WindowsServer2003HardeningChecklist_final-(1)
WindowsServer2003HardeningChecklist_final-(1)
Helpdesk 75220/[email protected]
Introduction:
This checklist contains server hardening procedures that balance industry best practices with the
unique requirements of UMass/Boston’s environment. Since Windows Server 2003 does not come
configured securely out of the box it is necessary to follow these steps to prevent attacks from
exploiting known vulnerabilities. These steps should be followed to secure a typical UCDHSC
Windows 2003 server, but may not be appropriate in all cases. In cases where an exception must
be made, documentation should be retained on this worksheet describing the reason for the
exception and any mitigating actions. In all cases, this worksheet should be retained for future
reference.
Procedure:
Each Service Pack for Windows includes all security fixes from previous Service
Packs. Keep up to date on Service Pack releases and install the correct Service Pack
for your servers as soon as operational circumstances allow.
Microsoft issues security bulletins through its Security Notification Service. When these
bulletins recommend installation of a security hot fix, you should immediately download and
test the hot fix, then install it on your member servers as soon as operational
circumstances allow.
Make sure that Domain Admins are members of the Local Administrators group.
Review the list of active accounts (for both users and applications) on the system in the
Computer Management snap-in, disabling any non-active accounts, and deleting accounts
that are no longer required, including duplicate user accounts, test accounts, shared
accounts, and general departmental accounts.
Use group policies to assign permissions as needed.
Disable unnecessary services.
After installing Windows 2003 Server, disable any network services not required for the
server role. In particular, consider whether the server should be running the Server service
for file and print sharing.
This list could include web services or ftp services if those are not needed.
Also avoid installing applications on the server unless they are absolutely necessary to the
server’s function. For example, don’t install e-mail clients, office productivity tools, or utilities
that are not strictly required for the server to do its job.
If SNMP is enabled, there must be no R/W community string, and the RO community string
must be set to something other than “public.” When choosing an SNMP community string,
follow the same guidelines as choosing a complex password.
Use the Domain Security Policy (or Local Security Policy) snap-in to strengthen the system
policies for password acceptance, including:
Password Policy:
Password Setting Recommended Settings
Note: Increase the log size from the 16384 mb default to at least 81920 mb.
The login dialog box makes it easier to discover a user name that can later be employed in
a password- guessing attack. Disable this feature using the security templates provided on
the installation CD, or via Group Policy snap-in.
Local Security Policy .. Security Settings .. Local Policies .. Security Options .. Domain
Member: Do not display last username
Configure a strong audit policy. Successful and failed logins, as well as privilege use,
should be logged and monitored to detect any unauthorized activity. Applied Trust suggests
the following Auditing settings:
Install antivirus software and updates. Make sure file scanning is enabled and automatic
definition updates are configured. MalwareBytes, ComboFix, or another. Consult IT
Helpdesk if assistance is needed
Configure appropriate settings for access control on file shares, given that permissions are
set through NTFS security.
All folders and files should be secured with standard NTFS settings. Minimum access rules
should apply such that groups are created that allow the minimum number of users to have
write access.
Where possible, the “Everyone” setting should be removed and replaced with user groups.
Once NTFS settings have been applied, then the most efficient share setting is to give all
Authenticated Users full control access. (Please confirm with your application guidelines)
Double-click the Autorun value, and type 0 for its value. (If it's not there, create it by
selecting Edit -> New -> DWORD Value, and typing "Autorun" for its name.)
You may have to log out and then log back in for this change to take effect.
Note: With this solution, Windows will no longer be notified when you insert a new
CD. To make sure the correct icon and title for the current CD are displayed in My
Computer and Explorer, press F5 to refresh the window.
Protect the registry from anonymous access
Make sure that the server firewall is turned on is blocking unneeded ports such as 21 for
FTP and 80 for web services. Please contact an IT security person if questions or
assistance is needed.
Ensure users have the correct level of debugging access. This can be done through:
The control panel of each machine
The platform SDK (SeDebugPrivilege)
Set up the event logs.
Once the server has been built, create a Level 0/Full backup of all drives and the System
State. This backup should be stored for the life of the machine as a forensic baseline in
case of a security incident. Additional Level 0 backups should be created and stored for the
machine’s lifetime upon major system upgrades.