Title: Windows 2000 Security
1Windows 2000 Security
Tom Davis University IT Security Office Office
of the Vice President for Information Technology
2Key Areas
- Group Policy
- Encrypting File System (EFS)
- Security Configuration Tool Set
- Kerberos
- Internet Protocol Security (IPSec)
- Certificate Services
3Key Areas
- Group Policy
- Encrypting File System (EFS)
- Security Configuration Tool Set
- Kerberos
- Internet Protocol Security (IPSec)
- Certificate Services
4Group Policy
- Overview
- Active Directory Objects
- Other Issues
- Demo
5Group Policy - Overview
- Used to define user and computer configurations
- Group Policy settings contained in Group Policy
Object (GPO) - GPOs associated with Active Directory objects
(sites, domains, and organization units)
6Group Policy Active Directory Objects
- Tree
- set of one or more domains with contiguous names
7Group Policy Active Directory Objects
(continued)
- Forrest
- set of one or more trees
IUAsia.edu
japan.IUAsia.edu
8Group Policy Active Directory Objects
(continued)
- Site
- set of one or more IP subnets
- used to direct requests to other computers at
same site - can have group policy applied to it
- Domain
- grouping of servers and network objects under a
single name - can have group policy applied to it
9Group Policy Active Directory Objects
(continued)
- Organizational Unit (OU)
- directory object contained within domains
- logical groupings for users, computers, and other
OUs - can have group policy applied to it
- Container
- intended for generic containment
- cannot have group policy applied to it
- Users and Computers contained used in NT4 upgrade
10Group Policy Inheritance Rules
- Local
- Site
- Domain
- Organization Unit
11Group Policy Inheritance Rules (continued)
- Any GPO (except local) may be enforced
- If more than one enforced, highest in hierarchy
takes precedence - GPO inheritance may be blocked
- Blocking does not prevent enforced GPOs from
being applied
12Group Policy Other Issues
- Password, lockout, and kerberos policies are
applied at the domain level only (ignored at OU
or LGPO level) - Access Control Lists can be applied to GPO to
modify scope of policy - Loopback processing to enforce computer settings
for use (student lab environment)
13Group Policy - Demo
14Key Areas
- Group Policy
- Encrypting File System (EFS)
- Security Configuration Tool Set
- Kerberos
- Internet Protocol Security (IPSec)
- Certificate Services
15Encrypting File System (EFS)
- Overview
- Data Recovery Agents
- Microsoft Recommendations
- Vulnerabilities?
- Demo
16EFS - Overview
- File Encryption Key (FEK)
- Encrypts objects with DESX using FEK
- FEK encrypted with users public key
- FEK can only be decrypted with users private key
- Each file has its own FEK
- Data Decryption Field (DDF) holds FEK encrypted
with users public key
17EFS Overview (continued)
- No need to decrypt file before use (transparent)
- Resides in kernel mode
- Uses non-paged pool to store FEKs
- Supports remote file server encrypting of files
- Data in transit is not encrypted
- File sharing not exposed (in current release)
- Objects can be encrypted via Explorer or cipher
command line tool
18EFS Overview (continued)
- Encrypted directory does not encrypt file lists
contained within directory - Flag tells EFS to encrypt all files placed in
that directory - Copying file to non Win2k NTFS partition makes it
unencrypted
19EFS - Data Recovery Agents
- Can decrypt files encrypted by users
- Only FEK is available to agent (not the users
private key) - Local Administrator default recovery agent on
stand alone workstations - Domain Administrator default recovery agent for
domain
20EFS - Data Recovery Agents (continued)
- Encrypted Data Recovery Agent policy defined at
domain controller - Policy applies to computers (not users)
- No accumulation of this policy (the one applied
last gets enforced) - Data Recovery Field (DRF) holds FEK encrypted
with Data Recovery Agents public key
21EFS - MS Recommendations
- Encrypt folders rather than individual files
- Encrypt the My Documents folder
- Encrypt the Temp folder
- Backup Recovery Agent certificates and private
keys, then delete certificate from certificate
store
22EFS Vulnerabilities?
- Cracking Win2000 EFS whitepaper
- Relies on Data Recovery Agent certificate being
present (which is against Microsofts
recommendation)
23EFS - Demo
24Key Areas
- Group Policy
- Encrypting File System (EFS)
- Security Configuration Tool Set
- Kerberos
- Internet Protocol Security (IPSec)
- Certificate Services
25Security Configuration (SC) Tool Set
- Overview
- Security Settings (GPO)
- Templates (MMC snap-in)
- Configuration and Analysis (MMC snap-in)
- Configuration and Analysis (Secedit.exe command
line tool)
26SC Tool Set - Overview
- Account Policies
- password, lockout, and kerberos settings
- Local Policies
- audit, user rights, and security options
- Event Log
- log size, restricting guest access, retention,
etc. - Restricted Groups
- enforcing group membership
27SC Tool Set Overview (continued)
- System Services
- service startup modes and access controls
- Registry
- access control for registry keys
- File System
- access control for folders and files
28SC Tool Set Security Settings (GPO)
- Described earlier under Group Policy
29SC Tool Set Templates
- Text based security template file
- Security Templates MMC Snap-in
- Contains security settings for all security areas
of the tool set - Can be
- imported into Security Settings (GPO)
- used via Security Configuration and Analysis
Snap-in - used via Secedit.exe command line tool
30SC Tool Set - Configuration and Analysis (MMC
snap-in)
- Identify security holes
- Identify changes that potential policy might make
to system - Identify deviations from policy
31SC Tool Set - Configuration and Analysis
(Secedit.exe)
- Identify security holes
- Identify changes that potential policy might make
to system - Identify deviations from policy
- Can be scripted
- Allows verbose logging
- Can specify particular area(s) to be configured
32SC Tool Set - Demo
33Key Areas
- Group Policy
- Encrypting File System (EFS)
- Security Configuration Tool Set
- Kerberos
- Internet Protocol Security (IPSec)
- Certificate Services
34Questions?