Malware attack hardening using Software Restriction Policies

Slides:



Advertisements
Similar presentations
Group Policy - Part 2 of 3 Rick Claus IT Pro Advisor Microsoft Canada
Advertisements

Auditing Microsoft Active Directory
File Server Organization and Best Practices IT Partners June, 02, 2010.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
Managing User Settings with Group Policy
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
Lesson 16: Creating Group Policy Objects
Lesson 18: Configuring Application Restriction Policies
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Performing Software Installation with Group Policy
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Group Policy in Microsoft Windows Active Directory.
Understanding Group Policy on Windows Server 2003 John Howard, IT Pro Evangelist, Microsoft UK
Microsoft ® Official Course Module 9 Configuring Applications.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
GROUP POLICY An overview of Microsoft Windows Group Policy.
Securing Windows Servers Using Group Policy Objects
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
The Internet and Access to Information Why is it so difficult to eliminate SPAM? By:Juan C. Vargas Computer Science 450.
Troubleshooting Windows Vista Security Chapter 4.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Managing User Desktops with Group Policy
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Performing Software Installation with Group Policy Lesson 9.
Module 6: Configuring User Environments Using Group Policy.
Module 7: Managing the User Environment by Using Group Policy.
POWERSHELL SHENANIGANS KIERAN JACOBSEN HP ENTERPRISE SERVICES.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
Module 7: Implementing Security Using Group Policy.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Module 10: Implementing Administrative Templates and Audit Policy.
Module 6: Configuring User Environments Using Group Policies.
Lesson 6: Controlling Access to Local Hardware and Applications
Module 8 Implementing Security Using Group Policy.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
Module 8: Implementing Group Policy. Overview Multimedia: Introduction to Group Policy Implementing Group Policy Objects Implementing GPOs on a Domain.
Managing User Desktops with Group Policy
MANAGING SOFTWARE Chapter 9
Lesson 4: Configuring File and Share Access
Configuring Windows Firewall with Advanced Security
HARDENING CLIENT COMPUTERS
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Chapter 9 MANAGING SOFTWARE.
Windows Server 2008 Administration
Chapter 10: Supporting and Maintaining Desktop Applications
Application Whitelisting and Your Managed Desktops
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Module 8: Implementing Group Policy
Preparing for the Windows 8.1 MCSA
Presentation transcript:

Malware attack hardening using Software Restriction Policies Kamin Miller Warrington College of Business University of Florida

What are Software Restriction Policies? Software restriction policies are GPO enabled rules that indicate if an application is allowed to run or is blocked from running Rules can be applied to any folder on the system A malformed rule could accidentally block parts of the Windows system from running Security levels are Unrestricted(Default), Disallowed, and Basic User Unrestricted is the default level – Software runs as the user context access rights level, i.e. If UAC allows for running the program as an administrator Basic User – Force all programs that match the rule to run in the limited user context Disallowed – Force all programs that match the rule to be unable to execute Each rule can be assigned a security level during creation Rules can be pattern matching by path, hash, internet zone, or publisher certificate matching

How do they help with security? All users, regardless of administrative permissions have full access to their home directories Most applications take advantage of the user’s AppData folder for temporary storage during installs and updates Malware tends to also utilize the user’s local temp folder as a place to start the process of modifying the system By whitelisting only approved apps to run from this folder, we can cut down the ability for malware to enter the system Rules apply to all users, regardless of administrative permission

What Software Restriction Policies do not replace Antivirus/Antimalware policies Limited user accounts User education about malware risks Common Sense

Whitelisting vs Blacklisting By default all apps are blocked Apps that need to be able to run from these folders are explicitly allowed Blacklisting By default all apps are allowed to run Identified malware is explicitly denied execution Whitelisting is less overhead for I.T. to maintain

Warrington College of Business Policy Configuration In Group Policy Management Editor Computer Configuration Policies Windows Settings Security Settings Software Restriction Policies

Warrington College of Business Policy Configuration Software Restriction Policies Enforcement Apply software restriction policies to all software files except libraries Apply software restriction policies to all users When applying software restriction policies, enforce certificate rules

Warrington College of Business Policy Configuration Software Restriction Policies Designated file types Lists what the computer will consider an executable to be evaluated Extensions: ADE, ADP, BAS, BAT, CHM, CMD, COM, CPL, CRT, EXE, HLP, HTA, INF, INS, ISP, JS, LNK, MDB, MDE, MSC, MSI, MSP, MST, OCX, PCD, PIF, REG, SCR, SHS, URL, VB, WSC List is modifiable by the GPO administrator

Warrington College of Business Policy Configuration Software Restriction Policies Additional Rules Path rules to be evaluated %AppData%\*.exe – Disallowed Blocks all executables at the User’s AppData root level from running %AppData%\*\*.exe - Disallowed Block executables in the AppData Subfolders from running %LocalAppData%\*.exe – Disallowed %LocalAppData%\*\*.exe – Disallowed

Warrington College of Business Policy Configuration Software Restriction Policies Additional Rules (continued) Path rules to be evaluated %Temp%\*.zip\*.exe – Disallowed Blocks all executables inside zip archives from being run without being extracted %Temp%\7z*\*.exe - Disallowed Block executables inside 7zip archives from being run without being extracted %Temp%\Rar*\*.exe – Disallowed Block executables inside WinRAR archives from being run without being extracted %Temp%\wz*\*.exe – Disallowed Block executables inside WinZip archives from being run without being extracted

Warrington College of Business Policy Configuration Software Restriction Policies Additional Rules (continued) Certificate rules to be evaluated Google Inc. – Unrestricted Allowed to run from any User Home directory sub folder Mozilla Corporation - Unrestricted Other digitally signed software as needed Certificate verification adds CPU cycles, which may slow down execution of an application

Alternative to Software Restriction Policies AppLocker is similar to Software Restriction Policies, but has more granular support for rules and users, allowing blocking by user group rather than all-or- nothing like Software Restriction Policies Audit mode can be used to test the impact before deploying PowerShell support for creating and modifying rules

AppLocker vs Software Restriction Policies comparison Feature Software Restriction Policies AppLocker Rule scope All users Specific user or group Rule conditions provided File hash, path, certificate, registry path, and Internet zone rules File hash, path, and publisher rules Rule types provided Allow and deny Default rule action Allow or deny Deny Audit-only mode No Yes Wizard to create multiple rules at one time Policy import or export Rule collection PowerShell support Custom error messages https://technet.microsoft.com/en-us/library/dd759113(v=ws.11).aspx

Takeaways Anything that enhances security and minimizes user downtime is a win to I.T. A demo GPO object with these settings can be read with anyone with the “PS_UF_N_ALL_IT_WORKERS_AutoGS” role, called “w-Computers-Security- ExeRestrictions-Demo” for reference Since its implementation, the Warrington College of Business has had 0 Ransomware infections, and a low number of malware UFIRT tickets from UF Security on domain joined machines It is possible to apply these settings locally to a non-domain joined machine

Contact and References Kamin Miller Kamin.miller@warrington.ufl.edu 352-273-1613 References UF Security provided bulletin that linked a set of reference Software Restriction Policy rules https://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware- information#prevent Microsoft TechNet on Software Restriction Policies https://technet.microsoft.com/en-us/library/cc782792(v=ws.10).aspx Microsoft TechNet on AppLocker https://technet.microsoft.com/en-us/itpro/windows/keep-secure/applocker-overview