Security
The following are the nine groups of Security Policy features mentioned previously. They are containers located in the Security Settings node of a Group Policy object. Although there are some differences regarding whether you are managing Security Policy for a domain or for a local computer, in general Security Policy includes much the same thing. For a local Security Policy, find the following:
Password Policy
Account Lockout Policy
Kerberos Authentication Policy
Audit Policy
User Rights Assignment
Security Options
Encrypted Data Recovery Agent
Internet Protocol Security Policies
Some of the policy areas apply only to the scope of a domain; that is, the policy settings are domainwide. Account policies, for example, apply uniformly to all user accounts in the domain. If you cannot define different account policies for different organizational units in the same domain, the policy will affect only the account policies on member workstations and servers contained within the organizational unit (OU).
Account Policies
Account policies are the first subcategory of Security Settings. The Account policies include the following:
Password Policy You can modify password policy to meet your organizations security needs. For example, you can specify minimum password length and maximum password age. You can also require complex passwords and prevent users from reusing passwords or simple variations of passwords. Note that password policy can be applied in Active Directory as well as in your local computers security policy. If multiple policies are set, the most restrictive policy is used.
Account Lockout Policy You can force users to be locked out after a specified number of failed logon attempts. You can also specify the period of time that accounts are frozen.
Kerberos Authentication Policy You can modify the default Kerberos settings for each domain. For example, you can set the maximum lifetime of a user ticket. Kerberos Authentication Policy is only applicable at a domain level, so no Kerberos Authentication Policy settings are available for local security policy.
The policies you choose affect the level of help desk support required for users as well as the vulnerability of your network to security breaches and attacks. For example, specifying a restrictive account lockout policy increases the potential for denial of service attacks, and setting a restrictive password policy results in increased help desk calls from users who cannot log on to the network.
In addition, specifying restrictive password policy can actually reduce the security of the network. For example, if you require passwords longer than seven characters, most users have difficulty remembering them. They might write their passwords down and leave them where an intruder can easily find them.
Local Computer Policies
The second subcategory of Security Settings is Local Computer policies. Local Computer policies include the following:
Audit Policy Windows 2000 can record a range of security event types, from a systemwide event, such as a user logging on, to an attempt by a particular user to read a specific file. Both successful and unsuccessful attempts to perform an action can be recorded.
User Rights Assignment You can control the rights assigned to user accounts and security groups for local computers. You can specify users and security groups who have rights to perform a variety of tasks affecting security. For example, you can control access to computers from the network, who can log on locally, or who can shut down the system. You can specify who has rights to perform critical administrative tasks on the computer, such as backing up and restoring files and directories, taking ownership of files and objects, and forcing shutdown from a remote system.
Security Options You can control a wide variety of security options for local computers. For example, you can specify policies that force users to log off when logon hours expire, disable CTRL+ALT+DEL for logon (to force smart card logon), and force computers to halt if unable to audit.
Public Key Policies
This subdivision of security settings lets you add a new Encrypted Data Recovery Agent and set up Automatic Certificate Requests. You can also manage your lists of trusted certification authorities.
Internet Protocol Security Policies
The policies in this section describe how to handle a variety of requests for Internet Protocol security (IPSec) communications. You can require secure communication, permit secure communication, or communicate without using IPSec. The predefined policies are not intended for immediate use. They provide examples of behavior for testing purposes. Network security administrators need to carefully design and assign their own custom IPSec policy to computers. For more information about working with Internet Protocol security policies, see Internet Protocol Security later in this chapter, or see the Deployment Planning Guide , the MicrosoftWindows 2000 Server Resource Kit Distributed Systems Guide , or the Internetworking Guide .
Security Settings by Policy
The following tables list the default security settings by policy.
Account Policies
Default settings for Password Policies on a local computer are described in Table 13.9.
Table 13.8 Password Policy
Policy |
Local Setting |
---|---|
Enforce password history |
0 passwords remembered |
Maximum password age |
42 days |
Minimum password age |
0 days |
Minimum password length |
0 characters |
Passwords must meet complexity requirements |
Disabled |
Store password using reversible encryption for all users in the domain |
Disabled |
Default settings for Account Lockout Policies on a local computer are described in Table 13.10.
Table 13.9 Account Lockout Policy
Policy |
Local Setting |
---|---|
Account lockout duration |
Not defined |
Account lockout threshold |
0 invalid logon attempts |
Reset account lockout counter after |
Not defined |
Local Policies
Default settings for Audit Policies on a local computer are described in Table 13.11.
Table 13.10 Audit Policy
Policy |
Local Setting |
---|---|
Audit account logon events |
No auditing |
Audit account management |
No auditing |
Audit directory service access |
No auditing |
Audit logon events |
No auditing |
Audit object access |
No auditing |
Audit policy change |
No auditing |
Audit privilege use |
No auditing |
Audit process tracking |
No auditing |
Audit system events |
No auditing |
Default settings for User Rights Assignment Policies on a local computer are described in Table 13.12.
Table 13.11 User Rights Assignment Policy
Policy |
Local Setting |
---|---|
Access this computer from the network |
Everyone |
Act as part of the operating system |
<None> |
Add workstations to domain |
<None> |
Back up files and directories |
Backup Operators |
Bypass traverse checking |
Everyone |
Change the system time |
Power Users |
Create a pagefile |
Administrators |
Create a token object |
<None> |
Create permanent shared objects |
<None> |
Debug programs |
Administrators |
Deny access to this computer from the network |
<None> |
Deny logon as a batch job |
<None> |
Deny logon as a service |
<None> |
Deny logon locally |
<None> |
Enable computer and user accounts to be trusted for delegation |
<None> |
Force shutdown from a remote system |
Administrators |
Generate security audits |
<None> |
Increase quotas |
Administrators |
Increase scheduling priority |
Administrators |
Load and unload device drivers |
Administrators |
Lock pages in memory |
<None> |
Log on as a batch job |
<None> |
Log on as a service |
<None> |
Log on locally |
Computer Domain \Guest |
Manage auditing and security log |
Administrators |
Modify firmware environment values |
Administrators |
Profile single process |
Power Users |
Profile system performance |
Administrators |
Remove computer from docking station |
Users |
Replace a process level token |
<None> |
Restore files and directories |
Backup Operators |
Shut down the system |
Users |
Synchronize directory service data |
<None> |
Take ownership of files or other objects |
Administrators |
Note
To permit users to log on to a computer, grant the user or group of users the Log on locally right listed above.
Default settings for Security Options Policies on a local computer are described in Table 13.13.
Table 13.12 Security Options Policy
Policy |
Local Setting |
---|---|
Additional restrictions for anonymous connections |
Rely on default permissions (none set by default) |
Allow server operators to schedule tasks (domain controllers only) |
Not defined |
Allow system to be shut down without having to log on |
Enabled |
Allowed to eject removable NTFS media |
Administrators |
Amount of idle time required before disconnecting session |
15 minutes |
Audit the access of global system objects |
Disabled |
Audit use of Backup and Restore privilege |
Disabled |
Automatically log off users when logon time expires (local) |
Enabled |
Clear virtual memory pagefile when system shuts down |
Disabled |
Digitally sign client communication (always) |
Disabled |
Digitally sign client communication (when possible) |
Enabled |
Digitally sign server communication (always) |
Disabled |
Digitally sign server communication (when possible) |
Disabled |
Disable CTRL+ALT+DEL requirement for logon |
Not defined |
Do not display last user name in logon screen |
Disabled |
LAN Manager Authentication Level |
Send LM and NTLM responses |
Message text for users attempting to log on |
<None> |
Message title for users attempting to log on |
<None> |
Number of previous logons to cache (in case domain controller is not available) |
10 logons |
Prevent system maintenance of computer account password |
Disabled |
Prevent users from installing printer drivers |
Disabled |
Prompt user to change password before expiration |
14 days |
Recovery Console: Allow automatic administrative logon |
Disabled |
Recovery Console: Allow floppy copy and access to all drives and all folders |
Disabled |
Rename administrator account |
Not defined |
Rename guest account |
Not defined |
Restrict CD-ROM access to locally logged-on user only |
Disabled |
Restrict floppy access to locally logged-on user only |
Disabled |
Secure channel: Digitally encrypt or sign secure channel data (always) |
Disabled |
Secure channel: Digitally encrypt secure channel data (when possible) |
Enabled |
Secure channel: Digitally sign secure channel data (when possible) |
Enabled |
Secure channel: Require strong (Windows 2000 or later) session key |
Disabled |
Send unencrypted password to connect to third-party SMB servers |
Disabled |
Shut down system immediately if unable to log security audits |
Disabled |
Smart card removal behavior |
No Action |
Strengthen default permissions of global system objects (for example, Symbolic Links) |
Enabled |
Unsigned driver installation behavior |
Not defined |
Unsigned non-driver installation behavior |
Not defined |
Public Key Policies
Default settings for the Encrypted Data Recovery Agent Policy are described in Table 13.14.
Table 13.13 Encrypted Data Recovery Agent Policy
Issued To |
Issued By |
Expiration Date |
Intended Purposes |
Friendly Name |
Status |
---|---|---|---|---|---|
Administrator |
Administrator |
10/8/99 |
File Recovery |
<None> |
<None> |
Internet Protocol Security Policies on Local Computer
Default settings for Internet Protocol Security Policies on a local computer are described in Table 13.15.
Table 13.14 Internet Protocol Security Policies on Local Computer
Name |
Description |
Policy Assigned |
---|---|---|
Client (Respond Only) |
Communicate normally (unsecured). Use the default response rule to negotiate with servers that request security. Only the requested protocol and port traffic with that server is secured. |
No |
Secure Server (Require Security) |
For all IP traffic, always require security using Kerberos trust. Do not allow unsecured communication with untrusted clients. |
No |
Server (Request Security) |
For all IP traffic, always request security using Kerberos trust. Allow unsecured communication with clients that do not respond to request. |
No |
Security Settings by Policy Setting
The following section lists the policies which are enabled, disabled, or not set.
Enabled
The following policies are enabled by default when you install Windows 2000 Professional on a stand-alone computer:
Allow system to be shut down without having to log on.
Automatically log off users when logon time expires (local).
Digitally sign client communication (when possible).
Secure channel: Digitally encrypt secure channel data (when possible).
Secure channel: Digitally sign secure channel data (when possible).
Strengthen default permissions of global system objects (for example, Symbolic Links).
Disabled
The following policies are disabled by default when you install Windows 2000 Professional on a stand-alone computer:
Passwords must meet complexity requirements.
Store password using reversible encryption for all users in the domain.
Account lockout threshold.
Audit the access of global system objects.
Audit use of Backup and Restore privilege.
Clear virtual memory pagefile when system shuts down.
Digitally sign client communication (always).
Digitally sign server communication (always).
Digitally sign server communication (when possible).
Do not display last user name on logon screen.
Prevent system maintenance of computer account password.
Prevent users from installing printer drivers.
Recovery Console: Allow automatic administrative logon.
Recovery Console: Allow floppy copy and access to all drives and all folders.
Restrict CD-ROM access to locally logged-on user only.
Restrict floppy access to locally logged-on user only.
Secure channel: Digitally encrypt or sign secure channel data (always).
Secure channel: Require strong (Windows 2000 or later) session key.
Send unencrypted password to connect to third-party SMB servers.
Shut down system immediately if unable to log security audits.
Additional restrictions for anonymous connections.
Message text for users attempting to log on.
Message title for users attempting to log on.
Smart card removal behavior.
Audit account logon events.
Audit account management.
Audit logon events.
Audit object access.
Audit policy change.
Audit privilege use.
Audit process tracking.
Audit system events.
Not Defined
By default, the following policies are not defined. This does not mean that values are not set for these parameters on the system. It just means that there is no local policy defined for these parameters.
Account lockout duration.
Reset account lockout counter after.
Audit directory service access.
Allow server operators to schedule tasks (domain controllers only).
Disable CTRL+ALT+DEL requirement for logon.
Rename administrator account.
Rename guest account.
Unsigned driver installation behavior.
Unsigned non-driver installation behavior.
Not Granted
By default, the following policies are not granted to any particular group when you clean-install Windows 2000 Professional on a stand-alone computer:
Act as part of the operating system.
Add workstations to domain.
Create a token object.
Create permanent shared objects.
Deny access to this computer from the network.
Deny logon as a batch job.
Deny logon as a service.
Deny logon locally.
Enable computer and user accounts to be trusted for delegation.
Generate security audits.
Lock pages in memory.
Log on as a batch job.
Log on as a service.
Replace a process level token.
Synchronize directory service data.
Comparison of Group Capabilities
What can an Administrator do that a Power User cant? By default, a member of the Administrators group can:
Install the operating system.
Install or configure hardware device drivers, although Power Users are allowed to install printer drivers.
Install system services.
Install Service Packs and Windows Updates.
Upgrade the operating system.
Repair the operating system.
Install applications that modify Windows system files.
Configure password policy.
Configure audit policy.
Manage security logs.
Create administrative shares.
Create administrative accounts.
Modify groups or accounts created by other users.
Remotely access the registry.
Stop or start any service.
Configure services.
Increase quotas.
Increase execution priorities
Remotely shut down the system.
Take ownership of arbitrary objects.
Assign rights to members of the Users group.
Override a locked computer.
Format a hard disk drive.
Modify systemwide environment variables
Access the private data of members of the Users group.
Back up and restore files.
What can a Power User do that a User cant? By default, a member of the Power Users group can:
Create local users and groups.
Modify users and groups that they have created.
Create and delete nonadministrator file shares.
Create, manage, delete, and share local printers.
Change system time (default user right).
Stop or start non-auto-started services.
By default, members of the Power Users group are granted the following permissions:
Modify access to the Program Files directory.
Modify access to many locations within the HKEY_LOCAL_MACHINE\Software registry hive.
Write access to most system directories including %windir% and %windir%\system32.
These permissions allow members of the Power Users group to:
Perform per-computer installation of many applications. For example, applications that do not modify Windows system files or do not modify HKEY_LOCAL_MACHINE\System.
Run legacy applications that improperly store per-user data in per-computer locations (without receiving error messages).
Unfortunately, these permissions also allow members of the Power Users group to:
Plant Trojan horses that, if executed by administrators or other users, can compromise system and data security.
Make systemwide operating system and application changes that affect other users of the system.