Security Implementation User's Guide For I/A Series and Foxboro Evo Workstations
Security Implementation User's Guide For I/A Series and Foxboro Evo Workstations
Security Implementation
User's Guide for I/A Series
and Foxboro Evo
Workstations
with Windows 7 or Windows Server
2008 Operating Systems
*B0700ET* *E*
B0700ET
Rev E
December 19, 2014
Invensys, Foxboro, Foxboro Evo, I/A Series, and InFusion are trademarks of Invensys Limited, its subsidiaries,
and affiliates.
All other brand names may be trademarks of their respective owners.
Tables..................................................................................................................................... ix
Preface.................................................................................................................................... xi
Revision Information ............................................................................................................... xi
Reference Documents .............................................................................................................. xi
Glossary of Terms .................................................................................................................. xiii
2. Platform Security............................................................................................................... 7
Physical Access .......................................................................................................................... 7
BIOS Settings ........................................................................................................................... 7
Foxboro-Supplied OS Images .................................................................................................... 9
How to Change OS Image Settings for Services ...................................................................... 31
Remote Desktop Services ........................................................................................................ 31
I/A Series/Control Core Services Startup and Logon Options ................................................. 31
Autologon Configurator ..................................................................................................... 32
iii
B0700ET – Rev E Contents
iv
Contents B0700ET – Rev E
v
B0700ET – Rev E Contents
vi
Figures
2-1. Autologon Configurator .............................................................................................. 32
2-2. Sample Autologon Configuration ................................................................................ 32
3-1. I/A Series or Foxboro Evo System Network Topologies
with Active Directory (Simplified) .............................................................................. 40
3-2. Active Directory Structure ........................................................................................... 43
3-3. Group Policies Structure ............................................................................................. 47
3-4. Opening Administrative Tools .................................................................................... 54
3-5. Opening Group Policy Management .......................................................................... 55
3-6. Group Policy Management - Group Policy Objects .................................................... 56
3-7. Group Policy Management - Group Policy Object Details .......................................... 57
3-8. Selecting to Back Up a GPO ....................................................................................... 58
3-9. Back Up Group Policy Dialog Box ............................................................................. 59
3-10. Editing a GPO ............................................................................................................ 60
3-11. Group Policy Management Editor .............................................................................. 61
3-12. Save GPO Report Dialog Box ..................................................................................... 62
3-13. Event Log Group Policy Settings for Operating Systems Prior to Windows Vista ....... 63
3-14. Event Log Group Policy Settings for Operating Systems
Newer than Windows Vista ........................................................................................ 64
3-15. Group Policy Management - Invensys Enhanced Interactive Logon Banner ON ........ 65
3-16. Group Policy Management - Edit ............................................................................... 66
3-17. Group Policy Management - Message Text ................................................................. 67
3-18. Group Policy Management - Title Text ...................................................................... 68
3-19. Group Policy Management - Link an Existing GPO… ............................................... 69
3-20. Select GPO Dialog Box ............................................................................................... 70
3-21. Group Policy Management - Linked Group Policy Objects ........................................ 71
3-22. Delete Invensys FoxView Environments GPO ............................................................ 72
3-23. Backup Schedule Wizard ............................................................................................. 73
3-24. Windows Server Backup Error .................................................................................... 73
3-25. Group Policy Management Editor - Security Options ................................................. 74
3-26. Define This Policy Setting Checkbox .......................................................................... 75
3-27. Active Directory Users and Computers Tool ............................................................... 77
3-28. Active Directory Users and Computers Tool - Selecting User ..................................... 78
3-29. New Object - User Name ............................................................................................ 79
3-30. New Object - User Password ....................................................................................... 80
3-31. Selecting Operator1 Properties .................................................................................... 81
3-32. Operator1 Properties Dialog Box - Selecting “Member Of” Tab ................................. 82
3-33. Select Groups Dialog Box ........................................................................................... 83
3-34. Select Groups Dialog Box - Selecting Group Name .................................................... 83
3-35. Select Groups Dialog Box - Proceeding ....................................................................... 84
3-36. Select Groups Dialog Box - Group Domain Added ..................................................... 84
3-37. Editing the Default Domain Controllers Policy .......................................................... 86
3-38. Password Policy ........................................................................................................... 87
3-39. Selecting Password Complexity ................................................................................... 88
3-40. Password Complexity Properties Dialog Box ............................................................... 89
vii
B0700ET – Rev E Figures
viii
Tables
1-1. Foxboro Platforms Supporting Security Enhancements ................................................. 3
2-1. Example BIOS Settings for Security Enhancements on
P92 (Dell-Based) Workstation ...................................................................................... 8
2-2. Windows Services Configuration for Security Enhancements ...................................... 10
3-1. Windows Services Startup Configuration for Stations with Security Enhancements .... 37
3-2. Active Directory Container and Security Group Associations ...................................... 44
3-3. Security Group Members ............................................................................................ 45
3-4. Group Policy Section and Enabled/Disabled Status .................................................... 46
3-5. Default Links Between Group Policies and Active Directory Containers ..................... 51
3-6. Group Policy Filters for User Groups .......................................................................... 52
3-7. FoxView Environments Accessible to Security Group Members (Default) .................. 71
4-1. McAfee Services Startup Configuration for Stations with Security Enhancements ..... 104
A-1. Group Policy Settings for I/A Series Software v8.8 or Foxboro Evo Control Core Services
v9.0 or Later .............................................................................................................. 109
ix
B0700ET – Rev E Tables
x
Preface
This document describes the implementation of security enhancements for I/A Series® software
v8.8, or Foxboro Evo™ Control Core Services v9.0 or later. These features provide additional
security to systems which include the I/A Series/Control Core Services or Foxboro® Control
Software (FCS)/Foxboro Evo™ Control Software platforms and software discussed in this docu-
ment.
NOTE
If a workstation has control software installed on it along with security enhanced
I/A Series software v8.8, or Foxboro Evo™ Control Core Services v9.0 or later, the
version of control software must be Foxboro Control Software v4.0 or later or Fox-
boro Evo Control Software (the Control Software) v5.0 or later.later.
Revision Information
For this release of this document (B0700ET, Rev. E), the following changes were made:
Global
♦ Updated title to include coverage for Foxboro Evo system.
Preface
♦ Updated initial paragraph.
♦ Updated “Reference Documents” section.
Reference Documents
The following documents provide additional and related information.
♦ Control Core Services v9.0 Software Installation Guide (B0700SP)
♦ Control Core Services v9.0 Release Notes (B0700SQ)
♦ I/A Series V8.8 Software Installation Guide (B0700SF)
♦ I/A Series® System V8.8 Release Notes (B0700SG)
♦ Station Assessment Tool (SAT) User’s Guide (B0700DZ)
♦ Optional McAfee® Security Products Installation and Configuration Guide (B0700EX)
♦ Symantec System Recovery 2011 Workstation Edition and Server Edition Guide for
I/A Series Workstations (B0700ES)
♦ McAfee VirusScan® and AntiSpyware Enterprise 8.8i Installation (B0700EQ)
♦ The MESH Control Network Architecture Guide (B0700AZ)
♦ The MESH Control Network Operation, and Switch Installation and Configuration
Guide (B0700CA)
♦ Security Guidelines For ISASecure™ Certified Products (B0700GH)
xi
B0700ET – Rev E Preface
The following documents provide configuration information about the platforms which support
the security enhancements:
♦ Hardware and Software Specific Instructions Model P92*K Workstation (T3500)
(B0700DU)
♦ Hardware and Software Specific Instructions for Model P90*D (R710, Windows Server®
2003, Standard Edition Operating System) (B0700DV)
♦ Hardware and Software Specific Instructions for Model P91*G (T610, Windows Server®
2003, Standard Edition Operating System) (B0700DW)
♦ Hardware and Software Specific Instructions for Model P92 Workstation (T3500 Gen II)
(B0700EF)
♦ Hardware and Software Specific Instructions for Model P90 Workstation (R710 Gen II)
(B0700EG)
♦ Hardware and Software Specific Instructions for Model P91 Workstation (T710 Gen II)
(B0700EH)
♦ Hardware and Software Specific Instructions for Model H92 (HP Z400) (B0700EM)
♦ Hardware and Software Specific Instructions for the Model H92 Workstation (HP Z400)
(Windows 7 Operating System) (B0700FF)
♦ Hardware and Software Specific Instructions for Model P92 Workstation (T3500) with
Windows 7 Operating System (B0700FJ)
♦ Hardware and Software Specific Instructions for Model P92 Workstation (T3500 Gen II)
with Windows 7 Operating System (B0700FM)
♦ Hardware and Software Specific Instructions for the Model H92 Workstation (HP Z420
Windows XP Operating System) (B0700FR)
♦ Hardware and Software Specific Instructions for the Model H92 Workstation (HP Z420
Windows 7 Operating System) (B0700FS)
♦ Hardware and Software Specific Instructions for Model P90 (R710) with Windows
Server® 2008 Operating System (B0700FK)
♦ Hardware and Software Specific Instructions for Model P90 (R710 Gen II) with Windows
Server 2008 Operating System (B0700FN)
♦ Hardware and Software Instructions for Model H90 Workstation (HP DL380) with
Windows Server 2008 Operating System (B0700FG)
♦ Hardware and Software Specific Instructions for Model P91 (T610) with Windows
Server® 2008 Operating System (B0700FL)
♦ Hardware and Software Specific Instructions for Model P91 (T710 Gen II) with Win-
dows Server 8 Operating System (B0700FP)
♦ Hardware and Software Instructions for Model H91 Workstation (HP ML350) with
Windows Server 2008 Operating System (B0700FH)
These documents are available on the Foxboro Evo Electronic Documentation media
(K0174MA). The latest revisions of each document are also available through our Invensys
Global Customer Support at https://support.ips.invensys.com.
xii
Preface B0700ET – Rev E
Glossary of Terms
The following terminology, used throughout this user’s guide, relates to these security
enhancements.
Expression Meaning
API Application Programming Interface
ATS Address Translation Station
Control Core See “Foxboro Evo Control Core Services” below.
Services
COTS Commercial Off-the-Shelf
CP Control Processor. The control processor performs any mix of integrated
first-level automation functions such as continuous, sequential, or discreet
logic functions.
FCP280 Field Control Processor 280
FCP270 Field Control Processor 270
FCS (Obsolete) Foxboro Control Software (formerly known as InFusion). With
v5.0, this term has been superseded by “Foxboro Evo Control Software” -
defined below.
Foxboro Evo Core software environment, formerly known as “I/A Series (Intelligent Auto-
Control Core mation Series) software”. A workstation which runs this software is known as
Services a “Foxboro Evo Control Core Services workstation”.
Foxboro Evo Formerly known as “FCS Configuration Tools”, “InFusion Engineering
Control Editors Environment”, or “IEE”, these are the Control Software engineering and
configuration tools built on the ArchestrA Integrated Development Environ-
ment (IDE).
Foxboro Evo Formerly known as “Foxboro Control Software (FCS)” and “InFusion”, a
Control Soft- suite of software built on the ArchestrA Integrated Development Environ-
ware ment (IDE) to operate with the Foxboro Evo Control Core Services.
Foxboro Evo An overall term used to refer to a system which may include either, or both,
Process Auto- Foxboro Evo Control Software and Foxboro Evo Control Core Services.
mation System
I/O Input/Output
NERC North American Electric Reliability Corporation
NIST National Institute of Standards and Technology
OM Object Manager: a proprietary, Foxboro OS extension that supports data
access to Foxboro Evo objects.
PDC Primary Domain Controller
PRD Product Requirements Document
The Control See “Foxboro Evo Control Software” above.
Software
xiii
B0700ET – Rev E Preface
Expression Meaning
Workstations Stations that connect to bulk storage devices and optimally to information
networks to allow bi-directional information flow. These processors perform
computation intensive functions as well as process file requests from tasks
within themselves or from other stations. They also interface to an LCD
monitor and the input devices associated with it. These may be alphanumeric
keyboards, mice, trackballs, touchscreens, or up to two modular keyboards.
Each processor manages the information on its CRT and exchanges data with
other processor modules.
WSUS Microsoft® Windows Server Update Services enable system administrators to
deploy and manage the distribution of the latest Microsoft product updates
to computers in their network that are running Microsoft operating systems.
ZCP270 Z-Format Control Processor 270
xiv
1. Overview of Security
Enhancements
This chapter describes the security enhancements provided for systems with I/A Series software
v8.8 or Foxboro Evo Control Core Services v9.0 or later, which may also include Foxboro
Control Software v4.x or Foxboro Evo Control Software v5.0 or later.
Levels of Security
“Security” is a continuum of features and options that can vary from one environment to another,
rather than being a simple black and white issue. There are many levels at which security can be
approached, ranging from physical access to a building or a room to controlling what actions indi-
vidual computer users have permission to perform. This concept is sometimes referred to as “secu-
rity in layers” or “defense in depth.”
As evidenced in this document, Foxboro® has striven to provide you with multiple options for
making your systems as secure as you decide they need to be. Since each site is different and may
be covered by different regulatory agencies and standards, Foxboro allows you to make decisions
about balancing the trade-offs regarding security compliance versus usability and production effi-
ciency.
Foxboro implements default security settings that provide a good overall secure environment.
Since it is recognized that there is no “one size fits all” in the security arena, Foxboro provides
information about how to change those default settings should you find the need to do so.
The approach that Foxboro provides with regard to securing a system involves the following
levels:
♦ Computer BIOS settings
♦ Pre-configured OS images
♦ Features and pre-configured options provided by the Foxboro software
♦ Incorporation of globally-recognized third-party tools
♦ Additional service offerings from Foxboro Consulting
The following are high-level descriptions of each of these levels with pointers to the chapter that
provides more detailed information where appropriate.
BIOS Settings
It is possible to configure BIOS settings that render the workstation useless. For example, if all its
ports and drives are turned off, there is no way to install the I/A Series software or Foxboro Evo
Control Core Services (hereinafter referred to as the Control Core Services) on it. Therefore, the
BIOS settings are left open typically until all the software that is required to be installed is in
place, and then all features that are not needed are turned off. Once that is done, the ability to
change BIOS settings can be protected by configuring a BIOS password.
1
B0700ET – Rev E 1. Overview of Security Enhancements
Foxboro provides the BIOS settings for each platform that it ships in a separate document. No
changes will be made to the BIOS settings for securing workstations. Foxboro will continue to
document the BIOS settings that are available and leave it to you to configure them as you want
to.
Refer to Chapter 2 “Platform Security” for more detailed information about BIOS settings.
Foxboro-Supplied OS Images
Foxboro ships each workstation with a pre-configured Operating System (OS) image. (In
addition to being installed on the hard drive, an OS restore image is provided on DVD-ROM
media.)
This image has some security features incorporated in it. For example, virus scanning and anti-
spyware software is pre-installed in the image. Also, certain OS features are disabled. The inten-
tion is to disable features that are not needed for the successful installation and operation of Fox-
boro software, such as the I/A Series software or Control Core Services, and Foxboro Control
Software (FCS) or Foxboro Evo Control Software (hereinafter referred to as the Control Software)
packages.
Refer to Chapter 2 “Platform Security” for more detailed information about the OS Images pro-
vided by Foxboro.
2
1. Overview of Security Enhancements B0700ET – Rev E
Kit, which includes this DVD.) You will have the ability to customize these options as required
for your site requirements.
Foxboro supplies documentation to provide some basic guidelines for navigating these tools and
changing your settings.
Refer to Chapter 4 “Security Packages” for more detailed information about the security features
available with the additional third-party tools.
Supported Platforms
The security enhancements provided by Foxboro are supported on the Foxboro platforms listed in
Table 1-1.
Described in
Foxboro Hewlett-Packard or Media Part Foxboro
H-Code/ P-Code Type Dell Model Number Document1
H92 Workstation HP Z420 K0174KA2 B0700FS
-OR- (Windows 7)
K0174KB3 B0700FR
(Windows XP)
H92 Workstation HP Z400 K0174HP B0700FF
(Windows 7)
B0700EM
(Windows XP)
P92*K Workstation T3500 Gen II K0174HE B0700EF
P92*K Workstation T3500 K0174HB B0700DU
H91 Server HP ML350 K0174HQ B0700FH
(Windows 7)
B0700EP
(Windows XP)
H90 Server HP DL380 K0174HR B0700FG
(Windows 7)
B0700EN
(Windows XP)
P91 Server T710 Gen II K0174HF B0700EH
P90 Server R710 Gen II K0174HF B0700EG
P91*G Server T610 K0174HD B0700DW
3
B0700ET – Rev E 1. Overview of Security Enhancements
Described in
Foxboro Hewlett-Packard or Media Part Foxboro
H-Code/ P-Code Type Dell Model Number Document1
P90*D Server R710 K0174HD B0700DV
1.
Although the titles of some of these documents refer to older operating systems, Foxboro pro-
vides OS restore images for these hardware platforms to support either Windows 7 Professional
(for workstation platforms) or Windows Server 2008 R2 (for server-class platforms).
2. Restore optical media (P/N K0174KA) – For use with Model H92 HP Z420 processors with
Windows XP with Service Pack 3 and I/A Series software v8.2 to v8.4.x.
3. Restore optical media (P/N K0174KB) – For use with Model H92 HP Z420 processors with
Windows XP with Service Pack 3 and I/A Series software v8.5-v8.8 or Control Core Services
v9.0 and later.
The documents listed in Table 1-1 are available through our Invensys Global Customer Support
at https://support.ips.invensys.com.
Related Documentation
Refer to “Reference Documents” on page xi for a list of documents which discuss the hardware
and software affected by these security enhancements.
Recommended Practices
Installing a system and making it secure can become quite complicated and requires careful
planning. The following is a recommended sequence for Foxboro systems:
1. Decide where the equipment is going to be located and make sure appropriate
physical access measures are put in place.
2. Create appropriate system drawings, including a network drawing showing computer
names (remember the I/A Series/Control Core Services and FCS/the Control Soft-
4
1. Overview of Security Enhancements B0700ET – Rev E
ware assume a six-character letterbug for each station) and the specific roles that the
stations are going to provide, such as: the Master Timekeeper (MTK), the CSA data-
base host, primary Active Directory domain controller, secondary Active Directory
domain controller, System Monitors, Data Historian, Remote Desktop Services, and
so forth.
NOTE
For security reasons, Remote Desktop Services should never be enabled on a
domain controller.
3. Use the System Definition utility or FCS Configuration Tools/Foxboro Evo Control
Editors to configure the I/A Series or Foxboro Evo system (including the servers that
will provide the role of Active Directory domain controller if they are on The Mesh
control network). Create the System Commit installation media.
4. Install the Primary Active Directory domain controller first using the I/A Series soft-
ware or Control Core Services installation media to perform a Day 0 installation. (It
will install the necessary OS components to provide the Active Directory role.) For
specific instructions, refer to I/A Series V8.8 Software Installation Guide (B0700SF) or
the appropriate Control Core Services v9.x Software Installation Guide.
5. Install the I/A Series software or Control Core Services on the other stations by first
joining the station to the Active Directory domain created in the previous step. This
process is performed as part of the Day 0 installation. For specific instructions, refer to
I/A Series V8.8 Software Installation Guide (B0700SF) for the appropriate Control Core
Services v9.x Software Installation Guide.
6. Configure or load your control blocks and custom displays.
7. Verify the system to make sure it is operating correctly from a process control system
perspective.
8. Make adjustments to the security settings as desired. (This might include making
manual changes to the BIOS settings, changing group policies, and/or turning on
Device Control features.)
9. Verify the system to ensure that the security adjustments are not interfering with the
proper operation of the system.
10. Continue to monitor logs, first for a period of time to ensure that all critical software
operations have been verified, and then periodically as a regular part of the normal
operating procedure.
5
B0700ET – Rev E 1. Overview of Security Enhancements
6
2. Platform Security
This chapter describes the security enhancements provided specifically for I/A Series or Control
Core Services platforms (hardware).
Physical Access
Physical security of the plant control area is your responsibility. This can include guarded gates to
the site, security cameras, locks, badges, biometric devices, and so forth. Foxboro does not
provide this level of security.
BIOS Settings
Foxboro ships a document with each workstation or server platform that lists the BIOS settings
that are configured for each specific platform type. These are listed below:
♦ Hardware and Software Specific Instructions Model P92*K Workstation (T3500)
(B0700DU)
♦ Hardware and Software Specific Instructions for Model P90*D (R710, Windows Server®
2003, Standard Edition Operating System) (B0700DV)
♦ Hardware and Software Specific Instructions for Model P91*G (T610, Windows Server®
2003, Standard Edition Operating System) (B0700DW)
♦ Hardware and Software Specific Instructions for Model P92 Workstation (T3500 Gen II)
(B0700EF)
♦ Hardware and Software Specific Instructions for Model P90 Workstation (R710 Gen II)
(B0700EG)
♦ Hardware and Software Specific Instructions for Model P91 Workstation (T710 Gen II)
(B0700EH)
♦ Hardware and Software Specific Instructions for Model H92 (HP Z400) (B0700EM)
♦ Hardware and Software Specific Instructions for the Model H92 Workstation (HP Z400)
(Windows 7 Operating System) (B0700FF)
♦ Hardware and Software Specific Instructions for Model P92 Workstation (T3500) with
Windows 7 Operating System (B0700FJ)
♦ Hardware and Software Specific Instructions for Model P92 Workstation (T3500 Gen II)
with Windows 7 Operating System (B0700FM)
♦ Hardware and Software Specific Instructions for Model P90 (R710) with Windows
Server® 2008 Operating System (B0700FK)
♦ Hardware and Software Specific Instructions for Model P90 (R710 Gen II) with Windows
Server 2008 Operating System (B0700FN)
♦ Hardware and Software Instructions for Model H90 Workstation (HP DL380) with
Windows Server 2008 Operating System (B0700FG)
7
B0700ET – Rev E 2. Platform Security
♦ Hardware and Software Specific Instructions for Model P91 (T610) with Windows
Server® 2008 Operating System (B0700FL)
♦ Hardware and Software Specific Instructions for Model P91 (T710 Gen II) with Win-
dows Server 8 Operating System (B0700FP)
♦ Hardware and Software Instructions for Model H91 Workstation (HP ML350) with
Windows Server 2008 Operating System (B0700FH)
♦ Hardware and Software Specific Instructions for the Model H92 Workstation (HP Z420
Windows XP Operating System) (B0700FR)
♦ Hardware and Software Specific Instructions for the Model H92 Workstation (HP Z420
Windows 7 Operating System) (B0700FS)
NOTE
Although the titles of these documents refer to older operating systems, Foxboro
provides OS restore images for these hardware platforms to support either
Windows 7 (for workstation platforms) and Windows Server 2008 R2 (for server-
class platforms).
These documents are available on the Foxboro Evo Electronic Documentation media
(K0174MA). The latest revisions of each document are also available through our Invensys
Global Customer Support at https://support.ips.invensys.com.
If you want to implement security by using features available in the BIOS, you can do so manu-
ally. Table 2-1 provides an example of BIOS settings that you may manually choose to set in order
to harden a workstation, such as disabling unnecessary boot options, closing all external ports,
and applying a BIOS password.
8
2. Platform Security B0700ET – Rev E
The documents listed above contain instructions about how to change the BIOS settings for each
specific platform.
Foxboro-Supplied OS Images
The OS images supplied by Foxboro for the supported platforms have been configured to incor-
porate security measures such as removing unnecessary software components and turning off ser-
vices that are not required for Foxboro software operation.
The following is a list of changes applied to the Windows® OS image to enhance security:
♦ Removed unused Windows OS components: [All Games], Media Player, Messenger,
MSN Explorer, Outlook Express
♦ Removed “Favorites” from Start menu
♦ Removed “My Pictures” from Start menu
♦ Removed “My Music” from the Start menu
♦ Removed “Set Program Access and Defaults” from Start menu
♦ Disabled unnecessary user accounts (Guest, HelpAssistant, Support_38*)
♦ Disabled anonymous access and hash password storage
♦ Disabled the Shared Documents folder
♦ Power button behavior set to: “When I press the power button, do nothing.”
NOTE
Be aware that if you press and hold the button (for about seven seconds), the station
will still shut down.
9
B0700ET – Rev E 2. Platform Security
10
2. Platform Security B0700ET – Rev E
11
B0700ET – Rev E 2. Platform Security
12
2. Platform Security B0700ET – Rev E
13
B0700ET – Rev E 2. Platform Security
Encrypting File Manual Manual Manual Provides the core file encryption technol-
System (EFS) ogy used to store encrypted files on NTFS
file system volumes. If this service is
stopped or disabled, applications will be
unable to access encrypted files.
Extensible Authen- Manual Manual Manual The Extensible Authentication Protocol
tication Protocol (EAP) service provides network authenti-
cation in such scenarios as 802.1x wired
and wireless, VPN, and Network Access
Protection (NAP). EAP also provides appli-
cation programming interfaces (APIs) that
are used by network access clients, includ-
ing wireless and VPN clients, during the
authentication process. If you disable this
service, this computer is prevented from
accessing networks that require EAP
authentication.
Fax Disabled N/A N/A Enables you to send and receive faxes, uti-
lizing fax resources available on this com-
puter or on the network.
14
2. Platform Security B0700ET – Rev E
15
B0700ET – Rev E 2. Platform Security
16
2. Platform Security B0700ET – Rev E
17
B0700ET – Rev E 2. Platform Security
18
2. Platform Security B0700ET – Rev E
19
B0700ET – Rev E 2. Platform Security
Offline Files Auto Disabled Disabled The Offline Files service performs mainte-
nance activities on the Offline Files cache,
responds to user logon and logoff events,
implements the internals of the public API,
and dispatches interesting events to those
interested in Offline Files activities and
changes in cache state.
20
2. Platform Security B0700ET – Rev E
21
B0700ET – Rev E 2. Platform Security
22
2. Platform Security B0700ET – Rev E
23
B0700ET – Rev E 2. Platform Security
24
2. Platform Security B0700ET – Rev E
25
B0700ET – Rev E 2. Platform Security
26
2. Platform Security B0700ET – Rev E
27
B0700ET – Rev E 2. Platform Security
28
2. Platform Security B0700ET – Rev E
29
B0700ET – Rev E 2. Platform Security
30
2. Platform Security B0700ET – Rev E
31
B0700ET – Rev E 2. Platform Security
Autologon Configurator
The Autologon feature automates the logon process by storing a user-specified account and pass-
word in the registry database. While using this feature is more convenient than requiring users to
log on manually, be aware that it can pose a security risk since access to the desktop is provided
without requiring a user to provide appropriate credentials. This feature should only be used in
areas that are secured by other means.
After selecting an Autologon startup option from the control panel applet and clicking OK, you are
prompted for the logon credentials to use. A dialog box is displayed as shown in Figure 2-1:
Enter the user account, domain name, and the password (in both fields) as shown in Figure 2-2.
When done, click OK.
32
2. Platform Security B0700ET – Rev E
NOTE
While entering the domain name, you must use the short name (for example,
IASERIES), not the long name (for example, iaseries.local).
NOTE
If you want to autologon to the local workstation (for example, if The Mesh control
network is not enabled), enter the workstation’s letterbug for the domain name.
33
B0700ET – Rev E 2. Platform Security
34
3. Security Enhancements
Installation and Configuration
This chapter details the installation and configuration procedures for the security enhancements
provided for systems with I/A Series software v8.8 or Foxboro Evo Control Core Services v9.0 or
later, which may also include Foxboro Control Software v4.x or the Control Software v5.0 or
later.
Platform Requirements
The security enhancements incorporated in I/A Series software v8.8 or Foxboro Evo Control Core
Services v9.0 or later software releases are supported on the platforms listed in Table 1-1 “Foxboro
Platforms Supporting Security Enhancements” on page 3.
Note that the implementation of security for The Mesh control network1 involves having servers
that provide the role of Microsoft® Active Directory Domain Controllers. There has to be at least
one domain controller present to act as the “primary” domain controller, but the recommendation
is to have a second server acting as a “secondary” domain controller to provide redundancy. The
Active Directory structure is covered in a section later in this chapter.
As shown in Figure 3-1 on page 40, Active Directory domain controllers can be connected to The
Mesh (referred to as “on-Mesh domain controllers”) or be installed on a separate network (referred
to as “off-Mesh domain controllers”). Domain controllers that are directly connected to The
Mesh are installed as Foxboro stations2 to make sure they operate properly on The Mesh network.
As far as the Active Directory is concerned, a domain controller has one static IP address (which is
required for an Active Directory domain controller). However, for an On-Mesh domain control-
ler, The Mesh network’s intermediate driver provides redundant paths to the network (in a way
that is transparent to the Active Directory software).
While an on-Mesh domain controller server is installed as an I/A Series or Control Core Services
station, it must not be used to run I/A Series/Control Core Services or FCS/the Control Software
applications. Whether on The Mesh or off-Mesh, Active Directory domain controllers are key
resources since they provide user authentication for all the workstations in the domain and there-
fore should not be put at risk by running applications which could have a detrimental impact on
the availability of its services. Likewise, Remote Desktop Services should never be enabled on a
domain controller so that the integrity of the domain could not be compromised by a remote
user.
1.
The Mesh control network and its implementation of security from the switch’s perspective are dis-
cussed in The MESH Control Network Architecture Guide (B0700AZ) and in The MESH Control
Network Operation, and Switch Installation and Configuration Guide (B0700CA). This document
describes the implementation of security for servers and workstations which connect to The Mesh
control network.
2. These domain controllers may only have the I/A Series software or Control Core Services on them,
not Foxboro Control Software or the Control Software.
35
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
36
3. Security Enhancements Installation and Configuration B0700ET – Rev E
Table 3-1. Windows Services Startup Configuration for Stations with Security Enhancements
Startup Type on
Startup Type Windows Server
Startup on Windows 2008 R2 Domain
Type on Server 2008 R2 Controllers (On-
Service Name Windows 7 Client Servers MESH Only1) Description
Fox Shared Memory Auto Auto Auto Manages shared memory for
I/A Series or Control Core Ser-
vices applications. If this service is
disabled, I/A Series or Control
Core Services applications will not
function.
I/A Series Launcher Auto Auto Auto Manages the background pro-
cesses required by I/A Series or
Control Core Services. If this ser-
vice is disabled, I/A Series or Con-
trol Core Services will not start.
I/A Series Notification Auto Auto N/A Reports system configuration
changes performed by ADMC. If
this service is disabled, configura-
tion changes performed by ADMC
will not be reported for the work-
station.2
MessageManager - Calc Manual Manual N/A Communicates with CPs. Receives
and Filtering device database information from
CPs and forwards alarms to the
Message Manager Device Server
service for delivery to clients.3
MessageManager - Manual Manual N/A If Message Manager is configured
Device Server as redundant, communicates with
the Message Manager Redun-
dancy Controller service on the
partner station to determine
active/passive roles.3
MessageManager - Auto Auto N/A Controls the startup of all other
Internal Monitor Message Manager services.
Reports Message Manager status
via OM variables. Restarts other
Message Manager services if
issues are encountered.3
MessageManager - Manual Manual N/A Communicates with alarm destina-
Packet Receiver tion clients (CADs, historians,
printers). Receives alarms and
sends to clients.3
MessageManager - Manual Manual N/A Handles alarm re-prioritization.
Redundancy Controller Consumer of configuration files
created by the Message Manager
configurator.
MKSAUTH Manual Manual Manual MKS password authentication ser-
vice.
Network Time Protocol Manual Manual Manual Synchronizes computers over a
network
NuTCRACKER Service Auto Auto Auto MKS NuTCRACKER Service
(used by I/A Series or Control Core
Services infrastructure)
37
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
Table 3-1. Windows Services Startup Configuration for Stations with Security Enhancements (Continued)
Startup Type on
Startup Type Windows Server
Startup on Windows 2008 R2 Domain
Type on Server 2008 R2 Controllers (On-
Service Name Windows 7 Client Servers MESH Only1) Description
Open Text Exceed N/A Manual N/A A helper service for Exceed provid-
Display Controller ing Display Management.2
Open Text InetD Auto Auto N/A Open Text Internet Superservice.2
REDL Monitor Auto Auto Auto Monitors the Redundant Ethernet
Data Link and reports cable faults
to the System Monitor. If this ser-
vice is disabled, cable faults will
not be reported for this worksta-
tion.
System Manager Auto Auto Auto Provides system information to the
Service System Manager client applica-
tions.4
1.
I/A Series software or Control Core Services are not installed on off-Mesh Domain Controllers.
2.
Not installed if the IASVCS package is un-assigned from the workstation.
3. Only installed if the AMSGM7 package is assigned to the workstation.
4.
Only installed if the System Manager Server is installed.
Administrative Privileges
Administrative privileges are not required for normal I/A Series or Foxboro Evo system operation.
However, members of the IA Plant Admins security group are granted administrative privileges so
that they can perform important functions such as the ability to install software and change net-
work settings. The IA Plant Engineers, IA Plant Operators, and IA Plant View Only security
groups do not have this privilege, nor can they log in to the domain controllers.
NOTE
It is not possible to log on to a domain controller with a user account that is not a
member of the Administrators group.
If you wish to change this behavior, you may remove or add whichever user groups you wish to
the Administrators users group, provided you understand and are willing to accept the security
implications of doing so.
38
3. Security Enhancements Installation and Configuration B0700ET – Rev E
39
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
On-MESH Topology
The MESH
Control Network
Off-MESH Topology
L4 Network
Firewall
L3 Network
Off-MESH WSUS*
Domain Firewall (Optional ePO)
Controller Server
L2.1 Network
AW AW AW AW
Hosting Hosting Operator ... Operator
CPs CPs Station Station
L2 MESH Network
* WSUS = Microsoft’s Windows Server Update Services, and ePO = McAfee ePolicy Orchestrator
40
3. Security Enhancements Installation and Configuration B0700ET – Rev E
For the On-Mesh Topology in Figure 3-1, the Domain Controllers are connected directly to The
Mesh network. To ensure proper operation on The Mesh, these servers must have I/A Series soft-
ware or Control Core Services installed on them. Note that only workstations and servers partici-
pate in the Active Directory structure, not controllers or switches.
Security Groups
The concept of “security groups” is also present in the Active Directory structure. (These were
simply referred to as “user groups” in earlier operating systems such as Windows NT.) Like an
OU, a security group can include users and workstations. However, there is a difference. OUs act
as containers of objects (such as users and workstations), whereas security groups are a collection
of attributes that can be assigned to an object. Using the analogy of a company for example, you
may have divided it up into OUs that represent departments. If you want to designate certain
people as having the ability to control (configure and maintain) each OU, the user accounts of
those designated people would belong to a security group that has the required permissions to
allow them to do the tasks required to control the OU.
NOTE
A user account can be in only one OU but can be a member of any number of secu-
rity groups.
41
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
Group policies can manage computer-specific settings, user-specific settings or both. Computer
policies are applied at boot time. User policies take effect when a user logon occurs. Domain-
based group policies (other than folder redirection and software installation) are not only applied
at logon time, but also reapply themselves periodically to keep current with any changes. There is
a refresh interval specific for Domain Controllers (which typically is every 5 minutes) and a differ-
ent refresh interval for all other computers (which typically is 90 minutes). These refresh intervals
can be controlled via group policy.
Group policies are processed in a hierarchical order. For example, Local Security Policy is first,
then site-level policies, then domain-level policies, and then OU-level policies. Users and worksta-
tions that are both in a domain and an OU receive settings both from the domain-level policy and
from the OU-level policy. If the same policy is configured at multiple levels, the behavior depends
on how the policy is configured at the higher level. For example, it is possible to set a “No Over-
ride” option that prevents a policy from being overridden at a lower-level. Otherwise, normally
the lower level policy (the last one applied) would win.
42
3. Security Enhancements Installation and Configuration B0700ET – Rev E
43
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
44
3. Security Enhancements Installation and Configuration B0700ET – Rev E
Table 3-3 lists the I/A Series or Control Core Services groups and users which are members of
each security group.
Group Policies
Group policies have two sections:
♦ Computer Configuration
♦ User Configuration
The Invensys Plant Admins, Plant Engineers, Plant Operators, and Plant View Only group poli-
cies have the User Configuration section enabled and the Computer Configuration section dis-
abled.
Table 3-4 shows which of these sections are enabled or disabled by default for the group policies
shipped by Foxboro.
45
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
Computer User
Group Policy Configuration Configuration
Invensys Base Non-IA v1.0 Enabled Disabled
Invensys Base Policy v1.0 Enabled Disabled
Invensys Domain Controllers Policy v1.0 Enabled Disabled
Invensys Domain Policy v1.0 Enabled Disabled
Invensys Enhanced Interactive Logon Banner ON v1.0 Enabled Disabled
Invensys Enhanced Screen Saver Enabled Filtered v1.0 Disabled Enabled
Invensys FoxView Environments v1.0 Enabled Disabled
Invensys IA Computers v1.0 Enabled Disabled
Invensys IA Remote Desktop Servers v1.0 Enabled Disabled
Invensys IA Users Filtered v1.0 Disabled Enabled
Invensys Interactive Logon Banner OFF v1.0 Enabled Disabled
Invensys Plant Admins Filtered v1.0 Disabled Enabled
Invensys Plant Engineers Filtered v1.0 Disabled Enabled
Invensys Plant Operators Filtered v1.0 Disabled Enabled
Invensys Plant View Only Filtered v1.0 Disabled Enabled
The Computer Configuration settings include features such as password complexity and screen-
savers.
The User Configuration section allows different group policy settings to be applied based on the
logged-on user such as access to shutting down a station, access to the command prompt, and so
forth.
When either the Computer Configuration or User Configuration section is disabled, the group
policy settings in that section do not set get applied.
These group policies are organized as shown in Figure 3-3.
46
3. Security Enhancements Installation and Configuration B0700ET – Rev E
47
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
48
3. Security Enhancements Installation and Configuration B0700ET – Rev E
49
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
♦ Users requiring remote access should be added to the “IA Remote Access” security
group located under the Accounts > Groups > Remote OU.
You should not modify this group policy.
50
3. Security Enhancements Installation and Configuration B0700ET – Rev E
NOTE
The enhanced-level group policies are not linked by default as these policies are
optional. If you want to use these policies, it is recommended that you link them as
shown in Table 3-5.
Table 3-5. Default Links Between Group Policies and Active Directory Containers
Active Directory Container Linked Group Policies (in order of top to bottom)1
<Top Level of Domain> Invensys Domain Policy
<Top Level of Invensys OU> Invensys Base Policy
Accounts Invensys Enhanced Screen Saver Enabled Filtered (optional)2
Invensys Plant Admins Filtered
Invensys Plant Engineers Filtered
Invensys Plant Operators Filtered
Invensys Plant View Only Filtered
Invensys IA Users Filtered
Invensys Domain Policy
Admin <Block Inheritance>
51
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
Table 3-5. Default Links Between Group Policies and Active Directory Containers (Continued)
Active Directory Container Linked Group Policies (in order of top to bottom)1
Autologon Consoles Invensys Interactive Logon Banner OFF
Invensys FoxView Environments
Invensys IA Computers
Invensys Base Policy
Domain Controllers Invensys Domain Controllers Policy
Invensys Domain Policy
IA Computers Invensys FoxView Environments
Invensys IA Computers GPO
Invensys Base Policy
Remote Desktop Servers Invensys IA Remote Desktop Servers
Invensys FoxView Environments
Invensys IA Computers GPO
Invensys Base Policy
Non-IA Servers Invensys Base Non-IA
Invensys Base Policy
Non-IA Workstations Invensys Base Non-IA
Invensys Base Policy
1.
As observed in the “Group Policy Inheritance” tab in GPMC. Group policies shown in italics are
inherited from an upper-level container rather than being explicitly linked to that container.
2.
Not linked by default. If you want to use this enhanced-level group policy, it is recommended
that you link this policy as shown in this table.
Table 3-6 shows how the user groups for each group policy is filtered by default.
52
3. Security Enhancements Installation and Configuration B0700ET – Rev E
53
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
54
3. Security Enhancements Installation and Configuration B0700ET – Rev E
55
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
4. In the Group Policy Management window, expand the nodes in the left pane. Expand
the Group Policy Objects node, as shown in Figure 3-6. This lists all the GPOs in the
domain.
56
3. Security Enhancements Installation and Configuration B0700ET – Rev E
5. To see the detailed settings of a specific GPO, click on it in the left pane and select the
Settings tab in the right pane, as shown in Figure 3-7.
57
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
4. Before editing a policy, it is recommended that you create a backup first. To create a
backup, right-click on the GPO and select Back Up..., as shown in Figure 3-8.
58
3. Security Enhancements Installation and Configuration B0700ET – Rev E
5. In the Back Up Group Policy Object dialog box, specify a location where to save the
GPO backup (and a description) and click Back Up as shown in Figure 3-9.
59
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
6. To edit a policy, right-click on the GPO in the left pane and select Edit.
60
3. Security Enhancements Installation and Configuration B0700ET – Rev E
7. The Group Policy Management Editor opens as shown in Figure 3-11. Expand the
nodes in the left pane and edit the settings in the right pane.
8. To have the settings take effect, you can wait until the next group policy update or
type “gpupdate /force” in a command prompt on the station where you want the
changes to be applied immediately.
Be aware that for Computer Configuration changes to occur, you should reboot the
station.
61
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
6. To view the report, navigate to that location and double-click the report file to view
the settings.
62
3. Security Enhancements Installation and Configuration B0700ET – Rev E
NOTE
First, it is recommended that you save a copy of the existing GPOs before making
any modifications. Also, you should change the name of the modified GPO to make
it distinguishable from the GPO which was provided by Invensys. For example,
replace “Invensys” with your company name and bump up the version level
included in the name of the GPO so that you can easily identify that it was modi-
fied.
Figure 3-13. Event Log Group Policy Settings for Operating Systems Prior to Windows Vista
63
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
The newer group policy settings are located in the left pane of the Group Policy Management
Editor window under:
Computer Configuration -> Policies -> Administrative Templates -> Windows Com-
ponents -> Event Log Service
Figure 3-14. Event Log Group Policy Settings for Operating Systems
Newer than Windows Vista
64
3. Security Enhancements Installation and Configuration B0700ET – Rev E
inform the potential user that this computer is to be used only by authorized personnel and to dis-
play any usage policy restrictions.
By default, this feature is turned off on Foxboro workstations. However, this feature can be
enabled as described below. Note that this feature should not be used in conjunction with
“autologon” since the autologon will not be allowed to take place until the logon banner display is
dismissed. (This would defeat one of the purposes for using autologon.)
Foxboro provides an enhanced group policy object (GPO) to enable this feature named “Invensys
Enhanced Interactive Logon Banner ON.” This policy is installed on the system to make it avail-
able to those who want this feature but it is not automatically used until the following procedure
is performed.
1. Logon to the domain controller with a domain administrator account.
2. Open the Group Policy Management tool. Click the Start button and then click
Control Panel -> Administrative Tools -> Group Policy Management.
3. Navigate to the Group Policy Objects node in the left pane and expand it.
4. Click on Invensys Enhanced Interactive Logon Banner ON and click on the
Settings tab in the right pane.
You will see that there are two settings that need to be configured for your site. One is
for the text that you want displayed and the other is for the title that appears above the
message.
Figure 3-15. Group Policy Management - Invensys Enhanced Interactive Logon Banner ON
65
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
6. In the Group Policy Management Editor window, navigate in the left pane to Com-
puter Configuration -> Policies -> Windows Settings -> Security Set-
tings -> Local Policies and click on Security Options.
66
3. Security Enhancements Installation and Configuration B0700ET – Rev E
7. In the right pane, double-click on the “Interactive logon: Message text for users
attempting to log on” policy. Replace the text in the Security Policy Setting tab and
click OK.
67
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
8. Likewise, double-click on the “Interactive logon: Message title for users attempting to
log on” policy. Replace the title text with your own and click OK.
Now that the GPO has been configured with your specific message and title, it needs
to be linked in at the appropriate organizational unit. For example, to have the logon
banner appear on all the computers in the IA Computers OU, perform the following.
9. Open the Group Policy Management tool.
68
3. Security Enhancements Installation and Configuration B0700ET – Rev E
69
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
11. In the Select GPO dialog box, select Invensys Enhanced Interactive Logon
Banner ON and click OK.
70
3. Security Enhancements Installation and Configuration B0700ET – Rev E
12. When a GPO is linked to an OU, it is added as the bottom of the link order. The new
GPO needs to be moved up. Click on the IA Computers OU in the left pane. Select
the Linked Group Policy Objects tab in the right pane. Click Invensys
Enhanced Interactive Logon Banner ON and click on one of the up arrow icons
immediately to the left. The double-up arrow will place it at the top of the link order.
13. To have this policy go into effect, restart the computers that are members of the
IA Computers OU. When Ctrl + Alt + Del is pressed on those computers, the
logon banner will be displayed.
If you have custom environments that you want controlled by group policy, using the Group Pol-
icy Management console, you should clone the Invensys FoxView Environments GPO and edit
71
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
your copy to include your environments. Remember to unlink the Foxboro-supplied GPO from
the IA Computers OU and link your clone in its place.
This new method of providing security for FoxView environments using a group policy requires
that if a user needs access to a more privileged environment, they must log off and log back on
with a user account that has access to those environments. This is an extra layer of protection
since the person logging on would need to know the credentials of a higher-privileged account.
For auditing purposes, it also provides a way to know when a higher-privileged user logs on since
the logon events are recorded in the Windows Event Log.
If you do not want to use this group policy to help secure the FoxView environments, unlink the
Invensys FoxView Environments GPO from the IA Computers OU.
72
3. Security Enhancements Installation and Configuration B0700ET – Rev E
If you specify the “Back up to a shared network folder” option and try to schedule a backup, the
following dialog may appear:
73
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
If this message appears, it is due to a group policy setting that is preventing credentials from being
stored. For better security, this policy is set to Enabled. However, if you wish to use the schedule
feature of the Windows Server Backup utility and are willing to accept the less secure setting, the
following provides information about how to change that group policy setting.
Proceed as follows:
1. Login to the domain controller with an account that has domain administrator privi-
leges.
2. Open the Group Policy Management console.
a. Click the Start button and click Control Panel -> Administrative Tools.
b. Double-click Group Policy Management.
3. In the Group Policy Management console, expand the nodes in the left pane. Expand
the Group Policy Objects node.
4. Before editing a policy, it is recommended that you create a backup first. To create a
backup, right-click on the GPO and select Back Up.... In the Back Up Group Pol-
icy Object dialog box, specify a location where to save the GPO backup (and a
description) and click Back Up.
The GPO to edit depends on where you plan to be running the Windows Server
Backup utility, as follows:
♦ If backing up a domain controller, edit the Invensys Domain Controllers Policy.
♦ If backing up a client server, edit the Invensys Base Policy.
5. To edit the policy, right-click on the GPO in the left pane and select Edit.
6. The Group Policy Management Editor opens. Under the Computer Configuration
section in the left pane, expand the Policies node and navigate to:
Policies -> Windows Settings -> Security Settings -> Local Policies ->
Security Options
74
3. Security Enhancements Installation and Configuration B0700ET – Rev E
7. In the right pane, scroll down to the Network access: Do not allow storage
of passwords and credentials for network authentication setting and
double-click on it.
8. In the pop-up window, uncheck the Define this policy setting checkbox and
click OK.
9. To have the settings take effect on the station where you want the changes to be
applied immediately, open a command prompt and type:
gpupdate /force
If you want the changes to occur on a client server, it is typically necessary to reboot
the client server to make sure it receives the Computer Configuration policy updates.
At this point, you should be able to schedule a backup to a network share in the Microsoft Win-
dows Server Backup utility, accessed as follows:
Start -> Control Panel -> Administrative Tools -> Windows Server Backup
75
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
TIP
If you are changing group policies, remember that they must be applied before they
take effect. Normally, this happens at the normal group policy refresh interval. A
way to force a group policy refresh to occur right away is to open a command
prompt window on the station on which you want the policy applied and type:
gpupdate /force
However, there are other options available with this command.
Typing “gpupdate /?” will list them.
76
3. Security Enhancements Installation and Configuration B0700ET – Rev E
domain administrator on the domain controllers. The “Active Directory Users and Computers”
tool is the main application used for managing accounts, security groups, and OUs. Group poli-
cies are managed using the Group Policy Management Console as described in “How to Edit
Group Policies” on page 57.
The “Active Directory Users and Computers” tool can be accessed on the domain controller from
the Start menu as follows:
Start button -> Control Panel -> Administrative Tools -> Active Directory Users
and Computers
Figure 3-27 shows an example of the window displaying this tool.
You should see the name of the domain name near the top of the left pane. In the left pane, there
is a list of containers and organizational units that were previously created when Active Directory
and the I/A Series software or Control Core Services were installed. When you click on an item in
the left pane, more detailed information is displayed in the right pane.
77
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
Figure 3-28. Active Directory Users and Computers Tool - Selecting User
78
3. Security Enhancements Installation and Configuration B0700ET – Rev E
A wizard will appear and it will display the dialog boxes that you need to fill in to cre-
ate a new user.
2. Enter the name of the user and click Next. The following figures show how to add a
user named “Operator1”.
79
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
3. Enter a password that complies with the password policy for your site. Check the
boxes that apply. (Note that the domain administrator can reset passwords at any
time.) Click Next.
80
3. Security Enhancements Installation and Configuration B0700ET – Rev E
5. The user must be added to the appropriate security groups. In this case, Operator1
should be added to the IA Plant Operators group. Right-click on the user account in
the right-pane and select Properties as shown in Figure 3-31:
81
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
6. Select the Member Of tab. It is expected that it will be a member of the Domain Users
group since it is a domain user that was created. Click Add.
Figure 3-32. Operator1 Properties Dialog Box - Selecting “Member Of” Tab
82
3. Security Enhancements Installation and Configuration B0700ET – Rev E
7. Click Advanced.
8. In the “Starts with” field, type the first part of the group name, such as IA Plant. Click
Find Now, select the group in the bottom panel, and then click OK.
83
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
9. Click OK.
84
3. Security Enhancements Installation and Configuration B0700ET – Rev E
85
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
2. In the Group Policy Object Editor, under the Computer Configuration node, navi-
gate to Policies -> Windows Settings -> Security Settings -> Account
Policies -> Password Policy.
86
3. Security Enhancements Installation and Configuration B0700ET – Rev E
3. One of the settings in the Password Policy folder is labeled “Passwords Must Meet
Complexity Requirements.” To set this policy, double-click it.
4. Check the “Define This Policy Setting” checkbox.
5. Click the Enabled radio button, click Apply and then click OK.
NOTE
You should also set the other policy settings to match your organizations require-
ments.
6. Make the same changes to the “Invensys Domain Policy” group policy object if you
want that policy to take effect for local user accounts as well as domain user accounts.
7. Close the group policy editor.
87
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
1. In the Group Policy Management console, navigate to the “Invensys Domain Con-
trollers Policy” in the left pane. Right-click this policy and select Edit. The editor
window is displayed.
2. Navigate to the following node:
Computer Configuration -> Policies -> Administrative Templates ->
Classic Administrative Templates -> Invensys -> Security.
Click Security in the left pane, as shown in Figure 3-39.
3. In the right pane, double-click on the Password Complexity setting. The Password
Complexity Properties dialog box appears, as shown in Figure 3-40.
88
3. Security Enhancements Installation and Configuration B0700ET – Rev E
89
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
90
3. Security Enhancements Installation and Configuration B0700ET – Rev E
The administrator does not need to know the old password to set the new one.
91
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
The following information is provided as a convenience if you wish to manually recreate that
functionality (formerly available under the “ia” user account). Note that restoring this functional-
ity only works under the following conditions:
♦ You have a server that has the Remote Desktop Services feature enabled. (The Remote
Desktop Services service must be turned on.)
♦ You have purchased and installed a sufficient number of Remote Desktop Client
Access Licenses.
♦ You have the FoxView software installed on the server providing Remote Desktop
Services.
♦ You have purchased a sufficient number of FoxView licenses.
When a remote user logs on with this account, the only application that is run is FoxView. This is
a view-only instance and most of the menu items are disabled by default. When you exit FoxView,
the remote session is automatically logged off.
To manually create a remote user with this functionality, perform the following procedure:
1. At the domain controller, invoke the Active Directory Users and Computer tool as
follows: Start button -> Control Panel -> Administrative Tools -> Active
Directory Users and Computers
2. Navigate to the Remote OU under Invensys -> Accounts -> Users OU.
92
3. Security Enhancements Installation and Configuration B0700ET – Rev E
93
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
4. Fill in the name of the account. (It does not have to be “ia.”) Click Next.
94
3. Security Enhancements Installation and Configuration B0700ET – Rev E
5. Fill in the password fields using a password that is compliant with your site’s password
policy. (It is strongly recommended that you use a strong password.) Check the boxes
as appropriate. For example, if you do not want remote users to change the password,
you could check “User cannot change password.” (The domain administrator can
always reset the password.) When done, click Next.
6. Click Finish.
95
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
7. In the Active Directory Users and Computers tool, right-click the account you created
and select Properties.
96
3. Security Enhancements Installation and Configuration B0700ET – Rev E
97
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
9. Select the Sessions tab. Change the End a disconnected session drop-down
menu to 1 minute.
98
3. Security Enhancements Installation and Configuration B0700ET – Rev E
10. Select the Member Of tab. Using the Add button, add the following groups:
♦ IA Plant View Only (or another group that has the functionality you want to
provide remotely)
♦ IA Remote Access
99
B0700ET – Rev E 3. Security Enhancements Installation and Configuration
100
4. Security Packages
This chapter discusses the security packages provided and affected by the security enhancements.
Overview
Foxboro incorporates globally-recognized third-party security packages to complement the secu-
rity features built into its products. These packages provide additional security features and facili-
tate the management of these features.
An I/A Series or Foxboro Evo system with the security enhancements installed supports the addi-
tion of the following packages from McAfee®:
♦ Virus Scanner Enterprise
♦ AntiSpyware Enterprise
♦ ePolicy Orchestrator
♦ Host Intrusion Prevention
♦ Device Control
♦ Integrity Control
The Virus Scanner and AntiSpyware packages are pre-installed as part of the Foxboro-supplied
OS images described in Chapter 2 “Platform Security”.
The other packages are available via a separate DVD. The installation instructions and more
detailed information about these packages are included in Optional McAfee® Security Products
Installation and Configuration Guide (B0700EX).
ePolicy Orchestrator
The ePolicy Orchestrator (ePO) provides a way to centrally monitor and manage the other
McAfee security products. While some tools do not require ePO, such as Virus Scanner and Anti-
Spyware, other tools do require it, such as Host Intrusion Prevention and Device Control. The
ePolicy Orchestrator offers many features that are beneficial even for the tools that do not require
ePO. For example, ePO can be used to keep virus signature (DAT) files up to date from a single
location.
The ePO provides a “console” application that can be used to install the other McAfee packages
on all the managed workstations and servers from one location. For example, in the case of
101
B0700ET – Rev E 4. Security Packages
I/A Series or Foxboro Evo systems, these security packages can be managed from this ePO console
on all the workstations and servers on The Mesh that are in the Active Directory domain.
Not only can these packages be installed from ePO, but their policies and options can be managed
and distributed from the ePO console.
Another major benefit of ePO is the ability to monitor these packages from the ePO console. It is
possible to use predefined reports and dashboards or to create custom ones. Information about
how to do this is provided in Optional McAfee® Security Products Installation and Configuration
Guide (B0700EX).
The ePolicy Orchestrator can be installed on any server that has the bandwidth to handle it. In a
typical I/A Series or Control Core Services installation, it is expected to be installed on either the
Primary Domain Controller or a Secondary Domain Controller. Figure 4-1 depicts a topology
that has the domain controllers on The Mesh. Another option is to install ePO on a separate
server as shown in Figure 3-1 on page 40 for an off-Mesh topology.
The MESH
Control Network
102
4. Security Packages B0700ET – Rev E
Foxboro has already done this to arrive at the default settings that get installed when you install
the HIP package from the Foxboro-supplied DVD. These default settings allow the
I/A Series/Control Core Services and FCS/the Control Software to run.
If you install any additional software packages and they do not work, it is likely that the firewall is
blocking its traffic. You can check the HIP activity log to verify this. If that is the problem, you
will need to create new policies either manually or by using the adaptive mode.
! CAUTION
The adaptive mode should only be used on a pilot network or a subnet that is
known to be safe. For example, the subnet should not be connected to the Internet,
the virus scanner should be up-to-date and running on all stations, and there should
not be any rogue devices plugged into the subnet.
Device Control
The Device Control feature is provided by installing the Data Loss Prevention package. This pro-
vides control over the access to hardware ports, such as the floppy drive, CD/DVD drive or USB
ports.
When this package is installed from the DVD provided by Foxboro, a number of device blocking
policies are provided. You can enable or disable these policies from the ePO console anytime after
this package is installed.
More detailed information about the Device Control package is provided in Optional McAfee®
Security Products Installation and Configuration Guide (B0700EX).
Integrity Control
The Integrity Control feature enables the ability to ensure that only approved software runs on
specific workstations with I/A Series software or Control Core Services without imposing addi-
tional operational overhead. This feature blocks unauthorized, vulnerable, or malicious applica-
tions that can compromise the integrity of critical systems.
This product also leverages change control technology that can block unwanted, out-of-policy
changes before they occur. This level of protection is linked directly to policy. Changes can be ver-
ified against the change source or time window. Details about every change is captured, including
the exact time of the change, who was logged into the machine at that time, what processes were
running, and whether the change was manual (and if so, who made it) or made by an authorized
program.
The Integrity Control product also maintains a dynamic whitelist of the “authorized code” on the
workstation with I/A Series software or Control Core Services, and prevents the workstation from
103
B0700ET – Rev E 4. Security Packages
running any program or code outside the authorized set, and prevents any unauthorized changes
from being made.
Integrity Control is configured and managed for multiple computers using the ePolicy Orchestra-
tor (ePO) console.
More detailed information about the Integrity Control package is provided in Optional McAfee®
Security Products Installation and Configuration Guide (B0700EX).
Software Services
Table 4-1 provides an example of the McAfee services installed by these security packages and
their startup type.
Table 4-1. McAfee Services Startup Configuration for Stations with Security Enhancements
104
5. Software Updates
This chapter describes how updates to the software discussed in this document are handled.
These software updates can be related to Foxboro-produced software or third-party packages
shipped by Foxboro.
Software updates required for the security enhancements include the following:
♦ Foxboro software fixes (Foxboro Evo or I/A Series Quick Fixes, the Control Software
or FCS Quick Fixes and Service Packs)
♦ Microsoft security updates
♦ McAfee .DAT files
♦ McAfee software patches
There are other third-party packages employed by or shipped by Foxboro. However, updates for
those packages are only provided when they are incorporated in major or maintenance Foxboro
software releases.
The following sections describe how the above software packages are updated. You are encouraged
to periodically visit the Invensys Global Customer Support at https://support.ips.invensys.com to
determine what updates are available.
105
B0700ET – Rev E 5. Software Updates
McAfee Updates
McAfee releases updates to the VirusScan (and AntiSpyware) DAT files continuously (as frequent
as multiple times a day).
Since Foxboro is an OEM for specific McAfee products, Foxboro is obligated to provide the
updated DAT files to Foxboro customers. The details for obtaining and installing these patches
are described in McAfee VirusScan® and AntiSpyware Enterprise 8.8i Installation (B0700EQ).
McAfee releases patches to their software packages as necessary. McAfee software patches that are
relevant to the packages shipped by Foxboro will be downloaded and qualified by Foxboro and
then made available at Invensys Global Customer Support at https://support.ips.invensys.com. The
details for obtaining and installing these patches are described in Optional McAfee® Security Prod-
ucts Installation and Configuration Guide (B0700EX).
106
6. Station Assessment Tool
This chapter discusses the Station Assessment Tool, which allows you to audit the contents of a
workstation or server with I/A Series software/Control Core Services or Foxboro Control
Software/the Control Software.
An important part of enhancing the security of a system is the necessity of knowing what is
installed on all stations in your system at any point in time and being able to track any changes
made after that established time reference. This information is also very valuable for helping ser-
vice personnel troubleshoot and diagnose problems. The Station Assessment Tool (SAT) is
designed to address this functionality. It is installed as part of the I/A Series software or Control
Core Services installation.
SAT allows administrative users and service personnel to collect, view, print, and compare infor-
mation about workstations and servers with I/A Series software/Control Core Services or FCS/the
Control Software on The Mesh network which are running a Microsoft Windows operating sys-
tem (such as Windows 7 or Windows Server 2008 R2). It can collect the information locally from
the station on which it is running or from any other remote station.
SAT supports two user interfaces: a command-line interface (CLI) and a graphical user interface
(GUI). The CLI provides an interface that can accept individual commands from a command line
or by running a script. Scripts will facilitate the ability to run unattended station assessments at
scheduled times. The GUI is designed to make it very easy to interactively obtain information
about any workstation or server with I/A Series software/Control Core Services or FCS/the Con-
trol Software.
You can just collect information about a station, which is referred to as performing an assessment.
You can also perform an audit which includes performing a new assessment, comparing it to a
reference assessment, and producing a report of the differences. A reference assessment can be a
baseline profile or a previous assessment that is saved as a station custom profile.
The types of information that can be collected include:
♦ the workstation name (a.k.a., the letterbug)
♦ the I/A Series software/Control Core Services or FCS/the Control Software release
version
♦ the list and running state of services
♦ list of installed I/A Series software/Control Core Services or FCS/the Control Soft-
ware Quick Fixes
♦ list of installed Windows OS Updates
♦ list of installed software packages
♦ list of installed third party patches (if this information is available in the “Add or
Remove Programs” applet)
♦ information about Active Directory.
The reports can be viewed on the screen in the GUI and/or sent to a printer.
More detailed information about this tool is contained in Station Assessment Tool (SAT) User’s
Guide (B0700DZ).
107
B0700ET – Rev E 6. Station Assessment Tool
108
Appendix A. Comparison of
“Invensys Plant” GPOs
This appendix provides a list of the group policy settings for the IA Plant Admins, IA Plant
Engineers, IA Plant Operators, and IA Plant View Only security groups.
The group policy settings provided by the “Invensys Plant” GPOs for the IA Plant Admins,
IA Plant Engineers, IA Plant Operators, and IA Plant View Only security groups are shown in
Table A-1.
Table A-1. Group Policy Settings for I/A Series Software v8.8 or Foxboro Evo Control Core Services
v9.0 or Later
Administrative Templates
Policy definitions (ADMX files) retrieved from
the local machine.
Control Panel
Policy Setting Setting
Prohibit access to the Control Panel Enabled Enabled
Control Panel/Personalization
Policy Setting
Enable screen saver Disabled Disabled
Password protect the screen saver Disabled Disabled
Screen saver timeout Disabled Disabled
Desktop
Policy Setting Setting
Do not add shares of recently opened Enabled Enabled
documents to Network Locations
Do not save settings at exit Enabled Enabled
Hide and disable all items on the desktop Enabled Enabled
Hide Internet Explorer icon on desktop Enabled Enabled
109
B0700ET – Rev E Appendix A. Comparison of “Invensys Plant” GPOs
Table A-1. Group Policy Settings for I/A Series Software v8.8 or Foxboro Evo Control Core Services
v9.0 or Later (Continued)
110
Appendix A. Comparison of “Invensys Plant” GPOs B0700ET – Rev E
Table A-1. Group Policy Settings for I/A Series Software v8.8 or Foxboro Evo Control Core Services
v9.0 or Later (Continued)
111
B0700ET – Rev E Appendix A. Comparison of “Invensys Plant” GPOs
Table A-1. Group Policy Settings for I/A Series Software v8.8 or Foxboro Evo Control Core Services
v9.0 or Later (Continued)
112
Appendix A. Comparison of “Invensys Plant” GPOs B0700ET – Rev E
Table A-1. Group Policy Settings for I/A Series Software v8.8 or Foxboro Evo Control Core Services
v9.0 or Later (Continued)
113
B0700ET – Rev E Appendix A. Comparison of “Invensys Plant” GPOs
Table A-1. Group Policy Settings for I/A Series Software v8.8 or Foxboro Evo Control Core Services
v9.0 or Later (Continued)
114
Appendix A. Comparison of “Invensys Plant” GPOs B0700ET – Rev E
Table A-1. Group Policy Settings for I/A Series Software v8.8 or Foxboro Evo Control Core Services
v9.0 or Later (Continued)
115
B0700ET – Rev E Appendix A. Comparison of “Invensys Plant” GPOs
116
Index
A
Active Directory 39
Active Directory container 44, 51
ATS xiii
B
BIOS 1, 7
C
Control stations xiii
CP. See also Control stations
D
domain administrator 77
Domain Controllers 39
E
ePO 101
F
FCP270 xiii
FCP280 xiii
Firewall 2
FoxView 71
H
Hardening 2
I
Invensys Global Customer Support xii, 4, 8, 105, 106
O
Object Manager. See also OM
OM xiii
Organizational Units (OU) 41
P
primary domain controller (PDC) 36
117
B0700ET – Rev E Index
R
Reference documents xi
Remote Desktop Services 5, 35
Revision information xi
S
secondary domain controller (SDC) 36
strong password 8, 85
T
The MESH control network 35, 102
W
Workstations xiv
Z
ZCP270 xiv
118
Index B0700ET – Rev E
119
Invensys Systems, Inc.
10900 Equity Drive
Houston, TX 77041
United States of America
http://www.invensys.com