Windows Enterprise Domain
IT Administrator Support
Windows System Security
It is critical that any Windows system be updated with the latest service
packs and patches and also be running anti-virus software that is updated
with virus definitions DAILY. There are several proactive measures
implemented at the enterprise level (such as mail virus scanning for mail
passing through enteprise mail servers and certain ports being blocked
at the campus borders). However, by the nature of our open environment
and wide variety of systems that connect via insecure means to off-campus
systems (or on-campus people with dubious spare-time activities) you must
assume every system is vulnerable to attack from within or without or
campus borders. There are several things you should be aware of and
are encouraged to do.
-
To reduce off-campus Windows account hacking, selected Windows
authentication and remote procedure call (RPC) ports are blocked at the
campus borders. These blocks became effective November 18, 2003. A "Virtual
Private Connection" (VPN) connection will be necessary to use
off-campus Windows authentication for file and print sharing after this date.
See
Port Blocking at the Campus Border
for more information.
-
Hacking attacks from off-campus often occur using the Windows Remote Desktop
Protocol (RDP). This can cause your system to be blocked at the campus
border since it is the vector for the attacks. See
Remote Desktop Protocol Attack
Prevention for current recommendations.
-
Anti-virus software for clients and servers is available under a campus-wide
site-license for university-owned systems
(Microsoft Forefront Endpoint Protection). Non-university-owned systems
can select from a number of freeware and commercial anti-virus packages.
Microsoft's Security Essentials is one recommendation.
-
It is recommended that any Windows system be
at the current Service Pack for the OS. This is available
from Microsoft.
-
Use the "Windows Update" feature (on the "Start" menu) to make sure you have
all "Critical" updates installed on your system.
-
A local "Windows System Update Server" ("WSUS") is available for the ISU enterprise.
This server provides a "local mirror" of Microsoft updates and is available
for "on-campus" systems ("*.iastate.edu" and "*.ameslab.gov"). OU
administrators in ISU Enterprise domain can configure Group Policy to
automatically apply updates to their managed systems. Even systems that are
not members of the ISU Enterprise domain can use local security policy settings
to automatically be updated from this server. A
document on using the ISU Enterprise WSUS server is available
here.
-
It is important to apply any security hotfixes in addition to the current
Service Pack
and the critical updates. Use the following site provided by Microsoft to
see what is needed for each product you are running:
Microsoft Security Hotfix List
Example: Supply "Windows Server 2008" for the "Product:" and "Windows Server
2008 Service Pack 2" for the "Service Pack:" fields and click "Go". You will see
all security hotfixes which should be applied to a server at SP2. Be sure
to get the hotfix list for each product from the list you are running on
your servers (IIS, Exchange, etc).
REVIEW the description of each hotfix before you apply it. Some hotfixes
have been superseded by others in the list. Always apply hotfixes so they
can be backed off as necessary should they create a problem with your
server.
Another good tool to use is the
Microsoft Baseline Security Analyzer.
This product provides a scan of your system (or a remote system that you
have administrative rights on) for many security issues, including missing
security hotfixes, poor passwords, open file shares, etc. Make sure you
run this tool with "administrative" rights on the system being scanned!
-
An
IIS Lockdown Tool
is available from Microsoft. IIS admins may want to investigate this.
-
In the event you feel a Windows system may have been compromised (as
evidenced by missing security hotfix patches or strange system behavior) you
should review the
Compromised System Forensics
document for tips on how to proceed.
Last updated
September 30, 2011