essential security tips.pdf
(
835 KB
)
Pobierz
Aelita.Exchange.01_
Tr icks
™
&
Tr a p s
eBook Series
Security
Tips
By Randy Franklin Smith
and John Savill
®
Security
Essential
i
Books
®
Contents
Chapter 1 Passwords and Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Tip 1: Safeguarding FTP Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Tip 2: Using Passwords with Kerberos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Tip 3: Forcing All Users to Change Their Password At Next Logon . . . . . . . . . . . . . . 4
Tip 4: Understanding Event ID 560 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Tip 5: Solving Password Problems That Involve Your PDC . . . . . . . . . . . . . . . . . . . . 6
Tip 6: Resetting the Directory Service Restore Mode Administrator Password . . . . . . . 6
Tip 7: Disabling the Recovery Console Administrative Password . . . . . . . . . . . . . . . . 7
Tip 8: Specifying Spooler Permissions on Just One DC . . . . . . . . . . . . . . . . . . . . . . 7
Tip 9: Resolving a Windows XP-Related Password Error . . . . . . . . . . . . . . . . . . . . . 8
Tip 10: Changing Passwords Remotely Via the Web . . . . . . . . . . . . . . . . . . . . . . . . 9
Tip 11: Configuring Pre-Staged RIS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Tip 12: Changing a Domain User’s Password from the Command Line . . . . . . . . . . . 11
Tip 13: Comparing Code Access Security with User Access Permissions . . . . . . . . . . . 11
Tip 14: Enabling Users to Access Two Domain Accounts . . . . . . . . . . . . . . . . . . . . . 12
Chapter 2 Event Log and Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Tip 15: Enabling Debug Logging for IP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Tip 16: Using Log Parser to Audit Domain Logons . . . . . . . . . . . . . . . . . . . . . . . . . 14
Tip 17: Monitoring For Unauthorized Scheduled Tasks . . . . . . . . . . . . . . . . . . . . . . . 16
Tip 18: Establishing DHCP Server Log Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Tip 19: Operation-Based Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Tip 20: Auditing Account Logon Events Centrally . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Tip 21: Deciphering Security Event ID 529 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Tip 22: Monitoring Security with Custom MMC Consoles . . . . . . . . . . . . . . . . . . . . . 22
Tip 23: Audit Control List Editing Rights for a Win2K Object . . . . . . . . . . . . . . . . . . 25
Tip 24: Creating Multiple Event Viewer Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Tip 25: Viewing Security Logs for All DCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Chapter 3 Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Tip 26: Using Windows Update with Security Policies . . . . . . . . . . . . . . . . . . . . . . . 29
Tip 27: Using One GPO to Control Both Windows XP and Windows 2000 Settings . . 30
Tip 28: Preventing Users from Disabling Group Policy . . . . . . . . . . . . . . . . . . . . . . . 30
Tip 29: Connecting to a DC to Edit a GPO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Tip 30: Editing an IP Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Tip 31: Understanding Group Policy’s Block Policy Inheritance and
No Override Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
ii
Essential Security Tips
Chapter 4 IP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Tip 32: Defining IP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Tip 33: Stopping and Restarting the IP Security Policy Agent . . . . . . . . . . . . . . . . . . 35
Tip 34: Defining an IP Secuirty Policy for a Group Policy Object . . . . . . . . . . . . . . . 36
Tip 35: Changing the Authentication Method Used for IP Secuirty . . . . . . . . . . . . . . . 37
Tip 36: Enabling IP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Tip 37: Managing and Creating IP Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . 41
Tip 38: Enabling IP Security Traffic through a Firewall . . . . . . . . . . . . . . . . . . . . . . . 42
Tip 39: Defining the IP Security/Layer Two Tunneling Protocol NAT-T Update . . . . . . 43
Tip 40: Disabling IP Security on a VPN Connection that Uses Layer
Two Tunneling Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Tip 41: Preventing Attackers from Bypassing IP Security Packet Filtering . . . . . . . . . . 44
Chapter 5 Kerberos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Tip 42: Defining Kerberos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Tip 43: Distributing a Shared Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Tip 44: Distributing a Long-Term Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Tip 45: Defining a Kerberos Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Tip 46: Creating a Kerberos-Based Trust Between Domains . . . . . . . . . . . . . . . . . . . 49
Tip 47: Changing the Ticket Lifetime Used by Kerberos . . . . . . . . . . . . . . . . . . . . . . 49
Tip 48: Cracking Kerberos Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Tip 49: Windows NT LAN Manager Versus Kerberos Use . . . . . . . . . . . . . . . . . . . . . 51
Tip 50: Exploring Kerberos Ticket Lifetime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
iii
Authors
John Savill
(john@savilltech.com) is chief Microsoft architect for Geniant, a Dallas-based Microsoft
Gold Certified Partner. He is an MCSE on Windows Server 2003 and a five-time MVP. He is the
author of
The Windows XP/2000 Answer Book
(Addison-Wesley Professional).
Randy Franklin Smith
(randy@winsecanswers.com) is a contributing editor for
Windows IT Pro
,
an information security consultant, and CEO of Monterey Technology Group. He teaches Monterey
Technology Group’s Ultimate Windows Security course and is an SSCP.
1
Chapter 1
Passwords and Permissions
Tip 1: Safeguarding FTP Files
Internet. Our only option is FTP, and we can’t use VPNs, IP Security (IPSec), or FTP over
Secure Sockets Layer (SSL). We’ve thought about encrypting the file, but we also realize FTP
authentication is weak because the password is sent in clear text. We don’t want an attacker
who manages to capture our password to be able to wait for the transfer to complete, then
log on and download or delete the file. Can we set up the transfer so that attackers between
us and our partner firm can’t benefit should they capture our FTP password?
implementing proper user permissions. First, create a user account for the business partner—for
demonstration purposes, I’ll call the account Acme-FTP. To properly limit the new account, remove
Acme-FTP from the Users group to which Windows automatically adds all new accounts. Create a
folder in your FTP server’s root folder called AcmeFileDrop. Open the folder’s Properties page, click
the Security tab, then click Advanced and clear the check box that lets the folder inherit permissions
from the parent folder. When Windows asks whether to copy or remove the permissions, select
Remove. Then, add the Administrators and SYSTEM groups to the folder and give them Full Control.
Add any other groups that need to be able to access the files that Acme delivers, and grant those
groups Modify or Read access, as appropriate.
Next, add the Acme-FTP account and give it the specialized set of permissions that Figure 1-1
shows.
Brought to you by
Microsoft
and
Windows IT Pro
eBooks
Q
We have a business partner who regularly needs to send a file to our server over the
A
Yours is an interesting challenge, but you can meet it by using an encryption utility and
Plik z chomika:
mikroprocesory
Inne pliki z tego folderu:
windows power tools - winternals.pdf
(488 KB)
windows 2003 - Active directory administration essentials.pdf
(3169 KB)
widnows - disaster and recovery backup.pdf
(708 KB)
Tools for Managing AD.xps
(243 KB)
Terminal services deployment.xps
(438 KB)
Inne foldery tego chomika:
- ! ▣ WINDOWS 7 PL [32 BIT]
• HTML - JAVA - PHP
• Pierwsze kroki w cyfrówce
• Szkoła konstruktorów
Acronis Partition Expert. PL
Zgłoś jeśli
naruszono regulamin