Chapter 2

Implementing Security

EXAM OBJECTIVES

Securing systems through BIOS

Implementing users and groups

Implementing permissions and rights

Implementing auditing

Implementing firewalls

Implementing security best practices

In this chapter, you find out how to implement security best practices on systems at home or at the workplace. The preceding chapter introduces terms such as authentication and authorization; this chapter demonstrates how to perform such tasks. You find out how to create a user account that can be used for authentication and how to authorize the user to access a folder or perform an action within the operating system. This chapter will ensure that you know how to perform basic security-related tasks!

When thinking about network security, understand that security is to be implemented at multiple layers, meaning that you cannot focus on just one security-related feature. You want to implement multiple security features to secure your environment. For example, a number of people feel that their systems are secure because they have a firewall. They don’t realize that the firewall protects the system only from attacks coming across the network. What if the hacker is in the same room as the computer? The firewall is of no use at that point, so you need to ensure that you implement other security features to protect the system from all potential threats.

Securing Systems through BIOS/UEFI

When securing systems, your first security concern is physical access. This involves ensuring that critical systems, such as servers, are in locked rooms that are not accessible to unauthorized users. Physically securing systems could also involve changing some of the CMOS settings, such as boot device order, power-on password, and CMOS password.

Changing these settings in CMOS is different for each type of system, but the first thing to do is enter CMOS. Normally, you press Delete, F1, F2, or F10 when the system is booting.

After the system is booted, you will find the following settings in the CMOS setup program to help secure the system:

  • BIOS Password: Usually found in the security section of CMOS, you can set a power-on password (also known as a user password), which is a password that anyone who wants to use the system must type. You may also set an admin password, which is a password that must be known by anyone who wants to change CMOS settings.
  • Boot Devices: In CMOS, you can control what devices the computer can boot from. Most computers today can boot from DVD-ROM, hard disk, network, and USB removable drives. It is important to understand that if you allow a computer to boot from DVD-ROM, a hacker can possibly boot from a DVD and bypass all security enforced by your operating system.
  • Intrusion Detection: Most systems today have an intrusion detection option that will notify you if the computer case has been opened. This is important because instead of stealing the actual computer, a person could take the RAM or hard drive out of the computer, which is easier to hide and steal. Make sure that the intrusion detection option is enabled, and also be sure to lock the computer cases so they cannot be removed easily.

Implementing Users and Groups

In this section, you find out how to create user accounts that can be used to log on to the system and how to create groups to organize users together as a single object that permissions can be assigned to.

Creating user accounts

To secure the Windows OS from unauthorized access, you can create a user account for each person who is allowed to use the system. Anyone without a user account will be unable to log on to the system and, as a result, will not be able to use the computer. The other benefit of creating user accounts is that even if a person has a user account and logs onto the system, he might not be able to access a file because you have not given permission to that user to access the file.

Creating accounts in Computer Management

To create a user account on a Windows system, go to Control Panel ⇒ Administrative Tools ⇒ Computer Management. In the Computer Management console that opens, expand Local Users and Groups and select the Users folder (shown in Figure 2-1). In the Users folder, you will notice some user accounts on the right side. These user accounts are built-in accounts, meaning that they were built by the OS or by a piece of software you have installed. Note that the home editions of Windows do not have a Computer Management console, so you will have to manage user accounts through the Control Panel.

image

FIGURE 2-1: Creating user accounts and groups in the Computer Management console.

Two built-in accounts you should be familiar with for the A+ Exams are

  • Administrator: The administrator account is the built-in account in Windows that has full access to the system and can manage all aspects of the computer. During the installation of Windows, you were asked what you wanted to set as the password for the administrator account; you use that password to log on with the username of administrator. When you do log on as administrator, you can change any settings on the system. A normal user account cannot change major settings on the system such as the time, installing software, or any changes that affect the system. To make these types of changes, you need to log on as administrator to make changes.
  • Guest: Users can use the guest account if they don’t have an actual user account. When they try to access the system, they are authenticated as guest. The guest user inherits any permissions the guest account has on the system. There is one hook to this scenario, though. By default, the guest account is disabled, meaning that it is not available for use. Because of the security concerns of not requiring someone to log on, Microsoft has disabled the account. A disabled account appears with a red X on it and cannot be used.

fortheexam Two default accounts are built in to Windows: administrator and guest. The administrator account has full access to the system, and the guest account is used for temporary access to the system. Also note that the guest account is disabled by default.

Now that you have identified the two major built-in accounts, you can create your own user accounts. To create your own user accounts in the Computer Management console, right-click the Users folder and choose New User. The New User dialog box appears (shown in Figure 2-2). Fill in the following account details:

  • User Name: This is the name that the user uses to log on to the system. Typically, it is a short version of the full name. For example, the full name Glen Clarke might get truncated to gclarke as the username. A username is also known as the logon name.
  • Full Name: This is typically the person’s first name and last name: for example, Glen Clarke as the full name.
  • Description: This is a description of the user account. I typically put the person’s job role here: for example, Accountant.
  • Password: Type what you want for the user accounts password. The user needs to know this password to log on to the system. Be sure to use good practices with passwords, such as not using words found in the dictionary and using a combination of uppercase and lowercase letters, numbers, and symbols. See the preceding chapter for more information about strong passwords.
  • Confirm Password: Type the password again in this box. This ensures that you typed what you thought you typed.
  • User Must Change Password at Next Logon: Set this option if you want to force the user to change the password the first time he logs on. This ensures that you don’t know the user’s password because the password you originally set is overwritten.
  • User Cannot Change Password: Set this option if you don’t want the user to be able to change the password. This ensures that the password you set is the password that the user must use.
  • Password Never Expires: In a password policy, you can specify that passwords must be changed every so many days. That policy applies to all users except for any accounts that have Password Never Expires activated. You might use this option if you have two employees sharing a user account.
  • Account Is Disabled: If you want to disable an account at any time, you can set this option. A disabled account is unusable until you enable it again.
image

FIGURE 2-2: Creating a user account in Windows.

After you enter all the account information, click the Create button and then click Close to dismiss the New User dialog box. The user account has been created, and you can start using it right away to log on to Windows.

Creating accounts in Control Panel

It is also possible to create user accounts from within the Control Panel. In Windows 7, click User Accounts from the Control Panel and then select Family Safety ⇒ User Accounts ⇒ Manage Another Account. At this point you can select a user account you want to alter or create a new user account by choosing the Create a New Account link.

In Windows 8.1, you can also manage user accounts from the Control Panel by selecting User Accounts and Family Safety ⇒ User Accounts ⇒ Manage Another Account (Figure 2-3). Choose the account you want to alter and then choose the action on the left side that represents the change to the account you want to make. If you want to create a new account, click the link for Add a New User in PC settings from the Manage Another Account screen. This takes you to the PC settings screen where you can add a new user account.

image

FIGURE 2-3: Creating a user account via Control Panel.

One user account setting you can change is the type of account. In Windows you can create a standard user account (the default), which is just a plain account with no administrative permissions. You can also create an Administrator account, which has permissions to alter settings on the computer.

To change the account type after the fact, simply go to Control Panel ⇒ User Accounts and Family Safety ⇒ User Accounts ⇒ Manage Another Account, and then select the account you want to alter. On the left side of the screen you will see settings you can change. Choose Change Account Type and then choose either Standard User or Administrator.

Creating groups

A group in Windows is a collection of user accounts. The benefit of using groups when managing access to resources is that you don’t need to assign the same permissions multiple times. Instead, you assign the permission to the group, and anyone who is a member of the group receives the permission.

Like user accounts, Windows offers a number of built-in groups. A built-in group has predefined capabilities within Windows. For example, printer operators can manage all printers on the system, and anyone who is a member of the printer operators group will have that capability. The following is a list of some of the popular built-in groups found in Windows OSes:

  • Administrators: This group has full access to the system and can change any setting on the system. The administrator account is a member of this group by default, which is why the administrator account is allowed to change any setting on the system.
  • Backup Operators: Members can perform backups and restores on the system.
  • Account Operators: Members can create user accounts. This group is available on Windows servers. The benefit of using this group is that if you want someone to be able to manage user accounts, you can place that person in this group instead of in the administrators group and he or she will only be able to manage the user accounts — not the entire system.
  • Printer Operators: Members can change any settings on the printers. Essentially, members of this group are trained to troubleshoot the printing environment and then assigned the task of managing all printing problems on the network.
  • Users: All user accounts that are created are members of the users group. You can assign permissions to the users group knowing that all users will get the permission.
  • Power Users: The power users group is the group on Windows client OSes prior to Windows Vista that allows its users to create user accounts and manage the printing environment. Use this group if the desktop OS does not have an account operator or a printer operator group.

fortheexam Be sure you know the default groups in Windows. Some of the more useful built-in groups are account operators, printer operators, and backup operators. Also note that if a user is not placed in an administrative group, he or she is known as a standard user.

If the built-in groups do not satisfy your needs, create your own groups:

  1. Click Start and then right-click Computer (in Windows 7 and Vista) and choose Manage. (In Windows 8.1, right-click the Start icon and choose Computer Management.)
  2. In the Computer Management console, expand Local Users and Groups.
  3. Right-click the Groups folder in Local Users and Groups and then choose New Group, as shown in Figure 2-4.
  4. In the New Group dialog box that appears, type the name you want to use for the group.

    In this example, I use Accountants (shown in Figure 2-5).

  5. Fill in a description for the group in the Description text box.
  6. To begin adding members to the group, click the Add button.

    The Select Users dialog box appears.

  7. Type the name of the user account you want to add and then click the Check Name button on the right side.

    Windows should underline the account name, indicating that the user account exists and that you can add it to the group membership.

  8. Repeat Step 7 for each account you want to add to the group.
  9. After you add all the accounts to the group, click OK and then click Create to create the group.
image

FIGURE 2-4: Creating a new group in Computer Management.

image

FIGURE 2-5: Fill in information for your new group.

After you create the users and place them into their appropriate groups, you are now ready to assign them permissions.

ontheweb To practice creating users and groups, take a look at Lab 2-1 on the book’s companion website at www.dummies.com/go/aplusaio.

Implementing Permissions and Rights

When controlling a user’s access to the system, you typically modify the user’s rights and permissions. Microsoft has made a huge distinction between a permission and a right.

In this section, you discover the difference between permissions and rights within the Windows OS and how to implement both within the local security policy in Windows.

User rights

If you were to log on to your Windows system as just a user account and then double-click the time in the bottom-right corner to change that time, you get an error message indicating that you do not have the privilege to change the time. This is an example of user rights. The user account that you are currently logged in with does not have the right to change the system time, which is an action that typically has to be performed by an administrative account.

There is a large list of user rights; some of the most popular ones are listed below:

  • Access this computer from the network. This right is needed by anyone who wants to connect to the system from across the network: for example, if you want to connect to a shared folder on computer A, you need to this right on computer A.
  • Back up files and directories. This right is needed by anyone who wants to back up files on the computer. For security reasons, not everyone should be able to perform backups on a system, so Windows controls who can perform a backup via this right.
  • Change the system time. To change the time on the computer, your user account must be given this right.
  • Log on locally. To log on to the system by pressing Ctrl+Alt+Delete, you need this right. Microsoft classifies a local logon as you sitting in front of the computer at the keyboard (versus a remote logon, where you connect from across the network, which is controlled by the first right mentioned in this list).
  • Shut down the system. To shut down the computer, you must have this right.
  • Take ownership of files and other objects. In Windows, the owner of the object, such as a file or folder, always has the ability to change the permissions of the resource. You might want to give selected individuals the take-ownership right so that they can take ownership of a resource and then change the permissions.

To change the user rights (for example, to assign Bob Smith the right to change the system time), you need to modify the user rights assignments in the local security policies of the Windows computer. The local security policy controls all security settings for the system. To change the local security policies in Windows, follow these steps:

  1. In Windows 7, choose Start ⇒ Control Panel. (In Windows 8.1, right-click the Start icon and then choose Control Panel.)
  2. In the Control Panel, choose System and Security and then Administrative Tools.
  3. In the Administrative Tools, double-click Local Security Policy to start the Local Security Policy console.
  4. To modify the user rights within the local security policy, expand Local Policies and then highlight User Rights Assignments, as shown in Figure 2-6.

    When the User Rights Assignments node on the left side has been selected, you will notice the list of user rights on the right side of the screen in the Details pane.

  5. To modify a user right, double-click the user right.

    You see a list of users or groups that have been assigned that right.

  6. To add a user or group to the list, click the Add User or Group button, type the name of the account you want to add, and then click Check Names to ensure that Windows recognizes the user account.
  7. Click OK to add the account to the right you chose (as shown in Figure 2-7) and then click OK to close the window.
image

FIGURE 2-6: Configuring user rights within Windows allows you to control which actions a user can perform on that computer.

image

FIGURE 2-7: Adding Bob to the change the system time user right.

User Account Control (UAC)

Starting with Windows Vista, Microsoft added the User Account Control (UAC) feature, which was improved in Windows 7. When an administrative account logs onto Windows, that user is not initially given administrative access to the system. When the administrator launches a program to perform some administration, Windows prompts the user to raise the privilege level to the administrative level. If the administrator chooses Continue, Windows then elevates the user’s privileges to the administrative privileges.

Microsoft created the feature because over the last few years, a number of security incidents were caused by hackers that caused the user of the computer to run malicious software without the user’s knowledge — and because the user logged on had admin access to the system, so did the program that the user did not know was running. This malicious software that now had admin access could do anything it wanted to the system.

In response, Microsoft created the UAC feature. Now if software runs without your knowledge and tries to manipulate the system, you are prompted to decide whether you want to continue. Unfortunately, you also get prompted when you launch the software yourself, which is why most people get frustrated with the UAC feature. Still, it is a great feature from a security point of view.

You can modify the local security policy to get rid of the UAC prompt and automatically elevate the admin privileges (not recommended). Locate the User Account Control: Behavior of the Elevation Prompt for Administrators in Admin Approval Mode setting in the Security Options section of the Local Policy. You can set the value of the policy to Elevate Without Prompting, as shown in Figure 2-8.

image

FIGURE 2-8: Modifying the UAC feature within the Local Security Policy.

You can also change how the UAC feature works in Windows via the Control Panel (instead of the security policy). To change the UAC settings through the Control Panel, select User Accounts and Family Safety ⇒ User Accounts, and then choose the Change User Account Control Settings link. A dialog box appears that allows you to control when you get the notifications about elevating your privileges (see Figure 2-9). The default is to notify you when a program tries to make a change, but not notify you when you make a change. If you want to remove all notifications, drag the slider to the bottom to the Never Notify setting.

image

FIGURE 2-9: Modifying the UAC feature via Control Panel.

Permissions

Permissions are different than rights: A right governs an action that can be performed on the computer, but a permission is a user’s level of access to a resource. For example, you can give a user permission to read or modify a file. Figure 2-10 shows the permissions you can set for a file.

image

FIGURE 2-10: Looking at NTFS permissions in Windows.

technicalstuff Permissions can be configured only on a partition formatted for NTFS. To obtain an NTFS partition, you can format the partition for NTFS (but lose all existing data), or you can convert the drive to NTFS by using the convert driveletter: /fs:ntfs command. When you convert, the existing data on the drive is preserved.

To modify the permissions on a folder or file in Windows, simply right-click the file or folder and choose Properties. In the Properties window, choose the security page tab to set the permissions.

Here are the available permissions:

  • Read permissions: What I call the “read” permission is a combination of the three default permissions — Read, Read and Execute, and List Folder Contents. I personally classify all three as the read permission because at a minimum, this is typically what users need to read the file.
    • Read: Allows you read the contents of a file
    • Read and Execute: Allows you to read the contents of the file and execute a program
    • List Folder Contents: Allows you to see the file when you look in the folder
  • Modify: Allows a user to read, modify, and delete a file. When given the Modify permission to a folder, a user can also create new files or folders in that folder.
  • Full Control: Allows a user to do everything that the Modify permission allows, and the user can also change permissions on the resource or take ownership of the resource.

    warning If someone can take ownership of the resource, that person can change the permissions. The Full Control permission should be used sparingly so that not everyone has the permission to change permissions on you.

  • Write: Used by the Modify permission to allow users to write to the file or folder. When you choose the Modify permission, you will notice that the Write permission is automatically selected.

fortheexam The major difference between the Modify permission and Full Control permission is that Full Control allows a user to modify permissions and take ownership of the resource in addition to being able to modify and delete the resource.

Looking at Figure 2-10, you will notice a number of permissions with gray check boxes next to them. The gray check box means that you are not allowed to change the permission because the permission is being inherited from a parent level. Permission inheritance (also known as permission propagation) is a feature of Windows that is designed to minimize how much permission management you need to do. With permission inheritance, when you set permission on a folder, that permission applies to all subfolders and files; you don’t need to go to subfolders and files to set the same permission.

When you go to modify the permissions on a folder, however, you need to understand that the existing permissions are being inherited from the parent folder. To change the permissions, you need to break the permission inheritance feature on the folder by going to the properties of the folder, clicking the Security tab, and clicking the Advanced button. That invokes the Advanced Security Settings dialog box for the folder, where you can turn off the Inherit from Parent … option (see Figure 2-11).

image

FIGURE 2-11: Disabling permission inheritance in the Advanced Security Settings dialog box.

After you turn off the inheritance option and click OK to close that screen, you are presented with a dialog box asking whether you want to remove the existing permissions or copy the permission down from the parent folder so that you do not have to set all permissions again. Typically, I choose Remove and then add whoever needs to have access to the folder.

After you remove the existing permissions, you can add new users or groups to the permission list on the Security tab by clicking the Add button. You can type the name of the account or group you want to assign the permission to and then click the Check Names button. After you add all the users and groups to the permission list, you then choose which permission you want assigned to each user by selecting the user in the permission list and then choosing the permission. For example, in Figure 2-12, notice that the Accountants group has the Modify permission.

image

FIGURE 2-12: Giving the accountants the Modify permission.

ontheweb To practice changing permissions and rights, take a look at Lab 2-2, which can be found on the book’s companion website at www.dummies.com/go/aplusaio.

Allow versus deny

Note that the descriptions in this chapter have been about allowing a permission such as the modify permission. From time to time, you may want to take someone’s permissions away with a deny permission. A reason to do this would be if the user is a member of a group that has been allowed a permission and you do not want the user to have the permission; you simply add the user to the access control list and deny him the permission! All users in the group will be allowed the permission except for that one user. Remember that in Windows, the deny permission wins over an allow permission when a conflict occurs.

File attributes

You can change the attributes of a file and make it read-only so that no one can modify the file, or you can make it hidden so that no one can see the file. These are not great practices as far as security goes because when setting a file attribute, it applies to everyone. For example, if you set the read-only attribute on a file, the file cannot be modified by anyone, including users and administrators. With permissions, you get to choose who gets the permission.

Copying and moving files

Permissions on a file can change as you perform file management tasks, such as moving and copying files. The following list shows the outcome if you move or copy a file that has permissions set on it:

  • Move on same partition. When you move a file from one folder to another folder on the same partition, the file keeps its permissions.
  • Copy on same partition. When you copy a file from one folder to another folder on the same partition, the new file inherits the permissions of the folder that it was copied to.
  • Move across partitions. When you move a file from one folder to another on different partitions, the file inherits the permissions of the target folder and does not retain its original permissions. This is because when you move a file between partitions, Windows first copies the file and the deletes the original (if the copy was successful).
  • Copy across partitions. When you copy a file from one partition to another partition, the new file inherits the permissions of the destination folder.

fortheexam Remember the effect that copying and moving files have on the permissions of the destination file.

NTFS versus share permissions

When you share a folder, you have the opportunity to place permissions on the share, as well as to set up your NTFS permissions. (Book 8, Chapter 3 covers sharing network resources such as folders and printers.) The big question is what happens when the two permissions conflict? If a conflict in permissions between NTFS and shared folders exists, the most restrictive takes effect. For example, if you have NTFS permissions of modify on a folder and then you share the folder and give all users the read permission, the permission that takes effect will be the read permission because it is the most restrictive. Remember this for your A+ Certification Exams!

remember The share permission is inherited for the entire folder structure of the share, which is known as permission propagation. Also, remember that administrative shares are already created in Windows, such as the root of every drive. You can connect to them with syntax such as \\computername\c$, but remember that only administrators can connect to administrative shares!

Shared files and folders

You learn about shares in Book 8, Chapter 3, but let’s do a quick review of the key points here and focus on security-related facts you need to know about shares (on top of what you just read).

The purpose of sharing a folder is to ensure that users from across the network can access those files. Once you share the folder, the share is given a name, and users on the network will connect to that folder using the UNC path of \\servername\sharename.

Administrative shares versus local shares

There are two types of shares in Windows: administrative shares and local shares. Administrative shares are default folders that are already shared by Windows, but the permissions on the administrative share are configured so that only administrators can connect to the share. An example where an administrator may use an administrative share is if he or she needed to connect to the root of the drive on the server to copy some files from the server. The roots of all drives are administrative shares by default.

In Windows the following are default administrative shares:

  • Admin$: The Admin$ share is a hidden administrative share that references the Windows folder, typically c:\windows.
  • IPC$: The IPC$ administrative share is used by programs that need to communicate with the system.
  • <DriveLetter>$: The most common administrative share is the fact that the root of each drive is shared on the system, allowing an administrator to access the entire drive remotely. An example of accessing this share would be \\servername\c$.

Not only do we have administrative shares, but administrators can also create local shares. A local share is a folder that is manually shared by the administrator of the system.

Configure shares

You learn how to share a folder in Book 8, Chapter 3, but let’s review the steps to share a folder. To share a folder in Windows 8.1, follow these steps:

  1. Locate the folder you want to share on your system.
  2. Right-click the folder and choose Share With ⇒ Specific People.
  3. In the File Sharing dialog box, choose the user (or group) you want to share the folder with from the drop-down list, and then choose Add.
  4. Choose the Permission Level for the share:
    • Read: Allows the user or group to read files from the share folder but not make changes to the content of the shared folder.
    • Read/Write: Allows the user or group to add a file to the share and modify or delete his or her own files.
    • Owner: Gives the user full permission to the share, including modifying and deleting any files in the share.
  5. Click the Share button.
  6. Click Done.

System files and folders

From a security point of view, you should be familiar with where the system files and folders are for the operating system and ensure that you do not give users unnecessary access to these folders. The Windows operating system is stored in the c:\windows directory, with many of the files being stored in c:\windows\system32. Other examples of folders that store files used by the system are c:\program files and c:\program files (x86). Be sure to limit who has access to those folders.

Implementing Auditing

After you set up security on a Windows system by setting permissions on the folders and files, configuring user rights, and placing users in the appropriate groups, make sure that the security of the OS is effective. To monitor what is happening on the system, you enable auditing, which notifies you when certain things happen on the system. For example, you might want to be notified if someone fails to log on to the system, using a correct username and password — this could be someone trying to guess the password of the account.

To effectively work with the auditing feature in Windows, there are two steps:

  1. Enable auditing.

    You must first enable auditing. Simply choose what events you want to audit. The nice thing about auditing in Windows is that you choose which events you care to know about.

  2. Review the audit log.

    After you enable auditing, ensure that you monitor the log regularly for any security-related issues. For example, if you notice a failure to log on over and over for the same account, that is an indication that an account is being hacked.

The following sections offer more details about these two steps.

Enabling auditing

To enable auditing in Windows, modify the Local Security Policy:

  1. In Windows 7, choose Start ⇒ Control Panel. (In Windows 8.1, right-click the Start icon and choose Control Panel.)
  2. In the Control Panel, choose System and Security and then Administrative Tools.
  3. In the Administrative Tools, double-click Local Security Policy to start the Local Security Policy console.
  4. In the Local Security Policy console, expand Local Policies and then highlight Audit Policy.

    On the right side of the screen (the Details pane) is a list of events for which you can enable auditing (see Figure 2-13):

    • Audit Account Logon: Audit any remote users who are authenticated by this user account database. This is the event to enable auditing on a domain controller.

      technicalstuff A domain controller is a server in a Microsoft network environment that holds all the user accounts for an entire network. In the corporate world, users log on to the network, not a particular machine, which means that the logon request is sent to the domain controller where the username and password are checked against a database. The database that holds the user accounts on a domain controller is known as the Active Directory database.

    • Audit Account Management: Record an event in the log for any user account changes, such as any new accounts that are built, modified, or deleted.
    • Audit Logon Events: Record the fact that the user logged on from this station regardless of whether the account was authenticated from this system.
    • Audit Object Access: Audit access to a specific folder, file, or printer.

      tip After you enable Object Access Auditing, you need to go to the Security page in the properties of a file, folder, or printer and click the Advanced button. Click the Auditing tab and choose which users and which permissions to audit for. You must perform this step on any folder, file, or printer you want to audit.

    • Audit Policy Change: Notification of any change to the security policy.
    • Audit Privilege Use: Logs when a user takes advantage of any rights you have given that user. For example, if you give Bob the right to perform backups, you want to know when he actually performs a backup.
    • Audit Process Tracking: Notification of when a process starts or exits.
    • Audit System Events: Notification of system-related actions, such as restarting or shutting down the system. You might want to be aware when the system is restarted, especially on server OSes.
  5. To enable auditing on one of these events, double-click the event and then choose whether you want to audit the success of that event or the failure.

    For example, I do not care about the success of logons, so I would choose Failure for that event.

image

FIGURE 2-13: Looking at the auditing feature within the Local Security Policy.

Reviewing the security log

After you enable auditing on the different events, you then need to view the audited information in the security log of event viewer:

  1. In Windows 7, choose Start ⇒ Control Panel. (In Windows 8.1, right-click the Start icon and choose Control Panel.)
  2. In the Control Panel, choose System and Security and then Administrative Tools.
  3. In the Administrative Tools, double-click the Event Viewer to start the Event Viewer console.
  4. On the left side, expand Windows Logs and then select the log that you want to view.

    Note the events on the right side of the screen. If you select the security log, as shown in Figure 2-14, any events with a lock are failure events, and any events with a key are successful events. Figure 2-14 shows an account logon event with a lock, indicating a failure to log on.

  5. (Optional) To view a description of a particular event, double-click the event.

    Going back to the account logon failure example, you can see the date and time the logon was attempted. You can also view the username that was attempted and the computer that the person used to try to log on to the network.

image

FIGURE 2-14: Review the security log that is populated by the auditing feature of Windows.

fortheexam After enabling auditing, review the security events by checking out the Security log in Event Viewer.

Implementing Firewalls

A firewall is software or hardware designed to stop information from reaching your system unless you selectively choose certain pieces of information to pass through. This information is sent in the form of network packets (pieces of data) that are broken down into three parts:

How a firewall works

A firewall is designed to look at the contents of the packet — specifically, the header information — to decide whether the data should be allowed into the system or discarded. The firewall uses the source and destination IP addresses from the header, as well as the port number, to help make this decision. A port number represents an application that runs on the system. For example, the web server installed on my system runs at my IP address on port 80. The FTP server I am also running on my system uses my IP address but uses port 21 instead of port 80. If I want to allow the public to see my website but not my FTP site, I configure the firewall to allow information to reach port 80 but not port 21. So each TCP/IP application that is running on your system uses a different port number, which is how data is sent to one application and not the other.

My point is that the firewall also uses the port number to decide whether the data should be allowed into your system. For example, I have a website at www.gleneclarke.com so I had to configure my firewall to allow data destined for port 80 to be allowed in. Now, I don’t have an FTP server, so I ensured that the firewall disallows data destined for port 21.

tip Understand that you don’t need to open ports on the firewall unless you are hosting your own servers. For example, you don’t need to open ports on the firewall to surf the Internet because most firewalls are built to allow responses to data you requested to come back through the firewall.

To enable the Windows Firewall, follow these steps:

  1. In Windows 7, choose Start ⇒ Control Panel. (In Windows 8.1, right-click the Start icon and choose Control Panel.)
  2. In the Control Panel, choose System and Security and then Windows Firewall (see Figure 2-15).

    You will notice a green check mark on the screen, stating that the Windows Firewall is turned on, or red squares indicating the firewall is off. You can also see the status of On or Off in the Windows Firewall state.

  3. If the firewall is not turned on, click the Turn Windows Firewall on or off link (refer to Figure 2-15).
  4. You can then turn on the Windows Firewall for each network location or turn the Windows Firewall off if you like (not recommended).
image

FIGURE 2-15: The Windows Firewall in Control Panel.

Creating a DMZ

Most companies that want to publish their own websites or host other types of servers (such as FTP servers or email servers) need to allow traffic to reach these types of servers. Placing public servers such as these alongside your private network servers is unrealistic because it means that you need to open the firewall to allow traffic into the network to reach these servers.

As a work-around, most network administrators create a demilitarized zone (DMZ) to hold these servers. A DMZ is a network segment between two firewalls where you have allowed selected traffic to reach the servers in the DMZ. The DMZ is different from your private network because you will not allow any content to come into your private network.

Figure 2-16 displays a typical DMZ setup. Note the two firewalls: firewall 1 and firewall 2. Firewall 1 connects the DMZ to the Internet and will allow only traffic destined for the three servers in the DMZ to pass through the firewall. The second firewall (firewall 2) is designed so that no systems from the Internet can pass through it, essentially protecting the private company network from outside access.

image

FIGURE 2-16: Identifying a DMZ.

fortheexam Servers that you want to expose out to the Internet should be placed in a DMZ so that you can selectively choose which type of data is allowed to reach your servers.

Hardware versus software firewalls

There are hardware firewall solutions that are physical devices placed on the network between the clients on the network and the Internet. The benefits of using hardware firewalls are that they typically outperform a software firewall, and you get the extra security benefit of having a separate security device between you and the Internet. Too, a hardware firewall solution typically protects the entire network and not just one system. Software firewalls have the benefit of being much cheaper than a hardware firewall.

Hardware firewalls

A number of vendors make hardware firewalls; for example, Cisco offers the Cisco ASA firewall device. You can also use your home router as a firewall; home routers have firewall features that allow you to control what traffic is allowed to enter your network.

Software firewalls

Software firewalls are applications installed on your computer that protect only that computer. So-called personal firewall software, this kind of firewall protects only your personal computer: the one with the firewall software installed.

A number of different software firewall solutions are available. For example, Zone Alarm is a free software firewall that you can download and install on your system. Each operating system will typically have its own firewall software built-in as well. For example, Linux has iptables, and Windows has the Windows Firewall. Because most operating systems have built-in firewall software, you will most likely not need to download and install any other software.

Port security and exceptions

When configuring the firewall, you typically specify rules that control which packets are allowed or not allowed to enter the network. A default rule that you typically set first states “Drop all packets” or “Accept all packets,” and then you build a list of exceptions to that default rule.

For example, on my network, I have the default rule to drop all packets, but then I have an exception that says if traffic is destined for port 80, allow that traffic into the network. This way, people on the Internet can reach my website.

To configure exceptions in Windows, follow these steps:

  1. In Windows 7, choose Start ⇒ Control Panel. (In Windows 8.1, right-click the Start icon and choose Control Panel.)
  2. In the Control Panel, choose System and Security and then Windows Firewall.
  3. Choose the Allow a Program or Feature through Windows Firewall link, located on the left side of the screen.

    You can then select the type of traffic that is allowed to pass through the firewall. For example, if you want to be able to Remote Desktop into the system, choose the check box for Remote Desktop to open the RDP port on the firewall (which is TCP port 3389).

    If the program you want allow traffic through does not exist in the list, you can add an exception to the list.

  4. (Optional) To add an exception for an application or a type of traffic not in the list, click the Allow another Program button.
  5. Select the program you want to allow to communicate through the firewall and choose Add.
  6. Click OK and close all Windows to exit the Control Panel.

In Book 8, Chapter 3, you read more about the firewall in Windows. Within the Control Panel ⇒ System and Security ⇒ Windows Firewall dialog box, you can choose Allow a Program or Feature through Windows Firewall. If you need more flexibility, you will need to add exceptions through the Windows Firewall with Advanced Security. Here you can add exceptions by port values.

Windows Firewall with Advanced Security

If you need full control of the firewall in Windows and the capabilities to create firewall rules (exceptions) that control both inbound traffic and outbound traffic, you need to use the Windows Firewall with Advanced Security tool. Let’s walk through an example of opening a port on the firewall by creating our own rule:

  1. In Windows 7, choose Start ⇒ Control Panel. (In Windows 8.1, right-click the Start icon and choose Control Panel.)
  2. In the Control Panel, choose System and Security and then Windows Firewall.
  3. Choose Advanced Settings to open the Windows Firewall with Advanced Security dialog box.
  4. To create a new rule that controls traffic allowed to enter the system, choose Inbound Rules.
  5. Right-click Inbound Rules and then choose New Rule.
  6. To create a rule that opens a port on the firewall, choose Port and then choose Next.
  7. Select the protocol — either TCP or UDP — and then type the port number you want to open and choose Next.

    In my example, I am going to create a custom rule to open a port for my web server so I am using TCP and port 80 (see Figure 2-17).

  8. Choose whether you are allowing this traffic through the firewall or blocking it and then choose Next.

    I am choosing Allow the Connection.

  9. Choose Next to accept the default network locations the rule applies to.
  10. Give the rule a name such as “A+ Web Server Port” and then choose Finish.
image

FIGURE 2-17: Windows Firewall with Advanced Security.

Once you have added the rule, you can then enable or disable the rule at any time by right-clicking the rule and choosing Enable Rule or Disable Rule.

remember TCP is used for traffic that requires a connection to be established, and UDP is for connectionless. I want to go with TCP because FTP uses the TCP protocol.

Security Center versus Action Center

The Action Center in Windows is a central window that informs you of critical security mistakes with your system. In the Action Center, you can see whether you have a firewall enabled on your system and whether antivirus software is installed. (If Windows does not see antivirus software installed on the system, it reports virus protection as not found!) You can also see from the Action Center if Windows Update is not receiving automatic updates or if Windows Defender is out of date. Windows Defender is the malware protection software built into Windows.

From the Action Center, buttons are available so that you can manage Windows Defender updates, change your Windows update settings, or even perform a backup.

In the Action Center, you can also change your UAC settings, perform a backup, or perform a restore of a restore point. To get to the Action Center, choose Start ⇒ Control Panel ⇒ System and Security ⇒ Action Center.

Implementing Security Best Practices

In the following sections, you discover some basic best practices that can help you secure your environment. These sections are designed to be a summary of features that I discuss throughout the chapters of this book.

Hardening a system

The first thing you can do to secure your system is to harden it: You remove any software that you are not using and disable any Windows services that are not needed. The concept of hardening comes from the fact that hackers compromise systems by leveraging software that is installed or running on the system. The less software you have running, the less likely you are to be hacked!

Patching systems

Regularly patching the system by running Windows Update is critical. As Microsoft finds out about security problems with its OS and software, its programmers fix the problem and deliver the fix through the Windows Update site. To ensure that you are getting the security fixes and patches, you must run Windows Update often. More on this topic in the next chapter.

tip Even though the feature is called Windows Update, you can get updates for more than just the Windows operating system. You can download updates for a number of Microsoft products from the Windows Update site, such as Windows and Microsoft Office.

Firewalls

Make sure you turn on the Firewall feature in Windows. The firewall helps protect your system from network attacks, but it is not the be-all and end-all of network security. You also need to follow the other best practices presented in this chapter.

Password policies

Stress to your users the importance of using strong passwords. To enforce strong password usage, you can set a password policy in the Local Security Policies. To set the password policy, follow these steps:

  1. In Windows 7, choose Start ⇒ Control Panel. (In Windows 8.1, right-click the Start icon and choose Control Panel.)
  2. In the Control Panel, click System and Security and then click Administrative Tools, located toward the bottom of the window.
  3. In the Administrative Tools, double-click Local Security Policy to start the Local Security Policy console.
  4. Expand Account Policies and highlight Password Policy.
  5. Ensure that users use strong passwords by double-clicking the Password Must Meet Complexity Requirements policy and then choose Enable (see Figure 2-18).

    This setting ensures that users use passwords of a minimum of six characters, with a mix of uppercase and lowercase characters, numbers, and symbols. The password will also not contain any part of the username.

image

FIGURE 2-18: Configuring password complexity in Windows.

Auditing

Make sure that you enable auditing on critical systems so that you will know (hopefully) when the system has been compromised. For example, if a hacker makes his way into the system and builds himself a hidden user account, you will know about it if you have enabled account management auditing.

Encrypt sensitive data

Another big part of security is ensuring the confidentiality of your data. The best way to ensure confidentiality is to use encryption technologies to encrypt your data as it sits on the hard drive. This ensures that if someone steals your computer or hard drive, he or she will not be able to read the data as it is encrypted.

Windows has a number of features to encrypt data, such as EFS, Bitlocker, and Bitlocker-To-Go.

EFS

Encrypting File System (EFS) is an older NTFS feature that is designed to encrypt files (and not the entire disk). To encrypt a file with EFS, follow these steps:

  1. Right-click the file you want to encrypt and then choose Properties.
  2. On the General tab, choose the Advanced button at the bottom of the screen to go to the Advanced Attributes dialog box.
  3. Select the Encrypt Contents to Secure Data check box and then choose OK twice to exit out.

Keep in mind that this is a feature that is designed to be transparent to the users. Once the file is encrypted, as soon as you open the file it is automatically decrypted. When you close the file, it is again encrypted to disk.

Once you have encrypted the file you can go back to the Advanced Attributes dialog and add additional people who can decrypt the file. Underneath the scenes EFS uses certificates to encrypt the information.

BitLocker

BitLocker is a Windows feature that allows you to encrypt the entire disk. This ensures that if someone steals your hard drive and then tries to connect it to another system to read the data, he or she will be unsuccessful because the entire drive is encrypted. Keep in mind that BitLocker is only available to the Ultimate and Enterprise editions of Windows Vista and Windows 7, and the Pro and Enterprise editions of Windows 8.1.

With BitLocker you can have the encryption keys stored in a computer chip on the computer, known as a Trusted Platform Module (TPM). A TPM is a chip on the motherboard that is used to store encryption keys that can be used by BitLocker to encrypt the drive. You can also use BitLocker in USB key mode where the keys are stored on a USB device. This means you would need the USB key to be able to decrypt and access the drive.

BitLocker-To-Go

BitLocker-To-Go is the Windows feature that allows you to encrypt the contents of a removable drive such as a USB drive. This ensures that if your USB drive that contains sensitive data is ever lost, you have the confidence of knowing the data is unreadable on the drive.

Use switches instead of hubs

You can enable a number of security features when working with switches instead of hubs on the network. To begin with, switches filter traffic by sending only data to the port on the switch that the data is destined for. This can add to the security of the network because it is harder for a hacker to monitor network traffic when the port the hacker is using is not getting a copy of all data — just data destined for his system.

The second thing you could do to secure your environment with a switch is disable any unused ports on the switch. This way, if the hacker gets physical access to your network, she cannot simply plug into the switch to get access to the network.

The other thing you could do with more advanced switches is to configure a virtual local area network (VLAN), which is a grouping of ports on the switch that are allowed to communicate with one another but cannot communicate with other VLANs on the same switch. For example, I have a 24-port switch with two VLANs. The first VLAN comprises the first 12 ports, and the second VLAN comprises the last 12 ports. Any systems plugged into the first 12 ports cannot communicate with the systems on the second set of 12 ports, and vice versa. Essentially, you have two networks — but only one switch.

Use antivirus software

Using antivirus software is another security best practice. Ensure you are using antivirus software on all your systems and keep the virus definition database up to date! Antivirus software is designed to protect your system against viruses. For more information on antivirus software, check out Book 9, Chapter 3.

Securing wireless

As a last note, I just want to add a few tips here to help secure your wireless environment. You can configure most of these settings on the wireless router by navigating to the administration site of the router, which involves starting a web browser and entering either 192.168.0.1 or 192.168.1.1. If you have hit the web administration pages of the wireless router, you will be asked to log on. Most routers have a default username of admin with no password that you will use to logon.

After you are logged onto the router, locate the following options in the administration pages:

  • Router password: After you hook up your wireless router, be sure to connect to the router and change the admin password. Most wireless routers ship with no password, so be sure to protect your router by assigning one. Check the documentation that came with your router to find out how to set an admin password.
  • Setting the SSID: The Service Set Identifier (SSID) is a name assigned to your wireless network. You should change the name of the SSID, but do not use your company name. When hackers are “war driving,” they pick up on a signal from a wireless network. Say the SSID says “BridgetsWidgets.” Hackers then look for the building with the Bridget’s Widgets sign. When they spot the sign, they then drive close to the building so that they get a stronger signal. Don’t make it easy for them to figure out what building to get close to!
  • Disabling SSID broadcasting: After you set the SSID, you also want to disable SSID broadcasting. The wireless router broadcasts the SSID so that anyone who gets close will know the wireless network is there. If you disable broadcasting, then to connect to the wireless network, a person has to know and input the SSID manually into his network client. Keep in mind that programs such as Kismet can still discover a wireless network that has SSID broadcasting disabled.
  • MAC address filtering: If you check the administration pages on your wireless router, there is a place for you to enable MAC address filtering. This feature allows you to control which systems can connect to the wireless network by the MAC address of their network card. After MAC address filtering is enabled, only the MAC addresses listed can connect to the network. Keep in mind hackers can spoof their MAC address to bypass your MAC filtering so the feature can be compromised if someone is determined.
  • Enable Encryption (WEP/WPA/WPA2): Be sure to enable some form of encryption for your wireless network. You can use a number of protocols to encrypt traffic on your wireless network: WEP, WPA, or WPA2 depending upon what is supported by your wireless router. It is important to note that the WEP protocol is easy to crack and should be avoided if possible. Use WPA2 as your wireless encryption protocol when possible.

For more information on wireless networking, check out Book 8, Chapter 2.

Getting an A+

This chapter introduces you to a number of best practices for securing your Windows environment. Some of the key points to remember for the A+ Exams are to

Prep Test

1. You are the IT technician for a company and working on ways to secure the system. You would like to control network traffic that enters into the Windows 8.1 system. What security feature stops network packets from entering the system through the network card?

(A) Auditing

(B) Password policy

(C) Permissions

(D) Firewall

2. What is the network name assigned to the wireless network?

(A) WEP

(B) SSID

(C) SID

(D) WPE

3. You are securing a folder and want to allow a user to read, modify, create, and delete a file. What permission would you assign?

(A) Read

(B) Full Control

(C) Modify

(D) Deny

4. You are working with the security team within your company to ensure systems are configured securely and monitored on a regular basis. You have enabled auditing; where do you go to view the audit information?

(A) Local Security Policy

(B) Event Viewer

(C) LAN Connection Properties

(D) Firewall

5. A privilege to perform an operating system task is known as what?

(A) Permission

(B) Policy

(C) Right

(D) Firewall

6. You need to give Sue the capabilities to manage permissions on a file. What permission allows her to modify the permissions?

(A) Read

(B) Full Control

(C) Modify

(D) Deny

7. Management has requested that users be able to change the time on the computer. What is the best way to allow Bob to change the time on his computer?

(A) Enable an Audit Policy.

(B) Place Bob in the Administrators group.

(C) Assign Bob the Change System Time permission.

(D) Assign Bob the Change System Time right.

8. Which security features might you enable through the system BIOS?

(A) Boot devices

(B) Password policy

(C) Permissions

(D) Audit policy

Answers

  1. D. A firewall is designed to stop data from entering your system through the network card. See “Implementing Firewalls.”
  2. B. The SSID is the name assigned to the wireless network. Review “Securing wireless.”
  3. C. To allow users to read, modify, create, and delete a file, you assign the Modify permission. Check out “Implementing Permissions and Rights.”
  4. B. When auditing has been enabled, you view the auditing information by reviewing the security log in Event Viewer. Peruse “Implementing Auditing.”
  5. C. A right gives you the privilege to perform an operating system task. Take a look at “User rights.”
  6. B. The Full Control permission allows users to modify permissions on a file or folder. Peek at “Permissions.”
  7. D. You would assign Bob the Change System Time right. You could put Bob in the Administrators group, but that is not the best answer because you have given him a number of other capabilities at the same time. Look over “User rights.”
  8. A. The boot devices can be disabled through the BIOS, which controls whether someone can bypass your operating system by booting from a bootable CD or floppy. Study “Securing Systems through BIOS/UEFI.”