Hardening Windows
Hey,
I need to know what is the term "hardening" when creating windows imaging/deployment?
I need to know what is the term "hardening" when creating windows imaging/deployment?
Comments
-
FloOz Member Posts: 1,614 ■■■■□□□□□□To my knowledge "hardening" and OS includes configuring policies/firewall/applications/updates. Like tightening up the security of the OS to correspond to how the company wants each OS "build" to turn out on a machine. Someone please correct me if I am wrong with my definition.
-
boredgamelad Member Posts: 365 ■■■■□□□□□□The simplest definition of hardening an OS is "making it more secure". In the context of a server, it can generally mean any of the following (and a lot more) depending on how secure your organization wants things:
Installing the system to its own partition separate from data
Disabling/uninstalling any extra components that are not in use
Disabling/not installing any services which are not needed (if it's not a print server, no reason to run the print service)
Locking down the registry
Disable autorun on removable media drives
Remove root access to the system for non-administrators
There's more to it and it can range from extreme to light depending on the policies where you're at. But essentially your role in hardening an OS is to reduce the size of the attack surface. -
RobertKaucher Member Posts: 4,299 ■■■■■■■■■■When I was studying for the MCSE Security I used this book as a resource. It was pretty good:
Professional Windows Desktop and Server Hardening (Programmer to Programmer): Roger A. Grimes: 9780764599903: Amazon.com: Books
Of course it is a bit out of date. But combined with the security resource kit you should find a ton of useful information.
Amazon.com: Windows Server 2008 Security Resource Kit (PRO - Resource Kit) 1st edition by Johansson, Jesper M. published by Microsoft Press [ Paperback ]: --N/A--: Books
For Linux there is this book, but I have not read it. -
JDMurray Admin Posts: 13,093 AdminYou should also have a look at NIST's Security Configuration Checklists Program:
NIST.gov - Computer Security Division - Computer Security Resource Center
National Vulnerability Database (NVD) National Checklist Program Repository -
SephStorm Member Posts: 1,731 ■■■■■■■□□□It annoys me how many "hardened" systems are not. How many systems have XPS Viewer or Tablet PC services running, numerous other services. If I ever start doing some sort of (Legit) Malware, i'd like to see if I can create something that exploits some completely unneeded service.
-
RobertKaucher Member Posts: 4,299 ■■■■■■■■■■If I ever start doing some sort of (Legit) Malware, i'd like to see if I can create something that exploits some completely unneeded service.
You mean like Code Red back in the day? That's really the way most malware work these days: exploits at the application level and applications that should never be running on a hardened system.You should also have a look at NIST's Security Configuration Checklists Program:
NIST.gov - Computer Security Division - Computer Security Resource Center
National Vulnerability Database (NVD) National Checklist Program Repository
Thanks for these. I had not seen these before. -
JDMurray Admin Posts: 13,093 AdminRobertKaucher wrote: »You mean like Code Red back in the day? That's really the way most malware work these days: exploits at the application level and applications that should never be running on a hardened system.
-
RobertKaucher Member Posts: 4,299 ■■■■■■■■■■Now you're looking at the dividing line between an OS with its native services and the 3rd-patry apps and services that run on top of the OS. Just "hardening the OS" is not the same thing as hardening the apps it runs. A hardened Windows OS would still have been infected by Code Red if it were running IIS without a host header. And using a host header with IIS is generally not consider to be a security measure, but it is an effective defense against most worms and automated scanners.
-
the_Grinch Member Posts: 4,165 ■■■■■■■■■■Amazon.com: Thor's Microsoft Security Bible: A Collection of Practical Security Techniques (9781597495721): Timothy "Thor" Mullen: Books <---This is for Server 2008, but still a great read. I have a review posted on ethicalhacker.net. It was a really enjoyable read and he definitely showed things I felt could be applied to just about any environment. I really liked that he discusses a method for accessing network drives in a secure manner without the need of a vpn!WIP:
PHP
Kotlin
Intro to Discrete Math
Programming Languages
Work stuff -
DevilWAH Member Posts: 2,997 ■■■■■■■■□□As my security tutor would say, a hardened Computer is one encases in concrete at the bottom of an ocean. This is both hardened and secured
- If you can't explain it simply, you don't understand it well enough. Albert Einstein
- An arrow can only be shot by pulling it backward. So when life is dragging you back with difficulties. It means that its going to launch you into something great. So just focus and keep aiming.
Linkin Profile - Blog: http://Devilwah.com