Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP
Total Page:16
File Type:pdf, Size:1020Kb
Solutions for Security and Compliance Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP Version 2.0 Published: December 2005 For the latest information, please see www.microsoft.com/technet/security © 2005 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. Threats and Countermeasures iii Contents 1 1 Introduction to Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP..............................................1 Chapter Summaries ............................................ 4 Tools and Templates ........................................................ 6 2 7 Domain Level Policies.............................................. ...........................7 Account Policies ........................................................................... 7 More Information ......................................................................... 21 3 22 Audit Policy...................................................................................... .22 Audit Settings .................................................................. 24 More Information ......................................................................... 31 4 32 User Rights...................................................................... .................32 User Rights Assignment Settings ....................................................... 32 More Information ......................................................................... 58 5 59 Security Options................................................... ............................59 Security Options Settings ..................................................... 59 More Information ..................................................................... .. 111 6 112 Event Log................................................................................. .......112 Event Log Settings ..................................................... 112 More Information ..................................................................... .. 118 7 119 System Services...................................................................... ........119 Services Overview ......................................................................... 120 Do Not Set Permissions on Service Objects ....... 122 Descriptions of System Services .............................................. 125 More Information ..................................................................... .. 177 8 178 Software Restriction Policies..................................................... ......178 The Threat of Malicious Software .......................... .. 178 More Information ..................................................................... .. 179 9 180 iv Threats and Countermeasures Windows XP and Windows Server 2003 Administrative Templates. .180 Computer Configuration Settings ...................... 181 User Configuration Settings .............................. 232 More Information ..................................................................... .. 258 10 260 Additional Registry Entries..................................................... .........260 Customized Security Configuration Editor ....................................... 260 TCP/IP-Related Registry Entries .............................. .. 263 Miscellaneous Registry Entries ......................................... .. 270 Registry Entries Available in Windows XP with SP2 and Windows Server 2003 with SP1 ..................................................... 283 Registry Entries Available in Windows XP with SP2 ........ 286 Registry Entries Available in Windows Server 2003 with SP1 . 288 More Information ..................................................................... .. 290 11 291 Additional Countermeasures.................................. .........................291 Configuring Windows Firewall ............................................... 310 More Information ..................................................................... .. 311 12 312 Conclusion................................................................. .....................312 More Information ..................................................................... .. 312 Acknowledgments..................................................................... ......315 Threats and Countermeasures v Feedback The Microsoft Solutions for Security and Compliance team would appreciate your thoughts about this and other security solutions. Have an opinion? Let us know on the Security Solutions Blog for the IT Professional at http://blogs.technet.com/secguide. Or e-mail your feedback to the following address: [email protected]. We look forward to hearing from you. 1 Introduction to Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP The purpose of this guide is to provide you with a reference to security settings that provide countermeasures for specific threats against current versions of the Microsoft® Windows® operating systems. This guide is a companion for two other publications that are available from Microsoft: • Windows Server 2003 Security Guide , available online at http://go.microsoft.com/fwlink/?LinkId=14845 • Windows XP Security Guide , available online at http://go.microsoft.com/fwlink/?LinkId=14839 Many of the countermeasures that are described in this guide are not intended for specific computer roles in the companion guides, or in some cases for any roles at all. These countermeasures help assure compatibility, usability, manageability, availability, or performance. Although often stated, it is nonetheless worth repeating that security and functionality are the opposite extremes of a continuum; the greater the level of security, the lower the level of functionality, and vice versa. There are exceptions, and some security countermeasures actually help to improve functionality, but for the most part this adage holds true. The chapter structure of this guide is similar to the way the major setting sections display in the user interface of the Group Policy Object Editor. Each chapter begins with a brief explanation of what is in the chapter, followed by a list of subsection headers, each of which corresponds to a setting or group of settings. (These settings are listed in the Microsoft Excel® workbook that is described later in this chapter.) Each subsection includes a brief explanation of what the countermeasure does, and includes the following three additional subsections: • Vulnerability. Explains how an attacker might exploit a feature or its configuration. • Countermeasure. Explains how to implement the countermeasure. • Potential Impact. Explains the possible negative consequences of countermeasure implementation. 2 Threats and Countermeasures For example, Chapter 2, "Domain Level Policies," begins with the following sections: Account Policies • Enforce password history • Vulnerability • Countermeasure • Potential Impact • Maximum Password Age • Vulnerability • Countermeasure • Potential Impact This pattern is repeated throughout this guide. Settings that are closely related are presented in a single section. For example, in Chapter 5, "Security Options," four settings are all placed into the “Microsoft network client and server: Digitally sign communications (four related settings)” section. These settings include the following: • Microsoft Network Client: Digitally Sign Communications (Always) • Microsoft Network Server: Digitally Sign Communications (Always) • Microsoft Network Client: Digitally Sign Communications (If Server Agrees) • Microsoft Network Server: Digitally Sign Communications (If Client Agrees) Although many Group Policy settings are documented in this guide, those that are intended to help organizations manage their environments are not documented. This guide only examines the settings and features in Microsoft Windows Server™ 2003 with SP1 and Windows XP with SP2 that can help organizations secure their enterprises against specific threats. Settings and features that were added subsequent to those Service Packs, or functionalities that may be added by software released after those Service Packs, are not discussed in this guide. Also, management features and those security features that are not configurable by administrators are not described in this guide. The information that is provided within this guide should help you and your organization understand the countermeasures that are available in current versions of the Windows operating system, but for prescriptive guidance about what settings to use for specific scenarios please refer to the two companion guides: • Windows Server 2003 Security Guide, available online at http://go.microsoft.com/fwlink/?LinkId=14845 • Windows XP Security Guide, available online at http://go.microsoft.com/fwlink/?LinkId=14839 The Microsoft Excel workbook "Windows Default Security and Services Configuration" (included with this guide) documents the default settings. The first worksheet ("Windows Server 2003 Defaults") details all of the default Group Policy settings that are available in Windows Server 2003. This worksheet includes the following columns: • The H column, Policy Setting Name in User Interface, is the name of the setting as it appears in the Windows Server 2003 Group Policy Editor