Windows Server 2003 Security Guide ............. 1 Overview....................................................................................................1 Executive Summary .....................................................................................1 Who Should Read This Guide.........................................................................2 Scope of this Guide......................................................................................2 Chapter Summaries .....................................................................................3 Chapter 1: Introduction to the Windows Server 2003 Security Guide .............4 Chapter 2: Windows Server 2003 Hardening Mechanisms ............................4 Chapter 3: The Domain Policy..................................................................4 Chapter 4: The Member Server Baseline Policy ...........................................4 Chapter 5: The Domain Controller Baseline Policy .......................................5 Chapter 6: The Infrastructure Server Role .................................................5
    [Show full text]