Following the basic and medium-level security settings mentioned in the previous issue, this article and the coming article about the security of
Windows NT / 2000 / XP systems is going to focus on the security issues that concern solely the advanced users of the systems. This article aims to
provide information on how to start keeping log files and how to do the settings of user accounts.
Log File Policies:
The following path should be followed to start keeping log files:
Control Panel è Administrative Tools è Local Security Policy è
Local Policies è Audit Policy
You can do the following modifications on the policies provided in this section:
Audit account logon events:
You can determine whether to record the logs of the attempts when someone unsuccesfully tried to access to your computer or when someone was actually
able to access to your computer. To do this, you should mark "Success" and "Failure".
Audit account managment:
You can determine whether to record the logs of the information such as opening of a new account, deleting an account and/or changing the properties
of an account. To do this, you should mark "Success" and "Failure".
Audit directory service access:
You can determine whether to audit the event of a user accessing an Active Directory object, however, there is no need to set auditing when there is
no domain structure.
Audit logon events:
You can determine whether to audit each instance of a user logging on to, logging off from, or making a network connection to this computer. To do
this, you should mark "Success" and "Failure".
Audit object access:
To determine whether to audit each instance of an unsuccessful access attempt to objects such as files, you should mark "Failure". Since recording
each instance of a successful access attempt causes the log file to grow oversize, you should not mark "Success".
Audit policy change:
To determine whether to audit incidences of a change to user rights assignment policies, audit policies, or trust policies, you should mark "Success"
and "Failure".
Audit privilege use:
To determine whether to audit instances of users exercising user rights, you should mark "Failure".
Audit process tracking:
You can determine whether to record the logs of tracking information for events such as activation, pausing or shutting down of a program/process.
However, recording each instance causes the log file to grow oversize; therefore there is no need to mark anything here.
Audit system events:
You can determine whether to record the logs of information for events such as when a user restarts or shuts down the computer or when an event occurs
that affects either the system security or the security log. To do this, you should mark "Success" and "Failure".
Account Policies:
To access account policies, you should follow this path:
Control Panel è Administrative Tools è Local Security Policy è
Account Policies
Account Policies include to subtopics in the console tree: Password Policy and Account Lockout Policy. You can do the following modifications on the
policies provided in this section:
1. Password Policy
Enforce password history:
This can be set as "24 passwords remembered" to prevent the users to reuse the old passwords continually by selecting them from among a few
previously used ones.
Maximum password age:
You can determine a period of time for a password to expire. You can, thereby, require the user to change his/her password when it expires. The number
of days you can set for a password to expire is between 1 and 999. For example, it is fairly reasonable to set it for 90 days.
Minimum password age:
You can determine a period of time so that the system allows the user when he/she wishes to change the password frequently. Here, you can set the
value as 1 day.
Minimum password length:
You can determine the least number of characters that a password for a user account may contain. It will be adequate to set it as "8 characters" to
make it difficult for the programs to crack the passwords.
Password must meet complexity requirements:
"Complexity requirements" means that passwords must contain characters from three of the following four categories: uppercase characters, lowercase
characters, base 10 digits (0 through 9) and non-alphanumeric characters. To make it difficult for the programs to decode the passwords, you should mark
"Enabled".
Store password using reversible encryption for all users in the domain:
Some programs such as Microsoft ISS store passwords using reversible encryption. However, this process makes it easier to crack the passwords.
Therefore, you should mark "Disabled".
2. Account Lockout Policy
Account lockout duration:
Certain number of unsuccesful logon attempts locks the account for a period of time. This policy hinders the capabilities of Brute Force type attacks.
The available range is 1 to 99,999 minutes and you can reasonably set it as "60 minutes".
Account lockout threshold:
To hinder the capabilities of Brute Force type attacks, you can determine the number of failed logon attempts. If the number set for failed failed
logon attempts is exceeded, then the account locks itself. You can set a value between 1 and 999 failed logon attempts and here you can reasonably set it
as "5 invalid logon attempts".
Reset account lockout counter after:
You can determine the number of minutes that must elapse after a failed logon attempt before the failed logon attempt counter is reset. Here you can
reasonably set it as "60 minutes" to hinder the capabilities of Brute Force type attacks.
Arranging the user Rights:
The following path should be followed to assign user rights:
Control Panel è Administrative Tools è Local Security Policy è
Local Policies è User Rights Assignment
This section covers the assignment of rights to different users among the policies mentioned here to prevent the potential vulnerabilities:
User Right |
Potential problem |
Domain user |
PC / Server user |
Professional user |
Access this computer from the network |
The password of the Administrator account can be obtained and the computer can be accessed from the network. |
Domain Users (Administrator user should be omitted) |
Domain Users |
- |
Act as part of the operating system |
Acting as a part of the operating system means that one gains all the rights to do whatever he/she wants. |
- |
- |
- |
Add workstations to the domain |
The users, who own the right to add workstations to the domain, may install another Domain Controller on the network and they can access to SAM
database. |
Administrator |
- |
- |
Backup files and directories |
When the backup files backed up by unauthenticated users are used along with "Restore Files and Directories" this may permit unauthorised
accesses. |
Backup Operators |
Backup Operators |
Backup Operators |
Bypass traverse checking |
This will lead to directory accesses that conflict with user rights. |
Administrators, Server Operators, Backup Operators |
Administrators (is essential for Users ISS) |
Administrators |
Change the system time |
There may be confusion with the data of log files. |
Administrator |
Administrator |
Administrator |
Create a pagefile |
|
Domain Administrators |
Administrator |
Administrator |
Debug programs |
This may permit the users to control the other programs and execute harmful codes. |
- |
- |
- |
Deny access to this computer from the network |
This is a precaution against the risk of someone stealing the password of an admnistrator. |
Administrator |
- |
- |
Enable computer and user accounts to be trusted for delegation |
This is used on file sharing servers along with "Encrypting File System". |
Should not be used unless necessary. |
Should not be used unless necessary. |
Should not be used unless necessary. |
Increase scheduling priority |
If a user increases the priority of a job, this may block the other services of the computer. |
Administrator |
Administrator |
Administrator |
Load and unload device drivers |
This allows the users to load trojan horses instead of driver files. |
Administrator |
Administrator |
Administrator |
Local pages in memory |
The user may block the service by using this feature. |
- |
- |
- |
Log on as a service |
The connection allows the user to access with the rights of the system. There are anti-virus programs which deman these rights, however they
should be monitored. |
Necessary programs |
- |
- |
Log on locally |
When run from the local computers, there is the possibility of programs which increase the user rights. |
Administrator, Server operators, Backup operators |
Administrator, Server operators, Backup operators |
Administrator, Authenticated users |
Replace a process level token |
There is the possibility of a user who may increase the priority of his job, which may consequently supersede the security settings. |
- |
- |
- |
Restore files and directories |
A user who, at the same time, owns the right to backup, may download the backups and create a system vulnerability. |
Backup operators, or a user specified for this task. |
Backup operators, or a user specified for this task. |
Backup operators, or a user specified for this task. |
Shut down the system |
An unknowing user may shut down the system while the system is performing an important job. |
Administrator, Server Operators |
Administrator |
Authenticated users |
Take ownership of files or other objects |
The users may obtain the rights of the files that do not belong to them. |
Administrator |
Administrator |
Administrator |
The next article will cover such main topics as shutting down unnecessary services, doing security settings, and managing additional security settings
of the registry file. Moreover, we will talk about EFS (Encyripted File System) and SRP (Software Restriction Policies) in the next article.
Ýbrahim ÇALIÞIR
|