Download as pdf or txt
Download as pdf or txt
You are on page 1of 81

Working Aide - Windows Security Template Settings Final - 06 March 2008

Ted Mac Daibhidh, CD

WORKING AIDE -
WINDOWS SECURITY TEMPLATE SETTINGS

TED MAC DAIBHIDH, CD

Page 0
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Table of Contents
1 INTRODUCTION ...................................................................................................................3
2 WINDOWS SECURITY TEMPLATES ...............................................................................4
3 SECURITY SETTINGS .........................................................................................................5
3.1 PASSWORD .........................................................................................................................4
3.2 ACCOUNT LOCKOUT...........................................................................................................5
3.3 KERBEROS POLICY .............................................................................................................6
3.4 AUDIT POLICY ....................................................................................................................7
3.5 USER RIGHTS ASSIGNMENTS ..............................................................................................8
3.6 SECURITY OPTIONS ..........................................................................................................14
3.7 EVENT LOG SIZE ..............................................................................................................27
3.8 GUEST ACCESS .................................................................................................................28
3.9 RETENTION METHOD .......................................................................................................28
3.10 SYSTEM SERVICES ............................................................................................................29
3.11 TCP/IP STACK HARDENING .............................................................................................51
3.12 AFD.SYS ........................................................................................................................53
3.13 OTHER SETTINGS .............................................................................................................54
4 ANNEXES ..............................................................................................................................56
4.1 GENERAL SECURITY SETTING VALUES ............................................................................56
4.2 WINDOWS SECURITY IDENTIFIERS (SIDS) ........................................................................59
4.3 COMMON ACCESS CONTROL LIST (ACL) SETTINGS........................................................66
4.4 SECURITY POLICY COMPARISON AND ANALYSIS .............................................................74
5 REFERENCES ......................................................................................................................80

Page 1
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

1 INTRODUCTION
This purpose of this document is to aggregate several disparate documents and
sources regarding Microsoft Windows security template settings; its purpose is to
assist those with limited exposure in this regard should they find themselves tasked
with a project requiring interpretation of these settings.

Page 2
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

2 WINDOWS SECURITY TEMPLATES1


Security templates are setup information (.inf) files that define system security
settings (e.g. user rights, permissions, password policies, etc.) on a Windows host.
Security templates can be either be deployed centrally using Group Policy objects
(GPOs) or locally using tools such as secedit or MMC security plugins.

Windows installations have several standard security templates which can be found
in the C:\Windows\Security\Templates folder. The standard security templates are:

a. Compatws.inf – required by older applications that need to have weaker


security to access the Registry and the file system;

b. DC security.inf – used to configure security of the Registry and File system of


a computer that was upgraded from Windows NT to Windows 2000/2003;

c. Hisecdc.inf – used to increase the security and communications with the


domain controllers;

d. Hisecws.inf – used to increase security and communications for the client


computers and member servers;

e. Notssid.inf – used to weaken security to allow older applications to run on


Windows Terminal Services;

f. Ocfiless.inf – used for optional components that are installed after the main
operating system is installed - this will support services such as Terminal
Services and Certificate Services;

g. Securedc.inf – used to increase the security and communications with the


domain controllers, but not to the level of the High Security DC security
template;

h. Securews.inf – used to increase security and communications for the client


computers and member servers; and

i. Setup security.inf – used to reapply the default security settings of a freshly


installed computer.

1
Melber, Derek. “Understanding Windows Security Templates”. 06 October 2004.
Accessed on 25 March 2008. http://www.windowsecurity.com/articles/Understanding-Windows-Security-
Templates.html.

Page 3
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

3 SECURITY SETTINGS
The sections below will define some of the individual security settings found in
security templates. Where available, the CSEC recommended setting values2 will be
provided and defined.
3.1 Password
Enforce password history
PasswordHistorySize = 24

„PasswordHistorySize‟ defines the number of passwords retained by the system. This


history is compared with user input during password changes.

The setting „24‟ requires the user to select twenty-four unique passwords before they
can re-use their first one. With a „MinimumPasswordAge‟ of two, the user would have
to cycle their password every two days to get back to their original password.

Maximum password age


MaximumPasswordAge = 42

„MaximumPasswordAge‟ defines the maximum number of days a user can keep the
same password.

A setting of forty-two requires the user to change their password every forty-two
days; combined with the „PasswordComplexity‟ and ‟PasswordLength‟ settings, these
settings ensure the password is strong and resilient to attack.

Minimum password age


MinimumPasswordAge = 2

„MinimumPasswordAge‟ defines how many days a user must wait between


passwordchanges.

The setting „2‟ requires the user to wait two before they can change it again.

Minimum password length


MinimumPasswordLength = 8

„MinimumPasswordLength‟ defines the minimum number of characters acceptable for


a password.

The setting „8‟ requires the user to enter a password of eight characters or more;
combined with the „PasswordComplexity‟ and „MaximumPasswordAge‟ settings, these
settings ensure the password is strong and resilient to attack.

2
Communications Security Establishment Canada. “Windows Server 2003 Recommended Baseline
Security (ITSG-20)”. http://www.cse-cst.gc.ca/documents/publications/gov-pubs/itsg/itsg20.pdf.

Page 4
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Password must meet complexity requirements


PasswordComplexity = 1

„PasswordComplexity‟ defines password complexity requirements; this setting helps


thwart brute-force attacks.

The setting „1‟ requires the user to enter a strong password that meets the criteria
demonstrated below:

• Upper Case Character (A-Z)

• Lower Case Character (a-z)

• Base 10 Digits (0-9)

• Non-alphanumeric (! @ # $ % ^ &)

Store password using reversible encryption


ClearTextPassword = 0

The „ClearTextPassword‟ keyword determines if the system stores passwords using


reversible encryption. The setting „zero‟ disables reversible encryption.

NOTE: Never enable this option unless operational considerations outweigh the need
to protect password information.

3.2 Account Lockout


Account Lockout Duration
LockoutDuration = 15

„LockoutDuration‟ defines the length of time (in minutes) that an account is disabled
afterlockout; this value needs to be synchronized with „ResetLockoutCounter‟ so the
user can logon when the „LockoutDuration‟ has expired.

The setting „15‟ disables the user‟s account for 15 minutes.

Account lockout threshold


LockoutBadCount = 10

„LockoutBadCount‟ defines the number of failed logons allowed before the account is
locked.

The setting „10‟ causes the user‟s account to be locked after 10 consecutive logon
attempts. The setting prevents extended password guessing attacks.

Page 5
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Reset account lockout counter after


ResetLockoutCount = 15

„ResetLockoutCount‟ defines the length of time (in minutes) before a lockout reset
occurs; this value needs to be synchronized with „LockoutDuration‟ so the user can
logon when the „LockoutDuration‟ has expired.

The setting „15‟ resets the lockout to zero after fifteen minutes.
3.3 Kerberos Policy
Enforce user logon restrictions
TicketValidateClient = 1

„TicketValidateClient‟ determines if Kerberos V5 Key Distribution Centre


authentication is required.

The setting „1‟ requires the use of Kerberos Authentication.

Maximum lifetime for the service ticket


MaxServiceAge = 600

„MaxServiceAge‟ defines the number of minutes a service ticket will be valid.

The setting „600‟ allows the ticket to be used for ten hours.

Maximum lifetime for user ticket


MaxTicketAge = 10

„MaxTicketAge‟ defines the maximum hours a user‟s ticket granting ticket may be
used.

The setting „10‟ indicates that the ticket granting ticket must be replaced or renewed
after ten hours.

Maximum lifetime for user ticket renewal


MaxRenewAge = 7

„MaxRenewAge‟ defines the number of days a ticket granting ticket may be renewed
after issuance.

The setting „7‟ allows a ticket granting ticket to be renewed for seven days.

Maximum tolerance for computer clock synchronization


MaxClockSkew = 5

„MaxClockSkew‟ defines the maximum amount of time a system clock can be


different from the Domain Controller clock.

The setting of „5‟ indicates systems more than 5 minutes.

Page 6
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

3.4 Audit Policy


Additional information regarding audit policy can be found in section 4.1.4 of the
Annex.
Audit account logon events
AuditAccountLogon = 3

„AuditAccountLogon‟ defines types of logon events to audit; „success‟ events can


determine who accessed the system during an incident. „Fail‟ events provide insight
to password guessing attacks.

The setting „3‟ audits „success‟ and „fail‟ events.

Audit account management


AuditAccountManage = 3

„AuditAccountManage‟ defines types of logon events to audit; „success‟ events can be


used in investigations, monitoring accounts at the time of an incident. „Fail‟ attempts
can determine if users are probing the system for vulnerabilities.

The setting „3‟ audits „success‟ and „fail‟ events.

Audit directory service access


AuditDSAccess = 3

„AuditDSAccess„ defines types of logon events to audit; the Directory Service holds
crucial information for the Domain. Knowledge of access during an incident can
provide valuable information about Active Directory objects accessed during an
attack.

The setting „3‟ audits „success‟ and „fail‟ events.

Audit logon events


AuditLogonEvents = 3

„AuditLogonEvents‟ defines types of logon events to audit; „success‟ events can be


used to determine who was accessing the system during an incident. „Fail‟ logon
attempts can determine if the system is under a password guessing attack.

The setting „3‟ audits „success‟ and „fail‟ events.

Audit object access


AuditObjectAccess = 2

„AuditObjectAccess‟ defines the type of logon events that will be audited; failed
attempts can be monitored to determine if any users are probing the system for
vulnerabilities.

The setting „2‟ audits failed events.

Page 7
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Audit policy change


AuditPolicyChange = 3

„AuditPolicyChange‟ defines the type of logon events that will be audited; „success‟
events are used in investigations to determine access to the system and policy used
at the time of the incident. „Fail‟ attempts can determine if users are probing the
system for vulnerabilities.

The setting 3 audits „success and „fail‟ events.

Audit privilege use


AuditPrivilegeUse = 3

„AuditPrivilegeUse‟ defines logon events to be audited; „Success‟ events are used to


determine who was accessing the system at the time of the incident. „Fail‟ attempts
can determine if users are probing the system for vulnerabilities.

The setting „3‟ audits „success‟ and „fail‟ events.

Audit process tracking


AuditProcessTracking = 0

„AuditProcessTracking‟ defines logon events to be audited. Due to the large volumes


of data generated if this setting is enabled, the normal setting for this value is
disabled. However, during an incident the information provided is invaluable; if an
attack is suspected, it is recommended that the setting be changed to „1‟ (enabled).

The setting „0‟ audits no events. The value of this information is weighed against the
volume of data collected.

Audit system events


AuditSystemEvents = 3

„AuditSystemEvents‟ defines events to be audited; these events reflect the system


shutdown and restarts, system security events, and events that affect the security
log.

The setting „3‟ audits „success‟ and „fail‟ events.

3.5 User Rights Assignments


User rights assignments are designated using Windows Security Identifiers (SIDs);
refer to Annex 4.2.
Access this computer from the network
senetworklogonright = *S-1-5-11,*S-1-5-32-544

„senetworklogonright‟ grants network protocol access to the system (SMB, NetBIOS,


CIFS, HTTP and COM+). The policy grants privileges to the Administrators and
authenticated users. The ability to access the system from the network provides
greater exposure for an attack; restricting access reduces the exposure.

Page 8
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Act as part of the operating system


setcbprivilege =

„setcbprivilege‟ grants an account the ability to act as part of the operating system.
According to Microsoft, there is no reason why an account would require this
privilege.

Add workstations to domain


semachineaccountprivilege =

„semachineaccountprivilege‟ grants the right to add workstations to a domain. This


policy grants no privilege; restricting this privilege helps maintain domain integrity.

Adjust memory quotas for a process


seincreasequotaprivilege = *S-1-5-32-544,*S-1-5-19,*S-1-5-20

„seincreasequotaprivilege‟ grants the ability to adjust memory quotas for a process.


This policy grants privileges to Administrators, LOCAL SERVICE and NETWORK
SERVICE accounts; if misused, DoS attacks are possible.

Allow log on locally


seinteractivelogonright = *S-1-5-32-551,*S-1-5-32-544

„seinteractivelogonright‟ grants logon privilege to the local console. These privileges


are given to Administrators and Backup operators. Local access is restricted to
accounts that have legitimate reason for access; by restricting this privilege, system
exposure is reduced.

Allow log on through Terminal Services


seremoteinteractivelogonright = *S-1-5-32-544

„seremoteinteractivelogonright‟ grants the right to logon remotely through Terminal


Services. This policy grants rights to Administrators; there is no requirement to allow
users this form of access.

Backup files and directories


sebackupprivilege = *S-1-5-32-551,*S-1-5-32-544

„sebackupprivilege‟ grants the right to backup files and directories. Rights are given
to Administrators and Backup Operators if your policy does not allow administrators
to backup then omit the Administrators group. The allocation of this privilege must
be tightly controlled.

Bypass traverse checking


sechangenotifyprivilege = *S-1-5-32-545,*S-1-5-32-551,*S-1-5-11,*S-1-5-
32-544
The „sechangenotifyprivilege‟ grants the right to bypass traverse checking in NTFS
file systems and the Registry. This policy grants rights to Users, Backup Operators,
Administrators and Authenticated users.

Page 9
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Change the system time


sesystemtimeprivilege = *S-1-5-32-544

„sesystemtimeprivilege‟ grants the right to change the system time; this policy
grants rights to Administrators. The system time is critical in incident investigation;
without a consistent time, it is difficult to co-relate events on multiple systems.

Create a pagefile
secreatepagefileprivilege = *S-1-5-32-544

„secreatepagefileprivilege‟ grants the right to create a page file. This policy grants
rights to Administrators; restricting this to Administrators reduces the exposure to
trusted individuals. Too large a page file can cause poor system performance.

Create a token object


secreatetokenprivilege =

„secreatetokenprivilege‟ grants the right to create local security token objects; the
privilege gives the ability to create or modify Access Tokens. This policy does not
grant rights to anyone; doing this can prevent privilege escalation attacks and DoS
conditions.

Create global objects


secreateglobalprivilege = *S-1-5-6,*S-1-5-32-544

„secreateglobalprivilege‟ grants the right to create objects available to all sessions; it


can be used to affect other user‟s processes. This policy grants rights to
Administrators and the SERVICE account.

Create permanent shared objects


secreatepermanentprivilege =

„secreatepermanentprivilege‟ grants the right to create shared objects (folders,


printers); users with this privilege could expose sensitive data to the network by
creating a shared object. Only members of the Administrators group can create
permanent shared objects.

Debug programs
sedebugprivilege =

„sedebugprivilege‟ grants the right to debug any kernel process. Program debugging
should never be done in a production environment; in the event it is required, grant
rights for only for the time required to perform the debugging.

Page 10
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Deny access to this computer from the network


sedenynetworklogonright = *S-1-5-32-546, *S-1-5-7

„sedenynetworklogonright‟ prevents access for a variety of network protocols; the


policy applies the right to Guests and Anonymous Logon. The Administrators must
add the local accounts „Guest‟, „Support_388945a0‟ and Built-in Administrator
account.

NOTE: Given no reason for network access to the system for a group or user, access
should be denied.

Deny log on as a batch job


sedenybatchlogonright = *S-1-5-32-546, *S-1-5-7

„sedenybatchlogonright„ prevents the ability to create batch jobs; the batch facility
could be used to schedule jobs that result in a DoS. This policy applies rights to
Guests and Anonymous Logon; the Administrators must add the local accounts
„Guest‟ and „Support_388945a0‟.

NOTE: Given no reason for batch logon access to the system for a group or user,
access should be denied.

Deny log on as a service


sedenyservicelogonright = *S-1-5-32-546,*S-1-5-32-544, *S-1-5-7

„sedenyservicelogonright‟ prevents access to a variety of network protocols. This


policy applies the rights to Guests, Anonymous Logon and Administrators.
Administrators must add the local accounts „Guest‟, „Support_388945a0‟ and Built-in
Administrator account.

Deny log on locally


sedenyinteractivelogonright = *S-1-5-32-546, *S-1-5-7

„sedenyinteractivelogonright‟ prevents local access to the system. This policy applies


the rights to Guests and Anonymous Logon; administrators must add the local
accounts „Guest‟ and „Support_388945a0‟.

NOTE: Given no reason for interactive access to the system for a group, access
should be denied.

Deny log on through Terminal Services


sedenyremoteinteractivelogonright = *S-1-5-32-546, *S-1-5-7

„sedenyremoteinteractivelogonright‟ prevents logon through terminal services. This


policy applies rights to Guests and Anonymous Logon. Administrators must add the
local accounts „Guest‟, „Support_388945a0‟ and Built-in Administrator.

NOTE: Given no reason for terminal services access for a group, access should be
denied.

Page 11
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Enable computer and user accounts to be trusted for delegation


seenabledelegationprivilege =

„seenabledelegationprivilege‟ grants the right to change „trusted for delegation‟


setting on Active Diretory objects; the misuse of this privilege could lead to
impersonation of users in a Domain. This policy does not grant privileges to anyone.

Force shutdown from a remote system


seremoteshutdownprivilege =

„seremoteshutdownprivilege‟ grants the right to shut the system down from a remote
location; servers in a High Security zone require physical access to be shut down.
This policy grants rights to no one.

Generate security audits


seauditprivilege = *S-1-5-19,*S-1-5-20

„seauditprivilege‟ grants the right to generate records in the security logs; limiting
rights to non-interactive accounts prevents DoS conditions caused by full logs.
This policy grants rights to Network Service and Local Service.

Impersonate a client after authentication


seimpersonateprivilege = *S-1-5-19,*S-1-5-20

„seimpersonateprivilege‟ grants the right for applications to impersonate that client;


for superior security, privileges should be limited to non-interactive accounts. This
policy grants rights to Local Service and Network Service.

Increase scheduling priority


seincreasebasepriorityprivilege = *S-1-5-32-544

„seincreasebasepriorityprivilege‟ grants the right to increase process priority; this


policy grants privileges to Administrators.

Load and unload device drivers


seloaddriverprivilege = *S-1-5-32-544

„seloaddriverprivilege‟ grants the right to load and unload device drivers. Driver code
can be run with elevated privileges; restricting privileges to Administrators reduces
system exposure. This policy grants privileges to Administrators.

Lock pages in memory


selockmemoryprivilege =

„selockmemoryprivilege‟ grants the right to keep data in physical memory. The abuse
of privileges can result in starved memory resources and a DoS situation; restricting
this privilege reduces exposure to this threat. This policy grants privileges to no one.

Page 12
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Log on as a batch job


sebatchlogonright =

„sebatchlogonright‟ grants the right to submit batch jobs (log on as a batch job); The
Task Scheduler could be used to invoke a DoS condition; limiting this privilege
reduces the threat. This policy grants rights to no one.

Log on as a service
seservicelogonright = *S-1-5-20,*S-1-5-19

„seservicelogonright‟ grants the right to logon as a service. This policy grants rights
to Local Service and Network Service; interactive accounts are purposely excluded.

Manage auditing and security log


sesecurityprivilege = *S-1-5-32-544

„sesecurityprivilege‟ grants the right to specify object access auditing options; this
policy grants rights to Administrators. Administrators alone can determine the
appropriate auditing level thereby ensuring that users of the system cannot reduce
auditing and eliminate traces of their activity.

Modify firmware environment values


sesystemenvironmentprivilege = *S-1-5-32-544

„sesystemenvironmentprivilege‟ grants rights to modify firmware environment


values. The ability to change system configurations must be strictly controlled;
this policy grants these rights to Administrators only.

Perform volume maintenance tasks


semanagevolumeprivilege = *S-1-5-32-544

„semanagevolumeprivilege‟ grants rights to manage volumes or disks. The


administrative function of volume and disk management can damage data on a disk;
Restricting this privilege reduces the threat. This policy grants rights to
Administrators only.

Profile single process


seprofilesingleprocessprivilege = *S-1-5-32-544

„seprofilesingleprocessprivilege‟ grants the right to monitor performance of a non-


system process. The ability to profile a process can provide information to be used as
a basis of an attack; limiting privileges to Administrators reduces this threat.
This policy grants these rights to Administrators.

Profile system performance


sesystemprofileprivilege = *S-1-5-32-544

„sesystemprofileprivilege‟ grants the right to monitor performance of a system


process. Profiling a system gathers information useful for an attack; limiting
privileges to Administrators reduces this threat. This policy grants these rights to
Administrators only.

Page 13
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Remove computer from docking station


seundockprivilege = *S-1-5-32-544

„seundockprivilege‟ grants the right to undock the server. As a preventive measure,


these privileges should be restricted; this policy grants these privileges to
Administrators only.

Replace a process level token


seassignprimarytokenprivilege = *S-1-5-19,*S-1-5-20

„seassignprimarytokenprivilege‟ grants the right to replace a process security token


of a child process; this can be used to launch processes as another user, providing
the ability to hide inappropriate activity on a system. These rights are granted to
Local Service and Network Service.

Restore files and directories


serestoreprivilege = *S-1-5-32-544

„serestoreprivilege‟ grants the right to bypass permissions when restoring objects.


Due to the nature of the restore process, rights should be restricted to accounts that
are required to use it. This policy grants privileges to Administrators only.

Shut down the system


seshutdownprivilege = *S-1-5-32-544

„seshutdownprivilege‟ grants the right to shut down the system locally. Restricting
this privilege reduces the threat of inadvertent or malicious shutdowns; this policy
grants the right to Administrators only.

Synchronize directory service data


sesyncagentprivilege =

„sesyncagentprivilege‟ grants the right to read all objects and properties in the
Directory; information gained from the Active Directory can be used to form an
attack against the system. This policy revokes all privileges.

Take ownership of files or other objects


setakeownershipprivilege = *S-1-5-32-544

„setakeownershipprivilege‟ grants the right to take ownership of any securable object


in the system. In addition to the act of changing ownership being recorded in the
logs, this policy grants privileges to Administrators only.

3.6 Security Options


Security options includes values for all entries in the Security Options section of the
policy GUI, incorporating entries in the Security Options section of the Domain Policy
as well as the Member Server Baseline. Please note all values are explicitly defined -
this ensures that security is not dependent on default values.

Page 14
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Accounts: Administrator account status


EnableAdminAccount = 0

„EnableAdminAccount‟ determines if the local administrator account is enabled. The


setting „0‟ disables the local administrator account; this prevents widespread use and
removes it as a target for attack.

Accounts: Guest account status


EnableGuestAccount = 0

„EnableGuestAccount„ determines if the local guest account is enabled. The setting „0‟
disables the local guest account; this prevents widespread use and removes it as a
target for attack.

Accounts: Limit local account use of blank passwords to console logon


machine\system\currentcontrolset\control\lsa\limitblankpassworduse=4, 1

„limitblankpassworduse‟ registry value determines if local accounts with blank


passwords can be used to logon remotely. The setting „1‟ disallows accounts with
blank passwords to logon remotely; this ensures remote access requires an account
name and password.

Accounts: Rename administrator account


NewAdministratorName = "johnsmith"

„NewAdministratorName‟ keyword sets the local administrator account name;


renaming the local administrator account makes it difficult for an attacker to misuse
the administrator account. The setting „johnsmith‟ renames the local administrator
account to johnsmith.

NOTE: This keyword should be omitted if a policy to rename the Administrator


account on each system is enforced. If not, then at a minimum change it from
„johnsmith‟ to a local value.

Accounts: Rename guest account


NewGuestName = "janesmith"

„NewGuestName‟ keyword sets the local guest account name; Renaming the account
makes it more difficult for an attacker to misuse it. The setting „janesmith‟ renames
the local guest account to janesmith.

NOTE: This keyword should be omitted if a policy to rename the Guest account on
each system is enforced. If not, then at a minimum change it from „janesmith‟ to a
local value.

Audit: Audit the access of global system objects


machine\system\currentcontrolset\control\lsa\auditbaseobjects=4, 0

„auditbaseobjects‟ registry setting determines if access to global system objects is


audited; the setting „0‟ disables audit access to global objects.

Page 15
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Audit: Audit the use of Backup and Restore privilege


machine\system\currentcontrolset\control\lsa\fullprivilegeauditing=3, 0

„fullprivilegeauditing‟ determines if the system will audit the Backup and Restore
privilege; the setting „0‟ disables the audit of Backup and Restore privilege.

Audit: Shut down system immediately if unable to log security audits


machine\system\currentcontrolset\control\lsa\crashonauditfail=4, 1

The „crashonauditfail‟ registry value determines system behaviour when it fails to log
security events; the setting „1‟ shuts the system down when it cannot log. The
Canadian Federal government requires that comprehensive log data be carefully
maintained; therefore, if the log files are full the system must not process further
transactions.

Devices: Allow undock without having to log on


machine\software\microsoft\windows\currentversion\policies\system\un
dockwithoutlogon=4, 0

The „undockwithoutlogon‟ registry value determines if a portable computer can


undock without logon; the setting „0‟ disallows the computer to be undocked without
logon.

Devices: Allowed to format and eject removable media


machine\software\microsoft\windowsnt\currentversion\winlogon\allocate
dasd=1,"0"

The „allocatedasd‟ registry value determines who can format and eject removable
media; the ability to store large quantities of data (e.g. entire databases) makes
should be restricted to trusted individuals. The setting „0‟ permits Administrators to
format and eject removable media.

Devices: Prevent users from installing printer drivers


services\servers\addprinterdrivers=4, 1

The „addprinterdrivers‟ registry value determines if users can add printer drivers. The
setting „1‟ prevents users from adding print drivers; this assists in preventing users
running malicious code in a privileged state.

Devices: Restrict CD-ROM access to locally logged-on user only


machine\software\microsoft\windowsnt\currentversion\winlogon\allocate
cdroms=1,"1"

The „allocatecdroms‟ registry value determines if the CD-ROM is equally accessible to


local and remote users. The setting „1‟ restricts remote access to the CD-ROM when
in use by a local user.

NOTE: The setting allows remote authorized users to access the CD-ROM if no one is
logged on locally.

Page 16
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Devices: Restrict floppy access to locally logged-on user only


machine\software\microsoft\windowsnt\currentversion\winlogon\allocate
floppies=1,"1"

The „allocatefloppies‟ registry value determines if the floppy drive is simultaneously


accessible to local and remote users; the setting „1‟ restricts remote access to when
in use by a local user.

NOTE: This setting allows remote access to the floppy drive if no one is logged on as
a local user.

Devices: Unsigned driver installation behavior


machine\software\microsoft\driversigning\policy=3, 1

The „policy‟ registry value defines the unsigned driver installation behaviour; if this
option is enforced, only drivers approved by the Windows Hardware Quality Lab
(WHQL) are eligible. The decision to install drivers not found within WHQL is left to
the Administrator. The setting „1‟ warns the user before the driver is installed.

Domain controller: Allow server operators to schedule tasks


machine\system\currentcontrolset\control\lsa\submitcontrol=4, 0

The „submitcontrol‟ registry value determines if system operators can schedule


tasks; a DoS condition may be invoked if too many simultaneous tasks are executed.
The setting „0‟ prevents system operators from scheduling tasks.

Domain controller: LDAP server signing requirements


machine\system\currentcontrolset\services\ntds\parameters\ldapserveri
ntegrity=4, 2

The „ldapserverintegrity‟ registry value determines if the LDAP server requires a


signature to negotiate with LDAP clients; unsigned data is susceptible to man-in-the-
middle attacks. This setting helps prevent session hijack.The setting „2‟ requires a
client signature.

Domain controller: Refuse machine account password changes


machine\system\currentcontrolset\services\netlogon\parameters\refusep
asswordchange=4, 0

The „refusepasswordchange‟ registry setting determines if domain controllers accept


changes to computer account passwords; regularly changed passwords reduce the
threat of effective brute-force attacks. The setting „0‟ allows changing of computer
account passwords.

Page 17
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Domain member: Digitally encrypt or sign secure channel data


(always)
machine\system\currentcontrolset\services\netlogon\parameters\require
signorseal=4, 1

The „requiresignorseal‟ registry value determines if the domain member will encrypt
or sign secure channel data always. The setting „1‟ encrypts or signs secure channel
data; this value prevents legacy systems (pre-Windows 2000) from joining a
Domain.

Domain member: Digitally encrypt secure channel data (when


possible)
machine\system\currentcontrolset\services\netlogon\parameters\sealsec
urechannel=4, 1

The „sealsecurechannel‟ registry value determines if a domain member requests


encryption of all secure channel data; encrypting Secure Channel data prevents
sensitive information being sent in the clear, thereby limiting an attacker‟s ability to
gather information for an attack. The setting „1‟ requests encryption of all secure
channel data.

Domain member: Digitally sign secure channel data (when possible)


machine\system\currentcontrolset\services\netlogon\parameters\signsec
urechannel=4, 1

The „signsecurechannel‟ registry value determines if a system will sign secure


channel data when possible; unsigned data is susceptible to man-in-the-middle
attack. By enabling this setting, the client is protected from session hijack. The
setting „1‟ enables the signing of secure channel data when possible.

Domain member: Disable machine account password changes


machine\system\currentcontrolset\services\netlogon\parameters\disable
passwordchange=4, 0

The „disablepasswordchange‟ registry value determines if a domain controller will


accept machine account password changes; if the password change were disallowed,
the systems could not change their computer passwords leaving them susceptible to
password-guessing attacks. The setting „0‟ allows machine account password
changes.

Domain member: Maximum machine account password age


machine\system\currentcontrolset\services\netlogon\parameters\maxim
umpasswordage=4, 42

The „maximumpasswordage‟ registry value determines the maximum number days


between password changes. The setting „42‟ requires the password to be changed at
least every forty-two days; this ensures the password is changed often to thwart
password-guessing attacks.

Page 18
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Domain member: Require strong (Windows 2000 or later) session key


machine\system\currentcontrolset\services\netlogon\parameters\require
strongkey=4, 1

The „requirestrongkey‟ registry value determines if a domain member establishes


secure channel communications requiring 128-bit encryption; if disabled, the client
must negotiate key strength with the Domain Controller. The setting „1‟ requires
128-bit encryption of the secure channel; this setting ensures the highest level of
protection for secure channel data.

Interactive logon: Do not display last user name


machine\software\microsoft\windows\currentversion\policies\system\do
ntdisplaylastusername=4, 1

The „dontdisplaylastusername‟ registry value determines if the system provides a


logon screen with the last username that logged on. The setting „1‟ does not display
the last username; this setting withholds vital information to prevent attacks.

Interactive logon: Do not require CTRL+ALT+DEL


machine\software\microsoft\windows\currentversion\policies\system\dis
ablecad=4, 0

The „disablecad‟ registry value determines if CTRL+ALT+DEL is required before a


user logon. The setting „0‟ requires CTRL+ALT+DEL to initiate logon; it provides
unassailable hardware initiation of the logon sequence; assisting in the thwarting of
Trojan Horse routines.

Interactive logon: Message text for users attempting to logon


machine\software\microsoft\windows\currentversion\policies\system\leg
alnoticetext=7, TEXT FOR USER LOGON MUST BE SUPPLIED

The „legalnoticetext‟ registry value is presented to the user prior to entry of


username and password; this may help an organization in the event of
legal proceedings. The value shown is the text presented.

Interactive logon: Message title for users attempting to logon


machine\software\microsoft\windows\currentversion\policies\system\leg
alnoticecaption=1
“TEXT FOR USER LOGON MUST BE SUPPLIED”

The „legalnoticecaption‟ registry value is presented to the user as the title of the
window that contains the „legalnoticetext‟ text; this may help an organization in the
event of legal proceedings. The value shown is the text presented.

Interactive logon: Number of previous logons to cache (in case domain


controller is not available)
machine\software\microsoft\windowsnt\currentversion\winlogon\cachedl
ogonscount=1,"0"

The „cachedlogonscount‟ registry value determines the number of unique user whom
logon information is locally cached. The setting „0‟ does not cache logon information
locally; this ensures the user establishes a current security token with the Domain
Controller, thereby preventing disabled users access via cached logon credentials.

Page 19
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Interactive logon: Prompt user to change password before expiration


machine\software\microsoft\windowsnt\currentversion\winlogon\passwo
rdexpirywarning=4,14

The „passwordexpirywarning‟ registry value determines how many days in advance


the user is notified of password expiration. This setting warns the user 14 days
before password expiry; the user will continue to be reminded until the password
expiry date.

Interactive logon: Require Domain Controller authentication to unlock


workstation
machine\software\microsoft\windowsnt\currentversion\winlogon\forceun
locklogon=4, 1

The „forceunlocklogon‟ registry value determines if a domain controller must be


contacted to unlock a computer. The setting „1‟ requires contact with a domain
controller; this ensures the user establishes a current security token with the Domain
Controller and also disallows disabled users access via cached logon credentials.

Interactive logon: Require smart card


machine\software\microsoft\windows\currentversion\policies\system\scf
orceoption=4, 0

The „scforceoption‟ registry value determines if a smart card is required to logon. The
setting „0‟ does not require a smart card to logon. The majority of servers will not
require two-factor authentication; if this capability is a requirement, it should be
enabled during the application of a role specific policy.

Interactive logon: Smart card removal behaviour


machine\software\microsoft\windowsnt\currentversion\winlogon\scremo
veoption=1,"1"

The „scremoveoption‟ determines system behaviour when a smart card is removed.


The setting „1‟ locks the workstation when removed; this ensures accountability for
transactions that require smart card authentication.

Microsoft network client: Digitally sign communications (always)


machine\system\currentcontrolset\services\lanmanserver\parameters\re
quiresecuritysignature=4, 1

The „requiresecuritysignature‟ registry value determines if the SMB client requires


packet signing. The setting „1‟ requires packet signing; this setting provides for
mutual authentication and may prevent man-in-the-middle attacks thereby
eliminatingsession hijacking. Legacy systems cannot support this requirement.

Page 20
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Microsoft network client: Digitally sign communications (if server


agrees)
machine\system\currentcontrolset\services\lanmanworkstation\paramete
rs\enablesecuritysignature=4, 1

The „enablesecuritysignature‟ registry value determines if an SMB client attempts to


negotiate SMB packet signing (if the server agrees). The setting „1‟ causes the client
to negotiate SMB signing; this setting provides for mutual authentication and may
prevent man-in-the-middle attacks thereby eliminating session hijacking. Legacy
systems (i.e. Pre-Windows 2000) cannot support this requirement.

Microsoft network client: Send unencrypted password to third-party


SMB
serversmachine\system\currentcontrolset\services\lanmanworkstation\pa
rameters\enableplaintextpassword=4, 0

The „enableplaintextpassword‟ registry value determines if an SMB client sends plain


text passwords to non-Microsoft SMB servers. The setting „0‟ disables the use of
clear-text passwords. The use of non-Microsoft SMB servers that do not accept
encrypted passwords is disallowed in a High Security environment; password
security must always be enforced.

Microsoft network server: Amount of idle time required before


suspending
sessionmachine\system\currentcontrolset\services\lanmanserver\parame
ters\autodisconnect=4, 15

The „autodisconnect‟ registry setting defines the amount of idle time in minutes
before an SMB session is suspended; the setting „15‟ suspends the SMB session after
fifteen minutes of idle time. An idle session consumes system resources; attackers
could set up sessions consuming resources to invoke a DoS condition. Further to the
security ramifications, idle sessions can cause SMB services to become slow or
unresponsive.

Microsoft network server: Digitally sign communications (always)


machine\system\currentcontrolset\services\lanmanserver\parameters\re
quiresecuritysignature=4, 1

The „requiresecuritysignature‟ registry value determines if the server will always sign
SMB communications. The setting „1‟ always digitally signs SMB communications;
this setting provides mutual authentication for all communication. Mutual
authentication may prevent man-in-the-middle attacks thereby eliminating session
hijacking. Legacy systems cannot support this requirement.

Page 21
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Microsoft network server: Digitally sign communications (if client


agrees)
machine\system\currentcontrolset\services\lanmanserver\parameters\en
ablesecuritysignature=4, 1

The „enablesecuritysignature‟ registry value signs SMB communications, if the client


agrees. The setting „1‟ signs SMB communications; this setting provides mutual
authentication for all communication. Mutual authentication may prevent man-in-
the-middle attacks and eliminate the possibility of session hijacking. Legacy (i.e. Pre-
Windows 2000) systems cannot support this requirement.

Microsoft network server: Disconnect clients when logon hours expire


machine\system\currentcontrolset\services\lanmanserver\parameters\en
ableforcedlogoff=4, 1

The „enableforcedlogoff‟ registry value determines if a network connected user is


disconnected outside of their hours of operation. The setting „1‟ disconnects the user
when logged on outside of their hours of operation.

Network access: Allow anonymous SID/Name translation


LSAAnonymousNameLookup = 0

The „LSAAnonymousNameLookup‟ determines if the system allows anonymous


SID/NAME translation; if enabled, a user could use a well-known account SID to
obtain usernames of the account which could facilitate a password guessing attack.
The setting „0‟ disallows the system to perform anonymous SID/NAME translation.

Network access: Do not allow anonymous enumeration of SAM


accounts
machine\system\currentcontrolset\control\lsa\restrictanonymoussam=4, 1

The „restrictanonymoussam‟ registry value determines if anonymous enumeration of


SAM accounts is permitted. Successful enumeration maps account names to a
corresponding SID; when the SID is known, local Guest and Administrator accounts
are exposed and rendered vulnerable to password guessing attacks. The setting „1‟
disallows anonymous enumeration of SAM accounts.

Network access: Disallow anonymous enumeration of SAM accounts


and shares
machine\system\currentcontrolset\control\lsa\restrictanonymous=4, 1

The „restrictanonymous‟ registry value determines if anonymous enumeration of SAM


accounts and shares is permitted. Successful enumeration maps account names to a
corresponding SID; when the SID is known, local Guest and Administrator accounts
are exposed and rendered vulnerable to password guessing attacks. The setting „1‟
disallows anonymous enumeration of SAM accounts.

Page 22
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Network access: Do not allow storage of credentials or .NET Passports


for network authentication
machine\system\currentcontrolset\control\lsa\disabledomaincreds=4, 1

The „disabledomaincreds‟ registry value determines if passwords, credentials or


Microsoft .NET passports are saved after initial domain authentication. The setting „1‟
disallows the save.

Network access: Let Everyone permissions apply to anonymous users


machine\system\currentcontrolset\control\lsa\everyoneincludesanonymo
us=4, 0

The „everyoneincludesanonymous‟ value determines what additional permissions are


granted for anonymous connections to a computer. The setting „0‟ grants no
additional permissions to anonymous users; this ensures unauthenticated users do
not inherit the rights of the „everyone‟ group.

Network access: Named Pipes that can be accessed anonymously


machine\system\currentcontrolset\services\lanmanserver\parameters\nu
llsessionpipes=7,

The „nullsessionpipes‟ value defines anonymous access to named pipes. The empty
setting disallows anonymous access to named pipes; this ensures all system access
is authorized.

Network access: Remotely accessible registry paths


machine\system\currentcontrolset\control\securepipeservers\winreg\allo
wedexactpaths\machine=7,

The „allowedexactpaths\machine‟ registry value defines which registry paths can be


accessed over the network. As there is normally no requirement for remotely
accessible registry information, the setting field is empty.

Network access: Remotely accessible registry paths and Sub-paths


machine\system\currentcontrolset\control\securepipeservers\winreg\allo
wedpaths\machine=7,

The „allowedpaths\machine‟ registry value defines registry paths and sub-paths that
can be accessed over the network. This Baseline configuration has no requirement
for remotely accessible registry information.

Network access: Restrict anonymous access to Named Pipes and Shares


machine\system\currentcontrolset\services\lanmanserver\parameters\re
strictnullsessaccess=4,1

The „restrictnullsessaccess‟ registry value determines if anonymous access is allowed


to named pipes and shares. The setting „1‟ disallows anonymous access to named
pipes and shares. Access to resources is predicated on authorization for that
resource; if anonymous access is granted, there would be no ability to identify who is
accessing the objects.

Page 23
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Network access: Shares that can be accessed anonymously


machine\system\currentcontrolset\services\lanmanserver\parameters\nu
llsessionshares=7,

The „nullsessionshares‟ registry value defines which shares can be accessed


anonymously over the network. The empty setting disallows anonymous access to
any share; all system access should be authorized. Anonymous access prevents
accurate authorization of shares.

Network access: Sharing and security model for local accounts


machine\system\currentcontrolset\control\lsa\forceguest=4, 0

The „forceguest‟ registry value determines the sharing and security model for local
accounts. The setting „0‟ requires user authentication to access resources; this allows
individual access to be audited.

Network security: Do not store LAN Manager hash value on next


password change
machine\system\currentcontrolset\control\lsa\nolmhash=4, 1

The „nolmhash‟ registry value determines if the LAN Manager hash value is stored on
the next password change. The setting „1‟ does not save the LAN Manager hash
value; this prevents local storage of the password, which would be vulnerable to
attack.

NOTE: Upon enabling in operation, all passwords must be changed.

Network Security: Force logoff when logon hours expire


ForceLogoffWhenHourExpire = 1

The „ForceLogoffWhenHourExpire‟ keyword determines if locally logged on users are


disconnected when working outside of defined hours; the setting „1‟ disconnects the
user outside of defined hours. Hours are defined within the “Active Directory Users
and Computers”, the „Computer Management” and “Local Users and Groups”
interface.

Network security: LAN Manager authentication level


machine\system\currentcontrolset\control\lsa\lmcompatibilitylevel=4, 5

The „lmcompatibilitylevel‟ value determines the level of LAN manager authentication.


The setting „5‟ sends NTLMv2 responses only and refuses LM & NTLM; this setting
ensures only the most secure authentication mechanism is permitted.

Network security: LDAP client signing requirements


machine\system\currentcontrolset\services\ldap\ldapclientintegrity=4, 1

The „ldapclientintegrity‟ value determines if the LDAP client negotiates signing to


communicate with LDAP servers. The setting „2‟ requires signing negotiation; this
reduces the threat of a man-in-the-middle attacks.

Page 24
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Network security: Minimum session security for NTLM SSP based


(including secure RPC) clients
machine\system\currentcontrolset\control\lsa\msv1_0\ntlmminclientsec
=4, 537395248

The „ntlmminclientsec‟ value defines the minimum session security for NTLM SSP
based (including secure RPC) clients. The setting „537395248‟ enables all options as
recommended by Microsoft; this requires message integrity, confidentiality, NTLMv2
session security and 128-bit encryption be used for logon.

Network security: Minimum session security for NTLM SSP based


(including secure RPC) servers
machine\system\currentcontrolset\control\lsa\msv1_0\ntlmminserversec
=4, 537395248

The „ntlmminserversec‟ registry value defines the minimum session security for NTLM
SSP based (including secure RPC) servers. The setting „537395248‟ enables all
options, as recommended; this requires message integrity, confidentiality, NTLMv2
session security and 128-bit encryption be used for logon.

Recovery console: Allow automatic administrative logon


machine\software\microsoft\windowsnt\currentversion\setup\recoveryco
nsole\securitylevel=4,0

The „securitylevel‟ value determines if the recovery console requires an Administrator


password to logon. The setting „0‟ requires an Administrators password; enabling this
setting to allow anyone to shut down a server is not recommended.

Recovery console: Allow floppy copy and access to all drives and all
folders
machine\software\microsoft\windowsnt\currentversion\setup\recoveryco
nsole\setcommand=4,0

The „setcommand‟ registry value determines if the Recovery Console „SET‟ command
is available; the setting „4‟ disables the „SET‟ command. (e.g. Copy to removable
media is disabled).

Shutdown: Allow system to be shut down without having to log on


machine\software\microsoft\windows\currentversion\policies\system\sh
utdownwithoutlogon=4, 0

The „shutdownwithoutlogon‟ registry value determines if the system can be shutdown


without the user logged on. The setting „0‟ requires the user to logon; this ensures
only authorized users may shut down the system.

Page 25
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Shutdown: Clear virtual memory page file


machine\system\currentcontrolset\control\sessionmanager\memory\man
agement\clearpagefileatshutdown=4, 1

The „clearpagefileatshutdown‟ value determines if page file contents are overwritten


on a clean shutdown; sensitive system and user information may be contained in the
page file; by ensuring it is cleared, the risk that information be available to an
attacker is reduced. The setting „1‟ causes clears the page file on a normal shutdown.

System cryptography: Force strong key protection for user keys


stored on the computer
machine\software\policies\microsoft\cryptography\forcekeyprotection=4, 2

The „forcekeyprotection‟ value determines if user keys (e.g. SMIME) require a


password each time they are to be used. The setting „2‟ requires entry of a password
each time a private key is used; this ensures that a session that requires key
material is used with the owner‟s knowledge.

System cryptography: Use FIPS compliant algorithms for encryption,


hashing, and signing
machine\system\currentcontrolset\control\lsa\fipsalgorithmpolicy=4, 1

The „fipsalgorithmpolicy‟ determines if Transport Layer Security/Secure Socket Layer


(TLS/SSL) Security Provider supports only TLS_RSA_WITH_3DES_EDE_CBC
_SHA cipher suite. The setting „1‟ requires the use of the TLS_RSA_WITH_3DES
_EDE_CBC_SHA cipher suite. The Canadian Federal Government, requires this
setting for all servers to remain compliant to cryptographic policies.

System objects: Default owner for objects created by members of the


Administrators group
machine\system\currentcontrolset\control\lsa\nodefaultadminowner=4, 1

The „nodefaultadminowner‟ value determines if objects created by members of the


Administrators group are owned by the group or the object creator. The setting „1‟
makes objects owned by the creator; this ensures actions of an individual
administrator can be isolated and audited.

System objects: Require case insensitivity for non-Windows


subsystems
machine\system\currentcontrolset\control\sessionmanager\kernel\obcas
einsensitive=4, 1

The „obcaseinsensitive‟ value determines if case insensitivity is required for non-


Windows subsystems. The setting „1‟ requires case insensitivity for non-Windows
subsystems; this disables the ability for non-Windows sub-systems to create files
that are inaccessible to the Windows system and also disables the ability to block
access to other files with the same name in upper case.

Page 26
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

System objects: Strengthen default permissions of internal system


objects (e.g. Symbolic Links)
machine\system\currentcontrolset\control\sessionmanager\protectionmo
de=4, 1

The „protectionmode‟ registry setting determines if permissions on internal system


objects (e.g. symbolic links) is strengthened. The setting „1‟ strengthens protection
on internal system objects; it allows non-administrators to view shared objects they
did not create, but not modify.

System settings: Optional subsystems


machine\system\currentcontrolset\control\sessionmanager\subsystems\o
ptional=7,

The „optional‟ value defines which subsystems are used to support applications. The
empty setting disallows any optional subsystems. The use of sub-systems should be
justified with operational requirements; unless required, no subsystem should be
enabled.

Use Certificate Rules on Windows Executables for Software


Restriction Policies
machine\software\policies\microsoft\windows\safer\codeidentifiers\auth
enticodeenabled=4, 0

The „authenticodeenabled‟ value determines the use of certificate rules on Windows


executables for software restriction policies. The setting „0‟ does not use certificate
rules on Windows executables for software restriction policies.

3.7 Event Log Size


Microsoft guidance indicates that the total size of all event logs should not exceed
300MB. If this value is exceeded, the system may not log or record the failure.While
the interface may allow values up to 4GB, there is a risk of losing log entries for
values beyond 300 MB. The following policy will utilize full available space for
allocation between event logs.

Maximum application log size


MaximumLogSize = 76800 (in [Application Log] section)

The „MaximumLogSize‟ determines the size of the Application event log; the setting
„76800‟ creates a 76800 KB log file. With an average of 500 bytes per event, this log
file will accommodate over 153,000 events and will allow the system to run for an
extended period of time without having to roll the log file.

NOTE: Due to the wide variety of event loads, monitoring the log files during
the initial operational period is recommended.

Page 27
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Maximum security log size


MaximumLogSize = 153600 (in [Security Log] section)

The „MaximumLogSize‟ determines the size of the Security event log; the setting
„153600‟ creates a 153600 KB log file. With an average of 500 bytes per event, this
log file will accommodate over 307,200 events and allows the system to run for an
extended period-of-time without having to roll the log file.

NOTE: Due to the wide variety of event loads, monitoring the log files during the
initial operational period is recommended.

Maximum system log size


MaximumLogSize = 76800 (in [System Log] section

The „MaximumLogSize‟ determines the size of the System event log; the setting
„76800‟ creates a 76800 KB log file. With an average of 500 bytes per event, this log
file will accommodate over 153,000 events allowing the system to run for an
extended period-of-time without having to roll the log file.

3.8 Guest Access


Prevent local Guests group from accessing Applications, Security, and
System logs
RestrictGuestAccess = 1(in [Application Log] or [Security Log] or [System
Log] section)

The „RestrictGuestAccess‟ keyword determines if accounts with „guest‟ access can


access the log. Access to log information provides an attacker with valuable
information to mount attacks on the system or users; as a result, only users who are
authenticated should be given access to the log files. The setting „1‟ disallows guest
access to the log.
3.9 Retention Method
Retention method for application log
AuditLogRetentionPeriod = 2(in [Application Log] or [Security Log] or
[System Log] section)

The „AuditLogRetentionPeriod‟ keyword determines the system behaviour when the


log is full. The setting „2‟ shuts the system down if the log cannot be written.

NOTE: Use of this setting should be consistent with the organization‟s log retention
policy.

Page 28
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

3.10 System Services


Amplifying information regarding the service startup and ACL settings can be found
in Annexes 4.1 and 4.3, respectfully.

3.10.1 Services Explicitly Covered by Microsoft


Alerter
"alerter",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Alerter service notifies selected users and computers of administrative alerts.
This policy disables this service.

Application Layer Gateway Service


"alg",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSW
RPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;WD)"

The Application Layer Gateway Service is a subcomponent of the Internet Connection


Sharing (ICS) / Internet Connection Firewall (ICF) Service. This supports
independent software vendor plug-ins to allow proprietary protocols through the
firewall and work behind ICS. This policy disables the service.

Application Management
"appmgmt",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA
;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

Application Management provides software installation services. This policy disables


the service.

ASP .NET State Service


"aspnet_state",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(A
U;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The ASP .NET State Service provides support for out-of-process session states for
ASP .NET. This policy disables the service.

Automatic Updates
"wuauserv",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Automatic Updates Service enables the automated download and installation of
software updates. This policy disables the service.

Background Intelligent Transfer Service


"bits",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSW
RPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;WD)"

Page 29
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

The Background Intelligent Transfer Service is used to transfer files asynchronously


between a client and an HTTP server. This policy disables the service.

Certificate Services
"certsvc",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;C
CDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Certificate Services perform core functions for a Certification Authority. This
policy disables the service.

MS Software Shadow Copy Provider


"swprv",3,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The MS Software Shadow Copy Provider supports the creation of file shadow copies
used to perform system backups. This policy sets the startup to manual for the
service.

Client Service for Netware


"nwcworkstation",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A
;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLO
CRSDRCWDWO;;;WD)"

The Client Service for Netware provides access to files and printers on NetWare
networks. This policy disables the service.

ClipBook
"clipsrv",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Clipbook Service creates and shares „pages‟ of data that may be viewed by
remote users. This policy disables the service.

Cluster Service
"clussvc",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;C
CDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Cluster Service supports membership in a High Availability environment


(Cluster). The service is disabled.

COM+ Event System


"eventsystem",3,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The COM+ Event System Service extends the COM+ programming model. This policy
sets the service startup to automatic.

Page 30
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

COM+ System Application


"comsysapp",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;C
CDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The COM+ System Application Service manages the configuration and tracking of
components based on COM+. The service is disabled.

Domain Member
Baseline"browser",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A
;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;
FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

This policy sets service startup to automatic.

Workgroup Member Baseline


"browser",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

This policy disables service startup.


Cryptographic Services
"cryptsvc",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

Cryptographic Services provide key management functionality for the computer. This
policy sets the service to automatic startup.

Domain Member Baseline


"dhcp",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;WD)"

This policy sets the service to automatic startup.

Workgroup Member Baseline


"dhcp",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCL
CSWRPWPDTLOCRS
DRCWDWO;;;WD)"

This policy disables service startup.

DHCP Server
"dhcpserver",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;
FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The DHCP Server allocates IP addresses. The service is disabled.

Page 31
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Distributed File System


"dfs",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;WD)

The Distributed File System manages logical volumes across local or wide area
networks. The service is disabled.

Distributed Link Tracking Client


"trkwks",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The Distributed Link Tracking Client Service ensures shortcuts (among others) work
after the target has been moved. The service is disabled.

Distributed Link Tracking Server


"trksvr",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Distributed Link Tracking Server stores information so files moved between
volumes can be tracked. The service is disabled.

Distributed Transaction Coordinator


"msdtc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Distributed Transaction Coordinator Service manages transactions that involve


multiple computer systems or resource managers. The service is disabled.

Domain Member Server


"dnscache",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

This policy sets the service to automatic startup.

Workgroup Member Server


"dnscache",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

This policy disables service startup.


DNS Server
"dns",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The DNS Server responds to queries for DNS names. The service is disabled.

Page 32
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Error Reporting Service


"ersvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Error Reporting Service collects, stores, and reports unexpected application
closures to Microsoft. The service is disabled.

Event Log
"eventlog",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Event Log Service enables event log messages to be viewed. This policy sets the
service to automatic startup.

Fax Service
"fax",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Fax service provides Fax capabilities. The service is disabled.

File Replication
"ntfrs",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The File Replication Service automatically copies and maintains files on multiple
Servers. The service is disabled.

File Server for Macintosh


"macfile",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The Macintosh File Service provides network file access to Macintosh computers. The
service is disabled.

FTP Publishing Service


"msftpsvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The FTP Publishing Service provides connectivity and administration through the IIS
snap-in. The service is disabled.

Help and Support


"helpsvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Help and Support Service enables Help and Support Center to run. The service is
disabled.

Page 33
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

HTTP SSL
"httpfilter",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The HTTP SSL Service provides SSL functions to IIS. The service is disabled.

Human Interface Device Access


"hidserv",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Human Interface Device Access service allows use of pre-defined hotbuttons.
The service is disabled.

IAS Jet Database Access


"iasjet",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;WD)"

The IAS Jet Database Access service uses RADIUS to provide authentication,
authorization and accounting services. The service is disabled.

IIS Admin Service


"iisadmin",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The IIS Admin Service allows administration of IIS components. The service is
disabled.

IMAPI CD-Burning COM Service


"imapiservice",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The IMAPI CD-Burning Service manages CD burning. The service is disabled.

Indexing Service
"cisvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Indexing Service indexes file contents and properties. The service is disabled.

Infrared Monitor
"irmon",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

Infrared Monitor service enables file and image sharing through infrared devices. The
service is disabled.

Page 34
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Internet Authentication Service


"ias",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;WD)"

Internet Authentication Service manages network authentication, authorization and


accounting. The service is disabled.

Internet Connection Firewall (ICF)/Internet Connection Sharing (ICS)


"sharedaccess",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;C
CDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCR
SDRCWDWO;;;WD)"

The Internet Connection Firewall (ICF) / Internet Connection Sharing (ICS) service
provides Internet services for small local networks. The service is disabled.

Intersite Messaging
"ismserv",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Intersite Messaging Service is used for mail-based replication. The service is
disabled.

IP Version 6 Helper Service

"6to4",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The IP Version 6 Helper Service offers IPV6 connectivity over existing IPV4 network.
The service is disabled.

IPSEC Policy Agent (IPSec Service)


"policyagent",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRS
DRCWDWO;;;WD)"

The IPSEC Policy Agent (IPSec Service) provides encryption services to clients and
servers on networks. This policy sets the service to automatic startup.

Kerberos Key Distribution Centre


"kdc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSW
RPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;WD)"

The Kerberos Key Distribution Center Service allows user logon using Kerberos v5
authentication protocol. The service is disabled.

License Logging Service


"licenseservice",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOC
RSDRCWDWO;;;WD)"

The License Logging service records client access licensing information. The service
is disabled.

Page 35
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Logical Disk Manager


"dmserver",3,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Logical Disk Manager service detects all new hard drives and sends disk volume
information to the Logical Disk Manager Administration Service. This policy sets the
service to manual startup.

Logical Disk Manager Administrative Service


"dmadmin",3,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Logical Disk Manager Administration service performs requests for disk
management. Thispolicy sets the service to manual startup.

Message Queuing
"msmq",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Message Queuing Service is the infrastructure and development tool for creating
distributed messaging applications. The service is disabled.

Message Queuing Down Level Clients


"mqds",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Message Queuing Down Level Clients service provides Active Directory access to
Message Queuing Clients. The service is disabled.

Message Queuing Triggers


"mqtgsvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Message Queuing Trigger Service provides rule-based analysis of messages


arriving in the Message Queuing queue. The service is disabled.

Messenger
"messenger",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSD
RCWDWO;;;WD)"

The Messenger Service sends Alerter Service messages between clients and servers.
The service is disabled.

Page 36
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Microsoft POP3 Service


"pop3svc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Microsoft POP3 service provides e-mail transfer and retrieval services. The
service is disabled.

MSSQL$UDDI
"mssql$uddi",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRS
DRCWDWO;;;WD)"

The MSSQL$UDDI service publishes and locates information about web services. The
service is disabled.

MSSQLServerADHelper
"mssqlserver",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRS
DRCWDWO;;;WD)"

The SQL Server service provides SQL functionality for a server. The service is
disabled.

.NET Framework Support Service


"corrtsvc",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The .NET Framework Support Service notifies a subscribing client when a specified
process initializes the Client Runtime Service. The service is disabled.

Domain Member Server


"netlogon",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

This policy sets the service to automatic startup.

Workgroup Member Server


"netlogon",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

This policy disables service startup.

NetMeeting Remote Desktop Sharing


"mnmsrvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The NetMeeting Remote Desktop Sharing Service enables access to a system with
NetMeeting. The service is disabled.

Page 37
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Network Connections
"netman",3,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Network Communications Service manages objects in the Network Connections


folder. This policy sets the service to manual startup. This will start the service
automatically when the Network Connections interface is invoked.

Network DDE
"netdde",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The NetDDE Service provides network transport and security for DDE. The service is
disabled.

Network DDE DSDM


"netddedsdm",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRS
DRCWDWO;;;WD)"

The NetDDEDSDM Service manages DDE network shares. The service is disabled.

Network Location Awareness (NLA)


"nla",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSW
RPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;WD)"

The Network Location Awareness service collects and stores network information.
The service is disabled.

Network News Transport Protocol (NNTP)


"nntpsvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Network News Transport Protocol (NNTP) service provides News Server
capabilities. The service is disabled.

NTLM Security Support Provider


"ntlmssp",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The NTLM Security Support Provider service provides security to RPC programs. This
enables users to log on using NTLM authentication in place of Kerberos. The service
is disabled.

Page 38
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Performance Logs and Alerts


"sysmonlog",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSD
RCWDWO;;;WD)"

The Performance Logs and Alerts Service collect performance data. The service is
disabled.

Plug and Play


"plugplay",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Plug and Play service allows a computer to adapt hardware configuration
changes with little user input. The service is disabled.

Portable Media Serial Number


"wmdmpmsn",4,D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSD
RCWDWO;;;WD)"

The Portable Media Serial Number service retrieves serial numbers from any portable
music player connected to the system. The service is disabled.

Print Server for Macintosh


"macprint",4,D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Macintosh Print service provides network printer access to Macintosh computers.
The service is disabled.

Print Spooler
"spooler",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The Spooler service manages local and network print queues and controls all print
jobs. The service is disabled.

Protected Storage
"protectedstorage",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(
A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTL
OCRSDRCWDWO;;;WD)"
The Protected Storage service protects storage of sensitive information from
unauthorized services, processes or users. This policy sets the service to automatic
startup.

Page 39
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Remote Access Auto Connection Manager


"rasauto",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Remote Access Auto Connection Manager service detects unsuccessful attempts
to a remote network or computer. It then provides an alternative method for
connection. The service is disabled.

Remote Access Connection Manager


"rasman",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The Remote Access Connection Manager service manages dial-up and VPN
connections to a server. The service is disabled.

Remote Administration Service


"srvcsurg",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Remote Administration service provides an interface for Remote Server


Administration Tools. The service is disabled.

Remote Desktop Help Session Manager


"rdsessmgr",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCD
CLCSWRPWPDTLORSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Remote Desktop Help Session Manager service controls the Remote Assistance
feature in the Help and Support Center application. The service is disabled.

Remote Installation
"binlsvc",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;C
CDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Remote Installation Service is a Windows deployment feature. The service is


disabled.

Remote Procedure Call (RPC)


"rpcss",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Remote Procedure Call (RPC) service is a secure inter-process communication


mechanism. This policy sets the service to automatic startup.

Page 40
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Remote Procedure Call (RPC) Locator


"rpclocator",\4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRS
DRCWDWO;;;WD)"

The RPC Locator Service enables RPC clients to locate RPC servers. The service is
disabled.

Remote Registry Service


"remoteregistry",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOC
RSDRCWDWO;;;WD)"

The Remote Registry service enables remote users to modify registry settings on the
system. The service is disabled.

Remote Server Manager


"appmgr",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCD
CLCSWRPWPDTLOCRDRCWDWO;;;WD)"

The Remote Server Manager service acts as a Windows Management


Instrumentation (WMI) instance provider for Remote Administration Alert Objects. It
also acts as a WMI method provider for Remote Administration Tasks. The service is
disabled.

Remote Server Monitor


"appmon",4,"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Remote Service Monitor service provides monitoring capability of resources on


remotely managed systems. The service is disabled.

Remote Storage Notification


"remote_storage_user_link",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;BA)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;WD)"

The Remote Storage Notification service notifies a user when accessing data on
secondary storage units. The service is disabled.

Remote Storage Server


"remote_storage_server",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;
;;BA)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRP
WPDTLOCRSDRCWDWO;;;WD)"

The Remote Storage Server stores infrequently used files in secondary storage. The
service is disabled.

Page 41
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Removable Storage
"ntmssvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Removable Storage service maintains a catalogue of information for removable


media used by the system. The service is disabled.

Resultant Set of Policy Provider


"rsopprov",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Resultant Set of Policy Provider service enables simulation of policy to determine
the effects. The service is disabled.

Routing and Remote Access


"remoteaccess",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;C
CDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCR
SDRCWDWO;;;WD)"

The Routing and Remote Access service provides multi-protocol LAN-to-LAN, LAN-to-
WAN, and NAT routing services. The service is disabled.

SAP Agent
"nwsapagent",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRS
DRCWDWO;;;WD)"

The SAP Agent service advertises services on an IPX network. The service is
disabled.

Secondary Logon Service


"seclogon",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Secondary Logon service allows users to create processes in different security
contexts. The service is disabled.

Security Accounts Manager


"samss",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Security Accounts Manager service manages user and group account
information. This policy sets the service to automatic startup.

Page 42
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Server
"lanmanserver",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;C
CDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCR
SDRCWDWO;;;WD)"

The Server service provides RPC, file, print, and Named pipe support over the
network. This policy disables service startup.

Shell Hardware Detection


"shellhwdetection",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(
A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTL
OCRSDRCWDWO;;;WD)"

The Shell Hardware Detection service monitors and provides notification for AutoPlay
hardware events. The service is disabled.

Simple Mail Transport Protocol (SMTP)


"smtpsvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Simple Mail transfer Protocol (SMTP) service transports electronic mail across
the network. The service is disabled.

Simple TCP/IP Services


"simptcp",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

Simple TCP/IP Services provide a variety of protocols. The service is disabled. The
services configured are as follows:

Echo Port 7
Discard Port 9
Character Generator Port 19
Daytime Port 13
Quote of the day Port 17

Single Instance Storage Groveler


"groveler",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Single Instance Storage Groveler service supports Remote Installation service.
The service is disabled.

Smart Card
"scardsvr",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Smart Card service manages access to smart card readers. The service is
disabled.

Page 43
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

SNMP Service
"snmp",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLORSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;WD)"

The Simple Network Management Protocol (SNMP) service allows incoming SNMP
requests to be processed by the system. The service is disabled.

SNMP Trap Service


"snmptrap",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLORSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The SNMP Trap service receives trap messages generated by SNMP agents. The
service is disabled.

Special Administration Console Helper


"sacsvr",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The Special Administration Console Helper service performs remote management


tasks. The service is disabled.

SQLAgent$* (*UDDI or WebDB)


"sqlagent$webdb",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A
;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLO
CRSDRCWDWO;;;WD)"

The SQLAgent$webdb service monitors, and schedules jobs. The service is disabled.

System Event Notification


"sens",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The System Event Notification service provides monitoring and tracking services for
system events. This policy sets the service to automatic startup.

Task Scheduler
"schedule",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Task Scheduler service enables configuration and schedules of automated tasks
on the system. The service is disabled.

Page 44
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Domain Member Server

"lmhosts",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

This policy sets the service to automatic startup.

Workgroup Member server


"lmhosts",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

This policy disables service startup.

TCP/IP Print Server


"lpdsvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The TCP/IP Print Server service enables TCP/IP based printing. The service is
disabled.

Telephony
"tapisrv",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The Telephony service provides support for programs that control telephony and IP-
based voice devices. The service is disabled.

Telnet
"tlntsvr",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The Telnet service provides ASCII terminal sessions to telnet clients. The service is
disabled.

Terminal Services
"termservice",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRS
DRCWDWO;;;WD)"

Terminal Services allows users to access a virtual Windows desktop session. The
service is disabled.

Page 45
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Terminal Services Licensing


"termservlicensing",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(
A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTL
OCRSDRCWDWO;;;WD)"

The Terminal Services Licensing service provides registered client licenses when
connecting to a Terminal Server. The service is disabled.

Terminal Services Session Directory


"tssdis",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Terminal Services Session Directory service provides a multi-session


environment that allows access a virtual Windows desktop. The service is disabled.

Themes
"themes",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

The Themes service provides theme management services. The service is disabled.

Trivial FTP Daemon


"tftpd",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Trivial FTP Daemon is a File Transfer Protocol that does not require
authentication. The service is disabled.

Uninterruptible Power Supply


"ups",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSW
RPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;WD)"

The Uninterruptible Power Supply service manages an uninterruptible power supply.


The service is disabled.

Upload Manager
"uploadmgr",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSD
RCWDWO;;;WD)"

The Upload Manager service manages file transfers between clients and servers.
Driver data is anonymously uploaded from a customer computer to Microsoft. The
service is disabled.

Page 46
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Virtual Disk Service


"vds",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSW
RPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;WD)"

The Virtual Disk service provides a single interface for managing block storage
visualization. The service is disabled.

Volume Shadow Copy


"vss",3,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSW
RPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;WD)"

The Volume Shadow Copy service manages and implements volume shadow copies
used for backups. This policy sets the service to manual startup.

WebClient
"webclient",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Webclient service allows Win32 applications to access documents on the


Internet. The service is disabled.

Web Element Manager


"elementmgr",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CC
DCLCSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Web Element Manager service provides Web user interface elements for the
Administration Web site at port 8098. The service is disabled.

Windows Audio
"audiosrv",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Windows Audio service provides support for sound. The service is disabled.

Windows Image Acquisition (WIA)


"stisvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLORSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;WD)"

The Windows Image Acquisition (WIA) service supports scanners and cameras. The
service is disabled.

Domain Member Server


"msiserver",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

This policy sets the service to automatic startup.

Page 47
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Workgroup Member Server


"msiserver",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLORSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

This policy disables service startup.

Windows Internet Name Service (WINS)


"wins",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Windows Internet Name Service (WINS) enables NetBIOS name resolution. The
service is disabled.

Windows Management Instrumentation


"winmgmt",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Windows Management Instrumentation service provides a common interface to


access management information. This policy sets the service to automatic startup.

Windows Management Instrumentation Driver Extensions


"wmi",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSW
RPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWD
WO;;;WD)"

The Windows Management Instrumentation Driver Extensions service monitors all


drivers and event trace providers that publish WMI or event trace information. The
service is disabled.

Windows Media Services


"wmserver",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

Windows Media Services provide streaming media service over IP-based networks.
The service is disabled.

Windows System Resource Manager


"windowssystemresourcemanager",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSD
RCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCD
CLCSWRPWPDTLOCRSDRCWDWO;;;WD)"

The Windows System Resource Manager service is a tool to help customers deploy
applications. The service is disabled.

Page 48
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Windows Time
"w32time",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The Windows Time service maintains date and time synchronization. This policy sets
the service to automatic startup.

WinHTTP Web Proxy Auto-Discovery Service


"winhttpautoproxysvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;B
A)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWP
DTLOCRSDRCWDWO;;;WD)"

The WinHTTP Web Proxy Auto – Discovery service implements Web Proxy Auto-
discovery (WPAD) Protocol. The WPAD protocol is an HTTP client service that locates
proxy servers. The service is disabled.

Wireless Configuration
"wzcsvc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLORSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The Wireless Configuration service enables automatic configuration of IEEE 802.11


wireless adapters. The service is disabled.

WMI Performance Adapter


"wmiapsrv",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDC
LCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The WMI Performance Adapter service provides performance library information. The
service is disabled.

Domain Member Server


"lanmanworkstation",2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA
)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPD
TLOCRSDRCWDWO;;;WD)"

This policy sets the service to automatic startup.

Workgroup Member Server


"lanmanworkstation",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA
)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPD
TLOCRSDRCWDWO;;;WD)"

This policy disables service startup.

Page 49
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

World Wide Web Publishing Service


"w3svc",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The World Wide Web Publishing service provides Web connectivity and administration
through the IIS snap-in. The service is disabled.

3.10.2 Services Not Explicitly Covered by Microsoft


"fastuserswitchingcompatibility",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;WD)"

The “fastuserswitchingcompatibility” is not a core requirement for a Windows 2003


server. The service is disabled.

"mssql$webdb",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;C
CDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCR
SDRCWDWO;;;WD)"

The MSSQL$webdb service is used to publish and locate information about web
services. The service is disabled.

"mssqlserveradhelper",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;B
A)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWP
DTLOCRSDRCWDWO;;;WD)"

The MSSQLServerADHelper service enables SQL server and SQL Server Analysis
Services to publish information in Active Directory. The service is disabled.

"saldm",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The “saldm” is not a core requirement for a Windows 2003 server. The service is
disabled.

"sptimer",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCL
CSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR
CWDWO;;;WD)"

The “sptimer” is not a core requirement for a Windows 2003 server. The service is
disabled.

"sqlserveragent",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;
CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOC
RSDRCWDWO;;;WD)"

The “sqlserveragent” is not a core requirement for a Windows 2003 server. The
service is disabled.

Page 50
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

"winsip",4,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"

This is not a core requirement for a High Security server. The service is disabled.

3.11 TCP/IP Stack Hardening


EnableICMPRedirect
machine\system\currentcontrolset\services\tcpip\parameters\enableicmp
redirect=4, 0

The „enableicmpredirect‟ registry value causes TCP to find host routes which
overrides OSPF generated routes; if enabled, a ten-minute timeout makes the
system unavailable to the network. Disabling causes the system to rely on OSPF
routing; the setting „0‟ disables this capability.

SynAttackProtect
machine\system\currentcontrolset\services\tcpip\parameters\synattackp
rotect=4, 1

The „synattackprotect‟ registry value adjusts retransmissions of SYN-ACK. The


setting „1‟ causes connection timeouts faster when a SYN-ATTACK is detected; this
setting reduces effort expended on unresponsive connections.

EnableDeadGWDetect
machine\system\currentcontrolset\services\tcpip\parameters\enabledead
gwdetect=4, 0

The „enabledeadgwdetect‟ value allows TCP re-direction to a backup gateway; if a


system detects difficulties on a network, it will automatically switch to a different
gateway which in turn may cause undesirable packet traversal over un-trusted
networks. The setting „0‟ disables this capability.

EnablePMTUDiscovery
machine\system\currentcontrolset\services\tcpip\parameters\enablepmt
udiscovery=4, 0

The „enablepmtudiscovery‟ registry value determines if TCP automatically finds the


maximum transmission unit (MTU) or the largest packet size to a remote host; if
enabled, an attacker could force a very small packet size and invoke a DoS condition.
The setting „0‟ causes a fixed size packet be used for all connections to remote hosts.

KeepAliveTime
machine\system\currentcontrolset\services\tcpip\parameters\keepaliveti
me=4, 300000

The „keepalivetime‟ registry value determines how often TCP verifies an idle
connection is intact. The setting „300,000‟ (5 minutes) is short enough to provide
some defense against DoS conditions and provides the ability to recover resources
from unresponsive connections.

Page 51
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

DisableIPSourceRouting
machine\system\currentcontrolset\services\tcpip\parameters\disableipso
urcerouting=4, 2

The „disableipsourcerouting‟ value determines if the sender of a TCP packet can


dictate the route; dictating packet routes can obscure an attacker‟s location on the
network. The setting „2‟ disables this ability.

TcpMaxConnectResponseRetransmissions
machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxcon
nectresponseretransmi
ssions=4, 2

The „tcpmaxconnectresponseretransmissions‟ value determines the number of


attempts that TCP re-transmits a SYN packet before aborting. The setting „2‟ limits
the possibility of a DoS attack without affecting normal users and reduces the effort
expended on unresponsive connections.

TcpMaxDataRetransmissions
machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxdata
retransmissions=4, 3

The „tcpmaxdataretransmissions‟ defines the number of times unacknowledged data


is retransmitted before disconnection. The setting „3‟ reduces the success of a DoS
attack and reduces the effort expended on unresponsive connections.

PerformRouterDiscovery
machine\system\currentcontrolset\services\tcpip\parameters\performrou
terdiscovery=4, 0

The „performrouterdiscovery‟ value controls the use of Internet Router Discovery


Protocol; if the system were to discover routers, an attacker could redirect packets to
another destination. The setting „0‟ disables discovery and forces the use of known
routers.

TCPMaxPortsExhausted
machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxport
sexhausted=4, 5

The „tcpmaxportsexhausted‟ value controls the point which SYN-ATTACK protection


begins. The setting „5‟ causes protection to start after five failures; this is the
Microsoft standard for TCP/IP. The setting is a balance between performance and
security.

TCPMaxHalfOpen
machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxhalf
open=4, 100

The „tcpmaxhalfopen‟ value defines the number of connections in the SYN state table
before SYN attack protection begins. The setting of „100‟ initiates SYN attack
protection when the state table reaches one hundred connections.

Page 52
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

TCPMaxHalfOpenRetired
machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxhalf
openretired=4, 80

The „tcpmaxhalfopenretired‟ value determines how many connections the server can
maintain in the half-open state; the setting „80‟ initiates SYN attack protection when
the state table reaches eighty connections.

NoNameReleaseOnDemand (TCP/IP)
machine\system\currentcontrolset\services\tcpip\parameters\nonamerel
easeondemand=4, 1

The „nonamereleaseondemand‟ registry determines if a system will release its


NetBIOS name to another computer on request; the setting „1‟ prevents disclosure of
NetBIOS information.

3.12 AFD.SYS
DynamicBacklogGrowthDelta
machine\system\currentcontrolset\services\afd\parameters\dynamicback
loggrowthdelta=4, 10

The „dynamicbackloggrowthdelta‟ value defines the number of free connections to


create when deemed necessary. The setting „10‟ creates ten additional free
connections. This setting ensures additional resources are not applied too, thereby
preventing the invocation of a DoS condition.
EnableDynamicBacklog
machine\system\currentcontrolset\services\afd\parameters\enabledynam
icbacklog=4, 1

The „enabledynamicbacklog‟ value enables dynamic backlog. The setting „1‟ enables
the backlog; this ensures the system manages port resources in a manner that
mitigates DoS attacks.

MinimumDynamicBacklog
machine\system\currentcontrolset\services\afd\parameters\minimumdyn
amicbacklog=4, 20

The „minimumdynamicbacklog‟ value controls the minimum number of free ports on


a listening end point. The setting „20‟ allows a system to create more if there is less
than twenty available; it is intended to ensure resources are available and limit the
threat of DoS conditions.

MaximumDynamicBacklog
machine\system\currentcontrolset\services\afd\parameters\maximumdyn
amicbacklog=4,20000

The „maximumdynamicbacklog‟ value controls the number of „quasi-free‟ connections


allowed on a listening end point. The setting „20,000‟ is recommended to stymie
DoS attacks. This setting reduces the resources allocated to incomplete connections;
if creating additional free ports exceeds the value, a system will not be able to
maintain additional sessions.

Page 53
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

3.13 Other Settings


NoNameReleaseOnDemand (NetBIOS)
machine\system\currentcontrolset\services\netbt\parameters\nonamerel
easeondemand=4, 1

The „nonamereleaseondemand‟ value determines if a system releases its NetBIOS


name upon a name-release request. The setting „1‟ prevents a system from releasing
the NetBIOS name, other than to WINS servers; this reduces information it provides
to an unauthorized user.

Enable the computer to stop generating 8.3 style filenames


machine\system\currentcontrolset\control\filesystem\ntfsdisable8dot3na
mecreation=4, 1

The „ntfsdisable8dot3namecreation‟ value determines if a system will generate 8.3


file names. The setting „1‟ prevents the 8.3 filename format. Generation of 8.3 file
makes the task of name guessing easier for an attacker; disabling this ensures only
the full name is used to reference files.

NoDriveTypeAutoRun
machine\software\microsoft\windows\currentversion\policies\explorer\n
odrivetypeautorun=4,255

The „nodrivetypeautorun‟ value determines if autorun is enabled on connected drives.


The setting „255‟ disables autorun for all drives on the system; this ensures
privileged users do not run unapproved software for without restrictions, unapproved
software may run inadvertently.

The time in seconds before the screen saver grace period expires (0
recommended)
machine\system\software\microsoft\windowsnt\currentversion\winlogon
\screensavergraceperiod=4, 0

The „screensavergraceperiod‟ value determines the amount of time (in seconds) to


enforce the screen saver password; the setting „0‟ enforces password lock with no
time delay which provides an immediate lock when the idle threshold is reached.

Warning Level
machine\system\currentcontrolset\services\eventlog\security\warninglev
el=4, 90

The „warninglevel‟ value determines the maximum amount of security logs before a
warning event is triggered. The setting „90‟ triggers a warning when the Security log
reaches 90% capacity; this will afford sufficient time to reset the log and determine
reasons for the warning.

Page 54
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Enable Safe DLL search mode (recommended)


machine\system\currentcontrolset\control\sessionmanager\safedllsearch
mode=4, 1

The „safedllsearchmode‟ value determines the order DLLs are searched. The setting
„1‟ commands the system to first look in the PATH, then the current folder; this order
ensures files in the current foder do not run in place of files in the users PATH.

Disable Autorun on CD-ROM


machine\system\currentcontrolset\control\services\CDRom\AutoRun=4, 1

The „Disable Autorun on CD-Rom‟ prevents automatic execution of programs upon


insertion of a CD. The setting „1‟disables the Autorun feature; this helps reduce the
threat of malicious code infection through CD-Rom.

Disable Administrative Shares


machine\system\currentcontrolset\control\services\LanmanServer\Param
eters\AutoShareServer=4, 0

The „AutoShareServer‟ value determines if disk drives have administrative shares.


The setting „0‟ disables administrative shares.

Disable DCOM
machine\Software\Microsoft\OLE\EnableDCOM=4, 0

The „EnableDCOM‟ value determines if DCOM is active. The setting „0‟disables DCOM.

Page 55
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4 ANNEXES
4.1 General Security Setting Values
Windows security templates utilize various general setting values; all of these will be
expounded upon below.
4.1.1 Binary Setting Values
Binary settings are used to indicate whether an object is enabled/installed or
disabled/not installed.

Binary Settings

BINARY VALUE DEFINITION

0 disabled/not installed
1 enabled/installed

EnableAdminAccount = 1
1 = The administrator account is enabled.

4.1.2 Windows Services Boot Values


Windows services bootup values determine whether a service is enabled, disabled or
able to activated manually at system start up.
Windows Services Boot Settings

NUMERICAL VALUE DEFINITION

2 automatic startup
3 manual startup
4 disabled

netlogon,2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLC
SWRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRC
WDWO;;;WD)"
2 = The netlogon service starts automatically at system bootup.

Page 56
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.1.3 Common User Rights Security Identifier Settings


Security Identifiers (SIDs) are unique values of variable length that are used to
identify a security principal or security group in Windows operating systems; their
values remain constant across all operating systems.
User Rights Security Identifier Settings

SETTING DEFINITION

*S-1-5-32-544 administrator
*S-1-5-6 service
*S-1-5-32-551 backup operators
*S-1-5-32-545 users
*S-1-5-20 network service
*S-1-5-11 authenticated users.

sesystemtimeprivilege = *S-1-5-32-544
*S-1-5-32-544 = Only the system administrator can change the system time.

4.1.4 Audit Log Retention Period Settings


The audit log retention period settings determine the period of time that audit log
records will be retained before they are overwritten.

Retention Period Settings


NUMERICAL VALUE DEFINITION

0 overwrite events as needed


1 overwrite events as specified by
retention days entry
2 never overwrite events (clear log
manually)

AuditLogRetentionPeriod = 2
2 = The log’s events are never overwritten and must be cleared manually.

Page 57
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.1.5 Registry Value Settings


Registry settings in Windows security templates typically consist of two values. The
first value is numerical and represents a standard registry value type; the second
value will contain the security setting value.

Registry Value Settings

SETTING DEFINITION Value

1 reg_sz sequence of characters representing human readable


text
2 reg_expand_sz expandable data test string containing a variable to be
replaced when called by an application
3 reg_binary binary value as described in 10.1.1.
4 reg_dword a number four bytes long; can be displayed as a
binary, hexadecimal or decimal value
7 reg_multi_sz multiple values of human readable text

MACHINE\Software\Microsoft\Driver Signing\Policy=3,1
3 = reg_binary
1= driver signing enabled

Page 58
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.2 Windows Security Identifiers (SIDs)


SID: S-1-0
Name: Null Authority
Description: An identifier authority.

SID: S-1-0-0
Name: Nobody
Description: No security principal.

SID: S-1-1
Name: World Authority
Description: An identifier authority.

SID: S-1-1-0
Name: Everyone
Description: A group that includes all users, even anonymous users and
guests. Membership is controlled by the operating system.

SID: S-1-2
Name: Local Authority
Description: An identifier authority.

SID: S-1-3
Name: Creator Authority
Description: An identifier authority.

SID: S-1-3-0
Name: Creator Owner
Description: A placeholder in an inheritable access control entry (ACE).
When the ACE is inherited, the system replaces this SID with the SID for
the object's creator.

SID: S-1-3-1
Name: Creator Group
Description: A placeholder in an inheritable ACE. When the ACE is inherited,
the system replaces this SID with the SID for the primary group of the
object's creator. The primary group is used only by the POSIX subsystem.

SID: S-1-3-2
Name: Creator Owner Server
Description: This SID is not used in Windows 2000.

SID: S-1-3-3
Name: Creator Group Server
Description: This SID is not used in Windows 2000.

SID: S-1-4
Name: Non-unique Authority
Description: An identifier authority.

Page 59
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

SID: S-1-5
Name: NT Authority
Description: An identifier authority.

SID: S-1-5-1
Name: Dialup
Description: A group that includes all users who have logged on through a
dial-up connection. Membership is controlled by the operating system.

SID: S-1-5-2
Name: Network
Description: A group that includes all users that have logged on through a
network connection. Membership is controlled by the operating system.

SID: S-1-5-3
Name: Batch
Description: A group that includes all users that have logged on through a
batch queue facility. Membership is controlled by the operating system.

SID: S-1-5-4
Name: Interactive
Description: A group that includes all users that have logged on
interactively. Membership is controlled by the operating system.

SID: S-1-5-5-X-Y
Name: Logon Session
Description: A logon session. The X and Y values for these SIDs are
different for each session.

SID: S-1-5-6
Name: Service
Description: A group that includes all security principals that have logged on
as a service. Membership is controlled by the operating system.

SID: S-1-5-7
Name: Anonymous
Description: A group that includes all users that have logged on
anonymously. Membership is controlled by the operating system.

SID: S-1-5-8
Name: Proxy
Description: This SID is not used in Windows 2000.

SID: S-1-5-9
Name: Enterprise Domain Controllers
Description: A group that includes all domain controllers in a forest that
uses an Active Directory directory service. Membership is controlled by the
operating system.

Page 60
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

SID: S-1-5-10
Name: Principal Self
Description: A placeholder in an inheritable ACE on an account object or
group object in Active Directory. When the ACE is inherited, the system
replaces this SID with the SID for the security principal who holds the
account.

SID: S-1-5-11
Name: Authenticated Users
Description: A group that includes all users whose identities were
authenticated when they logged on. Membership is controlled by the
operating system.

SID: S-1-5-12
Name: Restricted Code
Description: This SID is reserved for future use.

SID: S-1-5-13
Name: Terminal Server Users
Description: A group that includes all users that have logged on to a
Terminal Services server. Membership is controlled by the operating
system.

SID: S-1-5-18
Name: Local System
Description: A service account that is used by the operating system.

SID: S-1-5-19
Name: NT Authority
Description: Local Service

SID: S-1-5-20
Name: NT Authority
Description: Network Service

SID: S-1-5-domain-500
Name: Administrator
Description: A user account for the system administrator. By default, it is
the only user account that is given full control over the system.

SID: S-1-5-domain-501
Name: Guest
Description: A user account for people who do not have individual accounts.
This user account does not require a password. By default, the Guest
account is disabled.

SID: S-1-5-domain-502
Name: KRBTGT
Description: A service account that is used by the Key Distribution Center
(KDC) service.

Page 61
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

SID: S-1-5-domain-512
Name: Domain Admins
Description: A global group whose members are authorized to administer
the domain. By default, the Domain Admins group is a member of the
Administrators group on all computers that have joined a domain, including
the domain controllers. Domain Admins is the default owner of any object
that is created by any member of the group.

SID: S-1-5-domain-513
Name: Domain Users
Description: A global group that, by default, includes all user accounts in a
domain. When you create a user account in a domain, it is added to this
group by default.

SID: S-1-5-domain-514
Name: Domain Guests
Description: A global group that, by default, has only one member, the
domain's built-in Guest account.

SID: S-1-5-domain-515
Name: Domain Computers
Description: A global group that includes all clients and servers that have
joined the domain.

SID: S-1-5-domain-516
Name: Domain Controllers
Description: A global group that includes all domain controllers in the
domain. New domain controllers are added to this group by default.

SID: S-1-5-domain-517
Name: Cert Publishers
Description: A global group that includes all computers that are running an
enterprise certification authority. Cert Publishers are authorized to publish
certificates for User objects in Active Directory.

SID: S-1-5-root domain-518


Name: Schema Admins
Description: A universal group in a native-mode domain; a global group in a
mixed-mode domain. The group is authorized to make schema changes in
Active Directory. By default, the only member of the group is the
Administrator account for the forest root domain.

SID: S-1-5-root domain-519


Name: Enterprise Admins
Description: A universal group in a native-mode domain; a global group in a
mixed-mode domain. The group is authorized to make forest-wide changes
in Active Directory, such as adding child domains. By default, the only
member of the group is the Administrator account for the forest root
domain.

Page 62
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

SID: S-1-5-domain-520
Name: Group Policy Creator Owners
Description: A global group that is authorized to create new Group Policy
objects in Active Directory. By default, the only member of the group is
Administrator.

SID: S-1-5-domain-533
Name: RAS and IAS Servers
Description: A domain local group. By default, this group has no members.
Servers in this group have Read Account Restrictions and Read Logon
Information access to User objects in the Active Directory domain local
group. By default, this group has no members. Servers in this group have
Read Account Restrictions and Read Logon Information access to User
objects in Active Directory.

SID: S-1-5-32-544
Name: Administrators
Description: A built-in group. After the initial installation of the operating
system, the only member of the group is the Administrator account. When a
computer joins a domain, the Domain Admins group is added to the
Administrators group. When a server becomes a domain controller, the
Enterprise Admins group also is added to the Administrators group.

SID: S-1-5-32-545
Name: Users
Description: A built-in group. After the initial installation of the operating
system, the only member is the Authenticated Users group. When a
computer joins a domain, the Domain Users group is added to the Users
group on the computer.

SID: S-1-5-32-546
Name: Guests
Description: A built-in group. By default, the only member is the Guest
account. The Guests group allows occasional or one-time users to log on
with limited privileges to a computer's built-in Guest account.

SID: S-1-5-32-547
Name: Power Users
Description: A built-in group. By default, the group has no members. Power
users can create local users and groups; modify and delete accounts that
they have created; and remove users from the Power Users, Users, and
Guests groups. Power users also can install programs; create, manage, and
delete local printers; and create and delete file shares.

Page 63
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

SID: S-1-5-32-548
Name: Account Operators
Description: A built-in group that exists only on domain controllers. By
default, the group has no members. By default, Account Operators have
permission to create, modify, and delete accounts for users, groups, and
computers in all containers and organizational units of Active Directory
except the Builtin container and the Domain Controllers OU. Account
Operators do not have permission to modify the Administrators and Domain
Admins groups, nor do they have permission to modify the accounts for
members of those groups.

SID: S-1-5-32-549
Name: Server Operators
Description: A built-in group that exists only on domain controllers. By
default, the group has no members. Server Operators can log on to a server
interactively; create and delete network shares; start and stop services;
back up and restore files; format the hard disk of the computer; and shut
down the computer.

SID: S-1-5-32-550
Name: Print Operators
Description: A built-in group that exists only on domain controllers. By
default, the only member is the Domain Users group. Print Operators can
manage printers and document queues.

SID: S-1-5-32-551
Name: Backup Operators
Description: A built-in group. By default, the group has no members.
Backup Operators can back up and restore all files on a computer,
regardless of the permissions that protect those files. Backup Operators also
can log on to the computer and shut it down.

SID: S-1-5-32-552
Name: Replicators
Description: A built-in group that is used by the File Replication service on
domain controllers. By default, the group has no members. Do not add
users to this group.

The following groups will show as SIDs until a Windows Server 2003 domain
controller is made the primary domain controller (PDC) operations master role
holder. (The "operations master" is also known as flexible single master
operations or FSMO.) Additional new built-in groups that are created when a
Windows Server 2003 domain controller is added to the domain are:

SID: S-1-5-32-554
Name: BUILTIN\Pre-Windows 2000 Compatible Access
Description: An alias added by Windows 2000. A backward compatibility group
which allows read access on all users and groups in the domain.

Page 64
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

SID: S-1-5-32-555
Name: BUILTIN\Remote Desktop Users
Description: An alias. Members in this group are granted the right to logon
remotely.

SID: S-1-5-32-556
Name: BUILTIN\Network Configuration Operators
Description: An alias. Members in this group can have some administrative
privileges to manage configuration of networking features.

SID: S-1-5-32-557
Name: BUILTIN\Incoming Forest Trust Builders
Description: An alias. Members of this group can create incoming, one-way trusts
to this forest.

SID: S-1-5-32-557
Name: BUILTIN\Incoming Forest Trust Builders
Description: An alias. Members of this group can create incoming, one-way trusts
to this forest.

SID: S-1-5-32-558
Name: BUILTIN\Performance Monitor Users
Description: An alias. Members of this group have remote access to monitor this
computer.

SID: S-1-5-32-559
Name: BUILTIN\Performance Log Users
Description: An alias. Members of this group have remote access to schedule
logging of performance counters on this computer.

SID: S-1-5-32-560
Name: BUILTIN\Windows Authorization Access Group
Description: An alias. Members of this group have access to the computed
tokenGroupsGlobalAndUniversal attribute on User objects.

SID: S-1-5-32-561
Name: BUILTIN\Terminal Server License Servers
Description: An alias. A group for Terminal Server License Servers. When
Windows Server 2003 Service Pack 1 is installed, a new local group is created.

SID: S-1-5-32-562
Name: BUILTIN\Distributed COM Users
Description: An alias. A group for COM to provide computerwide access controls
that govern access to all call, activation, or launch requests on the computer.

Page 65
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.3 Common Access Control List (ACL) Settings


4.3.1 Security Descriptor Definition Language (SDDL)3
SDDL defines the string format that describe a security descriptor4 as a text string;
in the context of security template settings, SDDL is utilized in nTSecurityDescriptor5
attributes, registry keys and NTFS files to define the ACL.

4.3.2 Discretionary Access Control List (DACL)


The DACL identifies the trustees that are allowed or denied access to a securable
object; when a process tries to access a securable object, the system checks the
ACEs in the object's DACL to determine whether to grant access to it.

Should the object not have a DACL, the system grants full access to everyone; if the
object's DACL has no ACEs, the system denies all attempts to access the object
because the DACL does not allow any access rights.

The system checks the ACEs in sequence until it finds one or more ACEs that allow
all the requested access rights, or until any of the requested access rights are
denied.

4.3.3 System Access Control List (SACL)


The SACL enables administrators to log attempts to access a secured object; each
ACE specifies the types of access attempts by a specified trustee that cause the
system to generate a record in the security event log.

An ACE in a SACL can generate audit records when an access attempt fails, when it
succeeds, or both. In future releases, a SACL will also be able to raise an alarm when
an unauthorized user attempts to gain access to an object.

4.3.4 Access Control Entry (ACE)


An access control entry is an element in an access control list (ACL) . An ACL can
have zero or more ACEs. Each ACE controls or monitors access to an object by a
specified trustee.

3
University of Washington. “SDDL Syntax”. April 24, 2007. Accessed on 25 March 2008.
https://www.washington.edu/computing/support/windows/UWdomains/SDDL.html.

4
Security Descriptor - A structure and associated data that contains the security information for a
securable object. A security descriptor identifies the object's owner and primary group. It can also contain
a DACL that controls access to the object, and a SACL that controls the logging of attempts to access the
object.
5
nTSecurityDescriptor - Every object in Active Directory contains this attribute which is a security
descriptor object containing the discretionary access control list (DACL), the system access control list
(SACL), group, and owner information that controls the object's access control behavior.

Page 66
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

All types of ACEs contain the following access control information:

A security identifier (SID) that identifies the trustee to which the ACE applies.
An access mask that specifies the access rights controlled by the ACE.
A flag that indicates the type of ACE.
A set of bit flags that determine whether child containers or objects can
inherit the ACE from the primary object to which the ACL is attached.

The following table lists the three ACE types supported by all securable objects:

Type Description
Access-denied Used in a discretionary access control list (DACL) to deny access
ACE rights to a trustee.
Access-allowed
Used in a DACL to allow access rights to a trustee.
ACE
Used in a system access control list (SACL) to generate an audit
System-audit
record when the trustee attempts to exercise the specified
ACE
access rights.

4.3.5 Format of nTSecurityDescriptor string:

Each nTSecurityDescriptor SDDL string is composed of 5 primary components which


correspond to the header, DACL (D:), SACL (S:), primary group (G:)and owner (O:):

O:owner_sidG:group_sidD:dacl_flags(ace string 1)(ace string 2 )S:sacl_flags(ace


string 1)(ace string 2)

The header contains record keeping information along with 2 flags that designate
whether the object is blocking inheritance for the SACL and DACL. The contents of
both the primary group and owner parts are simply a single SID while the contents
of both the SACL and DACL parts are a string with no fixed length.

ACEs6 make up the contents of these strings, are enclosed within parenthesis, and
contain 6 fields separated by a semicolon delimiter. The fields are:

a. ACE type (allow/deny/audit);

b. ACE flags (inheritance and audit settings);

c. Permissions (list of incremental permissions);

d. ObjectType (GUID);

6
ACE - An access control entry is an element in an access control list (ACL). An ACL can have zero or
more ACEs. Each ACE controls or monitors access to an object by a specified trustee.

Page 67
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

e. Inherited Object Type (GUID); and

f. Trustee (SID)

4.3.6 ACE Type

The ACE type designates whether the trustee is allowed, denied or audited.

Value Description
"A" ACCESS ALLOWED
"D" ACCESS DENIED
"OA" OBJECT ACCESS ALLOWED: ONLY APPLIES TO A SUBSET OF THE OBJECT(S).
"OD" OBJECT ACCESS DENIED: ONLY APPLIES TO A SUBSET OF THE OBJECT(S).
"AU" SYSTEM AUDIT
"AL" SYSTEM ALARM
"OU" OBJECT SYSTEM AUDIT
"OL" OBJECT SYSTEM ALARM

4.3.7 ACE Flags

The ACE flags denote the inheritance options for the ACE, and if it is a SACL, the
audit settings.

Value Description
CONTAINER INHERIT: Child objects that are containers, such as directories,
"CI"
inherit the ACE as an explicit ACE.
OBJECT INHERIT: Child objects that are not containers inherit the ACE as an
"OI"
explicit ACE.
"NP" NO PROPAGATE: ONLY IMMEDIATE CHILDREN INHERIT THIS ACE.
INHERITANCE ONLY: ACE DOESN'T APPLY TO THIS OBJECT, BUT MAY AFFECT
"IO"
CHILDREN VIA INHERITANCE.
"ID" ACE IS INHERITED
"SA" SUCCESSFUL ACCESS AUDIT
"FA" FAILED ACCESS AUDIT

Page 68
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.3.8 Permissions

The Permissions are a list of the incremental permissions given (or denied/audited)
to the trustee-these correspond to the permissions discussed earlier and are simply
appended together. However, the incremental permissions are not the only
permissions available. The table below lists all the permissions.

Value Description
Generic access rights
"GA" GENERIC ALL
"GR" GENERIC READ
"GW" GENERIC WRITE
"GX" GENERIC EXECUTE
Directory service access rights
"RC" Read Permissions
"SD" Delete
"WD" Modify Permissions
"WO" Modify Owner
"RP" Read All Properties
"WP" Write All Properties
"CC" Create All Child Objects
"DC" Delete All Child Objects
"LC" List Contents
"SW" All Validated Writes
"LO" List Object
"DT" Delete Subtree
"CR" All Extended Rights
File access rights
"FA" FILE ALL ACCESS
"FR" FILE GENERIC READ
"FW" FILE GENERIC WRITE
"FX" FILE GENERIC EXECUTE
Registry key access rights
"KA" KEY ALL ACCESS
"KR" KEY READ
"KW" KEY WRITE
"KX" KEY EXECUTE

4.3.9 Object Type and Inherited Object Type

The ObjectType is a GUID representing an object class, attribute, attribute set, or


extended right. If present it limits the ACE to the object the GUID represents. The
Inherited Object Type is a GUID representing an object class. If present it limits
inheritance of the ACE to the child entries of only that object class.

Page 69
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.3.10 Trustee

The Trustee is the SID of the user or group being given access (or denied or
audited). Instead of a SID, there are several commonly used acronyms for well-
known SIDs. These are listed in the table below:

Value Description
"AO" Account operators
"RU" Alias to allow previous Windows 2000
"AN" Anonymous logon
"AU" Authenticated users
"BA" Built-in administrators
"BG" Built-in guests
"BO" Backup operators
"BU" Built-in users
"CA" Certificate server administrators
"CG" Creator group
"CO" Creator owner
"DA" Domain administrators
"DC" Domain computers
"DD" Domain controllers
"DG" Domain guests
"DU" Domain users
"EA" Enterprise administrators
"ED" Enterprise domain controllers
"WD" Everyone
"PA" Group Policy administrators
"IU" Interactively logged-on user
"LA" Local administrator
"LG" Local guest
"LS" Local service account
"SY" Local system
"NU" Network logon user
"NO" Network configuration operators
"NS" Network service account
"PO" Printer operators
"PS" Personal self
"PU" Power users
"RS" RAS servers group
"RD" Terminal server users
"RE" Replicator
"RC" Restricted code
"SA" Schema administrators
"SO" Server operators
"SU" Service logon user

Page 70
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.3.11 ACL Example


Given an ACL assigned to a service as demonstrated below:

w32time,2,"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCS
WRPWPDTLOCRSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCW
DWO;;;WD)"

The DACL
D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRP
WPDTLOCRSDR CWDWO;;;SY) would break out as follows:

AR SDDL_AUTO_INHERIT_REQ - the SE_DACL_AUTO_INHERIT_REQ flag is set.

ACE String 1

A ACCESS ALLOWED
CC CREATE ALL CHILD OBJECTS
DC DELETE ALL CHILD OBJECTS
LC LIST CONTENTS
SW ALL VALIDATED WRITES
RP READ ALL PROPERTIES
WP WRITE ALL PROPERTIES
DT DELETE SUBTREE
LO LIST OBJECT
CR ALL EXTENDED RIGHTS
SD DELETE
RC READ PERMISSIONS
WD MODIFY PERMISSIONS
WO MODIFY OWNER
BA BUILT-IN ADMINISTRATOR

ACE String 2

A ACCESS ALLOWED
CC CREATE ALL CHILD OBJECTS
DC DELETE ALL CHILD OBJECTS
LC LIST CONTENTS
SW ALL VALIDATED WRITES
RP READ ALL PROPERTIES
WP WRITE ALL PROPERTIES
DT DELETE SUBTREE
LO LIST OBJECT
CR ALL EXTENDED RIGHTS
SD DELETE
RC READ PERMISSIONS
WD MODIFY PERMISSIONS
WO MODIFY OWNER
SY LOCAL SYSTEM

The SACL S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)


would break out as follows:

Page 71
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

AU SYSTEM AUDIT
FA FILE ALL ACCESS
CC CREATE ALL CHILD OBJECTS
DC DELETE ALL CHILD OBJECTS
LC LIST CONTENTS
SW ALL VALIDATED WRITES
RP READ ALL PROPERTIES
WP WRITE ALL PROPERTIES
DT DELETE SUBTREE
LO LIST OBJECT
CR ALL EXTENDED RIGHTS
SD DELETE
RC READ PERMISSIONS
WO MODIFY OWNER
WD MODIFY PERMISSIONS

Page 72
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.4 Security Policy Comparison and Analysis


While developing and deploying a custom security policy, the IT Security specialist in
the field may have to compare and/or analyze security policies. This annex will
outline the use of the MMC Security Configuration and Analysis plugin and the
command line tool secedit to compare and analyze the local security configuration of
a Windows 2003 Server installation.

4.4.1 MMC – Microsoft Management Console


MMC is a framework for system administration tools in modern Microsoft Windows
operating systems. Most of Microsoft's administration tools included with both
Windows itself, and Windows Server System products are implemented as MMC
modules (known as “snap-ins”).

One of these snap-ins (Security Configuration and Analysis) allows the system
administrator to analyze local security policies by generating a security database
from the security policy installed on a host and comparing it to another security
policy template.

4.4.2 Comparing and Analyzing Security Policies Using MMC


Running MMC and Adding the Snap-in

1. Log in as the local administrator (username: cscsrvadmin).


2. From the Start menu, select Run…
3. In the Open: field, type mmc and click OK.
4. In the Console window, click File and select Add/Remove Snap-in.
5. In the Add/Remove Snap-in window, click on Add…
6. In the Add Standalone Snap-in window, select Security Configuration and
Analysis and click Add.
7. Click Close.
8. In the Add/Remove Snap-in window, click on OK.

Page 73
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Figure 1 – The MMC Console window after loading the Security Configuration and Analysis
snap-in module.

To Open an Existing Security Policy Database

1. Right-click the Security Configuration and Analysis snap-in item.


2. Click Open Database.
3. Select a database, and then click Open.

To Create a New Security Policy Database

1. Right-click the Security Configuration and Analysis snap-in item.


2. Click Open Database.
3. Type a new database name, and then click Open.
4. Select a security template to import, and then click Open.

Page 74
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Figure 2 – The MMC Console window after loading selecting the security database and security
policy.

To Compare and Analyze the Security Policy

1. Right-click the Security Configuration and Analysis snap-in item.


2. Select Analyze Computer Now…
3. In the Perform Analysis window, click OK.
4. Allow the Analyzing System Security window‟s routine to complete.

Page 75
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Figure 3 – The MMC Console’s security policy analysis progress window.

To Navigate the Results

1. Under the Security Configuration and Analysis snap-in item, select the
item you wish to view from the tree.
2. The analysis results for the selected item will be displayed on the right hand
side.

Figure 4 – The MMC Console window after the comparison and analysis is complete.

Page 76
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Analyzing Security and Viewing Results

The Security Configuration and Analysis snap-in performs security analysis by


comparing the current state of system security against an analysis database. During
creation, the analysis database uses at least one security template.

Should the administrator choose to import more than one security template, the
database will merge the various templates and create one composite template. The
snap-in resolves conflicts in order of import; the last template that is imported takes
precedence.

The snap-in displays the analysis results by security area, using visual flags to
indicate problems; It displays the current system and base configuration settings for
each security attribute in the security areas.

ANALYSIS VISUAL FLAG HIGHLIGHTS AND THEIR MEANINGS.


Visual Flag Highlight Meaning
Red X The entry is defined in the analysis
database and on the system, but the
security setting values do not match.
Green Check The entry is defined in the analysis
database and on the system and the
setting values match.
Question Mark The entry is not defined in the analysis
database and, therefore, was not
analyzed.

If an entry is not analyzed, it may be


that it was not defined in the analysis
database or that the user who is
running the analysis may not have
sufficient permission to perform
analysis on a specific object or area.
Exclamation Point This item is defined in the analysis
database, but does not exist on the
actual system. For example, there may
be a restricted group that is defined in
the analysis database but does not
actually exist on the analyzed system.
No Highlight The item is not defined in the analysis
database or on the system.

Page 77
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

4.4.3 Secedit – Command Line Security Policy Analysis Tool


Secedit is a command line tool that allows a system administrator to perform various
security policy related tasks. Although a command line tool, secedit is extremely
versatile as it can be scripted to perform tasks remotely across multiple hosts; MMC
can only be used to perform tasks on a single machine (the local host).

The Secedit tool has six primary functions; configure, analyze, import, export,
validate, and generate rollback; the scope of this document will be limited to those
used for security policy analysis.

Comparing and Analyzing Security Policies Using Secedit

Running Secedit

1. From the Start menu, select Run…


2. In the Open: field, type cmd and click OK.
3. In the command shell window, enter the commands as described below.

Secedit Switches Explained

DB - The DB switch allows the administrator to specify the name of the database file
to either create or use.

CFG - The CFG switch allows the administrator to specify the name of the template
to use.

Overwrite – When used in conjunction with the import function, the overwrite
switch is purges the databases prior to the import function; this provides the same
basic functionality as creating a brand new database.

Log - Allows the administrator to specify a log file to be used in lieu of the default
log file.

Quiet – Allows the administrator to run Secedit without prompting for task
verifications.

Areas - Allows the administrator to specify which types of data from the template
should be applied; all other types of data within the template are ignored. Valid data
types are:

SECURITYPOLICY - including account policies, audit policies, event log


settings, and security options.
GROUP_MGMT - includes restricted groups settings.
USER_RIGHTS - includes user rights assignments.
REGKEYS - includes registry permissions.
FILESTORE - includes file system permissions.
SERVICES - include system service settings.

Page 78
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

Creating a Security Policy Database

The secedit import function is used to create or import a security policy database;
the syntax for the Import function is as follows:

SECEDIT /IMPORT /DB database.sdb /CFG template.inf /OVERWRITE

In the example above, replace database.sdb with the name of the database being
created and template.inf with the name of the template being used to generate the
database.

Analyzing Security Policies

The secedit analyze function is used to compare an existing security policy database
to a security policy. The syntax is as follows:

SECEDIT /ANALYZE /DB database.sdb /CFG template.inf /OVERWRITE /LOG


output.txt

In the example above, replace database.sdb with the name of an existing database
and template.inf with the name of the template being compared to the database.
This will create a log file in the current directory named OUTPUT.TXT listing every
security setting that differs from the template.

Opening the Analysis Results File

To open and view the results file (e.g. OUTPUT.TXT), simply open the file with
Notepad or another text editor.

Page 79
Working Aide - Windows Security Template Settings Final - 06 March 2008
Ted Mac Daibhidh, CD

5 REFERENCES
Communications Security Establishment Canada. “Windows Server 2003
Recommended Baseline Security (ITSG-20)”. March 2004. Accessed on 25 March
2008. http://www.cse-cst.gc.ca/documents/publications/gov-pubs/itsg/itsg20.pdf.

Melber, Derek. “Understanding Windows Security Templates”. 06 October 2004.


Accessed on 25 March 2008. http://www.windowsecurity.com/articles/Understanding-
Windows-Security-Templates.html.

Microsoft Download Center. “Windows Server 2003 Security Guide”. 05 August 2006.
Accessed on 25 March 2008. http://www.microsoft.com/downloads/details.aspx?
FamilyId=8A2643C1-0685-4D89-B655-521EA6C7B4DB&displaylang=en.

Microsoft Help and Support. “Definition of Registry Value Data Types”. 14 March
2008. Accessed on 25 March 2008. http://support.microsoft.com/kb/101230.

Microsoft Help and Support. “Well-known Security Identifiers in Windows Operating


Systems”. 14 March 2008. Accessed on 25 March 2008.
http://support.microsoft.com/kb/243330.

Microsoft TechNet. “Security Templates”. Date unknown. Accessed on 25 March


2008. http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit
/deploy/dgbe_sec_vopo.mspx?mfr=true

University of Washington. “SDDL Syntax”. April 24, 2007. Accessed on 25 March


2008. https://www.washington.edu/computing/support/windows/UWdomains/
SDDL.html.

Page 80

You might also like