Kurt
 
I have read and use all guides mentioned below and as a consultant treat them 
as a bible on new deployments.  I cannot thank the MS team enough for producing 
these and my thanks goes to yourself and all others involved.  
 
Onen thing I would like to see in the future is a security integration guide 
published for all MS enterprise products similar to the exchange doc.  This 
would then have the configuration changes needed from the member server 
baseline policy needed to get the product successfully installed and running. 
 
Rgds
Dave Adamson
Solutions & Security

        -----Original Message----- 
        From: Kurt Dillard [mailto:[EMAIL PROTECTED] 
        Sent: Thu 10/11/2005 22:28 
        To: [EMAIL PROTECTED]; matthew patton; [email protected] 
        Cc: 
        Subject: RE: What server hardening are you doing these days?
        
        

        Matthew,
        I can understand the frustration people had with NT 4, but your broad
        accusations seem... Well... Hmmmm.
        
        Have you seen these documents that I helped to author?
        Windows Server 2003 Security Guide:
        http://go.microsoft.com/fwlink/?LinkId=14845
        Windows XP Security Guide: http://go.microsoft.com/fwlink/?LinkId=14839
        Threats and Countermeasures: Security Settings in Windows Server 2003
        and Windows XP: http://go.microsoft.com/fwlink/?LinkId=15159
        
        And others from different teams:
        Exchange 2003 Hardening Guide:
        http://www.microsoft.com/downloads/details.aspx?FamilyID=6a80711f-e5c9-4
        aef-9a44-504db09b9065&displaylang=en
        Scenarios and Procedures for Microsoft Systems Management Server 2003:
        Security:
        http://www.microsoft.com/downloads/details.aspx?FamilyID=3d81b520-a203-4
        376-a72d-fd34a6c4a44c&DisplayLang=en
        ISA Server 2004 Security Hardening Guide:
        http://www.microsoft.com/technet/prodtechnol/isa/2004/plan/securityharde
        ningguide.mspx
        MOM 2005 security guide:
        http://www.microsoft.com/downloads/details.aspx?FamilyID=812b3089-18fe-4
        2ff-bc1e-d181ccfe5dcf&displaylang=en
        
        Have you seen links such as these?
        http://www.nsa.gov/snac/downloads_win2003.cfm?MenuID=scg10.3.1.1
        http://csrc.nist.gov/itsec/guidance_WinXP.html (check the
        acknowledgements page in the PDF file)
        http://www.informationweek.com/story/showArticle.jhtml?articleID=1664042
        90
        http://www.eweek.com/article2/0,1895,1860574,00.asp
        
        If you're looking for mandatory access control, no general purpose
        commercial software supports that out of the box. MACs is, in my
        opinion, not viable for the vast majority of users and businesses. As
        for localsystem having full access to the file system, your comment
        suggests that you don't realize localsystem has full access to virtually
        everything. Its analogous to root on *nix. If you have data you want to
        protect from even localsystem you'll have to encrypt it and store the
        key separate from the computer.
        
        To reiterate Laura's request, do you have a specific suggestion?
        
        Kurt Dillard   CISSP, ISSAP, CISM, MCSE
        Program Manager - Security Solutions
        Microsoft Federal
        
        -----Original Message-----
        From: Laura A. Robinson [mailto:[EMAIL PROTECTED]
        Sent: Thursday, November 10, 2005 12:48 PM
        To: 'matthew patton'; [email protected]
        Subject: RE: What server hardening are you doing these days?
        
        I'm having a difficult time grokking what your actual assertion is here.
        What are you saying that Microsoft should have published that they
        haven't published? Have you looked at the default permissions in Win2K3?
        Have you looked at the changes in accounts related to Local System,
        Local Service and Network Service? I'm seeing a lot of vague accusation
        in your post, but not any explanation of what your point is.
        
        Laura
        
        > -----Original Message-----
        > From: matthew patton [mailto:[EMAIL PROTECTED]
        > Sent: Thursday, November 10, 2005 10:40 AM
        > To: [email protected]
        > Subject: Re: What server hardening are you doing these days?
        >
        > I just love this bit from the MS release:
        >
        > <quote>
        > Because of these changes to the core operating system of Windows XP
        > and of Windows Server 2003, extensive changes to file permissions on
        > the root of the operating system are no longer required.
        >
        > Additional ACL changes may invalidate all or most of the application
        > compatibility testing that is performed by Microsoft. Frequently,
        > changes such as these have not undergone the in-depth testing that
        > Microsoft has performed on other settings. Support cases and field
        > experience has shown that ACL edits change the fundamental behavior of
        
        > the operating system, frequently in unintended ways. These changes
        > affect application compatibility and stability and reduce
        > functionality, both in terms of performance and capability.
        > </quote>
        >
        > This is called FUD. Microsoft has not once BOTHERED to investigate and
        
        > publish least privilege on their OS. Here in DoD land the
        > NSA/DISA/ArmedService' "hardening" guidelines are nearly silent on the
        
        > matter of fixing the sad excuse that is windows filesystem security.
        > Mostly because M$ itself has never published anything. To be fair,
        > it's improved a little bit since NT4 but LocalSystem in particular has
        
        > WAY too much access. Of course the vendor doesn't want you to change
        > anything. They can't be bothered to configure their OS correctly to
        > begin with.
        >
        > If M$ wanted to they could ship Vista with proper filesystem
        > permissions out of the box and nobody would notice. They just can't be
        
        > bothered. Afterall, when you have such a disorganized OS going 16
        > different ways, and an ISV community that has for decades been getting
        
        > away with murder, would you want to spend the time to figure out which
        
        > in-house programmer was being an idiot and assuming he could just step
        
        > all over the filesystem? Programmers are just plain sloppy.
        > They have no incentive to make security a priority. For all the PR
        > about M$'s new "we care about security" schtick, not a whole heck of a
        
        > lot is going to change.
        >
        >
        > --------------------------------------------------------------
        > -------------
        > --------------------------------------------------------------
        > -------------
        >
        
        
        ------------------------------------------------------------------------
        ---
        ------------------------------------------------------------------------
        ---
        
        
        
---------------------------------------------------------------------------
        
---------------------------------------------------------------------------
        
        

Reply via email to