Windows Server 2008 Security Resource Kit.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2008 by Jesper M. Johansson All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2008920563 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWT 3 2 1 0 9 8 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further infor- mation about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress. Send comments to [email protected]. Microsoft, Microsoft Press, Active Directory, ActiveX, Authenticode, bCentral, BitLocker, DirectX, Excel, ForeFront, Hotmail, Internet Explorer, MSDN, MSN, Outlook, PowerPoint, SharePoint, SQL Server, Visio, Visual Basic, Visual Studio, Windows, Windows CardSpace, Windows Live, Windows Media, Windows Mobile, Windows NT, Windows PowerShell, Windows Server, Windows Server System, Windows Vista, Xbox, and Xbox Live are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. 7KLVERRNH[SUHVVHVWKHDXWKRU¶VYLHZVDQGRSLQLRQV7KHLQIRUPDWLRQFRQWDLQHGLQWKLVERRNLVSURYLGHG without any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book. Acquisitions Editor: Martin DelRe Developmental Editor: Devon Musgrave Project Editor: Maureen Zimmerman Editorial Production: S4Carlisle Publishing Services Technical Reviewer: Mitch Tulloch; Technical Review services provided by Content Master, a member of CM Group, Ltd. Cover: Tom Draper Design Body Part No. X14-14926 Contents at a Glance Part I Windows Security Fundamentals 1 Subjects, Users, and Other Actors . .3 2 Authenticators and Authentication Protocols. 17 3 Objects: The Stuff You Want. 55 4 Understanding User Account Control (UAC) . 91 5 Firewall and Network Access Protection . 115 6 Services . 151 7 Group Policy . 183 8 Auditing. 213 Part II Implementing Identity and Access (IDA) Control Using Active Directory 9 Designing Active Directory Domain Services for Security. 241 10 Implementing Active Directory Certificate Services. 265 Part III Common Security Scenarios 11 Securing Server Roles . 285 12 Patch Management . 313 13 Securing the Network . 341 14 Securing the Branch Office. 369 15 Small Business Considerations . 391 16 Securing Server Applications . 431 Index . 463 iii Table of Contents Acknowledgements . .xv Introduction . .xvii Part I Windows Security Fundamentals 1 Subjects, Users, and Other Actors . .3 The Subject/Object/Action-Tuple . 3 Types of Security Principals. 4 Users. 4 Computers. 7 Groups . .7 Abstract Concepts (Log-on Groups) . 10 Services . 11 Security Identifiers . 12 SID Components. 12 SID Authorities . 13 Service SIDs . 14 Well-Known SIDs . 15 Summary . 16 Additional Resources . .16 2 Authenticators and Authentication Protocols. 17 Something You Know, Something You Have . 17 Something You Know . 18 Something You Have . 18 Something You Are . 18 Understanding Authenticator Storage . 19 LM Hash. 21 NT Hash . 23 What do you think of this book? We want to hear from you! Microsoft is interested in hearing your feedback so we can continually improve our books and learning resources for you. To participate in a brief online survey, please visit: www.microsoft.com/learning/booksurvey/ v vi Table of Contents Password Verifier . 24 In Memory . 25 Reversibly Encrypted. 27 Authentication Protocols . 29 Basic Authentication . 29 Challenge-Response Protocols . 30 Smart Card Authentication. 37 Smart Cards and Passwords . 38 Attacks on Passwords . 38 Obtaining Passwords. 38 Using the Captured Information . 42 Protecting Your Passwords . 44 Managing Passwords. 46 Use Other Authenticators. 46 Record Passwords, Safely . 46 Stop Thinking About Words. 47 Set Password Policies. 47 Fine-Grained Password Policies . 49 Summary . 54 Additional Resources. 54 3 Objects: The Stuff You Want. 55 Access Control Terminology. 55 Securable Objects . ..