Your Definitive Lockdown Guide

Slides:



Advertisements
Similar presentations
Microsoft Office 2010 Basics and the Internet
Advertisements

Google Picasa Simple Sharing & Photo Editing May 2011Moore Memorial Library Public Computer Center | Greene, NY1.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
® Microsoft Office 2010 Browser and Basics.
Installing Windows XP Professional Using Attended Installation Slide 1 of 30Session 8 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Maintaining and Updating Windows Server 2008
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
Windows Server 2008 Chapter 6 Last Update
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Chapter 7 Installing and Using Windows XP Professional.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Cyber Patriot Training
Hands-On Microsoft Windows Server 2008
Using Windows Firewall and Windows Defender
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
University of Management & Technology 1 Operating Systems & Utility Programs.
1 Chapter Overview Configuring and Troubleshooting the Display Configuring Power Management Configuring Operating System Settings Configuring and Troubleshooting.
The Microsoft Baseline Security Analyzer A practical look….
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Chapter 4 Initial Configuration Tasks. Understanding the Initial Configuration Tasks window Microsoft now provides a new feature, the Initial Configuration.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
NetTech Solutions Security and Security Permissions Lesson Nine.
Managing Applications, Services, Folders, and Libraries Lesson 4.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Section 4 The Basics of Windows 7. Windows 7 Versions  Home Premium  Professional  Specialized.
Windows Administration How to protect your computer.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Managing Servers Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Using Remote DesktopPlan server management strategies 2.1 Delegating.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
Maintaining and Updating Windows Server 2008 Lesson 8.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
Chapter Objectives In this chapter, you will learn:
Bomgar Remote support software
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Windows Operating System
Presentation transcript:

Your Definitive Lockdown Guide Hardening Windows XP: Your Definitive Lockdown Guide

What is a service patch? This presentation will examine the following items and how to lock them down step by step. This will enable your XP system to be lean, mean and ready to do battle with attackers of all types. Windows XP Professional Configuration Checklist Details Verify that all disk partitions are formatted with NTFS Change Logging Settings Disable Indexing Service Protect file shares Disable fast User Switching Use software restriction policies Disable unnecessary services Keep up-to-date on the latest security updates Use Security Baseline Analyzer 2

Best Practice #1: disk partitions are formatted with NTFS Many older XP workstations still use the older less secure FAT, FAT32, or FAT32x files systems. The enhanced NTFS file system offers greater access controls and protections that aren't available with the FAT, FAT32, or FAT32x file systems. Make sure that all partitions on your computer are formatted using NTFS. If necessary, use the “Convert Utility” to non-destructively convert your FAT partitions to NTFS. Before running this utility always make a backup of critical data, but that should go without saying!   3

Best Practice #2: Change system Logging settings By default the system logging does not provide for extensive logging activity. To change the system logging follow these steps: Open Event Viewer In the console tree, click the log you want to change. On the Action menu, click Properties. On the General tab, in Maximum log size, specify the new log size in kilobytes. Change log sizes Application: 81920, overwrite as needed Security: 81920, overwrite as needed System: 81920, overwrite as needed To put the new setting in effect, click Clear Log.   4

Best Practice #3: Disable Indexing Service Indexing Service is a base service for Microsoft Windows operating systems that extracts content from files and constructs an indexed catalog to facilitate efficient and rapid searching. Indexing Service can extract both text and property information from files on the local host and on remote, networked hosts. The files can be simply members of a selected file system or part of a virtual Web hosted by, for example, Internet Information Services (IIS). The index server has been a major vulnerability of the XP operating systems. It is recommended to turn off this service unless otherwise needed. To disable the indexing service performs the following steps: In the "Start" menu, choose "Run." Type "services.msc" and press Enter. Scroll-down to "Indexing Service" and double-click it. If the service status is "Running", then stop it by pressing the "Stop" button. To make sure this service doesn't run again, under "Startup Type:", choose "Disabled." Windows search will still work if you perform these steps, but it will work more slowly than if indexing was enabled. 5

Best Practice #3: Disable Indexing Service 6

Best Practice #4: Protect file shares By default, Windows XP Professional systems that are not connected to a domain use a network access model called "Simple File Sharing," where all attempts to log on to the computer from across the network will be forced to use the Guest account. This means that network access as well as Remote Procedure Calls (RPCS) will only be available to the Guest account. This can be a big vulnerability and has been exploited by some the most widely used attack tools targeting the Windows XP OS. To change it, go to: Start => Programs => Accessories => Windows Explorer and drop down the Tools menu and select ‘Folder Options’. 7

Best Practice #5: Disable Fast-User Switching When multiple users share a computer, logging off and logging on to the computer in order to switch users can become tiresome. Fast User Switching, a feature that makes it possible for you to quickly switch between users without actually logging off from the computer. Multiple users can share a computer and use it simultaneously, switching back and forth without closing the programs they are running. However, if you are not sharing computers this feature should be disable. To disable fast-user switching: Go to control panel > User Accounts Select “change the way users log in and out” Click “Off” the option for “Use Fast User Switching” Apply Changes 8

Best Practice #5: Disable Fast-User Switching 9

Best Practice #6: Use software restriction policies Software restriction policies provide administrators with a policy driven mechanism that identifies software running in their domain, and controls the ability of that software to run. Using a software restriction policy, an administrator can prevent unwanted programs from running; this includes viruses and Trojan horses, or other software that is known to cause conflicts when installed. Software restriction policies can be used on a standalone computer by configuring the local security policy. Software restriction policies also integrate with Group Policy and Active Directory. 10

Best Practice #7: Disable unnecessary services Hardening Windows XP included turning off any network services not required for normal operations. In particular, you should consider whether your computer needs any IIS Web services. By default, IIS is not installed as part of Windows XP and should only be installed if its services are specifically required. It is recommended that if you don’t need them, disable the following services ASAP: Telnet Universal Plug and Play Device Host IIS (not installed by default) Netmeeting Remote Desktop Sharing Remote Desktop Help Session Manager Remote Registry Routing & Remote Access SSDP Discovery Service It is also recommend that the server service and computer browser be eliminated if you are on a stand-alone machine connected to the Internet. There is no practical use for them and leave you exposed. 11

Best Practice #7: Disable unnecessary services 12

Best Practice #9: Keep up-to-date on the Latest Security Updates The Auto Update feature in Windows XP can automatically detect and download the latest security fixes from Microsoft. Auto Update can be configured to automatically download fixes in the background and then prompt the user to install them once the download is complete. To configure Auto Update, click System in Control Panel and select the Automatic Updates tab. Choose the first notification setting to download the updates automatically and receive notification when they are ready to be installed. 13

What is a product family? A product family is a collection of products that have a related purpose. For instance, the Microsoft Windows® product family includes all Windows operating systems, such as Windows 3.11, Windows 95, and Windows 2000. A product is one member of a product family. For instance, Microsoft Windows NT® is a product in the Windows family. A version is an instance of a product. For instance, Windows NT 3.5, Windows NT 4.0, and Windows 2000 are different versions of the Windows NT product. 14

Service pack versus patches A service pack is a periodic update that corrects problems in one version of a product. For instance, there have been six service packs for Windows NT 4.0. Some Microsoft products use the term service release rather than service pack, but the terms mean the same thing. A patch is an update that occurs between service packs. A patch is sometimes also referred to as a hotfix. Note: Most patches are built to correct security vulnerabilities, but we also build patches to correct critical stability or performance issues. In this article, though, we'll only discuss security patches. http://technet.microsoft.com/en-us/library/cc723502.aspx 15

Windows update utility Windows 7 Click Start > Control Panel > Windows Update 16

View update information Windows 7 From the Windows Update window, click on a link to view additional information on that update. The 1 important update was selected in this example,. 17

Review the Update History From the Windows Update Window, select View Update History 18

Frequently Asked Questions From the Windows Update window, select Updates: frequently asked questions to find out more information 19

Settings for Automatic Updates From the Windows Update window, select Change Settings 20

Running Microsoft Baseline Security Analyzer Sample Scan 21

Additional System Information Links provide more information for a particular issue Report can be printed for documentation Report can be copied to clipboard 22

Administrative Vulnerabilities Links are provided as to what was scanned, the result details, and instructions on how to correct an issue. 23