19.06.2014 Views

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IT <strong>Security</strong><br />

Guidance<br />

<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong><br />

<strong>Baseline</strong><br />

March 2004<br />

ITSG-20


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

This page intentionally left blank.<br />

March 2004


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

Foreword<br />

The <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> is an unclassified publication, issued<br />

under the authority of the Chief, Communications <strong>Security</strong> Establishment (CSE).<br />

CSE wishes to acknowledge Microsoft for the “<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide” and<br />

“Threats and Counter Measures: <strong>Security</strong> Settings in <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> and <strong>Windows</strong> XP”<br />

documents which are both used as reference.<br />

For further information, please contact CSE’s:<br />

Client Contact Centre<br />

cryptosvc@cse-cst.gc.ca (e-mail)<br />

613-991-8495 (tel)<br />

_______________________________________<br />

Diane Keller<br />

A/Director, Architecture and Engineering<br />

©2004 Government of Canada, Communications <strong>Security</strong> Establishment<br />

It is permissible to make extracts from this publication, provided the extracts are for Government<br />

of Canada departmental use. For commercial purposes, written permission from CSE is required.<br />

Foreword March 2004 i


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

This page intentionally left blank.<br />

ii March 2004 Foreword


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

Disclaimer of Responsibility<br />

This product review was prepared by CSE for the use of the federal government. The review is<br />

informal and limited in scope. It is not an assessment or evaluation, and does not represent an<br />

endorsement of the product by CSE. The material in it reflects CSE’s best judgement, in light of<br />

the information available to it at the time of preparation. Any use which a third party makes of<br />

this report, or any reliance on or decisions made based on it, are the responsibility of such third<br />

parties. CSE accepts no responsibility for damages, if any, suffered by any third party as a result<br />

of decisions or actions based on this report.<br />

© 2004 Government of Canada, Communications <strong>Security</strong> Establishment (CSE)<br />

P.O. Box 9703, Terminal, Ottawa, Ontario, Canada, K1G 3Z4<br />

This publication may be reproduced verbatim, in its entirety, without charge, for educational and<br />

personal purposes only. However, written permission from CSE is required for use of the<br />

material in edited or excepted form, or for any commercial purpose.<br />

Disclaimer of Responsibility March 2004 iii


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

This page intentionally left blank.<br />

iv March 2004 Disclaimer of Responsibility


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

Record of Amendments<br />

Amendment No. Date Entered by<br />

Record of Amendments March 2004 v


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

This page intentionally left blank.<br />

vi March 2004 Record of Amendments


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

Executive Summary<br />

This guide provides detailed guidance for hardening a <strong>Windows</strong> <strong>2003</strong> <strong>Server</strong>. Deploying<br />

hardened servers is critical when protecting information technology (IT) from attack. By using<br />

the information in this guide, System Administrators can install packages that will deploy<br />

hardened servers in their environment.<br />

The intent of this guide is to provide a very secure <strong>Baseline</strong> configuration. System<br />

Administrators may then add functionality as needed.<br />

To help System Administrators add functionality, two configurations are provided: a print server<br />

and a file server.<br />

This guide has been developed using the “Microsoft <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide”<br />

[Reference 1] as reference. The Microsoft guide was analyzed and tested at CSE. The result is<br />

detailed instructions on:<br />

• Necessary software<br />

• Registry keys<br />

• <strong>Security</strong> settings<br />

• Internet Protocol <strong>Security</strong> (IPSec)<br />

Executive Summary March 2004 vii


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

This page intentionally left blank.<br />

viii March 2004 Executive Summary


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

Table of Contents<br />

Foreword......................................................................................................................... i<br />

Disclaimer of Responsibility ....................................................................................... iii<br />

Record of Amendments................................................................................................ v<br />

Executive Summary .................................................................................................... vii<br />

Table of Contents......................................................................................................... ix<br />

List of Tables .............................................................................................................. xiii<br />

List of Figures ............................................................................................................. xv<br />

List of Abbreviations and Acronyms....................................................................... xvii<br />

1 Introduction......................................................................................................... 1<br />

1.1 Background................................................................................................ 1<br />

1.2 Aim............................................................................................................. 1<br />

1.3 Scope......................................................................................................... 1<br />

1.4 Approach ................................................................................................... 2<br />

1.5 Functional and <strong>Security</strong> Testing................................................................. 2<br />

1.6 Assumptions .............................................................................................. 2<br />

1.7 Related documents.................................................................................... 2<br />

1.8 Document Structure................................................................................... 2<br />

1.9 Typographic Conventions .......................................................................... 3<br />

1.10 Reference Documents ............................................................................... 3<br />

2 Overview: Information Technology <strong>Security</strong> Guidance for <strong>Windows</strong> <strong>Server</strong><br />

<strong>2003</strong> ..................................................................................................................... 5<br />

2.1 How to Use This Document ....................................................................... 5<br />

2.1.1 Installation....................................................................................... 5<br />

2.1.2 Configuration................................................................................... 5<br />

2.1.3 Monitoring and Enforcement ........................................................... 6<br />

2.2 Assumptions / Restrictions......................................................................... 6<br />

2.2.1 Installation....................................................................................... 6<br />

2.2.2 Policy .............................................................................................. 6<br />

2.2.3 Policy Monitoring and Enforcement................................................. 6<br />

3 Automated Installation....................................................................................... 7<br />

3.1 Initiating Automated Installation ................................................................. 7<br />

3.2 Domain <strong>Server</strong> Installation Configuration file ............................................. 7<br />

3.2.1 Winnt.sif (Domain)........................................................................... 8<br />

3.3 Workgroup <strong>Server</strong> Installation Configuration file...................................... 24<br />

3.3.1 Winnt.sif (Workgroup) ................................................................... 25<br />

4 <strong>Server</strong> Policy Files............................................................................................ 43<br />

4.1 Policy File Application.............................................................................. 43<br />

4.1.1 Policy Application in a Domain...................................................... 43<br />

4.1.2 Policy Application in a Workgroup................................................. 44<br />

Table of Contents March 2004 ix


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.2 <strong>Baseline</strong> <strong>Server</strong> Policy Files Details ........................................................ 45<br />

4.3 Account Policies ...................................................................................... 45<br />

4.3.1 Password Policy............................................................................ 45<br />

4.3.2 Account Lockout Policy ................................................................. 46<br />

4.3.3 Kerberos Policy ............................................................................. 47<br />

4.4 Local Policies........................................................................................... 48<br />

4.4.1 Audit Policy ................................................................................... 48<br />

4.4.2 User Rights Assignments.............................................................. 49<br />

4.4.3 <strong>Security</strong> Options............................................................................ 56<br />

4.5 Event Log................................................................................................. 69<br />

4.5.1 Log Size ........................................................................................ 69<br />

4.5.2 Guest Access................................................................................ 70<br />

4.5.3 Retention Method.......................................................................... 70<br />

4.6 System Services ...................................................................................... 70<br />

4.6.1 Services Explicitly Covered by Microsoft Guidance ...................... 71<br />

4.6.2 Services Not Explicitly Covered by Microsoft Guidance................ 97<br />

4.7 Additional <strong>Security</strong> Settings ..................................................................... 98<br />

4.7.1 <strong>Security</strong> Consideration for Network Attacks .................................. 98<br />

4.7.2 AFD.SYS Settings....................................................................... 100<br />

4.7.3 Other <strong>Security</strong> Related Settings.................................................. 101<br />

4.7.4 Manual Activities ......................................................................... 102<br />

4.7.5 Access Controls .......................................................................... 105<br />

4.7.6 Variance from Microsoft Guidance.............................................. 111<br />

5 Role Based <strong>Server</strong> Policies ........................................................................... 117<br />

5.1 Role Based IPSec Policies .................................................................... 117<br />

5.1.1 Load IPSec policy ....................................................................... 117<br />

5.1.2 Activate IPSec Policy .................................................................. 117<br />

5.2 Domain File <strong>Server</strong> <strong>Security</strong> Policy........................................................ 118<br />

5.2.1 Variance from Microsoft “Hardening File <strong>Server</strong>s” Guidance ...... 118<br />

5.2.2 [Service General Setting] ............................................................ 119<br />

5.2.3 Domain File <strong>Server</strong> IPSec Policy ................................................ 119<br />

5.3 Domain Print <strong>Server</strong> Policy .................................................................... 121<br />

5.3.1 Variance from Microsoft “Hardening Print <strong>Server</strong>s” Guidance .... 121<br />

5.3.2 [Registry Values] ......................................................................... 121<br />

5.3.3 [Service General Setting] ............................................................ 122<br />

5.3.4 Domain Print <strong>Server</strong> IPSec Policy............................................... 122<br />

5.4 Workgroup File <strong>Server</strong> Policy ................................................................ 124<br />

5.4.1 Variance from Microsoft Guidance.............................................. 124<br />

5.4.2 [Registry Values] ......................................................................... 124<br />

5.4.3 [Service General Setting] ............................................................ 124<br />

5.4.4 Workgroup File <strong>Server</strong> IPSec Policy ........................................... 125<br />

5.5 Workgroup Print <strong>Server</strong> Policy............................................................... 126<br />

5.5.1 Variance from Microsoft Guidance.............................................. 126<br />

5.5.2 [Registry Values] ......................................................................... 127<br />

5.5.3 [Service General Setting] ............................................................ 127<br />

5.5.4 Workgroup Print <strong>Server</strong> IPSec Policy.......................................... 127<br />

x March 2004 Table of Contents


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

6 <strong>Server</strong> Policy Compliance: Inspection and Enforcement ........................... 131<br />

6.1 Configuration of Microsoft Management Console (MMC) ...................... 131<br />

6.2 Load Policy File and Computer Configuration........................................ 131<br />

6.3 Compare Resultant Policy and Computer Settings................................ 132<br />

Bibliography .............................................................................................................. 133<br />

Annex A...................................................................................................................... 135<br />

Table of Contents March 2004 xi


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

This page intentionally left blank.<br />

xii March 2004 Table of Contents


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

List of Tables<br />

Table 1 – General File Access Controls ...................................................................... 106<br />

Table 2 – General Registry Access Controls............................................................... 109<br />

Table 3 – Variance from Microsoft Member <strong>Server</strong> <strong>Baseline</strong> ...................................... 111<br />

Table 4 – Variance from Microsoft Bastion Host Local Policy ..................................... 114<br />

List of Figures March 2004 xiii


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

List of Figures<br />

Figure 1 – Example Active Directory Structure................................................................ 7<br />

List of Figures March 2004 xv


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

This page intentionally left blank.<br />

xvi July 2004 List of Abbreviations and Acronyms


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

List of Abbreviations and Acronyms<br />

.NET<br />

Microsoft Tools for development environment<br />

AD<br />

Active Directory<br />

ADSI<br />

Active Directory Service Interface<br />

API<br />

Application Program Interface<br />

ASCII<br />

American Standard Code for Information Interchange<br />

ASP<br />

Active <strong>Server</strong> Pages<br />

COM<br />

Component Object Module<br />

DDE<br />

Dynamic Data Exchange<br />

FTP<br />

File Transfer Protocol<br />

GB<br />

Gigabyte<br />

GUI<br />

Graphical User Interface<br />

HTTP<br />

HyperText Transfer Protocol<br />

HTTPS<br />

Secure HyperText Transfer Protocol<br />

IAS<br />

Internet Authentication Service<br />

ICF<br />

Internet Connection Firewall<br />

ICMP<br />

Internet Control Message Protocol<br />

ICS<br />

Internet Connection Sharing<br />

IIS<br />

Internet Information <strong>Server</strong><br />

IMAPI<br />

Image Mastering Application Programming Interface<br />

IP<br />

Internet Protocol<br />

IPSec<br />

Internet Protocol <strong>Security</strong><br />

IPX<br />

Internetwork Packet Exchange<br />

ISAPI<br />

Internet <strong>Server</strong> API<br />

KB<br />

Kilobyte<br />

LAN<br />

Local Area Network<br />

LM<br />

LAN Manager<br />

MB<br />

Megabyte<br />

MMC<br />

Microsoft Management Console<br />

MQDSS<br />

Message Queue Directory Service Support<br />

MSMQ<br />

Microsoft Message Queue<br />

MSN<br />

Microsoft Network<br />

NNTP<br />

Network News Transfer Protocol<br />

NTLM<br />

<strong>Security</strong> Service Provider<br />

OSPF<br />

Open Shortest Path First<br />

POP3 Post Office Protocol 3<br />

RAD<br />

Rapid Application Development<br />

RADIUS<br />

Remote Authentication Dial-In Service<br />

RPC<br />

Remote Procedure Call<br />

List of Abbreviations and Acronyms March 2004 xvii


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

SAM<br />

SID<br />

SMB<br />

SMTP<br />

SNMP<br />

SYN-ACK<br />

SYN-ATTACK<br />

TCP<br />

UI<br />

VPN<br />

WHQL<br />

WMI<br />

WMPOCM<br />

WPAD<br />

WWW<br />

<strong>Security</strong> Accounts Manager<br />

<strong>Security</strong> Identifier<br />

<strong>Server</strong> Message Block<br />

Simple Mail Transfer Protocol<br />

Simple Network Management Protocol<br />

Synchronization Acknowledgement<br />

Attacker sends SYN requests to a target (victim). The target sends<br />

a SYN ACK in response and waits for an ACK to come back to<br />

complete the session set up.<br />

Transmission Control Protocol<br />

User Interface<br />

Virtual Private Network<br />

<strong>Windows</strong> Hardware Quality Lab<br />

<strong>Windows</strong> Management Interface<br />

<strong>Windows</strong> Media Player<br />

Web Proxy Autodiscovery<br />

World Wide Web<br />

xviii March 2004 List of Abbreviations and Acronyms


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

1 Introduction<br />

1.1 Background<br />

Threat agents exploit vulnerabilities to either gain control or disable a computer. Experts differ<br />

on what may be the primary cause of computer vulnerabilities. Some will agree that two causes<br />

are exploitation of defects in software, and lack of secure configurations.<br />

To address software defects, vendors issue patches in many forms. These are designed to<br />

address software defects particular to an operating system or application. Although they fix one<br />

problem, patches create other issues. In addition to patches, checklists are used to provide<br />

computer users with secure and tested configuration guides.<br />

In the past, Government agencies 1 have produced and disseminated checklists for securing<br />

computer systems. However, the way checklists are produced has changed. Vendors realize<br />

benefits producing configuration checklists for their own products. In turn, public and private<br />

organizations save time and money by leveraging this complex work.<br />

1.2 Aim<br />

ITSG-20 provides a practical set of security settings for Microsoft <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong>. The<br />

aim is to establish and maintain a High <strong>Security</strong> <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> environment.<br />

There are two platform variants: Domain <strong>Server</strong> and Workgroup <strong>Server</strong>. We cover two<br />

applications as well: Print <strong>Server</strong> and File <strong>Server</strong>. In other words, we provide four<br />

configurations, one for each application running on each platform, as follows:<br />

1) Domain File <strong>Server</strong><br />

2) Domain Print <strong>Server</strong><br />

3) Workgroup File <strong>Server</strong><br />

4) Workgroup Print <strong>Server</strong><br />

The guideline provides a <strong>Baseline</strong> configuration that applies to all servers of a given type,<br />

Domain <strong>Server</strong> or Workgroup <strong>Server</strong>. Given that the <strong>Baseline</strong> configuration provides security<br />

before functionality, it should be used as a starting point. File and Print <strong>Server</strong> application<br />

policies are layered on top of the <strong>Baseline</strong> configuration. In this way, we provide a template for<br />

creating additional server roles based on the CSE <strong>Baseline</strong>. Application policies layered above<br />

the <strong>Baseline</strong> enables the server to function as intended.<br />

1.3 Scope<br />

ITSG-20 provides guidance to build High <strong>Security</strong> Domain and High <strong>Security</strong> Workgroup<br />

servers. Additional policies can be applied to support a variety of roles within your organization.<br />

1 Agencies such as: National Institute of Standards and Technology (NIST), National <strong>Security</strong> Agency (NSA),<br />

Center for Internet <strong>Security</strong> (CIS), and SANS (SysAdmin, Audit, Network, <strong>Security</strong>).<br />

Introduction March 2004 1


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

We provide two such additional policies: File <strong>Server</strong> Role Guidance and Print <strong>Server</strong> Role<br />

Guidance.<br />

1.4 Approach<br />

Two documents were of significant reference: <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide and Threats<br />

and Counter Measures: <strong>Security</strong> Settings in <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> and <strong>Windows</strong> XP. These<br />

documents were tested and augmented in a CSE lab environment to produce ITSG-20.<br />

Wherever possible, an automated approach is used throughout this document.<br />

1.5 Functional and <strong>Security</strong> Testing<br />

Connectivity was verified by accessing services offered by the hardened systems (Printer or File<br />

Shares). Once usability was established, Vulnerability and Penetration tests were executed<br />

against the systems. Results from vulnerability and penetration tests influenced this document.<br />

1.6 Assumptions<br />

It is assumed the reader has a thorough understanding of security features within <strong>Windows</strong><br />

<strong>Server</strong> <strong>2003</strong>. ITSG-20 is a detailed guide intended for use by system administrators.<br />

It is recommended that the reference documents listed in section 1.10 be reviewed. This will<br />

enhance the readers understanding of ITSG-20.<br />

1.7 Related documents<br />

See section 1.10, in addition to the Bibliography at the end of this document.<br />

1.8 Document Structure<br />

This document has the following structure:<br />

1. Introduction<br />

This section provides an explanation of the document and contents.<br />

2. Overview: Information Technology <strong>Security</strong> Guidance for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

This section provides an outline for the approach used by the document. It explains the<br />

method used to “Start secure and stay secure”, as follows:<br />

a) Installation;<br />

b) Configuration and Monitoring; and<br />

c) Enforcement.<br />

This section also provides details on assumptions and restrictions used for the above.<br />

Included is a list of reference documents and description of tests performed against the<br />

environment.<br />

2 March 2004 Introduction


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

3. Automated Installation<br />

This section provides values to perform an unattended installation of a Domain or<br />

Workgroup based server. This automated installation ensures that systems are consistent,<br />

with minimum software packages.<br />

4. <strong>Server</strong> Policy Files<br />

This section provides policy file values for the creation of a secure server in Domain or<br />

Workgroup environments.<br />

5. Role Based <strong>Server</strong> Policies<br />

This section provides policy file entries used to modify the baseline. These policy entries<br />

allow a server to perform designated file or print server activities, including IPSec.<br />

6. <strong>Server</strong> Policy Compliance: Inspection and Enforcement<br />

This section details a method for monitoring and enforcing policies outlined in this guide.<br />

The approach uses capabilities inherent in the <strong>Windows</strong> <strong>Server</strong> 20003 operating system.<br />

7. Annex A: <strong>Server</strong> Policy File Details<br />

This section has policy files with comments and explanations. This section explains settings<br />

in more detail. It also identifies differences from the Microsoft recommendation.<br />

1.9 Typographic Conventions<br />

The following typographic conventions are used in this document:<br />

1. Bold Italics are used to denote parameters and their values<br />

EXAMPLE: JoinDomain=”cse.local”<br />

2. [Square Brackets Denote File Section Headings]<br />

EXAMPLE: [Identification]<br />

3. “Items in quotations marks are to be entered in the file with quotation marks”<br />

EXAMPLE:<br />

JoinDomain=”cse.local”<br />

1.10 Reference Documents<br />

[Reference 1] <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide<br />

[Reference 2] Threats and Counter Measures: <strong>Security</strong> Settings in <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> and<br />

<strong>Windows</strong> XP<br />

Introduction March 2004 3


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

This page intentionally left blank.<br />

4 March 2004 Introduction


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

2 Overview: Information Technology <strong>Security</strong> Guidance<br />

for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

This guide provides build instructions for a secure <strong>Baseline</strong> configuration of <strong>Windows</strong> <strong>Server</strong><br />

<strong>2003</strong>. Guidance is provided for both a <strong>Windows</strong> Workgroup and Domain. You should use this<br />

<strong>Baseline</strong> as a starting point for configuring other services. For your benefit, policies for print and<br />

file services are provided.<br />

2.1 How to Use This Document<br />

Deploying a secure server can be organized in three steps: install the Operating System (OS),<br />

apply security policy, than apply additional changes, as needed.<br />

To begin, the guide presents <strong>Baseline</strong> configurations for workgroup and domain servers. For<br />

easy reference, information is organized consistent with “<strong>Windows</strong> <strong>Security</strong> Guide for <strong>2003</strong><br />

<strong>Server</strong>”. Additional items beyond Microsoft recommendations are listed in a separate section.<br />

Policies for print and file servers are also presented in separate sections. These policies are<br />

applied to the <strong>Baseline</strong> of the installed OS. Any additional changes are contained in the print and<br />

file server policy sections.<br />

System administrators can replace variables with values of their own. These settings produce a<br />

custom install package used to create a file or print server.<br />

To apply the <strong>Baseline</strong> and role specific policies in a Domain, Active Directory organizational<br />

units must be created.<br />

In a Workgroup environment, policies must be applied immediately upon system startup. By<br />

policy, the built-in administrator account is disabled. Make sure you create a site-specific<br />

administrator account prior to applying the policy.<br />

In addition to guidance on the deployment of secure servers, a maintenance section using<br />

Microsoft MMC is provided.<br />

2.1.1 Installation<br />

The installation process is automated via the use of an answer file (see Appendix A). This<br />

answer file directs the installation process. While many approaches can achieve this result, we<br />

make use of the Winnt.sif file.<br />

The <strong>Windows</strong> installation process reads the answer file from a floppy disk. Local information<br />

(System name, TCP/IP parameters, Domain/Workgroup) is supplied to reflect requirements. The<br />

result is an unattended installation that has no operator interaction.<br />

2.1.2 Configuration<br />

ITSG-20 takes a layered approach to policy application. The first layer is the <strong>Baseline</strong><br />

configuration for the OS. This layer is intended to provide a security profile with minimal<br />

exposure. Additional policy requirements are determined by role. Each policy file enables<br />

specific elements that allow the server to perform a single function (file sharing, print sharing,<br />

etc). Additional analysis and testing is required to build multi-function servers.<br />

The Domain environment supports a layered approach. This is accomplished by applying policy<br />

at the Domain level as well as the Organizational Unit (OU) level. Further granularity is<br />

Overview March 2004 5


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

achieved within a level; this allows you to create a matrix of policies for servers and<br />

environments.<br />

In a Workgroup environment, policy is applied in a prescribed order via policy files. This<br />

provides a consistent security profile for servers in a Workgroup environment.<br />

Since ‘policy files’ are simply text files, you can edit them with your favorite text editor. You<br />

may also copy and paste the policy text found at the end of this document.<br />

2.1.3 Monitoring and Enforcement<br />

We have outlined a manual method that provides basic compliance verification. This manual<br />

approach limits scalability of the solution. In a large environment, we recommend an automated<br />

method.<br />

2.2 Assumptions / Restrictions<br />

2.2.1 Installation<br />

For the installation of the OS, please ensure the following:<br />

a. The CD-ROM is before the floppy drive in the boot device order;<br />

b. There is no previous version of <strong>Windows</strong> (if not the installation will pause); and<br />

c. The first available disk partition is for the operating system.<br />

The following assumptions are made:<br />

a. The <strong>Server</strong> to be installed is not a Cluster Member;<br />

b. The Domain has an Organizational Unit for <strong>Server</strong>s;<br />

c. The Domain has an Organizational Unit for Print <strong>Server</strong>s under <strong>Server</strong>s;<br />

d. The Domain has an Organizational Unit for Files servers under <strong>Server</strong>s; and<br />

e. The installation is limited to contents of the Microsoft <strong>Server</strong> <strong>2003</strong> distribution.<br />

2.2.2 Policy<br />

Application of the policy results in the following:<br />

a. Local Guest account is renamed and disabled;<br />

b. Local Administrator account is renamed and disabled;<br />

c. All systems are <strong>Windows</strong> 2000 or later;<br />

d. System will shutdown if unable to log security events;<br />

e. No shares or named pipes can be accessed anonymously;<br />

f. No registry data can be accessed remotely;<br />

g. No accounts have the right to submit batch jobs;<br />

h. Administrator accounts cannot start services (Use an appropriate SERVICE account);<br />

i. Plug and Play is enabled when required as it is disabled by default; and<br />

j. SNMP is disabled.<br />

2.2.3 Policy Monitoring and Enforcement<br />

No additional assumptions are required for Policy Monitoring and Enforcement.<br />

6 March 2004 Overview


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

3 Automated Installation<br />

This section provides details for the Winnt.sif files. These files are used to install <strong>Windows</strong><br />

<strong>Server</strong> <strong>2003</strong> in a Domain or Workgroup environment. In both cases, use local operational values.<br />

The raw files (ones without comments) are in Appendix A.<br />

NOTE: You must maintain your system with the latest service packs and hot fixes. This ensures<br />

the system’s security is current.<br />

3.1 Initiating Automated Installation<br />

The automated installation uses a combination of CDROM and a floppy disk with a Winnt.sif<br />

file. During the boot process, it determines if the floppy has a Winnt.sif file. If present, it will use<br />

the settings in the file to configure the system.<br />

3.2 Domain <strong>Server</strong> Installation Configuration file<br />

In the Active Directory tree, the Domain version requires a ‘Print <strong>Server</strong>s’ and ‘File <strong>Server</strong>s’<br />

organizational unit (OU) be part of a ‘Public <strong>Server</strong>s’ OU (see below). All three of these OU’s<br />

are placeholders for policy that apply to the OU level in the directory information tree.<br />

Domain Name<br />

domain.local<br />

Organizational<br />

Unit<br />

User<br />

Systems<br />

Public<br />

<strong>Server</strong>s<br />

Organizational<br />

Unit<br />

File <strong>Server</strong>s<br />

Print <strong>Server</strong>s<br />

<strong>Server</strong>s<br />

File <strong>Server</strong> 1 File <strong>Server</strong> 2<br />

Figure 1 – Example Active Directory Structure<br />

Automated Installation March 2004 7


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

3.2.1 Winnt.sif (Domain)<br />

3.2.1.1 [Data]<br />

AutoPartition=1<br />

The AutoPartition value provides a location for the <strong>Windows</strong> operating system. The setting<br />

‘1’installs the operating system in the first available partition with sufficient space. If there is an<br />

existing operating system, the install will halt and require further instruction.<br />

MsDosInitiated=0<br />

The MsDosInitiated value must be present and must be set to ‘zero’ or the automated installation<br />

fails.<br />

UnattendedInstall=Yes<br />

When set to ‘YES’, the UnattendedInstall value allows the pre-installation of <strong>Windows</strong> by using<br />

the CD Boot method.<br />

3.2.1.2 [GuiUnattended]<br />

AdminPassword="A_Str0ng_p@SSw0rd"<br />

The AdminPassword value defines the Local Administrator password on the system being<br />

installed.<br />

NOTE:<br />

Select a value consistent with the local policy on Administrator passwords.<br />

EncryptedAdminPassword=No<br />

The EncryptedAdminPassword value determines if the setup encrypts the Administrator<br />

password. The setting ‘No’ does not encrypt the password. You may enable this feature via the<br />

setupmgr.exe tool provided on the <strong>Windows</strong> distribution media.<br />

OEMSkipWelcome=1<br />

The OEMSkipWelcome value determines if the startup displays the Welcome page. The setting<br />

‘1’ does not display the Welcome page.<br />

OEMSkipRegional=1<br />

The OEMSkipRegional value determines if the installation will display the Regional Settings<br />

page. The setting ‘1’ does not display the Regional Settings page.<br />

8 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

TimeZone=035<br />

The TimeZone value sets the system clock to the local time zone.<br />

004 – Pacific Standard Time<br />

010 – Mountain Standard Time<br />

020 – Central Standard Time<br />

025 – Canada Central Standard Time (Saskatchewan)<br />

035 – Eastern Standard Time<br />

050 – Atlantic Standard Time<br />

060 – Newfoundland and Labrador Standard Time<br />

AutoLogon=No<br />

The Autologon value determines if the Administrator account will be automatically logged on<br />

until the system is rebooted. The setting ‘No’ disables the AutoLogon feature. The<br />

AutoLogonCount can increase the number of reboots required to disable the autologon feature.<br />

3.2.1.3 [Identification]<br />

DomainAdmin=administrator<br />

The DomainAdmin value provides the install with a privileged Domain account. The<br />

DomainAdmin can add the system to the domain.<br />

DomainAdminPassword=" A_Str0ng_p@SSW0RD "<br />

The DomainAdminPassword provides the required password for the DomainAdmin account.<br />

NOTE: Provide a local value.<br />

JoinDomain="Department_Name.local"<br />

The JoinDomain value is the name of the Domain the system will join.<br />

NOTE: The local Domain name is required.<br />

Automated Installation March 2004 9


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

MachineObjectOU="OU=File <strong>Server</strong>s, OU=Public <strong>Server</strong>s, DC=Department_Name,<br />

DC=local"<br />

The MachineObjectOU value defines the Organizational Unit of the system in the Domain.<br />

NOTE:<br />

Local Domain values are required.<br />

3.2.1.4 [LicenseFilePrintData]<br />

AutoMode=Per<strong>Server</strong><br />

The AutoMode value defines the license mode. Enter either PerSeat or Per<strong>Server</strong>.<br />

NOTE: If Per<strong>Server</strong> is specified then the AutoUsers value must be supplied as well.<br />

AutoUsers=5<br />

The AutoUsers value determines the number of concurrent users the Per<strong>Server</strong> license supports.<br />

NOTE: A local value is required that reflects the license purchased for the system.<br />

3.2.1.5 [Unattended]<br />

OemPreinstall=No<br />

The OEMPreinstall value determines if there are OEM files to be installed. The setting ‘No’<br />

indicates all files are on the <strong>Windows</strong> distribution.<br />

UattendedSwitch=Yes<br />

The UnattendedSwitch value specifies whether Setup skips <strong>Windows</strong> Welcome. The setting<br />

‘Yes’ skips the <strong>Windows</strong> Welcome.<br />

Repartition=No<br />

The Repartition value determines what action to take on first drive partitions. The setting ‘No’<br />

maintains all partitions on the first drive.<br />

TargetPath=<strong>Windows</strong><br />

The TargetPath value defines the location of the operating system. The setting ‘<strong>Windows</strong>’ places<br />

the operating system files in a windows folder.<br />

10 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

UnattendedMode=FullUnattended<br />

The UnattendedMode value determines the level of human interaction with the installation<br />

process. The setting ‘FullUnattended’ has no human interaction.<br />

WaitForReboot=No<br />

The WaitForReboot value determines if the system will reboot immediately or provide an<br />

opportunity for human interaction. The setting ‘No’ reboots the system immediately.<br />

OemSkipEula=Yes<br />

The OemSkipEula value determines if the end user license agreement is presented during the<br />

installation. The setting ‘Yes’ does not display the end user license agreement.<br />

FileSystem=ConvertNTFS<br />

The FileSystem value determines the file system type for the installation. The value<br />

ConvertNTFS installs the system on an NTFS file system.<br />

3.2.1.6 [UserData]<br />

ComputerName=File<strong>Server</strong>01<br />

The ComputerName value sets the ComputerName registry value.<br />

NOTE: Provide a local value.<br />

FullName="System_Admin"<br />

The FullName value sets the RegisteredOwner in the registry.<br />

NOTE: Provide a local value.<br />

OrgName="Department_Name"<br />

The OrgName value sets the RegisteredOrganisation in the registry.<br />

NOTE: Provide a local value.<br />

Automated Installation March 2004 11


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

ProductKey="xxxx-xxxx-xxxx-xxxx-xxxx"<br />

The ProductKey value supplies the required license string for the version of <strong>Windows</strong> <strong>Server</strong><br />

<strong>2003</strong> being installed.<br />

NOTE:<br />

Provide a local value.<br />

3.2.1.7 [params.MS_TCPIP.Adapter01]<br />

SpecificTo=Adapter01<br />

The SpecificTo value identifies the network adapter to be configured. The setting ‘Adapter01’<br />

applies to the first network adapter identified.<br />

DisableDynamicUpdate=No<br />

The DisableDynamicUpdate value determines if the system will dynamically register ‘A’ and<br />

‘PTR’ records. The setting ‘No’ dynamically registers the ‘A’ and ‘PTR’ records with the DNS.<br />

EnableAdapterDomainNameregistration=No<br />

The EnableAdapterDomainNameregistration value determines if the connection specific DNS<br />

records are going to be registered. The setting ‘No’ does not register connection specific DNS<br />

records.<br />

DefaultGateway=xxx.xxx.xxx.xxx<br />

The DefaultGateway sets the TCP/IP default gateway value for the adapter.<br />

NOTE: Provide a local value.<br />

DHCP=Yes<br />

The DHCP value determines if the adapter will request a TCP/IP address using DHCP. The<br />

setting ‘Yes’ requests a TCP/IP address.<br />

DNSDomain=Department_Name.local<br />

The DNSDomain provides the name of the domain to which the system is entered.<br />

NOTE: Provide a local value.<br />

12 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

NetBIOSOptions=1<br />

The NetBIOSOptions determines the NetBIOS over TCP/IP setting. The setting ‘1’ enables<br />

NetBIOS over TCP/IP.<br />

Subnetmask=xxx.xxx.xxx.xxx<br />

The Subnetmask provides the subnet mask address.<br />

NOTE: Provide a local value.<br />

3.2.1.8 [NetOptionalComponents]<br />

DHCP<strong>Server</strong>=0<br />

The DHCP<strong>Server</strong> value determines if the system will install the DHCP <strong>Server</strong>. The setting ‘0’<br />

does not install the DHCP <strong>Server</strong>.<br />

DNS=0<br />

The DNS value determines if the system will install the DNS <strong>Server</strong>. The setting ‘0’ does not<br />

install the DNS <strong>Server</strong>.<br />

IAS=0<br />

The IAS value determines if the system will install the Internet Authentication Service. The<br />

setting ‘0’ does not install the Internet Authentication Service.<br />

ILS=0<br />

The ILS value determines if setup will install services that support telephony features (caller ID,<br />

conference calls, video conferencing, faxing, etc.). The setting ‘0’ does not install the Internet<br />

Locator Service.<br />

LDPSVC=0<br />

The LPDSVC value determines if the system will install UNIX Print services. The setting ‘0’<br />

does not install UNIX Print services.<br />

MacPrint=0<br />

The MacPrint value determines if the system will install Macintosh print services. The setting ‘0’<br />

does not install Macintosh Print services.<br />

Automated Installation March 2004 13


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

MacSrv=0<br />

The MacSrv value determines if the system will install Macintosh file services. The setting ‘0’<br />

does not install Macintosh file services.<br />

Netcm=0<br />

The Netcm value determines if the system will install Microsoft Connection Manager<br />

Administration Kit and Phone Book Service. The setting ‘0’ does not install this service.<br />

NetMonTools=0<br />

The ‘NetMon Tools’ value determines if the system will install the network monitoring tools.<br />

The setting ‘0’ does not install the network monitoring tools.<br />

SimpTcp=0<br />

The ‘SimpTcp’ value determines if the system will install simple TCP/IP protocol suites. The<br />

setting ‘0’ does not install the simple TCP/IP protocol suites.<br />

SNMP=0<br />

The ‘SNMP’ value determines if the system will install Simple Network Management Protocol.<br />

The setting ‘0’ does not install the SNMP protocol.<br />

WINS=0<br />

The ‘WINS’ value determines if the system will install <strong>Windows</strong> Internet Name Service. The<br />

setting ‘0’ does not install WINS.<br />

3.2.1.9 [Components]<br />

AccessOpt=On<br />

The AccessOpt value sets the registry value accessopt. The setting ‘On’ installs the Accessibility<br />

wizard.<br />

appsrv_console=Off<br />

The appsrv_console sets the registry value appsrv_console. The setting ‘Off’ does not install the<br />

Application <strong>Server</strong> Console.<br />

14 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

aspnet=Off<br />

The aspnet value sets the aspnet registry value. The setting ‘Off’ does not install the ASP .NET<br />

development platform.<br />

AutoUpdate=Off<br />

The AutoUpdate value sets the autoupdate registry value. The setting ‘Off’ does not install<br />

AutoUpdate.<br />

Bits<strong>Server</strong>ExtensionsISAPI=Off<br />

The Bits<strong>Server</strong>ExtensionsISAPI sets the bitsserverextensionsisapi registry value. The setting<br />

‘Off’ does not install ISAPI for BITS server extensions.<br />

Bits<strong>Server</strong>ExtensionManager=Off<br />

The Bits<strong>Server</strong>ExtensionManager sets the bitsserverextensionmanager registry key. The setting<br />

‘Off’ does not install the MMC snap-in, administrative APIs and ADSI extensions for BITS.<br />

Calc=On<br />

The Calc value sets the registry value calc. The setting ‘Off’ does not install the Calculator<br />

feature.<br />

certsrv=On<br />

The certsrv value sets the certsrv registry value. The setting ‘On’ installs the Certificate Services<br />

components.<br />

certsrv_client=Off<br />

The certsrv_client value sets the certsrv_client registry value. The setting ‘Off’ does not install<br />

the Web client components of Certificate Services. This requires a Certification Authority to be<br />

defined with the CAName parameter. This also requires a computer system hosting the<br />

Certification Authority be defined with the CAMachine parameter. These entries support the use<br />

of a certificate in a web browser.<br />

Automated Installation March 2004 15


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

certsrv_server=Off<br />

The certsrv_server value sets the certsrv_server registry value. The setting ‘Off’ does not install<br />

the Certificate <strong>Server</strong> Services. Only systems that are intended to offer a Certification Authority<br />

service require this to be enabled.<br />

charmap=On<br />

The charmap value sets the charmap registry value. The setting ‘On’ installs the Character Map<br />

feature.<br />

chat=Off<br />

The chat value sets the chat registry value. The setting ‘Off’ does not install the Chat program.<br />

Clipbook=Off<br />

The Clipbook value sets the clipbook registry value. The setting ‘Off’ does not install the<br />

Clipbook.<br />

cluster=Off<br />

The cluster value sets the cluster registry value. The setting ‘Off’ does not install the cluster<br />

software.<br />

complusnetwork=On<br />

The complusnetwork value sets the complusnetwork registry value. The setting ‘On’ enables<br />

network Com+ access.<br />

deskpaper=Off<br />

The deskpaper value sets the deskpaper registry value. The setting ‘Off’ does not install a<br />

desktop background.<br />

dialer=Off<br />

The dialer value sets the dialer registry value. The setting ‘Off’ does not install the Phone Dialer.<br />

dtcnetwork=Off<br />

The dtcnetwork value sets the dtcnetwork registry value. The setting ‘Off’ does not enable DTC<br />

network access. DTC is the Distributed Transaction Coordinator.<br />

16 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

fax=Off<br />

The fax value sets the fax registry value. The setting ‘Off’ does not install the Fax feature.<br />

fp_extensions=Off<br />

The fp_extensions value sets the fp_extensions registry value. The setting ‘Off’ does not install<br />

the FrontPage server extensions.<br />

fp_vdir_deploy=Off<br />

The fp_vdir_deploy value sets the fp_vdir_deploy registry value. The setting ‘Off’ does not<br />

install the Visual InterDev RAD Remote Deployment Support.<br />

freecell=Off<br />

The freecell value sets the freecell registry value. The setting ‘Off’ does not install the Freecell<br />

game.<br />

hearts=Off<br />

The hearts value sets the hearts registry value. The setting ‘Off’ does not install the Hearts game.<br />

hypertrm=Off<br />

The hyperterm value sets the hyperterm registry value. The setting ‘Off’ does not install the<br />

HyperTerminal feature.<br />

IEAccess=Off<br />

The IEAccess value determines if the Internet Explorer Access points are visible. The setting<br />

‘Off’ does not make the Internet Explorer Access points visible.<br />

iis_asp=Off<br />

The iis_asp value sets the iis_asp registry value. The setting ‘Off’ does not install the Active<br />

<strong>Server</strong> Pages feature.<br />

Automated Installation March 2004 17


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

iis_common=Off<br />

The iis_common value sets the iis_common registry value. The setting ‘Off’ does not install the<br />

common set of files needed by IIS.<br />

iis_ftp=Off<br />

The iis_ftp value sets the iis_ftp registry value. The setting ‘Off’ does not install the FTP<br />

Service.<br />

iis_inetmgr=Off<br />

The iis_inetmgr value sets the iis_inetmgr registry value. The setting ‘Off’ does not install the<br />

MMC-based administration tools for IIS.<br />

iis_internetdataconnector=Off<br />

The iis_internetdataconnector value sets the iis_internetdataconnector registry value. The setting<br />

‘Off’ does not install the Internet Data Connector.<br />

iis_nntp=Off<br />

The iis_nntp value sets the iis_nntp registry value. The setting ‘Off’ does not install the NNTP<br />

Service.<br />

iis_serversidesincludes=Off<br />

The iis_serversideincludes value sets the iis_serversideincludes registry value. The setting ‘Off’<br />

does not install the <strong>Server</strong> Side Includes.<br />

iis_smpt=Off<br />

The iis_smtp value sets the iis_smtp registry value. The setting ‘Off’ does not install the SMTP<br />

Service.<br />

iis_webadmin=Off<br />

The iis_webadmin value sets the iis_webadmin registry value. The setting ‘Off’ does not install<br />

the Web UI for Web server administration (Remote Administration Tools).<br />

18 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

iis_webdav=Off<br />

The iis_webdav value sets the iis_dav registry value. The setting ‘Off’ does not install the<br />

WebDAV Publishing.<br />

iis_www=Off<br />

The iis_www value sets the iis_www registry value. The setting ‘Off’ does not install the WWW<br />

Service.<br />

iis_www_vdir_scripts=Off<br />

The iis_www_vdir_scripts value sets the iis_www_vdir_scripts registry value. The setting ‘Off’<br />

does not create the optional scripts directory on the default web site.<br />

indexsrv_system=Off<br />

The indexsrv_system value sets the indexsrv_system registry value. The setting ‘Off’ does not<br />

install the Indexing Service.<br />

inetprint=Off<br />

The inetprint value sets the inetprint registry value. The setting ‘Off’ does not install Internet<br />

Printing.<br />

licenseserver=Off<br />

The licenseserver value sets the licenseserver registry value. The setting ‘Off’ does not enable<br />

Terminal Services licensing.<br />

media_clips=Off<br />

The media_clips value sets the media_clips registry value. The setting ‘Off’ does not install<br />

sample sounds.<br />

media_utopia=Off<br />

The media_utopia value sets the media_utopia registry value. The setting ‘Off’ does not install<br />

the Utopia sound scheme.<br />

Automated Installation March 2004 19


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

minesweeper=Off<br />

The minesweeper value sets the minesweeper registry value. The setting ‘Off’ does not install<br />

the Minesweeper game.<br />

mousepoint=On<br />

The mousepoint value sets the mousepoint registry value. The setting ‘On’ installs all available<br />

mouse pointers.<br />

msmq_ADIntegrated=Off<br />

The msmq_ADIntegrated value sets the msmq_ADIntegrated registry value. The setting ‘Off’<br />

does not integrate MSMQ with Active Directory.<br />

msmq_Core=Off<br />

The msmq_core value sets the msmq_core registry value. The setting ‘Off’ does not install the<br />

Message Queuing components.<br />

msmq_HTTPSupport=Off<br />

The msmq_HTTPSupport value sets the msmq_HTTPSupport registry value. The setting ‘Off’<br />

does disables the sending and receiving of messages using the HTTP protocol.<br />

msmq_LocalStorage=Off<br />

The msmq_LocalStorage value sets the msmq_LocalStorage registry value. The setting ‘Off’<br />

does not store messages locally.<br />

msmq_MQDSSService=Off<br />

The msmq_MQDSSService value sets the msmq_MQDSSService registry value. The setting<br />

‘Off’ restricts access to Active Directory and site recognition for downstream clients.<br />

msmq_RoutingSupport=Off<br />

The msmq_RoutingSupport value sets the msmq_RoutingSupport registry value. The setting<br />

‘Off’ does not provide efficient routing.<br />

20 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

msmq_TriggerService=Off<br />

The msmq_TriggerService value sets the msmq_TriggerService registry value. The setting ‘Off’<br />

disassociates the arrival of incoming messages at a queue with functionality in a Component<br />

Object Module (COM) component. The same may be said for a standalone executable program.<br />

msnexplr=Off<br />

The msnexplr value sets the msnexpire registry value. The setting ‘Off’ does not install MSN<br />

Explorer.<br />

mswordpad=On<br />

The mswordpad value sets the mswordpad registry value. The setting ‘On’ installs the<br />

mswordpad feature.<br />

netcis=Off<br />

The netcis value sets the netcis registry value. The setting ‘Off’ does not install Microsoft COM<br />

Internet Services.<br />

netoc=Off<br />

The netoc value sets the netoc registry value. The setting ‘Off’ does not install optional<br />

networking components.<br />

objectpkg=Off<br />

The objectpkg value determines if the Object Packager is installed. The setting ‘Off’ does not<br />

install the Object Packager.<br />

OEAccess=Off<br />

The OEAccess value determines if the visible entry points to Outlook Express are installed. The<br />

setting ‘Off’ does not install the visible entry points for Outlook Express.<br />

paint=Off<br />

The paint value sets the paint registry value. The setting ‘Off’ does not install Microsoft Paint.<br />

Automated Installation March 2004 21


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

pinball=Off<br />

The pinball value sets the pinball registry value. The setting ‘Off’ does not install the Pinball<br />

game.<br />

Pop3Admin=Off<br />

The Pop3Admin value determines if the optional Web UI for the Remote Administration Tools is<br />

installed. The setting ‘Off’ does not install the optional Web UI for the Remote Administration<br />

Tools.<br />

Pop3Service=Off<br />

The Pop3Service value determines if the main POP3 service is installed. The setting ‘Off’ does<br />

not install the main POP3 service.<br />

Pop3Srv=Off<br />

The Pop3Srv value determines if the root POP3 component is installed. The setting ‘Off’ does<br />

not install the root POP3 component<br />

rec=Off<br />

The rec value determines if the Sound Recorder is installed. The setting ‘Off’ does not install the<br />

Sound recorder.<br />

reminst=Off<br />

The reminst value sets the reminst registry value. The setting ‘Off’ does not install the Remote<br />

installation Service.<br />

rootautoupdate=Off<br />

The rootautoupdate value sets the rootautoupdate registry value. The setting ‘Off’ disables the<br />

OMC Update Root Certificates. If the user is presented with a certificate issued by an untrusted<br />

root authority, actions that require authentication are prevented.<br />

rstorage=Off<br />

The rstorage value sets the rstorage registry value. The setting ‘Off’ does not install the Remote<br />

Storage feature.<br />

22 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

solitaire=Off<br />

The solitaire value sets the solitaire registry value. The setting ‘Off’ does not install the Solitaire<br />

game.<br />

spider=Off<br />

The spider value sets the spider registry value. The setting ‘Off’ does not install the Spider game.<br />

templates=Off<br />

The templates value sets the templates registry value. The setting ‘Off’ does not install<br />

Document Templates.<br />

Terminal<strong>Server</strong>=On<br />

The Terminal<strong>Server</strong> value determines if the Terminal <strong>Server</strong> is installed. The setting ‘On’ installs<br />

the service.<br />

TSWebClient=Off<br />

The TSWebClient determines if the ActiveX control for hosting Terminal Services client<br />

connections over the Web are installed. The setting ‘Off’ does not install the ActiveX control.<br />

vol=Off<br />

The vol value sets the vol registry value. The setting ‘Off’ does not install The Volume Control.<br />

WBEMSNMP=Off<br />

The WBEMSNMP value sets the WBEMSNMP registry value. The setting ‘Off’ does not install<br />

the WMI SNMP Provider.<br />

WMAccess=Off<br />

The WMAccess value determines if the visible entry points to <strong>Windows</strong> Manager are installed.<br />

The setting ‘Off’ does not install the visible entry points to <strong>Windows</strong> Manager.<br />

WMPOCM=Off<br />

The WMPOCM value determines if the visible entry points to the <strong>Windows</strong> Media Player are<br />

installed. The setting ‘Off’ does not install the visible entry points to <strong>Windows</strong> Media Player.<br />

Automated Installation March 2004 23


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

wms=Off<br />

The wms value sets the wms registry value. The setting ‘Off’ does not install the core <strong>Windows</strong><br />

Media <strong>Server</strong> components.<br />

wms_admin_asp=Off<br />

The wms_admin_asp value sets the wms_admin_asp registry value. The setting ‘Off’ does not<br />

install <strong>Windows</strong> Media Services Web-based administrative components.<br />

wms_admin_mmc=Off<br />

The wms_admin_mmc value sets the wms_admin_mmc registry value. The setting ‘Off’ does<br />

not install the <strong>Windows</strong> Media Services MMC-based administrative components.<br />

wms_isapi=Off<br />

The wms_isapi value sets the wms_isapi registry value. The setting ‘Off’ does not install the<br />

<strong>Windows</strong> Media Services Multicast and Advertisement Logging Agent components.<br />

wms_server=Off<br />

The wms_server value sets the wms_server registry value. The setting ‘Off’ does not install the<br />

<strong>Windows</strong> Media Services server components.<br />

zonegames=Off<br />

The zonegames value sets the zonegames registry value. The setting ‘Off’ does not install the<br />

Microsoft Gaming Zone Internet Games.<br />

3.3 Workgroup <strong>Server</strong> Installation Configuration file<br />

The Workgroup <strong>Server</strong> installation can create a new workgroup or join an existing one. The<br />

installation assumes no use of DHCP or DNS. As a result, the Administrator must enter TCP/IP<br />

values into the Winnt.sif to enable networking.<br />

24 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

3.3.1 Winnt.sif (Workgroup)<br />

3.3.1.1 [Data]<br />

AutoPartition=1<br />

The AutoPartition value provides a location to place the <strong>Windows</strong> operating system. The setting<br />

‘1’installs the operating system in the first available partition with sufficient space. If there is an<br />

existing operating system the install will halt and require further instruction.<br />

MsDosInitiated=0<br />

The MsDosInitiated value must be present and must be set to ‘zero’. If not, the automated<br />

installation fails.<br />

UnattendedInstall=Yes<br />

When set to ‘YES’, the UnattendedInstall value allows the pre-installation of <strong>Windows</strong> by using<br />

the CD Boot method.<br />

3.3.1.2 [GuiUnattended]<br />

AdminPassword="A_Str0ng_p@SSw0rd"<br />

The AdminPassword value defines the Local Administrator password on the system being<br />

installed.<br />

NOTE:<br />

Select a value in keeping with the local policy on Administrator passwords.<br />

EncryptedAdminPassword=No<br />

The EncryptedAdminPassword value determines if the setup encrypts the Administrator<br />

password. The setting ‘No’ does not encrypt the password. You may enable this feature via the<br />

setupmgr.exe tool provided on the <strong>Windows</strong> distribution media.<br />

OEMSkipWelcome=1<br />

The OEMSkipWelcome value determines if the startup displays the Welcome page. The setting<br />

‘1’ does not display the Welcome page.<br />

OEMSkipRegional=1<br />

The OEMSkipRegional value determines if the installation will display the Regional Settings<br />

page. The setting ‘1’ does not display the Regional Settings page.<br />

Automated Installation March 2004 25


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

TimeZone=035<br />

The TimeZone value sets the system clock to the local time zone.<br />

004 – Pacific Standard Time<br />

010 – Mountain Standard Time<br />

020 – Central Standard Time<br />

025 – Canada Central Standard Time (Saskatchewan)<br />

035 – Eastern Standard Time<br />

050 – Atlantic Standard Time<br />

060 – Newfoundland and Labrador Standard Time<br />

AutoLogon=No<br />

The Autologon value determines if the Administrator account will automatically log on until the<br />

system is rebooted. The setting ‘No’ disables the AutoLogon feature. The AutoLogonCount can<br />

increase the number of reboots required to disable the feature.<br />

3.3.1.3 [Identification]<br />

JoinWorkgroup=Department_Name<br />

The JoinWorkgroup value determines which workgroup the server will join.<br />

NOTE: This value must be replaced with a local value.<br />

3.3.1.4 [LicenseFilePrintData]<br />

AutoMode=Per<strong>Server</strong><br />

The AutoMode value defines the license mode. Enter either PerSeat or Per<strong>Server</strong>.<br />

NOTE: If Per<strong>Server</strong> is specified then the AutoUsers value must be supplied as well.<br />

AutoUsers=5<br />

The AutoUsers value determines the number of concurrent users the Per<strong>Server</strong> license supports.<br />

NOTE: Provide a local value.<br />

26 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

3.3.1.5 [Unattended]<br />

OemPreinstall=No<br />

The OEMPreinstall value determines if there are OEM files to be installed. The setting ‘No’<br />

indicates all required files are on the <strong>Windows</strong> distribution.<br />

UattendedSwitch=Yes<br />

The UnattendedSwitch value specifies whether Setup skips <strong>Windows</strong> Welcome. The setting<br />

‘Yes’ skips the <strong>Windows</strong> Welcome.<br />

Repartition=No<br />

The Repartition value determines what action to take on first drive partitions. The setting ‘No’<br />

maintains all partitions on the first drive.<br />

TargetPath=<strong>Windows</strong><br />

The TargetPath value defines a location for the operating system. The setting ‘<strong>Windows</strong>’ places<br />

the operating system in the <strong>Windows</strong> folder.<br />

UnattendedMode=FullUnattended<br />

The UnattendedMode value determines the level of human interaction with the installation. The<br />

setting ‘FullUnattended’ has no human interaction during the process.<br />

WaitForReboot=No<br />

The WaitForReboot value determines if the system will reboot immediately or provide an<br />

opportunity for human interaction. The setting ‘No’ reboots the system immediately.<br />

OemSkipEula=Yes<br />

The OemSkipEula value determines if the end user license agreement is presented during the<br />

installation. The setting ‘Yes’ does not display the end user license agreement.<br />

FileSsytem=ConvertNTFS<br />

The FileSystem value determines the file system type for the installation. The value<br />

ConvertNTFS installs the system on an NTFS file system.<br />

Automated Installation March 2004 27


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

3.3.1.6 [UserData]<br />

ComputerName=File_<strong>Server</strong>_1<br />

The ComputerName value sets the ComputerName registry value.<br />

NOTE: Provide a local value.<br />

FullName="System_Admin"<br />

The FullName value sets the RegisterdOwner in the registry.<br />

NOTE: Provide a local value.<br />

OrgName="Department_Name"<br />

The OrgName value sets the RegisteredOrganisation in the registry.<br />

NOTE: Provide a local value.<br />

ProductKey="xxxx-xxxx-xxxx-xxxx-xxxx"<br />

The ProductKey value supplies the required license string for the version of <strong>Windows</strong> <strong>Server</strong><br />

<strong>2003</strong> being installed.<br />

NOTE:<br />

Provide a local value.<br />

3.3.1.7 [Networking]<br />

This section defines the Network for the system. In a Workgroup environment, static means are<br />

used for networking; this includes static IP addresses, and a Hosts file for name resolution. As a<br />

result, automated network definition is disabled. All values are supplied via parameters in this<br />

installation file.<br />

InstallDefaultComponents=No<br />

The InstallDefaultComponents indicates if the network setup will use DHCP and DNS. The<br />

setting ‘No’ indicates that the network will use supplied values as opposed to DHCP and DNS.<br />

3.3.1.8 [NetAdapters]<br />

Adapter1=params.Adapter1<br />

The Adapter1 value defines network interfaces to install with associated logical names. This<br />

ensures commands bound for adapters are properly directed.<br />

28 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

3.3.1.9 [params.Adapter1]<br />

InfID=*<br />

The InfID identifies a network adapter with a value that is the same as the Plug and Play ID. If<br />

there were more than one adapter, the parameter would supply the Plug and Play ID.<br />

3.3.1.10 [NetClients]<br />

MS_MSClient=params.MS_MSClient<br />

The MS_MSClient value specifies the section where the Client for Microsoft Networks is<br />

defined. The value ‘params.MS_MSClient’ is the title of the section that contains the definition<br />

of the network client.<br />

3.3.1.11 [NetServices]<br />

MS_SERVER=params.MS_SERVER<br />

The MS_SERVER value specifies the section where the entries are supplied to define a network<br />

service. There are no network services defined in this installation file. As a result there is no need<br />

for a ‘params.MS_SERVER’ section.<br />

3.3.1.12 [NetProtocols]<br />

MS_TCPIP=params.MS_TCPIP<br />

The MS_TCPIP value defines the section that holds the entries for this protocol.<br />

3.3.1.13 [params.MS_TCPIP]<br />

DNS=No<br />

The DNS value defines if the server will use a DNS <strong>Server</strong>. The setting ‘No’ indicates the server<br />

will not use DNS for name resolution.<br />

UseDomainNameDevolution=No<br />

The UseDomainNameDevolution value determines if the system will attempt to connect when<br />

the supplied DNS name is not Fully Qualified. The setting ‘No’ prevents the system from<br />

making this attempt.<br />

Automated Installation March 2004 29


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

EnableLMHosts=Yes<br />

The EnableLMHosts value determines if the server will use the Hosts file to resolve network<br />

name to address translations. The setting ‘Yes’ indicates the Hosts file will be used for name<br />

resolution.<br />

AdapterSections=params.MS_TCPIP.Adapter1<br />

The AdapterSections value defines the location in this file that contains the definition of the<br />

adapter.<br />

3.3.1.14 [params.MS_TCPIP.Adapter1]<br />

SpecificTo=Adapter1<br />

The SpecificTo value identifies the network adapter to which the block of commands applies.<br />

The setting ‘Adapter01’ applies to the first network adapter identified.<br />

DHCP=No<br />

The DHCP value identifies if the system uses DHCP. The setting ‘No’ indicates that the system<br />

will not obtain a TCP/IP address from a DHCP server.<br />

IPAddress=xxx.xxx.xxx.xxx<br />

The IPAddress value defines the IP address for the adapter.<br />

SubnetMask=xxx.xxx.xxx.xxx<br />

The Subnetmask value provides the subnet mask addresses.<br />

DefaultGateway=xxx.xxx.xxx.xxx<br />

The DefaultGateway value defines the address for Packets bound outside the mask. The gateway<br />

acts as the first stop in the route to the target system.<br />

WINS=No<br />

The WINS value determines if the system will use <strong>Windows</strong> Internet Name Service. The setting<br />

‘No’ disables WINS on the specified adapter.<br />

30 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

NetBIOSOptions=0<br />

The NetBIOSOptions value determines if the system enables NetBIOS over TCP/IP. The setting<br />

‘zero’ disallows NetBIOS over TCP/IP.<br />

3.3.1.15 [NetOptionalComponents]<br />

DHCP<strong>Server</strong>=0<br />

The DHCP<strong>Server</strong> value determines if the system will install the DHCP <strong>Server</strong>. The setting ‘0’<br />

does not install the DHCP <strong>Server</strong>.<br />

DNS=0<br />

The DNS value determines if the system will install the DNS <strong>Server</strong>. The setting ‘0’ does not<br />

install the DNS <strong>Server</strong> software.<br />

IAS=0<br />

The IAS value determines if the system will install the Internet Authentication Service. The<br />

setting ‘0’ does not install the Internet Authentication Service.<br />

ILS=0<br />

The ILS value determines if setup will install services that support telephony features (caller ID,<br />

conference calls, video conferencing, faxing, etc.). The setting ‘0’ does not install the Internet<br />

Locator Service.<br />

LDPSVC=0<br />

The LPDSVC value determines if setup will install UNIX Print services. The setting ‘0’ does not<br />

install UNIX Print services.<br />

MacPrint=0<br />

The MacPrint value determines if setup will install Macintosh print services. The setting ‘0’ does<br />

not install Macintosh Print services.<br />

MacSrv=0<br />

The MacSrv value determines if setup will install Macintosh file services. The setting ‘0’ does<br />

not install Macintosh file services.<br />

Automated Installation March 2004 31


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

Netcm=0<br />

The Netcm value determines if setup will install the Microsoft Connection Manager<br />

Administration Kit and Phone Book Service. The setting ‘0’ does not install these services.<br />

NetMonTools=0<br />

The ‘NetMon Tools’ value determines if setup will install the network monitoring tools. The<br />

setting ‘0’ does not install the network monitoring tools.<br />

SimpTcp=0<br />

The ‘SimpTcp’ value determines if setup will install simple TCP/IP protocol suites. The setting<br />

‘0’ does not install simple TCP/IP protocol suites.<br />

SNMP=0<br />

The ‘SNMP’ value determines if setup will install Simple Network Management Protocol. The<br />

setting ‘0’ does not install the SNMP protocol.<br />

WINS=0<br />

The ‘WINS’ value determines if setup will install <strong>Windows</strong> Internet Name Service. The setting<br />

‘0’ does not install WINS.<br />

3.3.1.16 [Components]<br />

AccessOpt=On<br />

The AccessOpt value sets the registry value accessopt. The setting ‘On’ installs the Accessibility<br />

wizard.<br />

appsrv_console=Off<br />

The appsrv_console sets the registry value appsrv_console. The setting ‘Off’ does not install the<br />

Application <strong>Server</strong> Console.<br />

aspnet=Off<br />

The aspnet value sets the aspnet registry value. The setting ‘Off’ does not install the ASP .NET<br />

development platform.<br />

32 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

AutoUpdate=Off<br />

The AutoUpdate value sets the autoupdate registry value. The setting ‘Off’ does not install<br />

AutoUpdate.<br />

Bits<strong>Server</strong>ExtensionsISAPI=Off<br />

The Bits<strong>Server</strong>ExtensionsISAPI sets the bitsserverextensionsisapi registry value. The setting<br />

‘Off’ does not install ISAPI for BITS server extensions.<br />

Bits<strong>Server</strong>ExtensionManager=Off<br />

The Bits<strong>Server</strong>ExtensionManager sets the bitsserverextensionmanager registry key. The setting<br />

‘Off’ does not install the MMC snap-in, administrative APIs and ADSI extensions for BITS.<br />

Calc=On<br />

The Calc value sets the registry value for calc. The setting ‘Off’ does not install the Calculator<br />

feature.<br />

certsrv=On<br />

The certsrv value sets the certsrv registry value. The setting ‘On’ installs the Certificate Services<br />

components.<br />

certsrv_client=Off<br />

The certsrv_client value sets the certsrv_client registry value. The setting ‘Off’ does not install<br />

the Web client components of Certificate Services. This requires a Certification Authority to be<br />

defined with the CAName parameter. This also requires a computer system hosting the<br />

Certification Authority be defined with the CAMachine parameter. These entries support the use<br />

of a certificate in a web browser.<br />

certsrv_server=Off<br />

The certsrv_server value sets the certsrv_server registry value. The setting ‘Off’ does not install<br />

the Certificate <strong>Server</strong>.<br />

charmap=On<br />

The charmap value sets the charmap registry value. The setting ‘On’ installs the Character Map<br />

feature.<br />

Automated Installation March 2004 33


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

chat=Off<br />

The chat value sets the chat registry value. The setting ‘Off’ does not install the Chat program.<br />

Clipbook=Off<br />

The Clipbook value sets the clipbook registry value. The setting ‘Off’ does not install the<br />

Clipbook.<br />

cluster=Off<br />

The cluster value sets the cluster registry value. The setting ‘Off’ does not install the cluster<br />

software.<br />

complusnetwork=On<br />

The complusnetwork value sets the complusnetwork registry value. The setting ‘On’ enables<br />

network Com+ access.<br />

deskpaper=Off<br />

The deskpaper value sets the deskpaper registry value. The setting ‘Off’ does not install a<br />

desktop background.<br />

dialer=Off<br />

The dialer value sets the dialer registry value. The setting ‘Off’ does not install the Phone Dialer.<br />

dtcnetwork=Off<br />

The dtcnetwork value sets the dtcnetwork registry value. The setting ‘Off’ disables DTC network<br />

access. DTC is the Distributed Transaction Coordinator.<br />

fax=Off<br />

The fax value sets the fax registry value. The setting ‘Off’ does not install the Fax feature.<br />

fp_extensions=Off<br />

The fp_extensions value sets the fp_extensions registry value. The setting ‘Off’ does not install<br />

the FrontPage server extensions.<br />

34 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

fp_vdir_deploy=Off<br />

The fp_vdir_deploy value sets the fp_vdir_deploy registry value. The setting ‘Off’ does not<br />

install the Visual InterDev RAD Remote Deployment Support.<br />

freecell=Off<br />

The freecell value sets the frecell registry value. The setting ‘Off’ does not install the Freecell<br />

game.<br />

hearts=Off<br />

The hearts value sets the hearts registry value. The setting ‘Off’ does not install the Hearts game.<br />

hypertrm=Off<br />

The hyperterm value sets the hyperterm registry value. The setting ‘Off’ does not install the<br />

HyperTerminal feature.<br />

IEAccess=Off<br />

The IEAccess value determines if the Internet Explorer Access points are visible. The setting<br />

‘Off’ does not make the Internet Explorer Access points visible.<br />

iis_asp=Off<br />

The iis_asp value sets the iis_asp registry value. The setting ‘Off’ does not install the Active<br />

<strong>Server</strong> Pages feature.<br />

iis_common=Off<br />

The iis_common value sets the iis_common registry value. The setting ‘Off’ does not install the<br />

common set of files needed by IIS.<br />

iis_ftp=Off<br />

The iis_ftp value sets the iis_ftp registry value. The setting ‘Off’ does not install the FTP<br />

Service.<br />

iis_inetmgr=Off<br />

The iis_inetmgr value sets the iis_inetmgr registry value. The setting ‘Off’ does not install the<br />

MMC-based administration tools for IIS.<br />

Automated Installation March 2004 35


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

iis_internetdataconnector=Off<br />

The iis_internetdataconnector value sets the iis_internetdataconnector registry value. The setting<br />

‘Off’ does not install the Internet Data Connector.<br />

iis_nntp=Off<br />

The iis_nntp value sets the iis_nntp registry value. The setting ‘Off’ does not install the NNTP<br />

Service.<br />

iis_serversidesincludes=Off<br />

The iis_serversideincludes value sets the iis_serversideincludes registry value. The setting ‘Off’<br />

does not install the <strong>Server</strong> Side Includes.<br />

iis_smpt=Off<br />

The iis_smtp value sets the iis_smtp registry value. The setting ‘Off’ does not install the SMTP<br />

Service.<br />

iis_webadmin=Off<br />

The iis_webadmin value sets the iis_webadmin registry value. The setting ‘Off’ does not install<br />

the Web UI for Web server administration (Remote Administration Tools).<br />

iis_webdav=Off<br />

The iis_webdav value sets the iis_dav registry value. The setting ‘Off’ does not install WebDAV<br />

Publishing.<br />

iis_www=Off<br />

The iis_www value sets the iis_www registry value. The setting ‘Off’ does not install the WWW<br />

Service.<br />

iis_www_vdir_scripts=Off<br />

The iis_www_vdir_scripts value sets the iis_www_vdir_scripts registry value. The setting ‘Off’<br />

does not does not create the optional scripts directory on the default web site.<br />

36 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

indexsrv_system=Off<br />

The indexsrv_system value sets the indexsrv_system registry value. The setting ‘Off’ does not<br />

install the Indexing Service.<br />

inetprint=Off<br />

The inetprint value sets the inetprint registry value. The setting ‘Off’ does not install Internet<br />

Printing.<br />

licenseserver=Off<br />

The licenseserver value sets the licenseserver registry value. The setting ‘Off’ does not enable<br />

Terminal Services licensing.<br />

media_clips=Off<br />

The media_clips value sets the media_clips registry value. The setting ‘Off’ does not install<br />

sample sounds.<br />

media_utopia=Off<br />

The media_utopia value sets the media_utopia registry value. The setting ‘Off’ does not install<br />

the Utopia sound scheme.<br />

minesweeper=Off<br />

The minesweeper value sets the minesweeper registry value. The setting ‘Off’ does not install<br />

the Minesweeper game.<br />

mousepoint=On<br />

The mousepoint value sets the mousepoint registry value. The setting ‘On’ installs all available<br />

mouse pointers.<br />

msmq_ADIntegrated=Off<br />

The msmq_ADIntegrated value sets the msmq_ADIntegrated registry value. The setting ‘Off’<br />

does not integrate MSMQ with Active Directory.<br />

Automated Installation March 2004 37


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

msmq_Core=Off<br />

The msmq_core value sets the msmq_core registry value. The setting ‘Off’ does not install the<br />

Message Queuing components.<br />

msmq_HTTPSupport=Off<br />

The msmq_HTTPSupport value sets the msmq_HTTPSupport registry value. The setting ‘Off’<br />

does not enable sending and receiving of messages using HTTP.<br />

msmq_LocalStorage=Off<br />

The msmq_LocalStorage value sets the msmq_LocalStorage registry value. The setting ‘Off’<br />

does not store messages locally.<br />

msmq_MQDSSService=Off<br />

The msmq_MQDSSService value sets the msmq_MQDSSService registry value. The setting<br />

‘Off’ disables access to Active Directory and site recognition for downstream clients.<br />

msmq_RoutingSupport=Off<br />

The msmq_RoutingSupport value sets the msmq_RoutingSupport registry value. The setting<br />

‘Off’ does not provide efficient routing. The Message Queuing components are not installed so<br />

this parameter does not affect the system.<br />

msmq_TriggerService=Off<br />

The msmq_TriggerService value sets the msmq_TriggerService registry value. The setting ‘Off’<br />

disassociates the arrival of incoming messages at a queue with functionality in a Component<br />

Object Module (COM) component. The same may be said for a standalone executable program.<br />

msnexplr=Off<br />

The msnexplr value sets the msnexplr registry value. The setting ‘Off’ does not install MSN<br />

Explorer.<br />

mswordpad=On<br />

The mswordpad value sets the mswordpad registry value. The setting ‘On’ installs the<br />

mswordpad feature.<br />

38 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

netcis=Off<br />

The netcis value sets the netcis registry value. The setting ‘Off’ does not install Microsoft COM<br />

Internet Services.<br />

netoc=Off<br />

The netoc value sets the netoc registry value. The setting ‘Off’ does not install optional<br />

networking components.<br />

objectpkg=Off<br />

The objectpkg value determines if the Object Packager is installed. The setting ‘Off’ does not<br />

install the Object Packager.<br />

OEAccess=Off<br />

The OEAccess value determines if the visible entry points to Outlook Express are installed. The<br />

setting ‘Off’ does not install the visible entry points for Outlook Express.<br />

paint=Off<br />

The paint value sets the paint registry value. The setting ‘Off’ does not install Microsoft Paint.<br />

pinball=Off<br />

The pinball value sets the pinball registry value. The setting ‘Off’ does not install the Pinball<br />

game.<br />

Pop3Admin=Off<br />

The Pop3Admin value determines if setup will install the optional Web UI for the Remote<br />

Administration Tools. The setting ‘Off’ does not install the optional Web UI.<br />

Pop3Service=Off<br />

The Pop3Service value determines if setup will install the main POP3 service. The setting ‘Off’<br />

does not install the main POP3 service.<br />

Pop3Srv=Off<br />

The Pop3Srv value determines if setup will install the root POP3 component. The setting ‘Off’<br />

does not install the root POP3 component.<br />

Automated Installation March 2004 39


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

rec=Off<br />

The rec value determines if setup will install the Sound Recorder. The setting ‘Off’ does not<br />

install the Sound recorder.<br />

reminst=Off<br />

The reminst value sets the reminst registry value. The setting ‘Off’ does not install the remote<br />

installation Service.<br />

rootautoupdate=Off<br />

The rootautoupdate value sets the rootautoupdate registry value. The setting ‘Off’ disables the<br />

OMC Update Root Certificates. If the user is presented with a certificate issued by a root<br />

authority that is not directly trusted, and the Update Root Certificates component is not installed<br />

on the user’s computer, the user will be prevented from completing the action that required<br />

authentication.<br />

rstorage=Off<br />

The rstorage value sets the rstorage registry value. The setting ‘Off’ does not install the Remote<br />

Storage feature.<br />

solitaire=Off<br />

The solitaire value sets the solitaire registry value. The setting ‘Off’ does not install the Solitaire<br />

game.<br />

spider=Off<br />

The spider value sets the spider registry value. The setting ‘Off’ does not install the Spider game.<br />

templates=Off<br />

The templates value sets the templates registry value. The setting ‘Off’ does not install<br />

Document Templates.<br />

Terminal<strong>Server</strong>=Off<br />

The Terminal<strong>Server</strong> value determines if setup will install Terminal Services. The setting of ‘Off’<br />

does not install Terminal Services.<br />

40 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

TSWebClient=Off<br />

The TSWebClient determines if the ActiveX control for hosting Terminal Services client<br />

connections over the Web are installed. The setting ‘Off’ does not install the ActiveX control.<br />

vol=Off<br />

The vol value sets the vol registry value. The setting ‘Off’ does not install the Volume Control.<br />

WBEMSNMP=Off<br />

The WBEMSNMP value sets the WBEMSNMP registry value. The setting ‘Off’ does not install<br />

the WMI SNMP Provider.<br />

WMAccess=Off<br />

The WMAccess value determines if setup will install visible entry points to <strong>Windows</strong> Manager.<br />

The setting ‘Off’ does not install visible entry points to <strong>Windows</strong> Manager.<br />

WMPOCM=Off<br />

The WMPOCM value determines setup will install visible entry points to <strong>Windows</strong> Media<br />

Player. The setting ‘Off’ does not install visible entry points to <strong>Windows</strong> Media Player.<br />

wms=Off<br />

The wms value determines sets the wms registry value. The setting ‘Off’ does not install the core<br />

<strong>Windows</strong> Media <strong>Server</strong> components.<br />

wms_admin_asp=Off<br />

The wms_admin_asp value sets the wms_admin_asp registry value. The setting ‘Off’ does not<br />

install <strong>Windows</strong> Media Services Web-based administrative components.<br />

wms_admin_mmc=Off<br />

The wms_admin_mmc value sets the wms_admin_mmc registry value. The setting ‘Off’ does<br />

not install the <strong>Windows</strong> Media Services MMC-based administrative components.<br />

wms_isapi=Off<br />

The wms_isapi value sets the wms_isapi registry value. The setting ‘Off’ does not install the<br />

<strong>Windows</strong> Media Services Multicast and Advertisement Logging Agent components.<br />

Automated Installation March 2004 41


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

wms_server=Off<br />

The wms_server value sets the wms_server registry value. The setting ‘Off’ does not install the<br />

<strong>Windows</strong> Media Services server components.<br />

zonegames=Off<br />

The zonegames value sets the zonegames registry value. The setting ‘Off’ does not install the<br />

Microsoft Gaming Zone Internet Games component.<br />

42 March 2004 Automated Installation


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4 <strong>Server</strong> Policy Files<br />

4.1 Policy File Application<br />

Apply policies dictated by the environment (Domain or Workgroup).<br />

4.1.1 Policy Application in a Domain<br />

The policy files are applied to Organizational Units within the Active Directory. The structure of<br />

the Directory will dictate the exact names and locations of the Organizational Units. The<br />

structure deployed in the CSE lab had an Organizational Unit for “Public <strong>Server</strong>s” to which the<br />

<strong>Baseline</strong> configuration was applied. The “Print <strong>Server</strong>s” and “File <strong>Server</strong>s” organizational units<br />

are placed in the “Public <strong>Server</strong>” organizational unit. The appropriate policies are applied to the<br />

specific organizational unit.<br />

This procedure is applicable to any organizational unit and any policy file. Simply substitute the<br />

‘OU’ and ‘policy file name’ as required.<br />

1. Invoke Active Directory interface.<br />

2. Expand Directory - click on the “+” signs to display the desired OU.<br />

3. Right click on the desired OU and select Properties from the menu.<br />

a. “Organizational Unit Properties” dialog opens.<br />

4. Select “Group Policy” tab.<br />

5. Click “New” button.<br />

6. “New Group Policy Object” is created.<br />

7. Rename “New Group Policy Object” to desired value.<br />

8. Click “Edit” button.<br />

b. “Group Policy Object Editor” dialog opens.<br />

9. Click “+” beside “<strong>Windows</strong> Settings”.<br />

10. Right Click “<strong>Security</strong> Settings”.<br />

11. Select “Import Policy” from menu.<br />

12. Browse to desired policy file and select it.<br />

13. Enable “Clear this database before importing”.<br />

14. Click “Open” (policy is imported).<br />

15. Click “File” and then “Exit”.<br />

16. Click “Apply”.<br />

17. Click “Exit”.<br />

<strong>Server</strong> Policy Files March 2004 43


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

Repeat this process until all OUs (Public <strong>Server</strong>s, Print <strong>Server</strong>s and Files <strong>Server</strong>s) have the<br />

required policy files applied to them.<br />

4.1.2 Policy Application in a Workgroup<br />

The policies for a workgroup server must be applied in the appropriate order to ensure a correct<br />

policy. Apply the <strong>Baseline</strong> configuration first, than apply additional policies to enable the<br />

designated role of the server.<br />

To enter a policy file with the local Group Policy Editor, perform the following:<br />

1. Open a command window.<br />

2. Enter “MMC” and press “Return”.<br />

a. “Console 1” dialog opens.<br />

3. Click “File”.<br />

4. Select “Add/Remove Snap-in”.<br />

5. “Add/Remove Snap-in” dialog displayed.<br />

6. Click “Add”.<br />

7. “Add Standalone Snap-in” dialog displayed.<br />

8. Browse to and select “Group Policy Editor”.<br />

9. Click “Add”.<br />

10. “Select Group Policy Object” dialog displayed.<br />

11. Accept defaults and click “”Finish”.<br />

12. Click “Close”.<br />

13. Click “OK”.<br />

a. The “Root Console Window” appears.<br />

14. Click on “+” beside “Local Computer Policy”<br />

15. Click on “+” beside “<strong>Windows</strong> Settings”.<br />

16. Right click on “<strong>Security</strong> Settings”.<br />

17. Select “Import Policy”.<br />

18. Browse to desired policy file and select it.<br />

a. Import <strong>Baseline</strong> configuration policy first then Role based policies.<br />

19. Click “Open”.<br />

20. Click “File”.<br />

21. Click “Exit”.<br />

22. “Microsoft Management Console” dialog displayed.<br />

44 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

23. Select “Yes” if you wish to save the settings.<br />

a. Otherwise, select “No”.<br />

4.2 <strong>Baseline</strong> <strong>Server</strong> Policy Files Details<br />

The following section provides additional services and settings that are managed by policy files.<br />

The Domain and Workgroup <strong>Baseline</strong> configuration files are largely identical. The following<br />

section provides details on the security settings. Items that are not the same will have both<br />

settings documented.<br />

4.3 Account Policies<br />

Account policies determine the rules for user’s with respect to passwords and Kerberos.<br />

4.3.1 Password Policy<br />

4.3.1.1 Enforce password history<br />

PasswordHistorySize = 24<br />

The ‘PasswordHistorySize’ defines the number of passwords retained by the system. This<br />

history is compared with user input during password changes. The setting ‘24’ requires the user<br />

to select twenty-four unique passwords before they can re-use their first one. With a<br />

‘MinimumPasswordAge’ of two, the user would have to cycle their password every two days to<br />

get back to their original password.<br />

4.3.1.2 Maximum password age<br />

MaximumPasswordAge = 42<br />

The ‘MaximumPasswordAge’ defines the maximum number of days a user can keep the same<br />

password. A setting of forty-two requires the user to change their password every forty-two days.<br />

Combined with the ‘PasswordComplexity’ and ’PasswordLength’ settings, these settings ensure<br />

the password is strong and resilient to attack.<br />

4.3.1.3 Minimum Password Age<br />

MinimumPasswordAge = 2<br />

The ‘MinimumPasswordAge’ defines how many days a user must wait between password<br />

changes. The setting ‘2’ requires the user to wait two before they can change it again.<br />

4.3.1.4 Minimum password length<br />

MinimumPasswordLength = 8<br />

The ‘MinimumPasswordLength’ defines the minimum number of characters acceptable for a<br />

password. The setting ‘8’ requires the user to enter a password of eight characters or more.<br />

<strong>Server</strong> Policy Files March 2004 45


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

Combined with the ‘PasswordComplexity’ and ‘MaximumPasswordAge’ settings, these settings<br />

ensure the password is strong and resilient to attack.<br />

4.3.1.5 Password must meet complexity requirements<br />

PasswordComplexity = 1<br />

The ‘PasswordComplexity’ switch defines password complexity requirements. The setting ‘1’<br />

requires the user to enter a password that meets the criteria below.<br />

The password contains characters from three of the following four categories:<br />

• Upper Case Character (A-Z)<br />

• Lower Case Character (a-z)<br />

• Base 10 Digits (0-9)<br />

• Non-alphanumeric (! @ # $ % ^ &)<br />

This setting helps thwart brute-force attacks.<br />

4.3.1.6 Store password using reversible encryption<br />

ClearTextPassword = 0<br />

The ‘ClearTextPassword’ keyword determines if the system stores passwords using reversible<br />

encryption. The setting ‘zero’ disables reversible encryption.<br />

NOTE:<br />

Never enable this option unless operational considerations outweigh the need to<br />

protect password information.<br />

4.3.2 Account Lockout Policy<br />

4.3.2.1 Account Lockout Duration<br />

LockoutDuration = 15<br />

The ‘LockoutDuration’ defines the length of time (in minutes) that an account is disabled after<br />

lockout. The setting ‘15’ disables the user’s account for 15 minutes. This value needs to be<br />

synchronized with ‘ResetLockoutCounter’ so the user can logon when the ‘LockoutDuration’<br />

has expired.<br />

4.3.2.2 Account lockout threshold<br />

LockoutBadCount = 10<br />

The ‘LockoutBadCount’ defines the number of failed logons allowed before the account is<br />

locked. The setting ‘10’ causes the user’s account to be locked after 10 consecutive logon<br />

attempts. The setting prevents extended password guessing attacks.<br />

46 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.3.2.3 Reset account lockout counter after<br />

ResetLockoutCount = 15<br />

The ‘ResetLockoutCount’ defines the length of time (in minutes) before a lockout reset occurs.<br />

The setting ‘15’ resets the lockout to zero after fifteen minutes. This value needs to be<br />

synchronized with ‘LockoutDuration’ so the user can logon when the ‘LockoutDuration’ has<br />

expired.<br />

4.3.3 Kerberos Policy<br />

There are no Kerberos settings in the Workgroup <strong>Baseline</strong> configuration.<br />

4.3.3.1 Enforce user logon restrictions<br />

TicketValidateClient = 1<br />

The ‘TicketValidateClient’ determines if Kerberos V5 Key Distribution Centre authentication is<br />

required. The setting ‘1’ requires the use of Kerberos Authentication.<br />

4.3.3.2 Maximum lifetime for the service ticket<br />

MaxServiceAge = 600<br />

The ‘MaxServiceAge’ defines the number of minutes a service ticket will be valid. The setting<br />

‘600’ allows the ticket to be used for ten hours.<br />

4.3.3.3 Maximum lifetime for user ticket<br />

MaxTicketAge = 10<br />

The ‘MaxTicketAge’ defines the maximum hours a user’s ticket granting ticket may be used.<br />

The setting ‘10’ indicates that the ticket granting ticket must be replaced or renewed after ten<br />

hours.<br />

4.3.3.4 Maximum lifetime for user ticket renewal<br />

MaxRenewAge = 7<br />

The ‘MaxRenewAge’ defines the number of days a ticket granting ticket may be renewed after<br />

issuance. The setting ‘7’ allows a ticket granting ticket to be renewed for seven days.<br />

4.3.3.5 Maximum tolerance for computer clock synchronization<br />

MaxClockSkew = 5<br />

The ‘MaxClockSkew’ defines the maximum amount of time a system clock can be different<br />

from the Domain Controller clock. The setting of ‘5’ indicates systems more than 5 minutes<br />

different than the Domain Controller clock will be refused.<br />

<strong>Server</strong> Policy Files March 2004 47


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4 Local Policies<br />

4.4.1 Audit Policy<br />

4.4.1.1 Audit account logon events<br />

AuditAccountLogon = 3<br />

The ‘AuditAccountLogon’ defines types of logon events to audit. The setting ‘3’ audits ‘success’<br />

and ‘fail’ events. ‘Success’ events can determine who accessed the system during an incident.<br />

‘Fail’ events provide insight to password guessing attacks.<br />

4.4.1.2 Audit account management<br />

AuditAccountManage = 3<br />

The ‘AuditAccountManage’ defines types of logon events to audit. The setting ‘3’ audits<br />

‘success’ and ‘fail’ events. ‘Success’ events can be used in investigations, monitoring accounts at<br />

the time of an incident. ‘Fail’ attempts can determine if users are probing the system for<br />

vulnerabilities.<br />

4.4.1.3 Audit directory service access<br />

AuditDSAccess = 3<br />

The ‘AuditDSAccess‘ defines types of logon events to audit. The setting ‘3’ audits ‘success’ and<br />

‘fail’ events. The Directory Service holds crucial information for the Domain. Knowledge of<br />

access during an incident can provide valuable information about Active Directory objects<br />

accessed during an attack.<br />

4.4.1.4 Audit logon events<br />

AuditLogonEvents = 3<br />

The ‘AuditLogonEvents’ defines types of logon events to audit. The setting ‘3’ audits ‘success’<br />

and ‘fail’ events. ‘Success’ events can be used to determine who was accessing the system<br />

during an incident. ‘Fail’ logon attempts can determine if the system is under a password<br />

guessing attack.<br />

4.4.1.5 Audit object access<br />

AuditObjectAccess = 2<br />

The ‘AuditObjectAccess’ defines the type of logon events that will be audited. The setting ‘2’<br />

audits failed events. Failed attempts can be monitored to determine if any users are probing the<br />

system for vulnerabilities.<br />

48 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.1.6 Audit policy change<br />

AuditPolicyChange = 3<br />

The ‘AuditPolicyChange’ defines the type of logon events that will be audited. The setting 3<br />

audits ‘success and ‘fail’ events. ‘Success’ events are used in investigations to determine access<br />

to the system and policy used at the time of the incident. ‘Fail’ attempts can determine if users<br />

are probing the system for vulnerabilities.<br />

4.4.1.7 Audit privilege use<br />

AuditPrivilegeUse = 3<br />

The ‘AuditPrivilegeUse’ defines logon events to be audited. The setting ‘3’ audits ‘success’ and<br />

‘fail’ events. ‘Success’ events are used to determine who was accessing the system at the time of<br />

the incident. ‘Fail’ attempts can determine if users are probing the system for vulnerabilities.<br />

4.4.1.8 Audit process tracking<br />

AuditProcessTracking = 0<br />

The ‘AuditProcessTracking’ defines logon events to be audited. The setting ‘0’ audits no events.<br />

The value of this information is weighed against the volume of data collected. Due to large<br />

volumes of data, the normal setting for this value is disabled. However, during an incident the<br />

information provided is invaluable. If an attack is suspected, we recommend the setting be<br />

enabled.<br />

4.4.1.9 Audit system events<br />

AuditSystemEvents = 3<br />

The’ AuditSystemEvents’ defines events to be audited. The setting ‘3’ audits ‘success’ and ‘fail’<br />

events. These events reflect the system shutdown and restarts, system security events, and events<br />

that affect the security log.<br />

4.4.2 User Rights Assignments<br />

4.4.2.1 Access this computer from the network<br />

senetworklogonright = *S-1-5-11,*S-1-5-32-544<br />

The ‘senetworklogonright’ grants network protocol access to the system (SMB, NetBIOS, CIFS,<br />

HTTP and COM+). The policy grants privileges to the Administrators and authenticated users.<br />

The ability to access the system from the network provides greater exposure for an attack.<br />

Restricting access reduces the exposure.<br />

<strong>Server</strong> Policy Files March 2004 49


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.2.2 Act as part of the operating system<br />

setcbprivilege =<br />

The ‘setcbprivilege’ grants an account the ability to act as part of the operating system.<br />

According to Microsoft, there is no reason why an account would require this privilege.<br />

4.4.2.3 Add workstations to domain<br />

semachineaccountprivilege =<br />

The ‘semachineaccountprivilege’ grants the right to add workstations to a domain. This policy<br />

grants no privilege. Restricting this privilege helps maintain Domain integrity.<br />

4.4.2.4 Adjust memory quotas for a process<br />

seincreasequotaprivilege = *S-1-5-32-544,*S-1-5-19,*S-1-5-20<br />

The ‘seincreasequotaprivilege’ grants the ability to adjust memory quotas for a process. This<br />

policy grants privileges to Administrators, LOCAL SERVICE and NETWORK SERVICE<br />

accounts. If misused, DoS attacks are possible.<br />

4.4.2.5 Allow log on locally<br />

seinteractivelogonright = *S-1-5-32-551,*S-1-5-32-544<br />

The ‘seinteractivelogonright’ grants logon privilege to the local console. These privileges are<br />

given to Administrators and Backup operators. Local access is restricted to accounts that have<br />

legitimate reason for access. By restricting this privilege, system exposure is reduced.<br />

4.4.2.6 Allow log on through Terminal Services<br />

seremoteinteractivelogonright = *S-1-5-32-544<br />

The ‘seremoteinteractivelogonright’ grants the right to logon remotely through Terminal<br />

Services. This policy grants rights to Administrators. There is no requirement to allow users this<br />

form of access.<br />

4.4.2.7 Backup files and directories<br />

sebackupprivilege = *S-1-5-32-551,*S-1-5-32-544<br />

The ‘sebackupprivilege’ grants the right to backup files and directories. Rights are given to<br />

Administrators and Backup Operators. If your policy does not allow administrators to backup<br />

then omit the Administrators group. The allocation of this privilege must be tightly controlled.<br />

50 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.2.8 Bypass traverse checking<br />

sechangenotifyprivilege = *S-1-5-32-545,*S-1-5-32-551,*S-1-5-11,*S-1-5-32-544<br />

The ‘sechangenotifyprivilege’ grants the right to bypass traverse checking in NTFS file systems<br />

and the Registry. This policy grants rights to Users, Backup Operators, Administrators, and<br />

authenticated users.<br />

4.4.2.9 Change the system time<br />

sesystemtimeprivilege = *S-1-5-32-544<br />

The ‘sesystemtimeprivilege’ grants the right to change the system time. This policy grants rights<br />

to Administrators. The system time is critical in incident investigation. Without a consistent time,<br />

it is difficult to co-relate events on multiple systems.<br />

4.4.2.10 Create a pagefile<br />

secreatepagefileprivilege = *S-1-5-32-544<br />

The ‘secreatepagefileprivilege’ grants the right to create a page file. This policy grants rights to<br />

Administrators. Too large a page file can cause poor system performance. Restricting this to<br />

Administrators reduces the exposure to trusted individuals.<br />

4.4.2.11 Create a token object<br />

secreatetokenprivilege =<br />

The ‘secreatetokenprivilege’ grants the right to create local security token objects. The privilege<br />

gives the ability to create or modify Access Tokens. This policy does not grant rights to anyone.<br />

This can prevent privilege escalation attacks and DoS conditions.<br />

4.4.2.12 Create global objects<br />

secreateglobalprivilege = *S-1-5-6,*S-1-5-32-544<br />

The ‘secreateglobalprivilege’ grants the right to create objects available to all sessions. This<br />

policy grants rights to Administrators and the SERVICE account. It can be used to affect other<br />

user’s processes.<br />

4.4.2.13 Create permanent shared objects<br />

secreatepermanentprivilege =<br />

The ‘secreatepermanentprivilege’ grants the right to create shared objects (folders, printers).<br />

Users with this privilege could expose sensitive data to the network by creating a shared object.<br />

Only members of the Administrators group can create permanent shared objects.<br />

<strong>Server</strong> Policy Files March 2004 51


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.2.14 Debug programs<br />

sedebugprivilege =<br />

The ‘sedebugprivilege’ grants the right to debug any kernal process. Program debugging should<br />

never be done in a production environment. In the event it is required, grant rights for a short<br />

time.<br />

4.4.2.15 Deny access to this computer from the network<br />

sedenynetworklogonright = *S-1-5-32-546, *S-1-5-7<br />

The ‘sedenynetworklogonright’ prevents access for a variety of network protocols. The policy<br />

applies the right to Guests and ANONYMOUS LOGON. The Administrators must add the local<br />

accounts ‘Guest’, ‘Support_388945a0’ and Built-in Administrator account.<br />

NOTE:<br />

Given no reason for network access to the system for a group or user, access should<br />

be denied.<br />

4.4.2.16 Deny log on as a batch job<br />

sedenybatchlogonright = *S-1-5-32-546, *S-1-5-7<br />

The ‘sedenybatchlogonright‘ prevents the ability to create batch jobs. This policy applies rights<br />

to Guests and ANONYMOUS LOGON. The Administrators must add the local accounts ‘Guest’<br />

and ‘Support_388945a0’. The batch facility could be used to schedule jobs that result in a DoS.<br />

NOTE:<br />

Given no reason for batch logon access to the system for a group or user, access<br />

should be denied.<br />

4.4.2.17 Deny log on as a service<br />

sedenyservicelogonright = *S-1-5-32-546,*S-1-5-32-544, *S-1-5-7<br />

The ‘sedenyservicelogonright’ prevents access to a variety of network protocols. This policy<br />

applies the rights to Guests, ANONYMOUS LOGON, and Administrators. Administrators must<br />

add the local accounts ‘Guest’, ‘Support_388945a0’ and Built-in Administrator account.<br />

4.4.2.18 Deny log on locally<br />

sedenyinteractivelogonright = *S-1-5-32-546, *S-1-5-7<br />

The ‘sedenyinteractivelogonright’ prevents local access to the system. This policy applies the<br />

rights to Guests and ANONYMOUS LOGON. Administrators must add the local accounts<br />

‘Guest’ and ‘Support_388945a0’.<br />

NOTE:<br />

Given no reason for interactive access to the system for a group, access should be<br />

denied.<br />

52 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.2.19 Deny log on through Terminal Services<br />

sedenyremoteinteractivelogonright = *S-1-5-32-546, *S-1-5-7<br />

The ‘sedenyremoteinteractivelogonright’ prevents logon through terminal services. This policy<br />

applies rights to Guests and ANONYMOUS LOGON. Administrators must add the local<br />

accounts ‘Guest’, ‘Support_388945a0’ and Built-in Administrator.<br />

NOTE:<br />

Given no reason for terminal services access for a group, access should be denied.<br />

4.4.2.20 Enable computer and user accounts to be trusted for delegation<br />

seenabledelegationprivilege =<br />

The ‘seenabledelegationprivilege’ grants the right to change the ‘trusted for delegation’ setting<br />

on Active Diretory objects. This policy does not grant privileges to anyone. The misuse of this<br />

privilege could lead to impersonation of users in a Domain.<br />

4.4.2.21 Force shutdown from a remote system<br />

seremoteshutdownprivilege =<br />

The ‘seremoteshutdownprivilege’ grants the right to shut the system down from a remote<br />

location. This policy grants rights to noone. <strong>Server</strong>s in a High <strong>Security</strong> zone require physical<br />

access to be shut down.<br />

4.4.2.22 Generate security audits<br />

seauditprivilege = *S-1-5-19,*S-1-5-20<br />

The ‘seauditprivilege’ grants the right to generate records in the security logs. This policy grants<br />

rights to NETWORK SERVICE and LOCAL SERVICE. By limiting rights to non-interactive<br />

accounts, DoS conditions through full logs can be avoided.<br />

4.4.2.23 Impersonate a client after authentication<br />

seimpersonateprivilege = *S-1-5-19,*S-1-5-20<br />

The ‘seimpersonateprivilege’ grants the right for applications to impersonate that client. This<br />

policy grants rights to Local Service and Network Service. For better security, privileges are<br />

limited to non-interactive accounts.<br />

4.4.2.24 Increase scheduling priority<br />

seincreasebasepriorityprivilege = *S-1-5-32-544<br />

The ‘seincreasebasepriorityprivilege’ grants the right to increase process priority. This policy<br />

grants privileges to Administrators. If misused, a DoS condition could starve CPU resources.<br />

<strong>Server</strong> Policy Files March 2004 53


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.2.25 Load and unload device drivers<br />

seloaddriverprivilege = *S-1-5-32-544<br />

The ‘seloaddriverprivilege’ grants the right to load and unload device drivers. This policy grants<br />

privileges to Administrators. The driver code is run with elevated privileges. By restricting<br />

privileges to Administrators, the exposure is reduced.<br />

4.4.2.26 Lock pages in memory<br />

selockmemoryprivilege =<br />

The ‘selockmemoryprivilege’ grants the right to keep data in physical memory. This policy<br />

grants privileges to no one. The abuse of privileges can result in starved memory resources and a<br />

DoS situation. Restricting this privilege reduces exposure to this threat.<br />

4.4.2.27 Log on as a batch job<br />

sebatchlogonright =<br />

The ‘sebatchlogonright’ grants the right to submit batch jobs (log on as a batch job). This policy<br />

grants rights to noone. The Task Scheduler could cause a DoS; limiting this privilege reduces the<br />

threat.<br />

4.4.2.28 Log on as a service<br />

seservicelogonright = *S-1-5-20,*S-1-5-19<br />

The ‘seservicelogonright’ grants the right to logon as a service. This policy grants rights to Local<br />

Service and Network Service. Interactive accounts are purposely excluded.<br />

4.4.2.29 Manage auditing and security log<br />

sesecurityprivilege = *S-1-5-32-544<br />

The ‘sesecurityprivilege’ grants the right to specify object access auditing options. This policy<br />

grants rights to Administrators. Administrators alone can determine the appropriate auditing<br />

level. This ensures that users of the system cannot reduce auditing and eliminate traces of their<br />

activity.<br />

4.4.2.30 Modify firmware environment values<br />

sesystemenvironmentprivilege = *S-1-5-32-544<br />

The ‘sesystemenvironmentprivilege’ grants rights to modify firmware environment values. This<br />

policy grants these rights to Administrators only. The ability to change system configurations<br />

needs to be controlled.<br />

54 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.2.31 Perform volume maintenance tasks<br />

semanagevolumeprivilege = *S-1-5-32-544<br />

The ‘semanagevolumeprivilege’ grants rights to manage volumes or disks. This policy grants<br />

rights to Administrators only. The administrative function of volume and disk management can<br />

damage user data on a disk. Restricting this privilege reduces the threat.<br />

4.4.2.32 Profile single process<br />

seprofilesingleprocessprivilege = *S-1-5-32-544<br />

The ‘seprofilesingleprocessprivilege’ grants the right to monitor performance of a non-system<br />

process. This policy grants these rights to Administrators. The ability to profile a process can<br />

provide information to be used as a basis of an attack. Limiting privileges to Administrators<br />

reduces this threat.<br />

4.4.2.33 Profile system performance<br />

sesystemprofileprivilege = *S-1-5-32-544<br />

The ‘sesystemprofileprivilege’ grants the right to monitor performance of a system process. This<br />

policy grants these rights to Administrators only. Profiling a system gathers information useful<br />

for an attack. Limiting privileges to Administrators reduces this threat.<br />

4.4.2.34 Remove computer from docking station<br />

seundockprivilege = *S-1-5-32-544<br />

The ‘seundockprivilege’ grants the right to undock the server. This policy grants these privileges<br />

to Administrators only. As a preventive measure, these privileges are restricted.<br />

4.4.2.35 Replace a process level token<br />

seassignprimarytokenprivilege = *S-1-5-19,*S-1-5-20<br />

The ‘seassignprimarytokenprivilege’ grants the right to replace a process security token of a<br />

child process. These rights are ganted to Local Service and Network Service. This can be used to<br />

launch processes as another user, providing the ability to hide inappropriate activity on a system.<br />

4.4.2.36 Restore files and directories<br />

serestoreprivilege = *S-1-5-32-544<br />

The ‘serestoreprivilege’ grants the right to bypass permissions when restoring objects. This<br />

policy grants privileges to Administrators only. Due to the nature of the restore process, rights<br />

are restricted to accounts that are required to use it.<br />

<strong>Server</strong> Policy Files March 2004 55


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.2.37 Shut down the system<br />

seshutdownprivilege = *S-1-5-32-544<br />

The ‘seshutdownprivilege’ grants the right to shut down the system locally. This policy grants<br />

the right to Administrators only. By restricting this privilege, the threat of inadevertent or<br />

malicious shutdowns is reduced.<br />

4.4.2.38 Synchronize directory service data<br />

sesyncagentprivilege =<br />

The ‘sesyncagentprivilege’ grants the right to read all objects and properties in the Directory.<br />

This policy revokes all privilege. Information gained from the Active Directory can be used to<br />

form an attack against the system.<br />

4.4.2.39 Take ownership of files or other objects<br />

setakeownershipprivilege = *S-1-5-32-544<br />

The ‘setakeownershipprivilege’ grants the right to take ownership of any securable object in the<br />

system. The act of changing ownership will be recorded in the logs. This policy grants privileges<br />

to Administrators only.<br />

4.4.3 <strong>Security</strong> Options<br />

This section includes values for all entries in the <strong>Security</strong> Options section of the policy GUI. It<br />

incorporates entries in the <strong>Security</strong> Options section of the Domain Policy as well as the Member<br />

<strong>Server</strong> <strong>Baseline</strong>. Please note all values are explicitly defined. This ensures that security is not<br />

dependent on default values.<br />

4.4.3.1 Accounts: Administrator account status<br />

EnableAdminAccount = 0<br />

The ‘EnableAdminAccount’ determines if the local administrator account is enabled. The setting<br />

‘0’ disables the local administrator account. This prevents widespread use and removes it as a<br />

target for attack.<br />

4.4.3.2 Accounts: Guest account status<br />

EnableGuestAccount = 0<br />

The ‘EnableGuestAccount‘ determines if the local guest account is enabled. The setting ‘0’<br />

disables the local guest account. This prevents widespread use and removes it as a target for<br />

attack.<br />

56 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.3.3 Accounts: Limit local account use of blank passwords to console logon only<br />

machine\system\currentcontrolset\control\lsa\limitblankpassworduse=4, 1<br />

The ‘limitblankpassworduse’ registry value determines if local accounts with blank passwords<br />

can be used to logon remotely. The setting ‘1’ disallows accounts with blank passwords to logon<br />

remotely. This ensures remote access requires an account name and password.<br />

4.4.3.4 Accounts: Rename administrator account<br />

NewAdministratorName = "johnsmith"<br />

The ‘NewAdministratorName’ keyword sets the local administrator account name. The setting<br />

‘johnsmith’ renames the local administrator account to johnsmith. Renaming the local<br />

administrator account makes it difficult for an attacker to misuse it.<br />

NOTE:<br />

This keyword should be omitted if a policy to rename the Administrator account on<br />

each system is enforced. If not, then at a minimum change it from ‘johnsmith’ to a<br />

local value.<br />

4.4.3.5 Accounts: Rename guest account<br />

NewGuestName = "janesmith"<br />

The ‘NewGuestName’ keyword sets the local guest account name. The setting ‘janesmith’<br />

renames the local guest account to janesmith. Renaming the account makes it more difficult for<br />

an attacker to misuse it.<br />

NOTE:<br />

This keyword should be omitted if a policy to rename the Guest account on each<br />

system is enforced. If not, then at a minimum change it from ‘janesmith’ to a local<br />

value.<br />

4.4.3.6 Audit: Audit the access of global system objects<br />

machine\system\currentcontrolset\control\lsa\auditbaseobjects=4, 0<br />

The ‘auditbaseobjects’ registry setting determines if access to global system objects is audited.<br />

The setting ‘0’ disables audit access to global objects.<br />

4.4.3.7 Audit: Audit the use of Backup and Restore privilege<br />

machine\system\currentcontrolset\control\lsa\fullprivilegeauditing=3, 0<br />

The ‘fullprivilegeauditing’ determines if the system will audit the Backup and Restore privilege.<br />

The setting ‘0’ disables the audit of Backup and Restore privilege.<br />

<strong>Server</strong> Policy Files March 2004 57


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.3.8 Audit: Shut down system immediately if unable to log security audits<br />

machine\system\currentcontrolset\control\lsa\crashonauditfail=4, 1<br />

The ‘crashonauditfail’ registry value determines system behaviour when it fails to log security<br />

events. The setting ‘1’ shuts the system down when it cannot log. The government requires that<br />

comprehensive log data be carefully maintained. As a result, if the log files are full the system<br />

must not process further transactions.<br />

4.4.3.9 Devices: Allow undock without having to log on<br />

machine\software\microsoft\windows\currentversion\policies\system\undockwithoutlogon=4, 0<br />

The ‘undockwithoutlogon’ registry value determines if a portable computer can undock without<br />

logon. The setting ‘0’ disallows the computer to be undocked without logon.<br />

4.4.3.10 Devices: Allowed to format and eject removable media<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatedasd=1,"0"<br />

The ‘allocatedasd’ registry value determines who can format and eject removable media. The<br />

setting ‘0’ permits Administrators to format and eject removable media. The ability to store large<br />

quantities of data (e.g. entire databases) makes should be restricted to trusted individuals.<br />

4.4.3.11 Devices: Prevent users from installing printer drivers<br />

services\servers\addprinterdrivers=4, 1<br />

The ‘addprinterdrivers’ registry value determines if users can add printer drivers. The setting ‘1’<br />

prevents users from adding print drivers. This helps prevent the threat of users running malicious<br />

code in a privileged state.<br />

4.4.3.12 Devices: Restrict CD-ROM access to locally logged-on user only<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatecdroms=1,"1"<br />

The ‘allocatecdroms’ registry value determines if the CD-ROM is equally accessible to local and<br />

remote users. The setting ‘1’ restricts remote access to the CD-ROM when in use by a local user.<br />

NOTE:<br />

The setting allows remote authorized users to access the CD-ROM if no one is logged<br />

on locally.<br />

4.4.3.13 Devices: Restrict floppy access to locally logged-on user only<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatefloppies=1,"1"<br />

The ‘allocatefloppies’ registry value determines if the floppy drive is simultaneously accessible<br />

to local and remote users. The setting ‘1’ restricts remote access to when in use by a local user.<br />

NOTE:<br />

This setting allows remote access to the floppy drive if no one is logged on as a local<br />

user.<br />

58 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.3.14 Devices: Unsigned driver installation behavior<br />

machine\software\microsoft\driver signing\policy=3, 1<br />

The ‘policy’ registry value defines the unsigned driver installation behavior. The setting ‘1’<br />

warns the user before the driver is installed. If this option is enforced, only drivers approved by<br />

the <strong>Windows</strong> Hardware Quality Lab (WHQL) are eligible. The decision to install drivers not<br />

found within WHQL is left to the Administrator.<br />

4.4.3.15 Domain controller: Allow server operators to schedule tasks<br />

machine\system\currentcontrolset\control\lsa\submitcontrol=4, 0<br />

The ‘submitcontrol’ registry value determines if system operators can schedule tasks. The setting<br />

‘0’ prevents system operators from scheduling tasks. A sufficient number of tasks can lead to a<br />

DoS condition.<br />

4.4.3.16 Domain controller: LDAP server signing requirements<br />

machine\system\currentcontrolset\services\ntds\parameters\ldapserverintegrity=4, 2<br />

The ‘ldapserverintegrity’ registry value determines if the LDAP server requires a signature to<br />

negotiate with LDAP clients. The setting ‘2’ requires a client signature. Unsigned data is<br />

susceptible to man-in-the-middle attacks. This setting helps prevent session hijack.<br />

4.4.3.17 Domain controller: Refuse machine account password changes<br />

machine\system\currentcontrolset\services\netlogon\parameters\refusepasswordchange=4, 0<br />

The ‘refusepasswordchange’ registry setting determines if domain controllers accept changes to<br />

computer account passwords. The setting ‘0’ allows changing of computer account passwords.<br />

Regularly changed passwords reduce the threat of effective brute-force attacks.<br />

4.4.3.18 Domain member: Digitally encrypt or sign secure channel data (always)<br />

machine\system\currentcontrolset\services\netlogon\parameters\requiresignorseal=4, 1<br />

The ‘requiresignorseal’ registry value determines if the domain member will encrypt or sign<br />

secure channel data always. The setting ‘1’ encrypts or signs secure channel data. This setting<br />

prevents legacy systems (pre-<strong>Windows</strong> 2000) from joining a Domain.<br />

4.4.3.19 Domain member: Digitally encrypt secure channel data (when possible)<br />

machine\system\currentcontrolset\services\netlogon\parameters\sealsecurechannel=4, 1<br />

The ‘sealsecurechannel’ registry value determines if a domain member requests encryption of all<br />

secure channel data. The setting ‘1’ requests encryption of all secure channel data. By encrypting<br />

Secure Channel data, the system prevents sensitive information being sent in the clear. This<br />

limits an attacker’s ability to gather information for an attack.<br />

<strong>Server</strong> Policy Files March 2004 59


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.3.20 Domain member: Digitally sign secure channel data (when possible)<br />

machine\system\currentcontrolset\services\netlogon\parameters\signsecurechannel=4, 1<br />

The ‘signsecurechannel’ registry value determines if a system will sign secure channel data when<br />

possible. The setting ‘1’ enables the signing of secure channel data when possible. Unsigned data<br />

is susceptible to man-in-the-middle attack. By enabling this setting, the client is protected from<br />

session hijack.<br />

4.4.3.21 Domain member: Disable machine account password changes<br />

machine\system\currentcontrolset\services\netlogon\parameters\disablepasswordchange=4, 0<br />

The ‘disablepasswordchange’ registry value determines if a domain controller will accept<br />

machine account password changes. The setting ‘0’ allows machine account password changes.<br />

If the password change were disallowed, the systems could not change their computer<br />

passwords. This would leave them susceptible to password-guessing attacks.<br />

4.4.3.22 Domain member: Maximum machine account password age<br />

machine\system\currentcontrolset\services\netlogon\parameters\maximumpasswordage=4, 42<br />

The ‘maximumpasswordage’ registry value determines the maximum number days between<br />

password changes. The setting ‘42’ requires the password to be changed at least every forty-two<br />

days. This ensures the password is changed often to thwart password-guessing attacks.<br />

4.4.3.23 Domain member: Require strong (<strong>Windows</strong> 2000 or later) session key<br />

machine\system\currentcontrolset\services\netlogon\parameters\requirestrongkey=4, 1<br />

The ‘requirestrongkey’ registry value determines if a domain member establishes secure channel<br />

communications requiring 128-bit encryption. The setting ‘1’ requires 128-bit encryption of the<br />

secure channel. If disabled, the client must negotiate key strength with the Domain Controller.<br />

This setting ensures the highest level of protection for secure channel data.<br />

4.4.3.24 Interactive logon: Do not display last user name<br />

machine\software\microsoft\windows\currentversion\policies\system\dontdisplaylastusername<br />

=4, 1<br />

The ‘dontdisplaylastusername’ registry value determines if the system provides a logon screen<br />

with the last username that logged on. The setting ‘1’ does not display the last username. This<br />

setting withholds vital information to prevent attacks.<br />

4.4.3.25 Interactive logon: Do not require CTRL+ALT+DEL<br />

machine\software\microsoft\windows\currentversion\policies\system\disablecad=4, 0<br />

The ‘disablecad’ registry value determines if CTRL+ALT+DEL is required before a user logon.<br />

The setting ‘0’ requires CTRL+ALT+DEL to initiate logon. The <strong>Windows</strong> architecture security<br />

60 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

is predicated on the CTL+ALT+DEL key sequence to initiate user authentication. It provides<br />

unassailable hardware initiation of the logon sequence; this helps thwart Trojan Horse routines.<br />

4.4.3.26 Interactive logon: Message text for users attempting to logon<br />

machine\software\microsoft\windows\currentversion\policies\system\legalnoticetext=7,<br />

DEPARTMENTAL TEXT FOR USER LOGON MUST BE SUPPLIED<br />

The ‘legalnoticetext’ registry value is presented to the user prior to entry of username and<br />

password. The value shown is the text presented. This may help an organization in the event of<br />

legal proceedings.<br />

4.4.3.27 Interactive logon: Message title for users attempting to logon<br />

machine\software\microsoft\windows\currentversion\policies\system\legalnoticecaption=1<br />

“DEPARTMENTAL TEXT FOR USER LOGON MUST BE SUPPLIED”<br />

The ‘legalnoticecaption’ registry value is presented to the user as the title of the window that<br />

contains the ‘legalnoticetext’ text. The value shown is the text presented. This may help an<br />

organization in the event of legal proceedings.<br />

4.4.3.28 Interactive logon: Number of previous logons to cache (in case domain controller<br />

is not available)<br />

machine\software\microsoft\windowsnt\currentversion\winlogon\cachedlogonscount=1,"0"<br />

The ‘cachedlogonscount’ registry value determines the number of unique user whom logon<br />

information is locally cached. The setting ‘0’ does not cache logon information locally. This<br />

ensures the user establishes a current security token with the Domain Controller. This prevents<br />

disabled users access via cached logon credentials.<br />

4.4.3.29 Interactive logon: Prompt user to change password before expiration<br />

machine\software\microsoft\windowsnt\currentversion\winlogon\passwordexpirywarning=4,<br />

14<br />

The ‘passwordexpirywarning’ registry value determines how many days in advance the user is<br />

notified of password expiration. This setting warns the user 14 days before password expiry. The<br />

user will continue to be reminded until the password expiry date.<br />

4.4.3.30 Interactive logon: Require Domain Controller authentication to unlock<br />

workstation<br />

machine\software\microsoft\windows nt\currentversion\winlogon\forceunlocklogon=4, 1<br />

The ‘forceunlocklogon’ registry value determines if a domain controller must be contacted to<br />

unlock a computer. The setting ‘1’ requires contact with a domain controller. This ensures the<br />

user establishes a current security token with the Domain Controller. This also disallows disabled<br />

users access via cached logon credentials.<br />

<strong>Server</strong> Policy Files March 2004 61


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.3.31 Interactive logon: Require smart card<br />

machine\software\microsoft\windows\currentversion\policies\system\scforceoption=4, 0<br />

The ‘scforceoption’ registry value determines if a smart card is required to logon. The setting ‘0’<br />

does not require a smart card to logon. The majority of servers will not require two-factor<br />

authentication. If this capability were a requirement, it should be enabled during the application<br />

of a role specific policy.<br />

4.4.3.32 Interactive logon: Smart card removal behaviour<br />

machine\software\microsoft\windowsnt\currentversion\winlogon\scremoveoption=1,"1"<br />

The ‘scremoveoption’ determines system behaviour when a smart card is removed. The setting<br />

‘1’ locks the workstation when removed. This ensures accountability for transactions that require<br />

smart card authentication.<br />

4.4.3.33 Microsoft network client: Digitally sign communications (always)<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\requiresecuritysignature<br />

=4, 1<br />

The ‘requiresecuritysignature’ registry value determines if the SMB client requires packet<br />

signing. The setting ‘1’ requires packet signing. This setting provides for mutual authentication.<br />

This may prevent man-in-the-middle attacks and eliminate session hijacking. Legacy systems<br />

cannot support this requirement.<br />

4.4.3.34 Microsoft network client: Digitally sign communications (if server agrees)<br />

machine\system\currentcontrolset\services\lanmanworkstation\parameters\enablesecuritysign<br />

ature=4, 1<br />

The ‘enablesecuritysignature’ registry value determines if an SMB client attempts to negotiate<br />

SMB packet signing (if the server agrees). The setting ‘1’ causes the client to negotiate SMB<br />

signing. This setting provides for mutual authentication. This may prevent man-in-the-middle<br />

attacks and eliminate session hijacking. Legacy systems (i.e. Pre-<strong>Windows</strong> 2000) cannot support<br />

this requirement.<br />

4.4.3.35 Microsoft network client: Send unencrypted password to third-party SMB<br />

servers<br />

machine\system\currentcontrolset\services\lanmanworkstation\parameters\enableplaintextpas<br />

sword=4, 0<br />

The ‘enableplaintextpassword’ registry value determines if an SMB client sends plain text<br />

passwords to non-Microsoft SMB servers. The setting ‘0’ disables the use of clear-text<br />

passwords. The use of non-Microsoft SMB servers that do not accept encrypted passwords is<br />

disallowed in a High <strong>Security</strong> environment. Password security must always be enforced.<br />

62 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.3.36 Microsoft network server: Amount of idle time required before suspending<br />

session<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\autodisconnect=4, 15<br />

The ‘autodisconnect’ registry setting defines the amount of idle time in minutes before an SMB<br />

session is suspended. The setting ‘15’ suspends the SMB session after fifteen minutes of idle<br />

time. An idle session consumes resources. Attackers could set up sessions consuming resources<br />

to initiate a DoS attack. Additionally, idle sessions can cause SMB services to become slow or<br />

unresponsive.<br />

4.4.3.37 Microsoft network server: Digitally sign communications (always)<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\requiresecuritysignature<br />

=4, 1<br />

The ‘requiresecuritysignature’ registry value determines if the server will always sign SMB<br />

communications. The setting ‘1’ always digitally signs SMB communications. This setting<br />

provides mutual authentication for all communication. Mutual authentication may prevent manin-the-middle<br />

attacks and eliminate session hijacking. Legacy (i.e. Pre-<strong>Windows</strong> 2000) systems<br />

cannot support this requirement.<br />

4.4.3.38 Microsoft network server: Digitally sign communications (if client agrees)<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\enablesecuritysignature=<br />

4, 1<br />

The ‘enablesecuritysignature’ registry value signs SMB communications, if the client agrees.<br />

The setting ‘1’ signs SMB communications. This setting provides mutual authentication for all<br />

communication. Mutual authenitcation may prevent man-in-the-middle attacks and eliminate the<br />

session hijacking. Legacy (i.e. Pre-<strong>Windows</strong> 2000) systems cannot support this requirement.<br />

4.4.3.39 Microsoft network server: Disconnect clients when logon hours expire<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\enableforcedlogoff=4, 1<br />

The ‘enableforcedlogoff’ registry value determines if a network connected user is disconnected<br />

outside of their hours of operation. The setting ‘1’ disconnects the user when logged on outside<br />

of their hours of operation.<br />

4.4.3.40 Network access: Allow anonymous SID/Name translation<br />

LSAAnonymousNameLookup = 0<br />

The ‘LSAAnonymousNameLookup’ determines if the system allows anonymous SID/NAME<br />

translation. The setting ‘0’ disallows the system to perform anonymous SID/NAME translation.<br />

If enabled, a user could use a well-known account SID to obtain usernames of the account. This<br />

may then be used to initiate a password guessing attack.<br />

<strong>Server</strong> Policy Files March 2004 63


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.3.41 Network access: Do not allow anonymous enumeration of SAM accounts<br />

machine\system\currentcontrolset\control\lsa\restrictanonymoussam=4, 1<br />

The ‘restrictanonymoussam’ registry value determines if anonymous enumeration of SAM<br />

accounts is permitted. The setting ‘1’disallows anonymous enumeration of SAM accounts. The<br />

enumeration maps account names to a corresponding SID. When the SID is known, local Guest<br />

and Administrator accounts are exposed. Once identified, they are open to password guessing<br />

attacks.<br />

4.4.3.42 Network access: Do not allow anonymous enumeration of SAM accounts and<br />

shares<br />

machine\system\currentcontrolset\control\lsa\restrictanonymous=4, 1<br />

The ‘restrictanonymous’ registry value determines if anonymous enumeration of SAM accounts<br />

and shares is permitted. The setting ‘1’ disallows anonymous enumeration of SAM accounts and<br />

shares. The enumeration maps account names to a corresponding SID. When the SID is known,<br />

local Guest and Administrator accounts are exposed. Once identified, they are open to password<br />

guessing attacks.<br />

4.4.3.43 Network access: Do not allow storage of credentials or .NET Passports for<br />

network authentication<br />

machine\system\currentcontrolset\control\lsa\disabledomaincreds=4, 1<br />

The ‘disabledomaincreds’ registry value determines if passwords, credentials or Microsoft .NET<br />

passports are saved after initial domain authentication. The setting ‘1’ does not perform the save.<br />

4.4.3.44 Network access: Let Everyone permissions apply to anonymous users<br />

machine\system\currentcontrolset\control\lsa\everyoneincludesanonymous=4, 0<br />

The ‘everyoneincludesanonymous’ value determines what additional permissions are granted for<br />

anonymous connections to a computer. The setting ‘0’ grants no additional permissions to<br />

anonymous users. This ensures unauthenticated users do not inherit the rights of the ‘everyone’<br />

group.<br />

4.4.3.45 Network access: Named Pipes that can be accessed anonymously<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionpipes=7,<br />

The ‘nullsessionpipes’ value defines anonymous access to named pipes. The empty setting<br />

disallows anonymous access to named pipes. This ensures all system access is authorized.<br />

64 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.3.46 Network access: Remotely accessible registry paths<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedexactpaths\machi<br />

ne=7,<br />

The ‘allowedexactpaths\machine’ registry value defines which registry paths can be accessed<br />

over the network. This <strong>Baseline</strong> configuration has no requirement for remotely accessible<br />

registry information.<br />

4.4.3.47 Network access: Remotely accessible registry paths and Sub-paths<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedpaths\machine=7,<br />

The ‘allowedpaths\machine’ registry value defines registry paths and sub-paths that can be<br />

accessed over the network. This <strong>Baseline</strong> configuration has no requirement for remotely<br />

accessible registry information.<br />

4.4.3.48 Network access: Restrict anonymous access to Named Pipes and Shares<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\restrictnullsessaccess=4,<br />

1<br />

The ‘restrictnullsessaccess’ registry value determines if anonymous access is allowed to named<br />

pipes and shares. The setting ‘1’ disallows anonymous access to named pipes and shares. Access<br />

to resources is predicated on authorization for that resource. If anonymous access is granted,<br />

there would be no ability to identify who is accessing the objects.<br />

4.4.3.49 Network access: Shares that can be accessed anonymously<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionshares=7,<br />

The ‘nullsessionshares’ registry value defines which shares can be accessed anonymously over<br />

the network. The empty setting disallows anonymous access to any share. All system access<br />

should be authorized. Anonymous access prevents accurate authorization of shares.<br />

4.4.3.50 Network access: Sharing and security model for local accounts<br />

machine\system\currentcontrolset\control\lsa\forceguest=4, 0<br />

The ‘forceguest’ registry value determines the sharing and security model for local accounts. The<br />

setting ‘0’ requires user authentication to access resources. This allows individual access to be<br />

audited.<br />

<strong>Server</strong> Policy Files March 2004 65


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.3.51 Network security: Do not store LAN Manager hash value on next password<br />

change<br />

machine\system\currentcontrolset\control\lsa\nolmhash=4, 1<br />

The ‘nolmhash’ registry value determines if the LAN Manager hash value is stored on the next<br />

password change. The setting ‘1’ does not save the LAN Manager hash value. This prevents<br />

local storage of the password, which would be vulnerable to attack.<br />

NOTE:<br />

Upon enabling in operation, all passwords must be changed.<br />

4.4.3.52 Network <strong>Security</strong>: Force logoff when logon hours expire<br />

ForceLogoffWhenHourExpire = 1<br />

The ‘ForceLogoffWhenHourExpire’ keyword determines if locally logged on users are<br />

disconnected when working outside of defined hours. The setting ‘1’ disconnects the user outside<br />

of defined hours. Hours are defined within the “Active Directory Users and Computers”, the<br />

‘Computer Management” and “Local Users and Groups” interface. Account should be created<br />

with restrictions on hours of access; we recommend enforcement through disconnection outside<br />

specified hours.<br />

4.4.3.53 Network security: LAN Manager authentication level<br />

machine\system\currentcontrolset\control\lsa\lmcompatibilitylevel=4, 5<br />

The ‘lmcompatibilitylevel’ value determines the level of LAN manager authentication. The<br />

setting ‘5’ sends NTLMv2 responses only and refuses LM & NTLM. This setting ensures only<br />

the most secure authentication mechanism is permitted.<br />

4.4.3.54 Network security: LDAP client signing requirements<br />

machine\system\currentcontrolset\services\ldap\ldapclientintegrity=4, 1<br />

The ‘ldapclientintegrity’ value determines if the LDAP client negotiates signing to communicate<br />

with LDAP servers. The setting ‘2’ requires signing negotiation. This reduces the threat of a<br />

man-in-the-middle attacks.<br />

4.4.3.55 Network security: Minimum session security for NTLM SSP based (including<br />

secure RPC) clients<br />

machine\system\currentcontrolset\control\lsa\msv1_0\ntlmminclientsec=4, 537395248<br />

The ‘ntlmminclientsec’ value defines the minimum session security for NTLM SSP based<br />

(including secure RPC) clients. The setting ‘537395248’ enables all options, as recommended.<br />

This requires message integrity, confidentiality, NTLMv2 session security and 128-bit<br />

encryption be used for logon.<br />

66 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.3.56 Network security: Minimum session security for NTLM SSP based (including<br />

secure RPC) servers<br />

machine\system\currentcontrolset\control\lsa\msv1_0\ntlmminserversec=4, 537395248<br />

The ‘ntlmminserversec’ registry value defines the minimum session security for NTLM SSP<br />

based (including secure RPC) servers. The setting ‘537395248’ enables all options, as<br />

recommended. This requires message integrity, confidentiality, NTLMv2 session security and<br />

128-bit encryption be used for logon.<br />

4.4.3.57 Recovery console: Allow automatic administrative logon<br />

machine\software\microsoft\windowsnt\currentversion\setup\recoveryconsole\securitylevel=4,<br />

0<br />

The ‘securitylevel’ value determines if the recovery console requires an Administrator password<br />

to logon. The setting ‘0’ requires an Administrators password. Enabling this setting to allow<br />

anyone to shut down a server is not recommended.<br />

4.4.3.58 Recovery console: Allow floppy copy and access to all drives and all folders<br />

machine\software\microsoft\windowsnt\currentversion\setup\recoveryconsole\setcommand=4,<br />

0<br />

The ‘setcommand’ registry value determines if the Recovery Console ‘SET’ command is<br />

available. The setting ‘4’ disables the ‘SET’ command. (e.g. Copy to removable media is<br />

disabled).<br />

4.4.3.59 Shutdown: Allow system to be shut down without having to log on<br />

machine\software\microsoft\windows\currentversion\policies\system\shutdownwithoutlogon=4<br />

, 0<br />

The ‘shutdownwithoutlogon’ registry value determines if the system can be shutdown without<br />

the user logged on. The setting ‘0’ requires the user to logon. This ensures only authorized users<br />

may shut down the system.<br />

4.4.3.60 Shutdown: Clear virtual memory page file<br />

machine\system\currentcontrolset\control\sessionmanager\memory\management\clearpagefile<br />

atshutdown=4, 1<br />

The ‘clearpagefileatshutdown’ value determines if page file contents are overwritten on a clean<br />

shutdown. The setting ‘1’ causes clears the page file on a normal shutdown. Sensitive system and<br />

user information may be contained in the page file. By ensuring it is cleared, the risk that<br />

information be available to an attacker is reduced.<br />

<strong>Server</strong> Policy Files March 2004 67


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.3.61 System cryptography: Force strong key protection for user keys stored on the<br />

computer<br />

machine\software\policies\microsoft\cryptography\forcekeyprotection=4, 2<br />

The ‘forcekeyprotection’ value determines if user keys (e.g. SMIME) require a password each<br />

time they are to be used. The setting ‘2’ requires entry of a password each time a private key is<br />

used. This ensures that a session that requires key material is used with the owner’s knowledge.<br />

4.4.3.62 System cryptography: Use FIPS compliant algorithms for encryption, hashing,<br />

and signing<br />

machine\system\currentcontrolset\control\lsa\fipsalgorithmpolicy=4, 1<br />

The ‘fipsalgorithmpolicy’ determines if Transport Layer <strong>Security</strong> / Secure Socket Layer<br />

(TLS/SSL) <strong>Security</strong> Provider supports only TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher<br />

suite. The setting ‘1’ requires the use of the TLS_RSA_WITH_3DES_EDE_CBC_SHA cipher<br />

suite. In the Federal Government, this setting is required for all servers to remain compliant to<br />

cryptographic policies.<br />

4.4.3.63 System objects: Default owner for objects created by members of the<br />

Administrators group<br />

machine\system\currentcontrolset\control\lsa\nodefaultadminowner=4, 1<br />

The ‘nodefaultadminowner’ value determines if objects created by members of the<br />

Administrators group are owned by the group or the object creator. The setting ‘1’ makes objects<br />

owned by the creator. This ensures actions of an individual administrator can be isolated and<br />

audited.<br />

4.4.3.64 System objects: Require case insensitivity for non-<strong>Windows</strong> subsystems<br />

machine\system\currentcontrolset\control\session manager\kernel\obcaseinsensitive=4, 1<br />

The ‘obcaseinsensitive’ value determines if case insensitivity is required for non-<strong>Windows</strong><br />

subsystems. The setting ‘1’ requires case insensitivity for non-<strong>Windows</strong> subsystems. This<br />

disables the ability for non-<strong>Windows</strong> sub-systems to create files that are inaccessible to the<br />

<strong>Windows</strong> system. It also disables the ability to block access to other files with the same name in<br />

upper case.<br />

4.4.3.65 System objects: Strengthen default permissions of internal system objects (e.g.<br />

Symbolic Links)<br />

machine\system\currentcontrolset\control\session manager\protectionmode=4, 1<br />

The ‘protectionmode’ registry setting determines if permissions on internal system objects (e.g.<br />

symbolic links) is strengthened. The setting ‘1’ strengthens protection on internal system objects.<br />

It allows non-administrators to view shared objects they did not create, but not modify.<br />

68 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.3.66 System settings: Optional subsystems<br />

machine\system\currentcontrolset\control\session manager\subsystems\optional=7,<br />

The ‘optional’ value defines which subsystems are used to support applications. The empty<br />

setting disallows any optional subsystems. The use of sub-systems should be justified with<br />

operational requirements. Unless required, no subsystem should be enabled.<br />

4.4.3.67 Use Certificate Rules on <strong>Windows</strong> Executables for Software Restriction Policies<br />

machine\software\policies\microsoft\windows\safer\codeidentifiers\authenticodeenabled=4, 0<br />

The ‘authenticodeenabled’ value determines the use of certificate rules on <strong>Windows</strong> executables<br />

for software restriction policies. The setting ‘0’ does not use certificate rules on <strong>Windows</strong><br />

executables for software restriction policies.<br />

4.5 Event Log<br />

Microsoft guidance indicates that the total size of all event logs should not exceed 300MB. If this<br />

value is exceeded, the system may not log or record the failure.<br />

While the interface may allow values up to 4GB, there is a risk of losing log entries for values<br />

beyond 300 MB. The following policy will utilize full available space for allocation between<br />

event logs.<br />

4.5.1 Log Size<br />

4.5.1.1 Maximum application log size<br />

MaximumLogSize = 76800 (in [Application Log] section)<br />

The ‘MaximumLogSize’ determines the size of the Application event log. The setting ‘76800’<br />

creates a 76800 KB log file. With an average of 500 bytes per event, this log file will<br />

accommodate over 153,000 events. This will allow the system to run for an extended period-oftime<br />

without having to roll the log file.<br />

NOTE:<br />

Due to the wide variety of event loads, we recommend monitoring the log files during<br />

the initial operational period.<br />

4.5.1.2 Maximum security log size<br />

MaximumLogSize = 153600 (in [<strong>Security</strong> Log] section)<br />

The ‘MaximumLogSize’ determines the size of the <strong>Security</strong> event log. The setting ‘153600’<br />

creates a 153600 KB log file. With an average of 500 bytes per event, this log file will<br />

accommodate over 307,200 events. This allows the system to run for an extended period-of-time<br />

without having to roll the log file.<br />

NOTE:<br />

Due to the wide variety of event loads, we recommend monitoring the log files during<br />

the initial operational period.<br />

<strong>Server</strong> Policy Files March 2004 69


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.5.1.3 Maximum system log size<br />

MaximumLogSize = 76800 (in [System Log] section<br />

The ‘MaximumLogSize’ determines the size of the System event log. The setting ‘76800’ creates<br />

a 76800 KB log file. With an average of 500 bytes per event, this log file will accommodate over<br />

153,000 events. This allows the system to run for an extended period-of-time without having to<br />

roll the log file.<br />

NOTE:<br />

Due to the wide variety of event loads, we recommend monitoring the log files during<br />

the initial operational period.<br />

4.5.2 Guest Access<br />

4.5.2.1 Prevent local Guests group from accessing Applications, <strong>Security</strong>, and System<br />

logs<br />

RestrictGuestAccess = 1(in [Application Log] or [<strong>Security</strong> Log] or [System Log] section)<br />

The ‘RestrictGuestAccess’ keyword determines if accounts with ‘guest’ access can access the<br />

log. The setting ‘1’ disallows guest access to the log. Access to log information provides an<br />

attacker with valuable information to mount attacks on the system or users. As a result, only<br />

users who are authenticated are given access to the log files.<br />

4.5.3 Retention Method<br />

4.5.3.1 Retention method for application log<br />

AuditLogRetentionPeriod = 2(in [Application Log] or [<strong>Security</strong> Log] or [System Log] section)<br />

The ‘AuditLogRetentionPeriod’ keyword determines the system behaviour when the log is full.<br />

The setting ‘2’ shuts the system down if the log cannot be written. Use of this setting should be<br />

consistent with departmental log retention policy.<br />

4.6 System Services<br />

A large number of services are disabled in this guide. With each disabled service, we provide<br />

justification for the recommendation. In some cases, a more flexible approach may be needed.<br />

It is important to note that a disabled service may only be required occasionally. For example,<br />

the Performance Logs and Alerts service is disabled. However, to help fulfill a specific<br />

temporary need, the Administrator could enable a service, resolve an issue, and return the service<br />

to the original configuration.<br />

70 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1 Services Explicitly Covered by Microsoft Guidance<br />

4.6.1.1 Alerter<br />

"alerter", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Alerter service notifies selected users and computers of administrative alerts. This policy<br />

disables this service.<br />

4.6.1.2 Application Layer Gateway Service<br />

"alg", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Application Layer Gateway Service is a subcomponent of the Internet Connection Sharing<br />

(ICS) / Internet Connection Firewall (ICF) Service. This supports independent software vendor<br />

plug-ins to allow proprietary protocols through the firewall and work behind ICS. This policy<br />

disables the service.<br />

4.6.1.3 Application Management<br />

"appmgmt", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

Application Management provides software installation services. This policy disables the<br />

service.<br />

4.6.1.4 ASP .NET State Service<br />

"aspnet_state", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The ASP .NET State Service provides support for out-of-process session states for ASP .NET.<br />

This policy disables the service.<br />

4.6.1.5 Automatic Updates<br />

"wuauserv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

<strong>Server</strong> Policy Files March 2004 71


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

The Automatic Updates Service enables the automated download and installation of software<br />

updates. This policy disables the service.<br />

4.6.1.6 Background Intelligent Transfer Service<br />

"bits", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Background Intelligent Transfer Service is used to transfer files asynchronously between a<br />

client and an HTTP server. This policy disables the service.<br />

4.6.1.7 Certificate Services<br />

"certsvc", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The Certificate Services perform core functions for a Certification Authority. This policy<br />

disables the service.<br />

4.6.1.8 MS Software Shadow Copy Provider<br />

"swprv", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The MS Software Shadow Copy Provider supports the creation of file shadow copies used to<br />

perform system backups. This policy sets the startup to manual for the service.<br />

4.6.1.9 Client Service for Netware<br />

"nwcworkstation", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Client Service for Netware provides access to files and printers on NetWare networks. This<br />

policy disables the service.<br />

4.6.1.10 ClipBook<br />

"clipsrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Clipbook Service creates and shares ‘pages’ of data that may be viewed by remote users.<br />

This policy disables the service.<br />

72 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.11 Cluster Service<br />

"clussvc", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The Cluster Service supports membership in a High Availability environment (Cluster). The<br />

service is disabled.<br />

4.6.1.12 COM+ Event System<br />

"eventsystem", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The COM+ Event System Service extends the COM+ programming model. This policy sets the<br />

service startup to automatic.<br />

4.6.1.13 COM+ System Application<br />

"comsysapp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The COM+ System Application Service manages the configuration and tracking of components<br />

based on COM+. The service is disabled.<br />

4.6.1.14 Computer Browser<br />

The Computer Browser Service maintains an up-to-date list of the computers on your network.<br />

4.6.1.14.1 Domain Member <strong>Baseline</strong><br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

This policy sets service startup to automatic.<br />

4.6.1.14.2 Workgroup Member <strong>Baseline</strong><br />

"browser", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

This policy disables service startup.<br />

<strong>Server</strong> Policy Files March 2004 73


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.15 Cryptographic Services<br />

"cryptsvc", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

Cryptographic Services provide key management functionality for the computer. This policy sets<br />

the service to automatic startup.<br />

4.6.1.16 DHCP Client<br />

The DHCP Client service registers with DHCP and DNS servers in the domain.<br />

4.6.1.16.1 Domain Member <strong>Baseline</strong><br />

"dhcp", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

This policy sets the service to automatic startup.<br />

4.6.1.16.2 Workgroup Member <strong>Baseline</strong><br />

"dhcp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

This policy disables service startup.<br />

4.6.1.17 DHCP <strong>Server</strong><br />

"dhcpserver", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The DHCP <strong>Server</strong> allocates IP addresses. The service is disabled.<br />

4.6.1.18 Distributed File System<br />

"dfs", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)<br />

The Distributed File System manages logical volumes across local or wide area networks. The<br />

service is disabled.<br />

74 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.19 Distributed Link Tracking Client<br />

"trkwks", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Distributed Link Tracking Client Service ensures shortcuts (among others) work after the<br />

target has been moved. The service is disabled.<br />

4.6.1.20 Distributed Link Tracking <strong>Server</strong><br />

"trksvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Distributed Link Tracking <strong>Server</strong> stores information so files moved between volumes can be<br />

tracked. The service is disabled.<br />

4.6.1.21 Distributed Transaction Coordinator<br />

"msdtc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Distributed Transaction Coordinator Service manages transactions that involve multiple<br />

computer systems or resource managers. The service is disabled.<br />

4.6.1.22 DNS Client<br />

The DNS Client Service resolves and caches DNS names.<br />

4.6.1.22.1 Domain Member <strong>Server</strong><br />

"dnscache", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

This policy sets the service to automatic startup.<br />

4.6.1.22.2 Workgroup Member <strong>Server</strong><br />

"dnscache", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

This policy disables service startup.<br />

<strong>Server</strong> Policy Files March 2004 75


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.23 DNS <strong>Server</strong><br />

"dns", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The DNS <strong>Server</strong> responds to queries for DNS names. The service is disabled.<br />

4.6.1.24 Error Reporting Service<br />

"ersvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Error Reporting Service collects, stores, and reports unexpected application closures to<br />

Microsoft. The service is disabled.<br />

4.6.1.25 Event Log<br />

"eventlog", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Event Log Service enables event log messages to be viewed. This policy sets the service to<br />

automatic startup.<br />

4.6.1.26 Fax Service<br />

"fax", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The Fax service provides Fax capabilities. The service is disabled.<br />

4.6.1.27 File Replication<br />

"ntfrs", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The File Replication Service automatically copies and maintains files on multiple <strong>Server</strong>s. The<br />

service is disabled.<br />

4.6.1.28 File <strong>Server</strong> for Macintosh<br />

"macfile", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

76 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

The Macintosh File Service provides network file access to Macintosh computers. The service is<br />

disabled.<br />

4.6.1.29 FTP Publishing Service<br />

"msftpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The FTP Publishing Service provides connectivity and administration through the IIS snap-in.<br />

The service is disabled.<br />

4.6.1.30 Help and Support<br />

"helpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Help and Support Service enables Help and Support Center to run. The service is disabled.<br />

4.6.1.31 HTTP SSL<br />

"httpfilter", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The HTTP SSL Service provides SSL functions to IIS. The service is disabled.<br />

4.6.1.32 Human Interface Device Access<br />

"hidserv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Human Interface Device Access service allows use of pre-defined hotbuttons. The service is<br />

disabled.<br />

4.6.1.33 IAS Jet Database Access<br />

"iasjet", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The IAS Jet Database Access service uses RADIUS to provide authentication, authorization and<br />

accounting services. The service is disabled.<br />

<strong>Server</strong> Policy Files March 2004 77


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.34 IIS Admin Service<br />

"iisadmin", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The IIS Admin Service allows administration of IIS components. The service is disabled.<br />

4.6.1.35 IMAPI CD-Burning COM Service<br />

"imapiservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The IMAPI CD-Burning Service manages CD burning. The service is disabled.<br />

4.6.1.36 Indexing Service<br />

"cisvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Indexing Service indexes file contents and properties. The service is disabled.<br />

4.6.1.37 Infrared Monitor<br />

"irmon", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

Infrared Monitor service enables file and image sharing through infrared devices. The service is<br />

disabled.<br />

4.6.1.38 Internet Authentication Service<br />

"ias", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

Internet Authentication Service manages network authentication, authorization and accounting.<br />

The service is disabled.<br />

4.6.1.39 Internet Connection Firewall (ICF)/Internet Connection Sharing (ICS)<br />

"sharedaccess", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

78 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

The Internet Connection Firewall (ICF) / Internet Connection Sharing (ICS) service provides<br />

Internet services for small local networks. The service is disabled.<br />

4.6.1.40 Intersite Messaging<br />

"ismserv", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The Intersite Messaging Service is used for mail-based replication. The service is disabled.<br />

4.6.1.41 IP Version 6 Helper Service<br />

"6to4", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The IP Version 6 Helper Service offers IPV6 connectivity over existing IPV4 network. The<br />

service is disabled.<br />

4.6.1.42 IPSEC Policy Agent (IPSec Service)<br />

"policyagent", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The IPSEC Policy Agent (IPSec Service) provides encryption services to clients and servers on<br />

networks. This policy sets the service to automatic startup.<br />

4.6.1.43 Kerberos Key Distribution Centre<br />

"kdc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Kerberos Key Distribution Center Service allows user logon using Kerberos v5<br />

authentication protocol. The service is disabled.<br />

4.6.1.44 License Logging Service<br />

"licenseservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The License Logging service records client access licensing information. The service is disabled.<br />

<strong>Server</strong> Policy Files March 2004 79


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.45 Logical Disk Manager<br />

"dmserver", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Logical Disk Manager service detects all new hard drives and sends disk volume<br />

information to the Logical Disk Manager Administration Service. This policy sets the service to<br />

manual startup.<br />

4.6.1.46 Logical Disk Manager Administrative Service<br />

"dmadmin", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Logical Disk Manager Administration service performs requests for disk management. This<br />

policy sets the service to manual startup.<br />

4.6.1.47 Message Queuing<br />

"msmq", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Message Queuing Service is the infrastructure and development tool for creating distributed<br />

messaging applications. The service is disabled.<br />

4.6.1.48 Message Queuing Down Level Clients<br />

"mqds", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Message Queuing Down Level Clients service provides Active Directory access to Message<br />

Queuing Clients. The service is disabled.<br />

4.6.1.49 Message Queuing Triggers<br />

"mqtgsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Message Queuing Trigger Service provides rule-based analysis of messages arriving in the<br />

Message Queuing queue. The service is disabled.<br />

80 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.50 Messenger<br />

"messenger", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Messenger Service sends Alerter Service messages between clients and servers. The service<br />

is disabled.<br />

4.6.1.51 Microsoft POP3 Service<br />

"pop3svc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Microsoft POP3 service provides e-mail transfer and retrieval services. The service is<br />

disabled.<br />

4.6.1.52 MSSQL$UDDI<br />

"mssql$uddi", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The MSSQL$UDDI service publishes and locates information about web services. The service is<br />

disabled.<br />

4.6.1.53 MSSQL<strong>Server</strong>ADHelper<br />

"mssqlserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The SQL <strong>Server</strong> service provides SQL functionality for a server. The service is disabled.<br />

4.6.1.54 .NET Framework Support Service<br />

"corrtsvc", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The .NET Framework Support Service notifies a subscribing client when a specified process<br />

initializes the Client Runtime Service. The service is disabled.<br />

4.6.1.55 Netlogon<br />

The Netlogon Service authenticates users and services.<br />

<strong>Server</strong> Policy Files March 2004 81


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.56 Domain Member <strong>Server</strong><br />

"netlogon", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This policy sets the service to automatic startup.<br />

4.6.1.57 Workgroup Member <strong>Server</strong><br />

"netlogon", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This policy disables service startup.<br />

4.6.1.58 NetMeeting Remote Desktop Sharing<br />

"mnmsrvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The NetMeeting Remote Desktop Sharing Service enables access to a system with NetMeeting.<br />

The service is disabled.<br />

4.6.1.59 Network Connections<br />

"netman", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Network Communications Service manages objects in the Network Connections folder. This<br />

policy sets the service to manual startup. This will start the service automatically when the<br />

Network Connections interface is invoked.<br />

4.6.1.60 Network DDE<br />

"netdde", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The NetDDE Service provides network transport and security for DDE. The service is disabled.<br />

4.6.1.61 Network DDE DSDM<br />

"netddedsdm", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The NetDDEDSDM Service manages DDE network shares. The service is disabled.<br />

82 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.62 Network Location Awareness (NLA)<br />

"nla", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Network Location Awareness service collects and stores network information. The service is<br />

disabled.<br />

4.6.1.63 Network News Transport Protocol (NNTP)<br />

"nntpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Network News Transport Protocol (NNTP) service provides News <strong>Server</strong> capabilities. The<br />

service is disabled.<br />

4.6.1.64 NTLM <strong>Security</strong> Support Provider<br />

"ntlmssp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The NTLM <strong>Security</strong> Support Provider service provides security to RPC programs. This enables<br />

users to log on using NTLM authentication in place of Kerberos. The service is disabled.<br />

4.6.1.65 Performance Logs and Alerts<br />

"sysmonlog", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Performance Logs and Alerts Service collect performance data. The service is disabled.<br />

4.6.1.66 Plug and Play<br />

"plugplay", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Plug and Play service allows a computer to adapt hardware configuration changes with little<br />

user input. The service is disabled.<br />

<strong>Server</strong> Policy Files March 2004 83


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.67 Portable Media Serial Number<br />

"wmdmpmsn", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Portable Media Serial Number service retrieves serial numbers from any portable music<br />

player connected to the system. The service is disabled.<br />

4.6.1.68 Print <strong>Server</strong> for Macintosh<br />

"macprint", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Macintosh Print service provides network printer access to Macintosh computers. The<br />

service is disabled.<br />

4.6.1.69 Print Spooler<br />

"spooler", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Spooler service manages local and network print queues and controls all print jobs. The<br />

service is disabled.<br />

4.6.1.70 Protected Storage<br />

"protectedstorage", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Protected Storage service protects storage of sensitive information from unauthorized<br />

services, processes or users. This policy sets the service to automatic startup.<br />

4.6.1.71 Remote Access Auto Connection Manager<br />

"rasauto", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Remote Access Auto Connection Manager service detects unsuccessful attempts to a remote<br />

network or computer. It then provides an alternative method for connection. The service is<br />

disabled.<br />

84 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.72 Remote Access Connection Manager<br />

"rasman", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Remote Access Connection Manager service manages dial-up and VPN connections to a<br />

server. The service is disabled.<br />

4.6.1.73 Remote Administration Service<br />

"srvcsurg", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Remote Administration service provides an interface for Remote <strong>Server</strong> Administration<br />

Tools. The service is disabled.<br />

4.6.1.74 Remote Desktop Help Session Manager<br />

"rdsessmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Remote Desktop Help Session Manager service controls the Remote Assistance feature in<br />

the Help and Support Center application. The service is disabled.<br />

4.6.1.75 Remote Installation<br />

"binlsvc", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The Remote Installation Service is a <strong>Windows</strong> deployment feature. The service is disabled.<br />

4.6.1.76 Remote Procedure Call (RPC)<br />

"rpcss", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Remote Procedure Call (RPC) service is a secure inter-process communication mechanism.<br />

This policy sets the service to automatic startup.<br />

<strong>Server</strong> Policy Files March 2004 85


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.77 Remote Procedure Call (RPC) Locator<br />

"rpclocator", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The RPC Locator Service enables RPC clients to locate RPC servers. The service is disabled.<br />

4.6.1.78 Remote Registry Service<br />

"remoteregistry", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Remote Registry service enables remote users to modify registry settings on the system. The<br />

service is disabled.<br />

4.6.1.79 Remote <strong>Server</strong> Manager<br />

"appmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Remote <strong>Server</strong> Manager service acts as a <strong>Windows</strong> Management Instrumentation (WMI)<br />

instance provider for Remote Administration Alert Objects. It also acts as a WMI method<br />

provider for Remote Administration Tasks. The service is disabled.<br />

4.6.1.80 Remote <strong>Server</strong> Monitor<br />

"appmon", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPD<br />

TLOCRSDRCWDWO;;;WD)"<br />

The Remote Service Monitor service provides monitoring capability of resources on remotely<br />

managed systems. The service is disabled.<br />

4.6.1.81 Remote Storage Notification<br />

"remote_storage_user_link", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Remote Storage Notification service notifies a user when accessing data on secondary<br />

storage units. The service is disabled.<br />

86 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.82 Remote Storage <strong>Server</strong><br />

"remote_storage_server", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Remote Storage <strong>Server</strong> stores infrequently used files in secondary storage. The service is<br />

disabled.<br />

4.6.1.83 Removable Storage<br />

"ntmssvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Removable Storage service maintains a catalogue of information for removable media used<br />

by the system. The service is disabled.<br />

4.6.1.84 Resultant Set of Policy Provider<br />

"rsopprov", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Resultant Set of Policy Provider service enables simulation of policy to determine the<br />

effects. The service is disabled.<br />

4.6.1.85 Routing and Remote Access<br />

"remoteaccess", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Routing and Remote Access service provides multi-protocol LAN-to-LAN, LAN-to-WAN,<br />

and NAT routing services. The service is disabled.<br />

4.6.1.86 SAP Agent<br />

"nwsapagent", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The SAP Agent service advertises services on an IPX network. The service is disabled.<br />

<strong>Server</strong> Policy Files March 2004 87


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.87 Secondary Logon<br />

"seclogon", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Secondary Logon service allows users to create processes in different security contexts. The<br />

service is disabled.<br />

4.6.1.88 <strong>Security</strong> Accounts Manager<br />

"samss", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The <strong>Security</strong> Accounts Manager service manages user and group account information. This<br />

policy sets the service to automatic startup.<br />

4.6.1.89 <strong>Server</strong><br />

"lanmanserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The <strong>Server</strong> service provides RPC, file, print, and Named pipe support over the network. This<br />

policy disables service startup.<br />

4.6.1.90 Shell Hardware Detection<br />

"shellhwdetection", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Shell Hardware Detection service monitors and provides notification for AutoPlay hardware<br />

events. The service is disabled.<br />

4.6.1.91 Simple Mail Transport Protocol (SMTP)<br />

"smtpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Simple Mail transfer Protocol (SMTP) service transports electronic mail across the network.<br />

The service is disabled.<br />

88 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.92 Simple TCP/IP Services<br />

"simptcp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Simple TCP/IP Services provide a variety of protocols. The service is disabled. The services<br />

configured are as follows:<br />

Echo Port 7<br />

Discard Port 9<br />

Character Generator Port 19<br />

Daytime Port 13<br />

Quote of the day Port 17<br />

4.6.1.93 Single Instance Storage Groveler<br />

"groveler", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Single Instance Storage Groveler service supports Remote Installation service. The service<br />

is disabled.<br />

4.6.1.94 Smart Card<br />

"scardsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Smart Card service manages access to smart card readers. The service is disabled.<br />

4.6.1.95 SNMP Service<br />

"snmp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Simple Network Management Protocol (SNMP) service allows incoming SNMP requests to<br />

be processed by the system. The service is disabled.<br />

4.6.1.96 SNMP Trap Service<br />

"snmptrap", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The SNMP Trap service receives trap messages generated by SNMP agents. The service is<br />

disabled.<br />

<strong>Server</strong> Policy Files March 2004 89


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.97 Special Administration Console Helper<br />

"sacsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Special Administration Console Helper service performs remote management tasks. The<br />

service is disabled.<br />

4.6.1.98 SQLAgent$* (*UDDI or WebDB)<br />

"sqlagent$webdb", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The SQLAgent$webdb service monitors, and schedules jobs. The service is disabled.<br />

4.6.1.99 System Event Notification<br />

"sens", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The System Event Notification service provides monitoring and tracking services for system<br />

events. This policy sets the service to automatic startup.<br />

4.6.1.100 Task Scheduler<br />

"schedule", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Task Scheduler service enables configuration and schedules of automated tasks on the<br />

system. The service is disabled.<br />

4.6.1.101 TCP/IP NetBIOS Helper Service<br />

The TCP/IP NetBIOS Helper service provides support for NetBIOS over TCP/IP. This is<br />

required for Domain membership.<br />

4.6.1.101.1 Domain Member <strong>Server</strong><br />

"lmhosts", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This policy sets the service to automatic startup.<br />

90 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.101.2 Workgroup Member server<br />

"lmhosts", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This policy disables service startup.<br />

4.6.1.102 TCP/IP Print <strong>Server</strong><br />

"lpdsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The TCP/IP Print <strong>Server</strong> service enables TCP/IP based printing. The service is disabled.<br />

4.6.1.103 Telephony<br />

"tapisrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Telephony service provides support for programs that control telephony and IP-based voice<br />

devices. The service is disabled.<br />

4.6.1.104 Telnet<br />

"tlntsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Telnet service provides ASCII terminal sessions to telnet clients. The service is disabled.<br />

4.6.1.105 Terminal Services<br />

"termservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Terminal Services allows users to access a virtual <strong>Windows</strong> desktop session. The service is<br />

disabled.<br />

4.6.1.106 Terminal Services Licensing<br />

"termservlicensing", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Terminal Services Licensing service provides registered client licenses when connecting to a<br />

Terminal <strong>Server</strong>. The service is disabled.<br />

<strong>Server</strong> Policy Files March 2004 91


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.107 Terminal Services Session Directory<br />

"tssdis", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Terminal Services Session Directory service provides a multi-session environment that<br />

allows access a virtual <strong>Windows</strong> desktop. The service is disabled.<br />

4.6.1.108 Themes<br />

"themes", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Themes service provides theme management services. The service is disabled.<br />

4.6.1.109 Trivial FTP Daemon<br />

"tftpd", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Trivial FTP Daemon is a File Transfer Protocol that does not require authentication. The<br />

service is disabled.<br />

4.6.1.110 Uninterruptible Power Supply<br />

"ups", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Uninterruptible Power Supply service manages an uninterruptible power supply. The<br />

service is disabled.<br />

4.6.1.111 Upload Manager<br />

"uploadmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Upload Manager service manages file transfers between clients and servers. Driver data is<br />

anonymously uploaded from a customer computer to Microsoft. The service is disabled.<br />

92 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.112 Virtual Disk Service<br />

"vds", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Virtual Disk service provides a single interface for managing block storage visualization.<br />

The service is disabled.<br />

4.6.1.113 Volume Shadow Copy<br />

"vss", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Volume Shadow Copy service manages and implements volume shadow copies used for<br />

backups. This policy sets the service to manual startup.<br />

4.6.1.114 WebClient<br />

"webclient", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Webclient service allows Win32 applications to access documents on the Internet. The<br />

service is disabled.<br />

4.6.1.115 Web Element Manager<br />

"elementmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The Web Element Manager service provides Web user interface elements for the Administration<br />

Web site at port 8098. The service is disabled.<br />

4.6.1.116 <strong>Windows</strong> Audio<br />

"audiosrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRS<br />

DRCWDWO;;;WD)"<br />

The <strong>Windows</strong> Audio service provides support for sound. The service is disabled.<br />

<strong>Server</strong> Policy Files March 2004 93


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.117 <strong>Windows</strong> Image Acquisition (WIA)<br />

"stisvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The <strong>Windows</strong> Image Acquisition (WIA) service supports scanners and cameras. The service is<br />

disabled.<br />

4.6.1.118 <strong>Windows</strong> Installer<br />

The <strong>Windows</strong> Installer service manages the installation and removal of applications.<br />

4.6.1.118.1 Domain Member <strong>Server</strong><br />

"msiserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This policy sets the service to automatic startup.<br />

4.6.1.118.2 Workgroup Member <strong>Server</strong><br />

"msiserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This policy disables service startup.<br />

4.6.1.119 <strong>Windows</strong> Internet Name Service (WINS)<br />

"wins", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The <strong>Windows</strong> Internet Name Service (WINS) enables NetBIOS name resolution. The service is<br />

disabled.<br />

4.6.1.120 <strong>Windows</strong> Management Instrumentation<br />

"winmgmt", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The <strong>Windows</strong> Management Instrumentation service provides a common interface to access<br />

management information. This policy sets the service to automatic startup.<br />

94 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.1.121 <strong>Windows</strong> Management Instrumentation Driver Extensions<br />

"wmi", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The <strong>Windows</strong> Management Instrumentation Driver Extensions service monitors all drivers and<br />

event trace providers that publish WMI or event trace information. The service is disabled.<br />

4.6.1.122 <strong>Windows</strong> Media Services<br />

"wmserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

<strong>Windows</strong> Media Services provide streaming media service over IP-based networks. The service<br />

is disabled.<br />

4.6.1.123 <strong>Windows</strong> System Resource Manager<br />

"windowssystemresourcemanager", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The <strong>Windows</strong> System Resource Manager service is a tool to help customers deploy applications.<br />

The service is disabled.<br />

4.6.1.124 <strong>Windows</strong> Time<br />

"w32time", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The <strong>Windows</strong> Time service maintains date and time synchronization. This policy sets the service<br />

to automatic startup.<br />

4.6.1.125 WinHTTP Web Proxy Auto-Discovery Service<br />

"winhttpautoproxysvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The WinHTTP Web Proxy Auto – Discovery service implements Web Proxy Auto- discovery<br />

(WPAD) Protocol. The WPAD protocol is an HTTP client service that locates proxy servers. The<br />

service is disabled.<br />

<strong>Server</strong> Policy Files March 2004 95


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.6.1.126 Wireless Configuration<br />

"wzcsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The Wireless Configuration service enables automatic configuration of IEEE 802.11 wireless<br />

adapters. The service is disabled.<br />

4.6.1.127 WMI Performance Adapter<br />

"wmiapsrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The WMI Performance Adapter service provides performance library information. The service is<br />

disabled.<br />

4.6.1.128 Workstation<br />

The Workstation service creates and maintains client network connections.<br />

4.6.1.128.1 Domain Member <strong>Server</strong><br />

"lanmanworkstation", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This policy sets the service to automatic startup.<br />

4.6.1.128.2 Workgroup Member <strong>Server</strong><br />

"lanmanworkstation", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This policy disables service startup.<br />

4.6.1.129 World Wide Web Publishing Service<br />

"w3svc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The World Wide Web Publishing service provides Web connectivity and administration through<br />

the IIS snap-in. The service is disabled.<br />

96 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.6.2 Services Not Explicitly Covered by Microsoft Guidance<br />

The following service entries in the policy file are not represented in the GUI interface.<br />

"fastuserswitchingcompatibility", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The “fastuserswitchingcompatibility” is not a core requirement for a <strong>Windows</strong> <strong>2003</strong> server. The<br />

service is disabled.<br />

"mssql$webdb", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The MSSQL$webdb service is used to publish and locate information about web services. The<br />

service is disabled.<br />

"mssqlserveradhelper", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The MSSQL<strong>Server</strong>ADHelper service enables SQL server and SQL <strong>Server</strong> Analysis Services to<br />

publish information in Active Directory. The service is disabled.<br />

"saldm", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The “saldm” is not a core requirement for a <strong>Windows</strong> <strong>2003</strong> server. The service is disabled.<br />

"sptimer", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The “sptimer” is not a core requirement for a <strong>Windows</strong> <strong>2003</strong> server. The service is disabled.<br />

"sqlserveragent", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

The “sqlserveragent” is not a core requirement for a <strong>Windows</strong> <strong>2003</strong> server. The service is<br />

disabled.<br />

"winsip", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

This is not a core requirement for a High <strong>Security</strong> server. The service is disabled.<br />

<strong>Server</strong> Policy Files March 2004 97


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.7 Additional <strong>Security</strong> Settings<br />

The following settings are in the policy file and organized similarily with the <strong>Windows</strong> <strong>Server</strong><br />

<strong>2003</strong> <strong>Security</strong> Guide. While the settings affect the Registry, they do not appear in the Registry<br />

section of the Policy GUI.<br />

4.7.1 <strong>Security</strong> Consideration for Network Attacks<br />

4.7.1.1 EnableICMPRedirect<br />

machine\system\currentcontrolset\services\tcpip\parameters\enableicmpredirect=4, 0<br />

The ‘enableicmpredirect’ registry value causes TCP to find host routes. This overrides OSPF<br />

generated routes. The setting ‘0’ disables this capability. If enabled, a ten-minute timeout makes<br />

the system unavailable to the network. Disabling causes the system to rely on OSPF routing.<br />

4.7.1.2 SynAttackProtect<br />

machine\system\currentcontrolset\services\tcpip\parameters\synattackprotect=4, 1<br />

The ‘synattackprotect’ registry value adjusts retransmissions of SYN-ACK. The setting ‘1’<br />

causes connection timeouts faster when a SYN-ATTACK is detected. The setting reduces effort<br />

expended on unresponsive connections.<br />

4.7.1.3 EnableDeadGWDetect<br />

machine\system\currentcontrolset\services\tcpip\parameters\enabledeadgwdetect=4, 0<br />

The ‘enabledeadgwdetect’ value allows TCP re-direction to a backup gateway. The setting ‘0’<br />

disables this capability. If a system detects difficulties on a network, it will automatically switch<br />

to a different gateway. This may cause undesireable packet traversal over un-trusted networks.<br />

4.7.1.4 EnablePMTUDiscovery<br />

machine\system\currentcontrolset\services\tcpip\parameters\enablepmtudiscovery=4, 0<br />

The ‘enablepmtudiscovery’ registry value determines if TCP automatically finds the maximum<br />

transmission unit (MTU) or the largest packet size to a remote host. The setting ‘0’ causes a<br />

fixed size packet be used for all connections to remote hosts. If enabled, an attacker could force a<br />

very small packet size. This results in a significant increase of network workload. This may also<br />

lead to a DoS condition.<br />

4.7.1.5 KeepAliveTime<br />

machine\system\currentcontrolset\services\tcpip\parameters\keepalivetime=4, 300000<br />

The ‘keepalivetime’ registry value determines how often TCP verifes an idle connection is intact.<br />

The setting ‘300,000’ (5 minutes) is short enough to provide some defense against DoS<br />

conditions. This setting provides the ability to recover resources from unresponsive connections.<br />

98 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.7.1.6 DisableIPSourceRouting<br />

machine\system\currentcontrolset\services\tcpip\parameters\disableipsourcerouting=4, 2<br />

The ‘disableipsourcerouting’ value determines if the sender of a TCP packet can dictate the<br />

route. The setting ‘2’ disables this ability. Dictating packet routes can obscure an attacker’s<br />

location on the network.<br />

4.7.1.7 TcpMaxConnectResponseRetransmissions<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxconnectresponseretransmi<br />

ssions=4, 2<br />

The ‘tcpmaxconnectresponseretransmissions’ value determines the number of attempts that TCP<br />

re-transmits a SYN packet before aborting. The setting ‘2’ limits the possibility of a DoS attack<br />

without affecting normal users. This setting reduces the effort expended on unresponsive<br />

connections.<br />

4.7.1.8 TcpMaxDataRetransmissions<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxdataretransmissions=4, 3<br />

The ‘tcpmaxdataretransmissions’ defines the number of times unacknowledged data is retransmitted<br />

before disconnection. The setting ‘3’ reduces the success of a DoS attack. This is<br />

achieved by reducing the effort expended on unresponsive connections.<br />

4.7.1.9 PerformRouterDiscovery<br />

machine\system\currentcontrolset\services\tcpip\parameters\performrouterdiscovery=4, 0<br />

The ‘performrouterdiscovery’ value controls the use of Internet Router Discovery Protocol. The<br />

setting ‘0’ disables discovery and forces the use of known routers. If the system were to discover<br />

routers, an attacker could redirect packets to another destination.<br />

4.7.1.10 TCPMaxPortsExhausted<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxportsexhausted=4, 5<br />

The ‘tcpmaxportsexhausted’ value controls the point which SYN-ATTACK protection begins.<br />

The setting ‘5’ causes protection to start after five failures. This is the Microsoft standard for<br />

TCP/IP. The setting is a balance between performance and security.<br />

4.7.1.11 TCPMaxHalfOpen<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxhalfopen=4, 100<br />

The ‘tcpmaxhalfopen’ value defines the number of connections in the SYN state table before<br />

SYN attack protection begins. The setting of ‘100’ initiates SYN attack protection when the state<br />

table reaches one hundred connections.<br />

<strong>Server</strong> Policy Files March 2004 99


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.7.1.12 TCPMaxHalfOpenRetired<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxhalfopenretired=4, 80<br />

The ‘tcpmaxhalfopenretired’ value determines how many connections the server can maintain in<br />

the half-open state. The setting ‘80’ initiates SYN attack protection when the state table reaches<br />

eighty connections.<br />

4.7.1.13 NoNameReleaseOnDemand (TCP/IP)<br />

machine\system\currentcontrolset\services\tcpip\parameters\nonamereleaseondemand=4, 1<br />

The ‘nonamereleaseondemand’ registry determines if a system will release its NetBIOS name to<br />

another computer on request. The setting ‘1’ prevents disclosure of NetBIOS information.<br />

4.7.2 AFD.SYS Settings<br />

4.7.2.1 DynamicBacklogGrowthDelta<br />

machine\system\currentcontrolset\services\afd\parameters\dynamicbackloggrowthdelta=4, 10<br />

The ‘dynamicbackloggrowthdelta’ value defines the number of free connections to create when<br />

deemed necessary. The setting ‘10’ creates ten additional free connections. This setting ensures<br />

additional resources are not applied too quickly, avoiding a potential DoS condition.<br />

4.7.2.2 EnableDynamicBacklog<br />

machine\system\currentcontrolset\services\afd\parameters\enabledynamicbacklog=4, 1<br />

The ‘enabledynamicbacklog’ value enables dynamic backlog. The setting ‘1’ enables the<br />

backlog. This ensures the system manages port resources in a manner that mitigates DoS attacks.<br />

4.7.2.3 MinimumDynamicBacklog<br />

machine\system\currentcontrolset\services\afd\parameters\minimumdynamicbacklog=4, 20<br />

The ‘minimumdynamicbacklog’ value controls the minimum number of free ports on a listening<br />

end point. The setting ‘20’ allows a system to create more if there is less than twenty available.<br />

The setting is intended to ensure resources are available and limit the threat of DoS conditions.<br />

4.7.2.4 MaximumDynamicBacklog<br />

machine\system\currentcontrolset\services\afd\parameters\maximumdynamicbacklog=4,<br />

20000<br />

The ‘maximumdynamicbacklog’ value controls the number of ‘quasi-free’ connections allowed<br />

on a listening end point. The setting ‘20,000’ is recommended to mitigate a DoS attack. The<br />

setting reduces the resources allocated to incomplete connections. If creating additional free<br />

ports exceeds the value, a system will not be able to maintain additional sessions.<br />

100 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.7.3 Other <strong>Security</strong> Related Settings<br />

4.7.3.1 NoNameReleaseOnDemand (NetBIOS)<br />

machine\system\currentcontrolset\services\netbt\parameters\nonamereleaseondemand=4, 1<br />

The ‘nonamereleaseondemand’ value determines if a system releases its NetBIOS name upon a<br />

name-release request. The setting ‘1’ prevents a system from releasing the NetBIOS name, other<br />

than to WINS servers. This reduces information it provides to an unauthorized user.<br />

4.7.3.2 Enable the computer to stop generating 8.3 style filenames<br />

machine\system\currentcontrolset\control\filesystem\ntfsdisable8dot3namecreation=4, 1<br />

The ‘ntfsdisable8dot3namecreation’ value determines if a system will generate 8.3 file names.<br />

The setting ‘1’ prevents the 8.3 filename format. Generation of 8.3 file makes the task of name<br />

guessing easier for an attacker. Disabling this ensures only the full name is used to reference<br />

files.<br />

4.7.3.3 NoDriveTypeAutoRun<br />

machine\software\microsoft\windows\currentversion\policies\explorer\nodrivetypeautorun=4,2<br />

55<br />

The ‘nodrivetypeautorun’ value determines if autorun is enabled on connected drives. The<br />

setting ‘255’ disables autorun for all drives on the system. This ensures privileged users do not<br />

run unapproved software. Without restrictions, unapproved software may run inadvertently.<br />

4.7.3.4 The time in seconds before the screen saver grace period expires (0<br />

recommended)<br />

machine\system\software\microsoft\windowsnt\currentversion\winlogon\screensavergraceperi<br />

od=4, 0<br />

The ‘screensavergraceperiod’ value determines the amount of time (in seconds) to enforce the<br />

screen saver password. The setting ‘0’ enforces password lock with no time delay. This provides<br />

an immediate lock when the idle threshold is reached.<br />

4.7.3.5 Warning Level<br />

machine\system\currentcontrolset\services\eventlog\security\warninglevel=4, 90<br />

The ‘warninglevel’ value determines the maximum amount of security logs before a warning<br />

event is triggered. The setting ‘90’ triggers a warning when the <strong>Security</strong> log reaches 90%<br />

capacity. This will afford sufficient time to reset the log and determine reasons for the warning.<br />

<strong>Server</strong> Policy Files March 2004 101


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.7.3.6 Enable Safe DLL search mode (recommended)<br />

machine\system\currentcontrolset\control\session manager\safedllsearchmode=4, 1<br />

The ‘safedllsearchmode’ value determines the order DLLs are searched. The setting ‘1’<br />

commands the system to first look in the PATH, then the current folder. This order ensures files<br />

in the current foder do not run in place of files in the users PATH.<br />

4.7.3.7 Disable Autorun on CD-ROM<br />

machine\system\currentcontrolset\control\services\CDRom\AutoRun=4, 1<br />

The ‘Disable Autorun on CD-Rom’ prevents automatic execution of programs upon insertion of<br />

a CD. The setting ‘1’disables the Autorun feature. This helps reduce the threat of malicious code<br />

infection through CD-Rom.<br />

4.7.3.8 Disable Administrative Shares<br />

machine\system\currentcontrolset\control\services\Lanman<strong>Server</strong>\Parameters\AutoShareServ<br />

er=4, 0<br />

The ‘AutoShare<strong>Server</strong>’ value determines if disk drives have administrative shares. The setting<br />

‘0’ disables administrative shares.<br />

4.7.3.9 Disable DCOM<br />

machine\Software\Microsoft\OLE\EnableDCOM=4, 0<br />

The ‘EnableDCOM’ value determines if DCOM is active. The setting ‘0’disables DCOM.<br />

4.7.4 Manual Activities<br />

The following elements could not be automated. They must be manually configured.<br />

NOTE:<br />

For 4.7.4.1 through 4.7.4.3, use the following procedure to reach the “Computer<br />

Configuration” level in either MMC (for Workgroup server) or Active Directory (for<br />

domain server).<br />

For a Domain server do the following:<br />

1. Invoke “Active Directory”.<br />

2. Right click “Public <strong>Server</strong>” OU and select “Properties”.<br />

3. Select the “Group Policy” tab.<br />

4. Select “CSE High <strong>Security</strong> – <strong>Baseline</strong> Policy”.<br />

5. Click “Edit”.<br />

The Computer Configuration entry is now displayed on the screen.<br />

102 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

For a Workgroup system do the following:<br />

1. Open a command window.<br />

2. Enter “MMC” and press “Enter”.<br />

3. “Console 1” dialog opens.<br />

4. Click “File”.<br />

5. Select “Add/Remove Snap-in”.<br />

6. “Add/Remove Snap-in” dialog displayed.<br />

7. Click “Add”.<br />

8. “Add Standalone Snap-in” dialog displayed.<br />

9. Browse to and select “IP <strong>Security</strong> Policy Management”.<br />

10. Click “Add”.<br />

11. “Select Computer or Domain” dialog displayed.<br />

12. Accept defaults and click “”Finish”.<br />

13. Click “Close”.<br />

14. Click “OK”.<br />

15. In the “root Console Window”<br />

16. Select “Group Policy Object Editor”<br />

17. Click on “Add”.<br />

18. “Select Group Policy Object” window opens.<br />

19. Click “Finish” to accept defaults.<br />

20. Click “Close”.<br />

21. Click “OK”.<br />

22. Click “+” beside “Local Computer Policy”.<br />

The Computer Configuration entry is now displayed on the screen.<br />

4.7.4.1 Set client connection encryption level<br />

Computer configuration\Administrative Templates\<strong>Windows</strong> Components\Terminal<br />

Services\Encryption and <strong>Security</strong>\Set client connection encryption level=High<br />

The “Set client encryption level” setting uses 128-bit encryption to protect Terminal Service<br />

sessions. This policy sets the value to High.<br />

<strong>Server</strong> Policy Files March 2004 103


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.7.4.2 Always prompt client for password upon connection<br />

Computer configuration\Administrative Templates\<strong>Windows</strong> Components\Terminal<br />

Services\Encryption and <strong>Security</strong> \Always prompt client for password upon<br />

connection\=Enabled<br />

The “Always prompt client for password upon connection\=Enabled” setting forces the user to<br />

logon to the local service. This policy enables password challenge upon connection.<br />

4.7.4.3 Report Errors<br />

Computer configuration\Administrative Templates\System\Error Reporting\=Disabled<br />

The “Error Reporting\=Disabled” setting prevents the system from reporting error conditions to<br />

Microsoft.<br />

4.7.4.4 Remove POSIX Subsystem Registry Key<br />

machine\system\currentcontrolset\control\session manager\subsystems\posix<br />

The ‘posix’ value determines if the POSIX subsystem is supported. This policy deletes the key.<br />

This prevents inadvertent use of the subsystem.<br />

4.7.4.5 Set BIOS Password<br />

The system BIOS should be password protected. This follows vendor specific procedures that are<br />

not outlined in this document.<br />

4.7.4.6 Disable Memory Dump<br />

Control Panel/System Properties/Advanced/Startup and Recovery-SettingsWrite Debugging<br />

Information=None<br />

The ability to dump memory in case of a program failure should be disabled. The likelihood of<br />

requiring a memory dump is low, however, if needed you may temporarily enable it.<br />

4.7.4.7 Boot Immediately to <strong>Windows</strong><br />

My Computer/Properties/Advanced/Startup and Recovery-Settings/Time to display list of<br />

operating systems=0<br />

The ‘Time to display list of operating systems’ value determines the number of seconds the<br />

system displays Operating System options at boot time. The setting ‘0’ prevents alternate boot<br />

during normal operations.<br />

4.7.4.8 Disassociate .reg Files from the Registry Editor<br />

1. Start/Settings/Control Panel/Folder Options<br />

2. Select ‘REG’extension<br />

104 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

3. Click ‘Delete’ and Yes’ in the confirmation window<br />

4. Click ‘Close’<br />

Disassociating the .reg extension from the registry editor prevents inadvertent modification of<br />

the registry.<br />

4.7.4.9 Remove Unnecessary Programs<br />

Start->Control Panel=>Add Remove Programs=>Add/Remove Window Components<br />

Remove CHAT.<br />

4.7.5 Access Controls<br />

Important files and registry values on the system should be protected. A good way of doing this<br />

is by use of Access Controls. The following sections provide suggestions for access controls.<br />

NOTE:<br />

Each installation must ensure the settings that follow are appropriate for their own<br />

environment.<br />

<strong>Server</strong> Policy Files March 2004 105


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.7.5.1 General File Access Controls<br />

Table 1 – General File Access Controls<br />

File/Folder Name<br />

Audit<br />

Administrators<br />

& System<br />

Authenticated<br />

Users<br />

Found<br />

Value<br />

C:\ Full Control Read<br />

C:\*.* Full Control Full Control<br />

C:\boot.ini S&F Full Control N/a<br />

C:\ntdetect.com S&F Full Control N/a<br />

C:\ntldr S&F Full Control N/a<br />

C:\ntbootdd.sys S&F Full Control N/a<br />

C:\autoexec.bat S&F Full Control Read<br />

C:\config.sys S&F Full Control Read<br />

C:\Program Files F Full Control Read & Execute<br />

C:\IO.sys S&F Full Control Change<br />

C:\MSDOS.sys S&F Full Control Change<br />

C:\Documents and Settings\All Users F Full Control Change<br />

C:\Documents and Settings\All Users\Documents F Full Control Read<br />

C:\Documents and Settings\All Users\Application Data F Full Control Read & Create<br />

C:\temp\*.* and subdirectories Full Control Traverse, Add<br />

C:\Users and subdirectories F Admin:rwxd<br />

Full Control<br />

C:\Users\Default and subdirectories F System: Full<br />

Control<br />

List<br />

Read Write<br />

Execute<br />

C:\WIN32APP and subdirectories S&F Full Control Read<br />

%windir% and subdirectories F Full Control Change<br />

%windir%\*.* F Full Control Read<br />

%windir%\*.ini F Full Control Change<br />

%windir%\LocalMon.dll Full Control Read<br />

%windir%\PrintMan.hlp Full Control Read<br />

%windir%\config\*.* S&F Full Control List<br />

%windir%\Help\*.* Full Control Read & Execute<br />

%windir%\repair\*.* and subdir S&F Administrator N/a<br />

%windir%\security S&F Full Control Read & Execute<br />

106 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

File/Folder Name<br />

Audit<br />

Administrators<br />

& System<br />

Authenticated<br />

Users<br />

Found<br />

Value<br />

%windir%\system\*.* S&F Full Control Read<br />

%windir%\system32 F Full Control Read<br />

%windir%\system32\<br />

autoexec.nt<br />

cmos.ram<br />

config.nt<br />

midimap.cfg<br />

S&F Full Control change<br />

%windir%\system32\passport.mid S&F Full Control Full Control<br />

%windir%\system32\CatRoot S&F Full Control N/a<br />

%windir%\system32\config S&F Full Control List<br />

%windir%\system32\config\*.* S&F Full Control List<br />

%windir%\system32\config\userdef S&F Full Control<br />

System:change<br />

Read<br />

%windir%\system32\dhcp and subdir Full Control Read<br />

%windir%\system32\dllcache S&F Full Control N/a<br />

%windir%\system32\drivers S&F Full Control Read<br />

%windir%\system32\ias S&F Full Control Read & Execute<br />

%windir%\system32\inetserv\Metabase.bin S&F Full Control Read & Execute<br />

%windir%\system32\inetserv\metaback S&F Full Control N/a<br />

%windir%\system32\mui S&F Full Control N/a<br />

%windir%\system32\os2\dll\oso001.009 Full Control Read<br />

%windir%\system32\os2\DLL\Doscalls.dll Full Control Read<br />

%windir%\system32\os2\dll\netapi.dll Full control Full control<br />

%windir%\system32\RAS\ S&F Full Control Read<br />

%windir%\system32\RAS\*.* S&F Full Control Read<br />

%windir%\system32\repl\export Full Control Change<br />

%windir%\system32\repl\export\scripts Full Control Read<br />

%windir%\system32\repl\ export\scripts\*.* Full Control Read<br />

%windir%\system32\repl\import Full Control Change<br />

%windir%\system32\repl\import\*.* Full Control Change<br />

%windir%\system32\repl\import\scripts\ Full Control Read<br />

%windir%\system32\repl\import\scripts\*.* Full Control Read<br />

<strong>Server</strong> Policy Files March 2004 107


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

File/Folder Name<br />

Audit<br />

Administrators<br />

& System<br />

Authenticated<br />

Users<br />

Found<br />

Value<br />

%windir%\system32\ShellExt S&F Full Control N/a<br />

%windir%\system32\spool\ and subdir F Full Control Read<br />

%windir%\system32\spool\drivers\w32x86\1 Full Control Full Control<br />

%windir%\system32\spool\drivers\w32x86\winprint.dll Full Control Read<br />

%windir%\system32\Viewers\*.* F Full Control N/a<br />

%windir%\system32\wbem F Full Control Read & Execute<br />

%windir%\system32\wbem\mof S&F Full Control Read & Execute<br />

%windir%\system32\wins and subdir F Full Control Full Control<br />

%windir%\twain_32 Full Control File, Add Subdir<br />

%windir%\web Full Control Read & Execute<br />

%userprofile% F Full Control N/a<br />

108 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.7.5.2 General Registry Access Controls<br />

Table 2 – General Registry Access Controls<br />

Hive/Key Name Audit Administrator &<br />

System<br />

Authenticated<br />

Users<br />

HKLM\Software S&F Full Control Read<br />

HKLM\Software\Classes\helpfile F Full Control Read<br />

HKLM\Software\Classes\.hlp F Full Control Read<br />

HKLM\Software\Microsoft\Command Processor S&F Full Control Read<br />

HKLM\Software\Microsoft\Cryptography S&F Full Control Read<br />

HKLM\Software\Microsoft\Driver Signing S&F Full Control Read<br />

HKLM\Software\Microsoft\EnterpriseCertificates S&F Full Control Read<br />

HKLM\Software\Microsoft\Non-DriverSigning S&F Full Control Read<br />

HKLM\Software\Microsoft\NetDDE S&F Full Control Read<br />

HKLM\Software\Microsoft\Ole F Full Control Read<br />

HKLM\Software\Microsoft\Rpc S&F Full Control Read<br />

HKLM\Software\Microsoft\Secure S&F Full Control Read<br />

HKLM\Software\Microsoft\SystemCertificates S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>\CurrentVersion\Run S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>\CurrentVersion\RunOnce S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Aedebug S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\AsrCommands S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Classes F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Console F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\DiskQuota F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Drivers32 S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Font Drivers F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\FontMapper F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Image File<br />

Execution Options<br />

S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\IniFileMapping S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\PerfLib S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\ProfileList S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\SecEdit S&F Full Control Read<br />

<strong>Server</strong> Policy Files March 2004 109


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

Hive/Key Name Audit Administrator &<br />

System<br />

Authenticated<br />

Users<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Svchost F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Time Zones S&F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\<strong>Windows</strong> F Full Control Read<br />

HKLM\Software\Microsoft\<strong>Windows</strong>NT\CurrentVersion\Winlogon S&F Full Control Read<br />

HKLM\Software\Policies S&F Full Control Read<br />

HKLM\System S&F Full Control Read<br />

HKLM\System\CurrentControlSet\Services S&F Full Control Read<br />

HKLM\SYSTEM\CurrentControlSet\Services\Schedule S&F Full Control None<br />

HKLM\System\CurrentControlSet\Control\SecurePipeServiers\Winreg S&F N/A Everyone=none<br />

HKLM\System\CurrentControlSet\Control\Session Manager\Executive S&F Full Control Read<br />

HKLM\System\CurrentControlSet\Control\TimeZoneInformation S&F Full Control Read<br />

HKLM\System\CurrentControlSet\Control\WMI\<strong>Security</strong> S&F Full Control None<br />

HKLM\Hardware S&F Full Control Everyone:Read<br />

HKLM\SAM S&F Full Control Everyone:Read<br />

HKLM\<strong>Security</strong> S&F Full Control N/A<br />

Hkey_Users (HKU) S&F Full Control N/A<br />

HKU\.Default S&F Full Control Read<br />

HKU\.Default\Software\Microsoft\NetDDE S&F Full Control N/A<br />

110 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.7.6 Variance from Microsoft Guidance<br />

The following table provides a list of settings that differ between the CSE guidance and<br />

Microsoft guidance. The parameter is identified along with the CSE value and Microsoft value.<br />

Table 3 – Variance from Microsoft Member <strong>Server</strong> <strong>Baseline</strong><br />

# Parameter CSE Value Microsoft Value<br />

1 Minimum Password Length 8 12<br />

2 Audit Policy Change Success/Fail Success<br />

3 Audit System Events Success/Fail Success<br />

4 Add Workstations to Domain None Administrators<br />

5 Backup Files and Directories Backup Operators and<br />

Administrators<br />

6 Bypass Traverse Checking Users, Backup<br />

Operators,Administrators and<br />

Authenticated Users<br />

Default<br />

Default<br />

7 Create a Pagefile Administrators Default<br />

8 Create a Token Object None Default<br />

9 Create Global Objects Service and Administrators Default<br />

10 Create Permanent Shared Objects None Default<br />

11 Deny Logon as a Service Guests, Anonymous Logon,<br />

Administrators, Built-in<br />

Administrator,<br />

Support_388945a0 and Guest<br />

12 Deny Logon Locally Guests, Anonymous Logon,<br />

Built-in Administrator,<br />

Support_388945a0 and Guest<br />

Default<br />

Default<br />

13 Force shutdown from remote<br />

system<br />

None<br />

Administrators<br />

14 Lock Pages in Memory None Administrators<br />

15 Logon as a Service Network Service and Local<br />

Service<br />

Default<br />

16 Administrator Account Status Disabled Enabled<br />

17 Interactive logon: Message text for<br />

users attempting to logon<br />

18 Interactive logon: Message title for<br />

users attempting to log on<br />

19 Interactive Logon: Require Smart<br />

Card<br />

Departmental entry<br />

required<br />

Departmental entry<br />

required<br />

Do not require smart card<br />

“This system is restricted….”<br />

“IT IS AN OFFENSE….”<br />

Default<br />

<strong>Server</strong> Policy Files March 2004 111


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

# Parameter CSE Value Microsoft Value<br />

20 Network Access: Allow<br />

Anonymous SID/Name Translation<br />

21 Network Access: Remotely<br />

accessible Registry paths<br />

22 Network Access: Remotely<br />

accessible registry paths and subpaths<br />

23<br />

Network <strong>Security</strong>: Force logoff<br />

when logon hours expire<br />

Disabled<br />

None<br />

None<br />

Enabled<br />

Default<br />

System\CurrentControlSet\Control\Pr<br />

oduct Options<br />

System\CurrentControlSet\Control\S<br />

erver Applications<br />

Software\Microsoft\<strong>Windows</strong><br />

NT\Current Version<br />

System\CurrentControlSet\Control\Pr<br />

int\Printers<br />

System\CurrentControlSet\Services\E<br />

ventlog<br />

Software\Microsoft\OLAP <strong>Server</strong><br />

Software\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\Print<br />

Software\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\<strong>Windows</strong><br />

System\CurrentControlSet\Control\C<br />

ontentIndex<br />

System\CurrentControlSet\Control\T<br />

erminal <strong>Server</strong><br />

System\CurrentControlSet\Control\T<br />

erminal <strong>Server</strong>\UserConfig<br />

System\CurrentControlSet\Control\T<br />

erminal<br />

<strong>Server</strong>\DefaultUserCOnfiguration<br />

Software\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\Perflib<br />

System\CurrentControlSet\services\S<br />

ysmonLog<br />

Default<br />

24 System Cryptography: Use FIPS<br />

compliant algorithms for<br />

encryption, hashing and signing<br />

25 Use Certificate Rules on <strong>Windows</strong><br />

Executables for Software<br />

Restriction Policies<br />

26 Retention method for Application<br />

log<br />

Enabled<br />

Disabled<br />

Do not overwrite<br />

Disabled<br />

Default<br />

As needed<br />

112 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

# Parameter CSE Value Microsoft Value<br />

27 Retention method for <strong>Security</strong> log Do not overwrite As needed<br />

28 Retention method for System log Do not overwrite As needed<br />

29 Automatic Updates Service Disabled Automatic<br />

30 Background Intelligent Transfer<br />

Service<br />

Disabled<br />

Manual<br />

31 Network Location Awareness Disabled Manual<br />

32 NTLM <strong>Security</strong> Support Provider Disabled Automatic<br />

33 Performance Logs and Alerts Disabled Manual<br />

34 Plug and Play Service Disabled Automatic<br />

35 Remote Administration Service Disabled Manual<br />

36 RemoteRegistry Service Disabled Automatic<br />

37 <strong>Server</strong> Service Disabled Automatic<br />

38 Terminal Services Disabled Automatic<br />

39 <strong>Windows</strong> Management<br />

Instrumentation Driver Extensions<br />

Disabled<br />

Manual<br />

40 WMI Performance Adapter Disabled Manual<br />

41 TCPMaxHalfOpen 100 No recommendation<br />

42 TCPMaxHalfOpenRetired 80 No recommendation<br />

43 NoNameReleaseOnDemand<br />

(TCP/IP)<br />

i) Enabled No recommendation<br />

44 Remove POSIX Subsystem<br />

Registry Key<br />

<strong>Recommended</strong><br />

No recommendation<br />

45 Set BIOS Password <strong>Recommended</strong> No recommendation<br />

46 Disable Memory Dump <strong>Recommended</strong> No recommendation<br />

47 Boot Immediately to <strong>Windows</strong> <strong>Recommended</strong> ii) No Recommendation<br />

48 Disassociate .reg files from registry<br />

editor<br />

<strong>Recommended</strong><br />

No Recommendation<br />

<strong>Server</strong> Policy Files March 2004 113


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

Table 4 – Variance from Microsoft Bastion Host Local Policy<br />

# Parameter CSE Value Microsoft Value<br />

1 Minimum Password Length 8 12<br />

2 Audit Policy Change Success/Fail Success<br />

3 Audit System Events Success/Fail Success<br />

4 Add Workstations to Domain None Administrators<br />

5 Allow log on locally Administrators and Backup<br />

Operators<br />

6 Backup Files and Directories Backup Operators and<br />

Administrators<br />

7 Bypass Traverse Checking Users, Backup Operators,<br />

Administrators and<br />

Authenticated Users<br />

Administrators<br />

Default<br />

Default<br />

8 Create a Pagefile Administrators Default<br />

9 Create a Token Object None Default<br />

10 Create Global Objects Service and Administrators Default<br />

11 Create Permanent Shared Objects None Default<br />

12 Deny Logon as a Service Guests, Anonymous Logon,<br />

Administrators, Built-in<br />

Administrator,<br />

Support_388945a0 and Guest<br />

13 Deny Logon Locally Guests, Anonymous Logon,<br />

Built-in Administrator,<br />

Support_388945a0 and Guest<br />

Default<br />

Default<br />

14 Force shutdown from remote<br />

system<br />

None<br />

Administrators<br />

15 Lock Pages in Memory None Administrators<br />

16 Logon as a Service Network Service and Local<br />

Service<br />

Default<br />

17 Administrator Account Status Disabled Enabled<br />

18 Interactive logon: Message text for<br />

users attempting to logon<br />

19 Interactive logon: Message title for<br />

users attempting to log on<br />

20 Interactive Logon: Require Smart<br />

Card<br />

21 Network Access: Allow<br />

Anonymous SID/Name Translation<br />

Departmental entry<br />

required<br />

Departmental entry<br />

required<br />

Do not require smart card<br />

Disabled<br />

“This system is restricted….”<br />

“IT IS AN OFFENSE….”<br />

Default<br />

Default<br />

114 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

# Parameter CSE Value Microsoft Value<br />

22 Network Access: Remotely<br />

accessible Registry paths<br />

23 Network Access: Remotely<br />

accessible registry paths and subpaths<br />

24<br />

Network <strong>Security</strong>: Force logoff<br />

when logon hours expire<br />

None<br />

None<br />

Enabled<br />

System\CurrentControlSet\Control\Pr<br />

oduct Options<br />

System\CurrentControlSet\Control\S<br />

erver Applications<br />

Software\Microsoft\<strong>Windows</strong><br />

NT\Current Version<br />

System\CurrentControlSet\Control\Pr<br />

int\Printers<br />

System\CurrentControlSet\Services\E<br />

ventlog<br />

Software\Microsoft\OLAP <strong>Server</strong><br />

Software\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\Print<br />

Software\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\<strong>Windows</strong><br />

System\CurrentControlSet\Control\C<br />

ontentIndex<br />

System\CurrentControlSet\Control\T<br />

erminal <strong>Server</strong><br />

System\CurrentControlSet\Control\T<br />

erminal <strong>Server</strong>\UserConfig<br />

System\CurrentControlSet\Control\T<br />

erminal<br />

<strong>Server</strong>\DefaultUserCOnfiguration<br />

Software\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\Perflib<br />

System\CurrentControlSet\services\S<br />

ysmonLog<br />

Default<br />

25 System Cryptography: Use FIPS<br />

compliant algorithms for<br />

encryption, hashing and signing<br />

Enabled<br />

Disabled<br />

26<br />

Use Certificate Rules on <strong>Windows</strong><br />

Executables for Software<br />

Restriction Policies<br />

Disabled<br />

Default<br />

<strong>Server</strong> Policy Files March 2004 115


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

# Parameter CSE Value Microsoft Value<br />

27 Retention method for Application<br />

log<br />

Do not overwrite<br />

As needed<br />

28 Retention method for <strong>Security</strong> log Do not overwrite As needed<br />

29 Retention method for System log Do not overwrite As needed<br />

30 DNS Client Disable Enable<br />

31 Plug and Play Service Disabled Automatic<br />

32 TCPMaxHalfOpen 100 No recommendation<br />

33 TCPMaxHalfOpenRetired 80 No recommendation<br />

34 NoNameReleaseOnDemand<br />

(TCP/IP)<br />

35 Remove POSIX Subsystem<br />

Registry Key<br />

Enabled<br />

<strong>Recommended</strong><br />

No recommendation<br />

No recommendation<br />

36 Set BIOS Password <strong>Recommended</strong> No recommendation<br />

37 Disable Memory Dump <strong>Recommended</strong> No recommendation<br />

38 Boot Immediately to <strong>Windows</strong> <strong>Recommended</strong> No Recommendation<br />

39 Disassociate .reg files from registry<br />

editor<br />

<strong>Recommended</strong><br />

No Recommendation<br />

116 March 2004 <strong>Server</strong> Policy Files


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

5 Role Based <strong>Server</strong> Policies<br />

The following policy files apply settings specific to the role they serve. They do not contain<br />

every setting required for a server; therefore apply these settings after the <strong>Baseline</strong> configuration.<br />

5.1 Role Based IPSec Policies<br />

Role based IP <strong>Security</strong> Policy is applied in a two-step process. The first step is to load the policy<br />

into the policy editor. The second step is to activate the policy. This is achieved with the Group<br />

Policy Editor.<br />

5.1.1 Load IPSec policy<br />

• Activate “<strong>Windows</strong> Explorer”.<br />

• Browse to location of desired IPSec policy file (must have .CMD extension).<br />

• Right click on policy command files and select “Open”.<br />

o Command window will open, execute the policy command file, and close.<br />

5.1.2 Activate IPSec Policy<br />

• Open a command window.<br />

• Enter “MMC” and press “Enter”.<br />

o “Console 1” dialog opens.<br />

• Click “File”.<br />

• Select “Add/Remove Snap-in”.<br />

o “Add/Remove Snap-in” dialog displayed.<br />

• Click “Add”.<br />

o “Add Standalone Snap-in” dialog displayed.<br />

• Browse to and select “IP <strong>Security</strong> Policy Management”.<br />

• Click “Add”.<br />

o “Select Computer or Domain” dialog displayed.<br />

• Accept defaults and click “”Finish”.<br />

• Click “Close”.<br />

• Click “OK”.<br />

• In the “Root Console Window”, click on “IP <strong>Security</strong> Policies on Local Computer”.<br />

• In right frame right click the desired IP <strong>Security</strong> policy and select “Assign”.<br />

• Right click the active policy and select “Properties”.<br />

Role Based <strong>Server</strong> Policies March 2004 117


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

• Select the “General” tab.<br />

• Click on the “Settings” button.<br />

o “Key Exchange Settings” dialog displayed.<br />

• Click the “Methods” button.<br />

o The “Key Exchange Methods” dialog displayed.<br />

• Remove all settings except the following (ensure they are in the order below):<br />

IKE 3DES SHA1 High (1024)<br />

IKE 3DES SHA1 Med (2)<br />

• Click “OK”.<br />

• Click “OK”.<br />

• Click “File”.<br />

• Click “Exit”.<br />

o “Microsoft Management Console” dialog displayed<br />

• Select “Yes” if you wish to save the settings (otherwise select “No”).<br />

5.2 Domain File <strong>Server</strong> <strong>Security</strong> Policy<br />

The domain-based file server allows authenticated users to access shared files in the domain.<br />

These shared files can use file protection to control access. Access attempts from outside a<br />

domain can authenticate with domain-based credentials. Once authenticated, access is granted<br />

based on domain policy.<br />

To fulfill file services, the <strong>Baseline</strong> configuration settings do not require further changes.<br />

5.2.1 Variance from Microsoft “Hardening File <strong>Server</strong>s” Guidance<br />

In the Microsoft hardening policy for Domain file servers, Distributed Files system and File<br />

Replication services are disabled. In the CSE <strong>Baseline</strong> configuration these same services are<br />

disabled; therefore they need not be disabled in the File <strong>Server</strong> policy.<br />

The remaining differences are a result of CSE and Microsoft <strong>Baseline</strong> configuration variance.<br />

It is important to note that the role-based policies cannot be viewed in isolation from the <strong>Baseline</strong><br />

configuration.<br />

118 March 2004 Role Based <strong>Server</strong> Policies


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

5.2.2 [Service General Setting]<br />

"lanmanserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOC<br />

RSDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

5.2.3 Domain File <strong>Server</strong> IPSec Policy<br />

The following file is supplied as part of the Microsoft <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guideline.<br />

The file must be modified to reflect correct domain controller addresses. Once modified, the<br />

procedure outlined in 5.1 Role Based IPSec Policies is used to apply the policy.<br />

REM (c) Microsoft Corporation 1997-<strong>2003</strong><br />

REM Packet Filters for <strong>Server</strong> Hardening<br />

REM<br />

REM Name: PacketFilter-File.CMD<br />

REM Version: 1.0<br />

REM This CMD file provides the proper NETSH syntax for creating an IPSec Policy<br />

REM that blocks all network traffic to a File <strong>Server</strong> except for what is<br />

REM explicitly allowed as described in the <strong>Windows</strong> <strong>2003</strong> <strong>Server</strong> Solution Guide.<br />

REM Please read the entire guide before using this CMD file.<br />

REM Revision History<br />

REM 0000 - Original February 05, <strong>2003</strong><br />

REM 0000 - Original April 03, <strong>2003</strong><br />

:IPSec Policy Definition<br />

netsh ipsec static add policy name="Packet Filters - File" description="<strong>Server</strong><br />

Hardening Policy" assign=no<br />

:IPSec Filter List Definitions<br />

netsh ipsec static add filterlist name="CIFS/SMB <strong>Server</strong>" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="NetBIOS <strong>Server</strong>" description="<strong>Server</strong> Hardening"<br />

netsh ipsec static add filterlist name="Terminal <strong>Server</strong>" description="<strong>Server</strong><br />

Hardening"<br />

Role Based <strong>Server</strong> Policies March 2004 119


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

netsh ipsec static add filterlist name="Domain Member" description="<strong>Server</strong> Hardening"<br />

netsh ipsec static add filterlist name="Monitoring" description="<strong>Server</strong> Hardening"<br />

netsh ipsec static add filterlist name="Block Domain Access" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="ALL Inbound Traffic" description="<strong>Server</strong><br />

Hardening"<br />

:IPSec Filter Action Definitions<br />

netsh ipsec static add filteraction name=SecPermit description="Allows Traffic to<br />

Pass" action=permit<br />

netsh ipsec static add filteraction name=Block description="Blocks Traffic"<br />

action=block<br />

:IPSec Filter Definitions<br />

netsh ipsec static add filter filterlist="CIFS/SMB <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="CIFS/SMB <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=445<br />

netsh ipsec static add filter filterlist="CIFS/SMB <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="CIFS/SMB <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=445<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=137<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=137<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=138<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=139<br />

netsh ipsec static add filter filterlist="Terminal <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="Terminal <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=3389<br />

netsh ipsec static add filter filterlist="Block Domain Access" srcaddr=me dstaddr=any<br />

description="Block Domain Access" protocol=TCP srcport=any dstport=1097<br />

netsh ipsec static add filter filterlist="ALL Inbound Traffic" srcaddr=any dstaddr=me<br />

description="ALL Inbound Traffic" protocol=any srcport=0 dstport=0<br />

REM NOTE: IP Address or server names of Domain Controllers must be hardcode into the<br />

dstaddr of the Domain Member filters defined below<br />

netsh ipsec static add filter filterlist="Domain Member" srcaddr=me<br />

dstaddr=192.168.0.1 description="Traffic to Domain Controller" protocol=any srcport=0<br />

dstport=0<br />

REM netsh ipsec static add filter filterlist="Domain Member" srcaddr=me<br />

dstaddr= description="Traffic to Domain Controller" protocol=any<br />

srcport=0 dstport=0<br />

REM NOTE: IP Address or server name of Monitoring server must be hard coded into the<br />

dstaddr of Monitoring filter defined below<br />

REM netsh ipsec static add filter filterlist="Monitoring" srcaddr=me dstaddr= description="Monitoring Traffic" protocol=any srcport=0 dstport=0<br />

120 March 2004 Role Based <strong>Server</strong> Policies


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

:IPSec Rule Definitions<br />

netsh ipsec static add rule name="CIFS/SMB <strong>Server</strong>" policy="Packet Filters - File"<br />

filterlist="CIFS/SMB <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="NetBIOS <strong>Server</strong> Rule" policy="Packet Filters - File"<br />

filterlist="NetBIOS <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="Terminal <strong>Server</strong> Rule" policy="Packet Filters - File"<br />

filterlist="Terminal <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="Domain Member Rule" policy="Packet Filters - File"<br />

filterlist="Domain Member" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="Block Domain Access Rule" policy="Packet Filters -<br />

File" filterlist="Block Domain Access" kerberos=yes filteraction=Block<br />

REM netsh ipsec static add rule name="Monitoring Rule" policy="Packet Filters - File"<br />

filterlist="Monitoring" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="ALL Inbound Traffic Rule" policy="Packet Filters -<br />

File" filterlist="ALL Inbound Traffic" kerberos=yes filteraction=Block<br />

5.3 Domain Print <strong>Server</strong> Policy<br />

The domain print server allows authenticated users access to shared printers. These shared<br />

printers use access controls. Users outside a domain can authenticate with domain-based<br />

credentials. Once authenticated, access is granted based on domain policy.<br />

To fulfill print services, the <strong>Baseline</strong> configuration settings do not require further changes.<br />

5.3.1 Variance from Microsoft “Hardening Print <strong>Server</strong>s” Guidance<br />

The Microsoft role-based policy for print servers has two activities: 1) Start the print spooler and<br />

2) disable “Microsoft network server: Digitally sign communications (always)”. The CSE policy<br />

also starts the print spooler but differs in the handling of signatures. The Microsoft <strong>Security</strong><br />

Options section recommends disabling “Microsoft network server: Digitally sign<br />

communications (always)”. Their reason is the user community would not be able to view the<br />

status of their print jobs. We did not observe this limitation in our lab. As a result, the option to<br />

digitally sign communications is enabled.<br />

The remaining differences are a result of the CSE and Microsoft <strong>Baseline</strong> configuration variance.<br />

It is important to note that the role-based policies cannot be viewed in isolation from the <strong>Baseline</strong><br />

configuration.<br />

5.3.2 [Registry Values]<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedpaths\machine=7,Sof<br />

tware\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\Print,System\CurrentControlSet\Control\Print\Printers<br />

Role Based <strong>Server</strong> Policies March 2004 121


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

5.3.3 [Service General Setting]<br />

"lanmanserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"spooler", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

5.3.4 Domain Print <strong>Server</strong> IPSec Policy<br />

The following file is supplied as part of the Microsoft <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guideline.<br />

The file must be modified to reflect domain controller addresses. Once modified the procedure<br />

outlined in 5.1 Role Based IPSec Policies is used to apply the policy.<br />

REM (c) Microsoft Corporation 1997-<strong>2003</strong><br />

REM Packet Filters for <strong>Server</strong> Hardening<br />

REM<br />

REM Name: PacketFilter-File.CMD<br />

REM Version: 1.0<br />

REM This CMD file provides the proper NETSH syntax for creating an IPSec Policy<br />

REM that blocks all network traffic to a File <strong>Server</strong> except for what is<br />

REM explicitly allowed as described in the <strong>Windows</strong> <strong>2003</strong> <strong>Server</strong> Solution Guide.<br />

REM Please read the entire guide before using this CMD file.<br />

REM Revision History<br />

REM 0000 - Original February 05, <strong>2003</strong><br />

REM 0000 - Original April 03, <strong>2003</strong><br />

:IPSec Policy Definition<br />

netsh ipsec static add policy name="Packet Filters - File" description="<strong>Server</strong><br />

Hardening Policy" assign=no<br />

:IPSec Filter List Definitions<br />

netsh ipsec static add filterlist name="CIFS/SMB <strong>Server</strong>" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="NetBIOS <strong>Server</strong>" description="<strong>Server</strong> Hardening"<br />

122 March 2004 Role Based <strong>Server</strong> Policies


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

netsh ipsec static add filterlist name="Terminal <strong>Server</strong>" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="Domain Member" description="<strong>Server</strong> Hardening"<br />

netsh ipsec static add filterlist name="Monitoring" description="<strong>Server</strong> Hardening"<br />

netsh ipsec static add filterlist name="Block Domain Access" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="ALL Inbound Traffic" description="<strong>Server</strong><br />

Hardening"<br />

:IPSec Filter Action Definitions<br />

netsh ipsec static add filteraction name=SecPermit description="Allows Traffic to<br />

Pass" action=permit<br />

netsh ipsec static add filteraction name=Block description="Blocks Traffic"<br />

action=block<br />

:IPSec Filter Definitions<br />

netsh ipsec static add filter filterlist="CIFS/SMB <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="CIFS/SMB <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=445<br />

netsh ipsec static add filter filterlist="CIFS/SMB <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="CIFS/SMB <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=445<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=137<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=137<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=138<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=139<br />

netsh ipsec static add filter filterlist="Terminal <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="Terminal <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=3389<br />

netsh ipsec static add filter filterlist="Block Domain Access" srcaddr=me dstaddr=any<br />

description="Block Domain Access" protocol=TCP srcport=any dstport=1097<br />

netsh ipsec static add filter filterlist="ALL Inbound Traffic" srcaddr=any dstaddr=me<br />

description="ALL Inbound Traffic" protocol=any srcport=0 dstport=0<br />

REM NOTE: IP Address or server names of Domain Controllers must be hard coded into the<br />

dstaddr of the Domain Member filters defined below<br />

netsh ipsec static add filter filterlist="Domain Member" srcaddr=me<br />

dstaddr=192.168.0.1 description="Traffic to Domain Controller" protocol=any srcport=0<br />

dstport=0<br />

REM netsh ipsec static add filter filterlist="Domain Member" srcaddr=me<br />

dstaddr= description="Traffic to Domain Controller" protocol=any<br />

srcport=0 dstport=0<br />

REM NOTE: IP Address or server name of Monitoring server must be hard coded into the<br />

dstaddr of Monitoring filter defined below<br />

Role Based <strong>Server</strong> Policies March 2004 123


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

REM netsh ipsec static add filter filterlist="Monitoring" srcaddr=me dstaddr= description="Monitoring Traffic" protocol=any srcport=0 dstport=0<br />

:IPSec Rule Definitions<br />

netsh ipsec static add rule name="CIFS/SMB <strong>Server</strong>" policy="Packet Filters - File"<br />

filterlist="CIFS/SMB <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="NetBIOS <strong>Server</strong> Rule" policy="Packet Filters - File"<br />

filterlist="NetBIOS <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="Terminal <strong>Server</strong> Rule" policy="Packet Filters - File"<br />

filterlist="Terminal <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="Domain Member Rule" policy="Packet Filters - File"<br />

filterlist="Domain Member" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="Block Domain Access Rule" policy="Packet Filters -<br />

File" filterlist="Block Domain Access" kerberos=yes filteraction=Block<br />

REM netsh ipsec static add rule name="Monitoring Rule" policy="Packet Filters - File"<br />

filterlist="Monitoring" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="ALL Inbound Traffic Rule" policy="Packet Filters -<br />

File" filterlist<br />

5.4 Workgroup File <strong>Server</strong> Policy<br />

The workgroup file server allows authenticated users access to shared files on a system. These<br />

shared files can use file protection to control access. Users who access the file server can<br />

authenticate with user-based credentials. Once authenticated, access is granted based on user<br />

policy.<br />

5.4.1 Variance from Microsoft Guidance<br />

Differences are a result of the CSE and Microsoft <strong>Baseline</strong> configuration variance.<br />

5.4.2 [Registry Values]<br />

machine\system\currentcontrolset\control\lsa\lmcompatibilitylevel=4,4<br />

5.4.3 [Service General Setting]<br />

"lanmanworkstation", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lanmanserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

124 March 2004 Role Based <strong>Server</strong> Policies


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

5.4.4 Workgroup File <strong>Server</strong> IPSec Policy<br />

The following file has been modified from the one supplied as part of the Microsoft <strong>Windows</strong><br />

<strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guideline. The procedure outlined in 5.1 Role Based IPSec Policies is used<br />

to apply the policy.<br />

REM (c) Microsoft Corporation 1997-<strong>2003</strong><br />

REM Packet Filters for <strong>Server</strong> Hardening<br />

REM<br />

REM Name: PacketFilter-File.CMD<br />

REM Version: 1.0<br />

REM This CMD file provides the proper NETSH syntax for creating an IPSec Policy<br />

REM that blocks all network traffic to a File <strong>Server</strong> except for what is<br />

REM explicitly allowed as described in the <strong>Windows</strong> <strong>2003</strong> <strong>Server</strong> Solution Guide.<br />

REM Please read the entire guide before using this CMD file.<br />

REM Revision History<br />

REM 0000 - Original February 05, <strong>2003</strong><br />

REM 0000 - Original April 03, <strong>2003</strong><br />

:IPSec Policy Definition<br />

netsh ipsec static add policy name="Packet Filters - File" description="<strong>Server</strong><br />

Hardening Policy" assign=no<br />

:IPSec Filter List Definitions<br />

netsh ipsec static add filterlist name="CIFS/SMB <strong>Server</strong>" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="NetBIOS <strong>Server</strong>" description="<strong>Server</strong> Hardening"<br />

netsh ipsec static add filterlist name="Terminal <strong>Server</strong>" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="ALL Inbound Traffic" description="<strong>Server</strong><br />

Hardening"<br />

:IPSec Filter Action Definitions<br />

netsh ipsec static add filteraction name=SecPermit description="Allows Traffic to<br />

Pass" action=permit<br />

Role Based <strong>Server</strong> Policies March 2004 125


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

netsh ipsec static add filteraction name=Block description="Blocks Traffic"<br />

action=block<br />

:IPSec Filter Definitions<br />

netsh ipsec static add filter filterlist="CIFS/SMB <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="CIFS/SMB <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=445<br />

netsh ipsec static add filter filterlist="CIFS/SMB <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="CIFS/SMB <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=445<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=137<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=137<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=138<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=139<br />

netsh ipsec static add filter filterlist="Terminal <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="Terminal <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=3389<br />

netsh ipsec static add filter filterlist="ALL Inbound Traffic" srcaddr=any dstaddr=me<br />

description="ALL Inbound Traffic" protocol=any srcport=0 dstport=0<br />

:IPSec Rule Definitions<br />

netsh ipsec static add rule name="CIFS/SMB <strong>Server</strong>" policy="Packet Filters - File"<br />

filterlist="CIFS/SMB <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="NetBIOS <strong>Server</strong> Rule" policy="Packet Filters - File"<br />

filterlist="NetBIOS <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="Terminal <strong>Server</strong> Rule" policy="Packet Filters - File"<br />

filterlist="Terminal <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="ALL Inbound Traffic Rule" policy="Packet Filters -<br />

File" filterlist="ALL Inbound Traffic" kerberos=yes filteraction=Block<br />

5.5 Workgroup Print <strong>Server</strong> Policy<br />

The workgroup print server allows authenticated users to access shared printers on the system.<br />

Access to these shared printers can be controlled. Users who attempt to access print servers can<br />

authenticate with user-based credentials. Once authenticated, appropriate access is granted.<br />

5.5.1 Variance from Microsoft Guidance<br />

Differences are a result of the CSE and Microsoft <strong>Baseline</strong> configuration variance.<br />

126 March 2004 Role Based <strong>Server</strong> Policies


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

5.5.2 [Registry Values]<br />

machine\system\currentcontrolset\control\lsa\lmcompatibilitylevel=4,4<br />

machine\system\currentcontrolset\control\print\providers\lanman print<br />

services\servers\addprinterdrivers=4,0<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedpaths\machine=7,Sof<br />

tware\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\Print,System\CurrentControlSet\Control\Print\Printers<br />

5.5.3 [Service General Setting]<br />

"lanmanworkstation", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lanmanserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"spooler", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

5.5.4 Workgroup Print <strong>Server</strong> IPSec Policy<br />

The following file has been modified from the Microsoft <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Security</strong><br />

Guideline. The CSE IPSec policy does not reference Domain Controllers. Run the file as a<br />

command to load the policy. The procedure outlined in 5.1 Role Based IPSec Policies is used to<br />

apply the policy.<br />

REM (c) Microsoft Corporation 1997-<strong>2003</strong><br />

REM Packet Filters for <strong>Server</strong> Hardening<br />

REM<br />

REM Name: PacketFilter-Print.CMD<br />

REM Version: 1.0<br />

REM This CMD file provides the proper NETSH syntax for creating an IPSec Policy<br />

REM that blocks all network traffic to a Print <strong>Server</strong> except for what is<br />

REM explicitly allowed as described in the <strong>Windows</strong> <strong>2003</strong> <strong>Server</strong> Solution Guide.<br />

REM Please read the entire guide before using this CMD file.<br />

Role Based <strong>Server</strong> Policies March 2004 127


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

REM Revision History<br />

REM 0000 - Original February 05, <strong>2003</strong><br />

REM 0000 - Original April 03, <strong>2003</strong><br />

:IPSec Policy Definition<br />

netsh ipsec static add policy name="Packet Filters - Print" description="<strong>Server</strong><br />

Hardening Policy" assign=no<br />

:IPSec Filter List Definitions<br />

netsh ipsec static add filterlist name="CIFS/SMB <strong>Server</strong>" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="NetBIOS <strong>Server</strong>" description="<strong>Server</strong> Hardening"<br />

netsh ipsec static add filterlist name="Terminal <strong>Server</strong>" description="<strong>Server</strong><br />

Hardening"<br />

netsh ipsec static add filterlist name="ALL Inbound Traffic" description="<strong>Server</strong><br />

Hardening"<br />

:IPSec Filter Action Definitions<br />

netsh ipsec static add filteraction name=SecPermit description="Allows Traffic to<br />

Pass" action=permit<br />

netsh ipsec static add filteraction name=Block description="Blocks Traffic"<br />

action=block<br />

:IPSec Filter Definitions<br />

netsh ipsec static add filter filterlist="CIFS/SMB <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="CIFS/SMB <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=445<br />

netsh ipsec static add filter filterlist="CIFS/SMB <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="CIFS/SMB <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=445<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=137<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=137<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=UDP srcport=0 dstport=138<br />

netsh ipsec static add filter filterlist="NetBIOS <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="NetBIOS <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=139<br />

netsh ipsec static add filter filterlist="Terminal <strong>Server</strong>" srcaddr=any dstaddr=me<br />

description="Terminal <strong>Server</strong> Traffic" protocol=TCP srcport=0 dstport=3389<br />

netsh ipsec static add filter filterlist="ALL Inbound Traffic" srcaddr=any dstaddr=me<br />

description="ALL Inbound Traffic" protocol=any srcport=0 dstport=0<br />

128 March 2004 Role Based <strong>Server</strong> Policies


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

:IPSec Rule Definitions<br />

netsh ipsec static add rule name="CIFS/SMB <strong>Server</strong>" policy="Packet Filters - Print"<br />

filterlist="CIFS/SMB <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="NetBIOS <strong>Server</strong> Rule" policy="Packet Filters - Print"<br />

filterlist="NetBIOS <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="Terminal <strong>Server</strong> Rule" policy="Packet Filters -<br />

Print" filterlist="Terminal <strong>Server</strong>" kerberos=yes filteraction=SecPermit<br />

netsh ipsec static add rule name="ALL Inbound Traffic Rule" policy="Packet Filters -<br />

Print" filterlist="ALL Inbound Traffic" kerberos=yes filteraction=Block<br />

Role Based <strong>Server</strong> Policies March 2004 129


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

This page intentionally left blank.<br />

130 March 2004 Role Based <strong>Server</strong> Policies


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

6 <strong>Server</strong> Policy Compliance: Inspection and Enforcement<br />

The manual approach for policy compliance is a feature of the Microsoft Operating System. This<br />

approach uses Microsoft Management Console (MMC) with the ‘<strong>Security</strong> Configuration and<br />

Analysis’ snap-in. This process applies to both the Domain and Workgroup environments.<br />

Appropriate configurations for the target server are required. Policies are loaded in MMC, the<br />

system is analyzed, and the results are presented on screen. If permissions do not match policy<br />

settings, items are identified with a red ‘x’ or the term ‘Investigate’.<br />

6.1 Configuration of Microsoft Management Console (MMC)<br />

The following steps perform compliance inspection with MMC.<br />

a. Open a ‘Command Prompt’ window.<br />

b. At the command prompt, type ‘mmc’.<br />

i. The ‘Console1’ GUI opens.<br />

c. Select File =>Add/Remove Snap-in.<br />

i. ‘Add/Remove Snap-in’ window appears.<br />

d. Click on ‘Add’ button.<br />

i. ‘Add Stand-alone Snap-in’ window opens.<br />

e. Scroll down to, and select ‘<strong>Security</strong> Configuration and Analysis’.<br />

f. Click ‘Add’ button.<br />

g. Click ‘Close’ button.<br />

i. Control is returned to the ‘Add/Remove Snap-in’ window.<br />

h. Click ‘OK’ button.<br />

6.2 Load Policy File and Computer Configuration<br />

Effective policy files for a system under inspection must be available. They consist of a <strong>Baseline</strong><br />

configuration file and a role specific policy file. For a domain-based print server, “CSE High<br />

<strong>Security</strong> – Member <strong>Server</strong> <strong>Baseline</strong>.inf” and “CSE High <strong>Security</strong> – Member File <strong>Server</strong>.inf “ are<br />

used. Based on your Active Directory and policy files within your structure, additional files may<br />

be required.<br />

To load a policy file:<br />

a. Ensure the ‘Console1’ window is active.<br />

b. Right click on ‘<strong>Security</strong> Configuration and Analysis’.<br />

c. Select ‘Open Database’.<br />

i. The ‘Open Database’ window opens.<br />

d. Enter a name for the database (e.g. systemname-date).<br />

Compliance Inspection and Enforcement March 2004 131


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

e. Click ‘Open’ button.<br />

i. ‘Import Template’ window opens.<br />

f. Browse to the location of the <strong>Baseline</strong> configuration file and select it.<br />

g. Select ‘Clean this database before importing’.<br />

h. Click ‘Open’ button.<br />

i. Right click on ‘<strong>Security</strong> Configuration and Analysis’.<br />

j. Click ‘Import Template’.<br />

i. ‘Import Template’ window opens.<br />

k. Browse to the location of the role based policy file and select it.<br />

l. Click ‘Open’ button.<br />

m. Right click ‘<strong>Security</strong> Configuration and Analysis’.<br />

n. Select ‘Analyze Computer Now’.<br />

i. ‘Perform Analysis’ window opens.<br />

o. Click ‘OK’ to accept the log file location and perform analysis.<br />

6.3 Compare Resultant Policy and Computer Settings<br />

a. Click on the ‘+’ to expand ‘<strong>Security</strong> Configuration and Analysis’.<br />

b. Click on the ‘+’ to expand ‘Account Policies’.<br />

c. Click on ‘Password Policies’ (right side frame shows settings).<br />

NOTE: If any item in the database does not match the computer setting, a small<br />

red ‘x’ in the ‘Policy’ column appears.<br />

d. Repeat the process for all sub-groups in ‘Account Policies’, ‘Local Policies’, and<br />

‘Event Logs’.<br />

e. Click on ‘System Services’ (right frame shows service settings).<br />

NOTE: If any item in the database does not match the computer setting, a small<br />

red ‘x’ in the ‘System Service’ column appears. Additionally, if the security<br />

setting does not match, the ‘Permission’ column will display ‘Investigate’.<br />

f. To reset the configuration, simply reapply the policy. A domain server can be<br />

rebooted to force application of the policy.<br />

g. Policy configuration for a workgroup server must be reapplied manually. Please<br />

follow the procedure outlined in 5.1 Role Based IPSec Policies.<br />

132 March 2004 Compliance Inspection and Enforcement


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

Bibliography<br />

Author: Ben Smith and Brian Komer (with the Microsoft <strong>Security</strong> Team)<br />

Title: Microsoft <strong>Windows</strong> <strong>Security</strong> Resource Kit<br />

Editor: Julie Miller<br />

Edition: 1 st<br />

Publication Data:<br />

Publisher: Microsoft Press<br />

Place: One Microsoft Way<br />

Redmond, Washington 98052-6399<br />

Author: Kurt Dillard, Jose Maldonado and Brad Warrender<br />

Title: Microsoft Solutions for <strong>Security</strong>: <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide<br />

Editor: Ried Bannecker, Wendy Cleary, John Cobb, Kelly McMahon and Jon Tobey<br />

Edition: 1 st<br />

Publication Data:<br />

Publisher: Microsoft Corporation<br />

Place: One Microsoft Way<br />

Redmond, Washington 98052-6399<br />

Author: Kurt Dillard<br />

Title: Microsoft Solutions for <strong>Security</strong>: Threats and Countermeasures: <strong>Security</strong> Settings<br />

in <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> and <strong>Windows</strong> XP<br />

Editor: Ried Bannecker, John Cobb and Jon Tobey<br />

Edition: 1 st<br />

Publication Data:<br />

Publisher: Microsoft Corporation<br />

Place: One Microsoft Way<br />

Redmond, Washington 98052-6399<br />

Author: Microsoft Press<br />

Title: Microsoft <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> Automating and Customizing Installations<br />

Editor: Maureen Willams Zimmerman<br />

Edition: 1 st<br />

Publication Data:<br />

Publisher: Microsoft Corporation<br />

Place: One Microsoft Way<br />

Redmond, Washington 98052-6399<br />

Compliance Inspection and Enforcement March 2004 133


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

This page intentionally left blank.<br />

134 March 2004 Compliance Inspection and Enforcement


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

Annex A<br />

The Annex contains ‘raw’ files previously referenced in this document. Modify the contents with<br />

a text editor to manually create installation or policy files. Feel free to cut and paste as needed.<br />

A.1 Automated Domain Installation File<br />

;<br />

; Installation configuration file for Member <strong>Server</strong> of Domain<br />

;<br />

; To be used with the CSE Member <strong>Server</strong> <strong>Baseline</strong> configuration to install<br />

; and configure a secure Domain <strong>Server</strong><br />

;<br />

;<br />

[Data]<br />

AutoPartition=1<br />

MsDosInitiated=0<br />

UnattendedInstall=Yes<br />

[GuiUnattended]<br />

AdminPassword="A_Strong_Password"<br />

OemSkipWelcome=1<br />

OEMSkipRegional=1<br />

TimeZone=035<br />

AutoLogon=No<br />

[Identification]<br />

DomainAdmin=administrator<br />

DomainAdminPassword="A_Strong_Password"<br />

JoinDomain="cse-lab.local"<br />

MachineObjectOU="OU=File <strong>Server</strong>s, OU=Public <strong>Server</strong>s, DC=cse-lab, DC=local"<br />

Bibliography January <strong>2003</strong> 135


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

[LicenseFilePrintData]<br />

AutoMode=Per<strong>Server</strong><br />

AutoUsers=5<br />

[Unattended]<br />

OemPreinstall=No<br />

UattendedSwitch=Yes<br />

Repartition=No<br />

TargetPath=<strong>Windows</strong><br />

UnattendedMode=FullUnattended<br />

WaitForReboot=No<br />

OemSkipEula=Yes<br />

FileSystem=ConvertNTFS<br />

[UserData]<br />

ComputerName=D<strong>Server</strong>1<br />

FullName="SEBT"<br />

OrgName="CSE-CST"<br />

ProductKey="xxxx-xxxx-xxxx-xxxx-xxxx"<br />

[params.MS_TCPIP.Adapter01]<br />

SpecificTo=Adapter01<br />

DisableDynamicUpdate=No<br />

EnabelAdapterDomainNameregistration=No<br />

DefaultGateway=192.163.0.1<br />

DHCP=Yes<br />

DNSDomain=cse-lab.local<br />

NetBIOSOptions=1<br />

Subnetmask=255.255.255.0<br />

136 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

[NetOptionalComponents]<br />

DHCP<strong>Server</strong>=0<br />

DNS=0<br />

IAS=0<br />

ILS=0<br />

LDPSVC=0<br />

MacPrint=0<br />

MacSrv=0<br />

Netcm=0<br />

NetMonTools=0<br />

SimpTcp=0<br />

SNMP=0<br />

WINS=0<br />

[Compoents]<br />

AccessOpt=On<br />

appsrv_console=Off<br />

aspnet=Off<br />

AutoUpdate=Off<br />

Bits<strong>Server</strong>ExtensionsISAPI=Off<br />

Bits<strong>Server</strong>ExtensionManager=Off<br />

Calc=On<br />

certsrv=On<br />

certsrv_client=Off<br />

certsrv_server=Off<br />

charmap=On<br />

chat=Off<br />

Clipbook=Off<br />

cluster=Off<br />

complusnetwork=On<br />

deskpaper=Off<br />

Bibliography January <strong>2003</strong> 137


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

dialer=Off<br />

fax=Off<br />

fp_extensions=Off<br />

fp_vdir_deploy=Off<br />

freecell=Off<br />

hearts=Off<br />

hypertrm=Off<br />

IEAccess=Off<br />

iis_asp=Off<br />

iis_common=Off<br />

iis_ftp=Off<br />

iis_inetmgr=Off<br />

iis_internetdataconnector=Off<br />

iis_nntp=Off<br />

iis_serversidesincludes=Off<br />

iis_smpt=Off<br />

iis_webadmin=Off<br />

iis_webdav=Off<br />

iis_www=Off<br />

iis_www_vdir_scripts=Off<br />

indexsrv_system=Off<br />

inetprint=Off<br />

licenseserver=Off<br />

media_clips=Off<br />

media_utopia=Off<br />

minesweeper=Off<br />

mousepoint=On<br />

msmq_ADIntegrated=Off<br />

msmq_Core=Off<br />

msmq_HTTPSupport=Off<br />

msmq_LocalStorage=Off<br />

138 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

msmq_MQDSSService=Off<br />

msmq_RoutingSupport=Off<br />

msmq_TriggerService=Off<br />

msnexplr=Off<br />

mswordpad=On<br />

netcis=Off<br />

netoc=Off<br />

objectpkg=Off<br />

OEAccess=Off<br />

paint=Off<br />

pinball=Off<br />

Pop3Admin=Off<br />

Pop3Service=Off<br />

Pop3Srv=Off<br />

rec=Off<br />

reminst=Off<br />

rootautoupdate=Off<br />

rstorage=Off<br />

solitaire=Off<br />

spider=Off<br />

templates=Off<br />

Terminal<strong>Server</strong>=Off<br />

TSWebClient=Off<br />

vol=Off<br />

WBEMSNMP=Off<br />

WMAccess=Off<br />

WMPOCM=Off<br />

wms=Off<br />

wms_admin_asp=Off<br />

wms_admin_mmc=Off<br />

wms_isapi=Off<br />

Bibliography January <strong>2003</strong> 139


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

wms_server=Off<br />

zonegames=Off<br />

A.2 Automated Workgroup Installation File<br />

;<br />

; Installation configuration file for Member <strong>Server</strong> of Domain<br />

;<br />

; To be used with the CSE Member <strong>Server</strong> <strong>Baseline</strong> configuration to install<br />

; and configure a secure Domain <strong>Server</strong><br />

;<br />

;<br />

[Data]<br />

AutoPartition=1<br />

MsDosInitiated=0<br />

UnattendedInstall=Yes<br />

[GuiUnattended]<br />

AdminPassword="A_Strong_Password"<br />

OemSkipWelcome=1<br />

OEMSkipRegional=1<br />

TimeZone=35<br />

AutoLogon=No<br />

[Identification]<br />

JoinWorkgroup=cse-lab<br />

[LicenseFilePrintData]<br />

AutoMode=Per<strong>Server</strong><br />

AutoUsers=5<br />

140 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

[Unattended]<br />

OemPreinstall=No<br />

UattendedSwitch=Yes<br />

Repartition=No<br />

TargetPath=WINDOWS<br />

UnattendMode=FullUnattended<br />

WaitForReboot=No<br />

OemSkipEula=Yes<br />

FileSystem=ConvertNTFS<br />

[UserData]<br />

ComputerName=B<strong>Server</strong>1<br />

FullName="sebt"<br />

OrgName="cse-cst"<br />

ProductKey=xxxx-xxxx-xxx-xxxx-xxxx<br />

[Networking]<br />

InstallDefaultComponents=No<br />

[NetAdapters]<br />

Adapter1=params.Adapter1<br />

[params.Adapter1]<br />

INFID=*<br />

[NetClients]<br />

MS_MSClient=params.MS_MSClient<br />

Bibliography January <strong>2003</strong> 141


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

[NetServices]<br />

MS_SERVER=params.MS_SERVER<br />

[NetProtocols]<br />

MS_TCPIP=params.MS_TCPIP<br />

[params.MS_TCPIP]<br />

DNS=No<br />

UseDomainNameDevolution=No<br />

EnableLMHosts=Yes<br />

AdapterSections=params.MS_TCPIP.Adapter1<br />

[params.MS_TCPIP.Adapter1]<br />

SpecificTo=Adapter1<br />

DHCP=No<br />

IPAddress=192.168.0.5<br />

SubnetMask=255.255.255.0<br />

DefaultGateway=192.168.0.1<br />

WINS=No<br />

NetBIOSOptions=0<br />

[NetOptionalComponents]<br />

DHCP<strong>Server</strong>=0<br />

DNS=0<br />

IAS=0<br />

ILS=No<br />

LPDSVC=0<br />

MacPrint=0<br />

MacSrv=0<br />

Netcm=0<br />

NetMonTools=0<br />

142 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

SimpTcp=0<br />

SNMP=0<br />

WINS=0<br />

[Compoents]<br />

AccessOpt=On<br />

appsrv_console=Off<br />

aspnet=Off<br />

AutoUpdate=Off<br />

Bits<strong>Server</strong>ExtensionsISAPI=Off<br />

Bits<strong>Server</strong>ExtensionManager=Off<br />

Calc=On<br />

certsrv=On<br />

certsrv_client=Off<br />

certsrv_server=Off<br />

charmap=On<br />

chat=Off<br />

Clipbook=Off<br />

cluster=Off<br />

complusnetwork=On<br />

deskpaper=Off<br />

dialer=Off<br />

dtcnetwork=Off<br />

fax=Off<br />

fp_extensions=Off<br />

fp_vdir_deploy=Off<br />

freecell=Off<br />

hearts=Off<br />

hypertrm=Off<br />

IEAccess=Off<br />

iis_asp=Off<br />

Bibliography January <strong>2003</strong> 143


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

iis_common=Off<br />

iis_ftp=Off<br />

iis_inetmgr=Off<br />

iis_internetdataconnector=Off<br />

iis_nntp=Off<br />

iis_serversidesincludes=Off<br />

iis_smpt=Off<br />

iis_webadmin=Off<br />

iis_webdav=Off<br />

iis_www=Off<br />

iis_www_vdir_scripts=Off<br />

indexsrv_system=Off<br />

inetprint=Off<br />

licenseserver=Off<br />

media_clips=Off<br />

media_utopia=Off<br />

minesweeper=Off<br />

mousepoint=On<br />

msmq_ADIntegrated=Off<br />

msmq_Core=Off<br />

msmq_HTTPSupport=Off<br />

msmq_LocalStorage=Off<br />

msmq_MQDSSService=Off<br />

msmq_RoutingSupport=Off<br />

msmq_TriggerService=Off<br />

msnexplr=Off<br />

mswordpad=On<br />

netcis=Off<br />

netoc=Off<br />

objectpkg=Off<br />

OEAccess=Off<br />

144 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

paint=Off<br />

pinball=Off<br />

Pop3Admin=Off<br />

Pop3Service=Off<br />

Pop3Srv=Off<br />

rec=Off<br />

reminst=Off<br />

rootautoupdate=Off<br />

rstorage=Off<br />

solitaire=Off<br />

spider=Off<br />

templates=Off<br />

Terminal<strong>Server</strong>=Off<br />

TSWebClient=Off<br />

vol=Off<br />

WBEMSNMP=Off<br />

WMAccess=Off<br />

WMPOCM=Off<br />

wms=Off<br />

wms_admin_asp=Off<br />

wms_admin_mmc=Off<br />

wms_isapi=Off<br />

wms_server=Off<br />

zonegames=Off<br />

A.3 CSE High <strong>Security</strong> – Member <strong>Server</strong> <strong>Baseline</strong>.inf<br />

[Unicode]<br />

Unicode=yes<br />

[Version]<br />

signature="$CHICAGO$"<br />

Bibliography January <strong>2003</strong> 145


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

Revision=1<br />

[Profile Description]<br />

Description=<strong>Baseline</strong> template for all Member <strong>Server</strong>s in an environment with high security<br />

requirements.<br />

[System Access]<br />

MinimumPasswordAge = 2<br />

MaximumPasswordAge = 42<br />

MinimumPasswordLength = 8<br />

PasswordComplexity = 1<br />

PasswordHistorySize = 24<br />

LockoutBadCount = 10<br />

ResetLockoutCount = 15<br />

LockoutDuration = 15<br />

ForceLogoffWhenHourExpire = 1<br />

NewAdministratorName = "johnsmith"<br />

NewGuestName = "janesmith"<br />

ClearTextPassword = 0<br />

LSAAnonymousNameLookup = 0<br />

EnableAdminAccount = 0<br />

EnableGuestAccount = 0<br />

[System Log]<br />

MaximumLogSize = 16384<br />

AuditLogRetentionPeriod = 2<br />

RestrictGuestAccess = 1<br />

[<strong>Security</strong> Log]<br />

MaximumLogSize = 81920<br />

AuditLogRetentionPeriod = 2<br />

RestrictGuestAccess = 1<br />

[Application Log]<br />

MaximumLogSize = 16384<br />

AuditLogRetentionPeriod = 2<br />

146 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

RestrictGuestAccess = 1<br />

[Event Audit]<br />

AuditSystemEvents = 3<br />

AuditLogonEvents = 3<br />

AuditObjectAccess = 2<br />

AuditPrivilegeUse = 3<br />

AuditPolicyChange = 3<br />

AuditAccountManage = 3<br />

AuditProcessTracking = 0<br />

AuditDSAccess = 3<br />

AuditAccountLogon = 3<br />

[Registry Values]<br />

machine\system\software\microsoft\windows<br />

nt\currentversion\winlogon\screensavergraceperiod=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxportsexhausted=4,5<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxdataretransmissions=4,3<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxconnectresponseretransmissi<br />

ons=4,2<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxhalfopen=4, 100<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxhalfopenretired=4, 80<br />

machine\system\currentcontrolset\services\tcpip\parameters\nonamereleaseondemand=4, 1<br />

machine\system\currentcontrolset\services\tcpip\parameters\synattackprotect=4,1<br />

machine\system\currentcontrolset\services\tcpip\parameters\performrouterdiscovery=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\keepalivetime=4,300000<br />

machine\system\currentcontrolset\services\tcpip\parameters\enablepmtudiscovery=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\enableicmpredirect=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\enabledeadgwdetect=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\disableipsourcerouting=4,2<br />

machine\system\currentcontrolset\services\ntds\parameters\ldapserverintegrity=4,2<br />

machine\system\currentcontrolset\services\netlogon\parameters\signsecurechannel=4,1<br />

machine\system\currentcontrolset\services\netlogon\parameters\sealsecurechannel=4,1<br />

machine\system\currentcontrolset\services\netlogon\parameters\requirestrongkey=4,1<br />

Bibliography January <strong>2003</strong> 147


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

machine\system\currentcontrolset\services\netlogon\parameters\requiresignorseal=4,1<br />

machine\system\currentcontrolset\services\netlogon\parameters\refusepasswordchange=4,0<br />

machine\system\currentcontrolset\services\netlogon\parameters\maximumpasswordage=4,30<br />

machine\system\currentcontrolset\services\netlogon\parameters\disablepasswordchange=4,0<br />

machine\system\currentcontrolset\services\netbt\parameters\nonamereleaseondemand=4,1<br />

machine\system\currentcontrolset\services\ldap\ldapclientintegrity=4,1<br />

machine\system\currentcontrolset\services\lanmanworkstation\parameters\requiresecuritysignatu<br />

re=4,1<br />

machine\system\currentcontrolset\services\lanmanworkstation\parameters\enablesecuritysignatur<br />

e=4,1<br />

machine\system\currentcontrolset\services\lanmanworkstation\parameters\enableplaintextpasswo<br />

rd=4,0<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\restrictnullsessaccess=4,1<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\requiresecuritysignature=4,<br />

1<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionshares=7,<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionpipes=7,<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\enablesecuritysignature=4,1<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\enableforcedlogoff=4,1<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\autodisconnect=4,15<br />

machine\system\currentcontrolset\services\eventlog\security\warninglevel=4,90<br />

machine\system\currentcontrolset\services\afd\parameters\minimumdynamicbacklog=4,20<br />

machine\system\currentcontrolset\services\afd\parameters\maximumdynamicbacklog=4,20000<br />

machine\system\currentcontrolset\services\afd\parameters\enabledynamicbacklog=4,1<br />

machine\system\currentcontrolset\services\afd\parameters\dynamicbackloggrowthdelta=4,10<br />

machine\system\currentcontrolset\control\session manager\subsystems\optional=7,<br />

machine\system\currentcontrolset\control\session manager\safedllsearchmode=4,1<br />

machine\system\currentcontrolset\control\session manager\protectionmode=4,1<br />

machine\system\currentcontrolset\control\session manager\memory<br />

management\clearpagefileatshutdown=4,1<br />

machine\system\currentcontrolset\control\session manager\kernel\obcaseinsensitive=4,1<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedpaths\machine=7,<br />

148 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedexactpaths\machine=<br />

7,<br />

machine\system\currentcontrolset\control\print\providers\lanman print<br />

services\servers\addprinterdrivers=4,1<br />

machine\system\currentcontrolset\control\lsa\submitcontrol=4,0<br />

machine\system\currentcontrolset\control\lsa\restrictanonymoussam=4,1<br />

machine\system\currentcontrolset\control\lsa\restrictanonymous=4,1<br />

machine\system\currentcontrolset\control\lsa\nolmhash=4,1<br />

machine\system\currentcontrolset\control\lsa\nodefaultadminowner=4,1<br />

machine\system\currentcontrolset\control\lsa\msv1_0\ntlmminserversec=4,537395248<br />

machine\system\currentcontrolset\control\lsa\msv1_0\ntlmminclientsec=4,537395248<br />

machine\system\currentcontrolset\control\lsa\lmcompatibilitylevel=4,5<br />

machine\system\currentcontrolset\control\lsa\limitblankpassworduse=4,1<br />

machine\system\currentcontrolset\control\lsa\fullprivilegeauditing=3,0<br />

machine\system\currentcontrolset\control\lsa\forceguest=4,0<br />

machine\system\currentcontrolset\control\lsa\fipsalgorithmpolicy=4,1<br />

machine\system\currentcontrolset\control\lsa\everyoneincludesanonymous=4,0<br />

machine\system\currentcontrolset\control\lsa\disabledomaincreds=4,1<br />

machine\system\currentcontrolset\control\lsa\crashonauditfail=4,1<br />

machine\system\currentcontrolset\control\lsa\auditbaseobjects=4,0<br />

machine\system\currentcontrolset\control\filesystem\ntfsdisable8dot3namecreation=4,1<br />

machine\software\policies\microsoft\windows\safer\codeidentifiers\authenticodeenabled=4,0<br />

machine\software\policies\microsoft\cryptography\forcekeyprotection=4,2<br />

machine\software\microsoft\windows\currentversion\policies\system\undockwithoutlogon=4,0<br />

machine\software\microsoft\windows\currentversion\policies\system\shutdownwithoutlogon=4,0<br />

machine\software\microsoft\windows\currentversion\policies\system\scforceoption=4,0<br />

machine\software\microsoft\windows\currentversion\policies\system\legalnoticetext=7,This<br />

system is restricted to authorized users. Individuals attempting unauthorized access will be<br />

prosecuted. If unauthorized, terminate access now! Clicking on OK indicates your acceptance of<br />

the information in the background.<br />

machine\software\microsoft\windows\currentversion\policies\system\legalnoticecaption=1,"IT<br />

IS AN OFFENSE TO CONTINUE WITHOUT PROPER AUTHORIZATION."<br />

Bibliography January <strong>2003</strong> 149


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

machine\software\microsoft\windows\currentversion\policies\system\dontdisplaylastusername=4<br />

,1<br />

machine\software\microsoft\windows\currentversion\policies\system\disablecad=4,0<br />

machine\software\microsoft\windows\currentversion\policies\explorer\nodrivetypeautorun=4,25<br />

5<br />

machine\system\currentcontrolset\control\services\CDRom\AutoRun=4, 1<br />

machine\software\microsoft\windows nt\currentversion\winlogon\scremoveoption=1,"1"<br />

machine\software\microsoft\windows nt\currentversion\winlogon\passwordexpirywarning=4,14<br />

machine\software\microsoft\windows nt\currentversion\winlogon\forceunlocklogon=4,1<br />

machine\software\microsoft\windows nt\currentversion\winlogon\cachedlogonscount=1,"0"<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatefloppies=1,"1"<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatedasd=1,"0"<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatecdroms=1,"1"<br />

machine\software\microsoft\windows nt\currentversion\setup\recoveryconsole\setcommand=4,0<br />

machine\software\microsoft\windows nt\currentversion\setup\recoveryconsole\securitylevel=4,0<br />

machine\software\microsoft\driver signing\policy=3,1<br />

machine\system\currentcontrolset\control\services\Lanman<strong>Server</strong>\Parameters\AutoShare<strong>Server</strong>=<br />

4, 0<br />

machine\Software\Microsoft\OLE\EnableDCOM=4, 0<br />

[Privilege Rights]<br />

seassignprimarytokenprivilege = *S-1-5-19,*S-1-5-20<br />

seauditprivilege = *S-1-5-19,*S-1-5-20<br />

sebackupprivilege = *S-1-5-32-551,*S-1-5-32-544<br />

sebatchlogonright =<br />

sechangenotifyprivilege = *S-1-5-32-545,*S-1-5-32-551,*S-1-5-11,*S-1-5-32-544<br />

secreateglobalprivilege = *S-1-5-6,*S-1-5-32-544<br />

secreatepagefileprivilege = *S-1-5-32-544<br />

secreatepermanentprivilege =<br />

secreatetokenprivilege =<br />

sedebugprivilege =<br />

sedenybatchlogonright = *S-1-5-32-546,*S-1-5-7<br />

sedenyinteractivelogonright = *S-1-5-32-546,*S-1-5-7<br />

150 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

sedenynetworklogonright = ,*S-1-5-32-546,*S-1-5-7<br />

sedenyremoteinteractivelogonright = *S-1-5-32-546,*S-1-5-7<br />

sedenyservicelogonright = *S-1-5-32-546,*S-1-5-7,*S-1-5-32-544<br />

seenabledelegationprivilege =<br />

seimpersonateprivilege = *S-1-5-19,*S-1-5-20<br />

seincreasebasepriorityprivilege = *S-1-5-32-544<br />

seincreasequotaprivilege = *S-1-5-32-544,*S-1-5-19,*S-1-5-20<br />

seinteractivelogonright = *S-1-5-32-551,*S-1-5-32-544<br />

seloaddriverprivilege = *S-1-5-32-544<br />

selockmemoryprivilege = *S-1-5-32-544<br />

semachineaccountprivilege = *S-1-5-32-544<br />

semanagevolumeprivilege = *S-1-5-32-544<br />

senetworklogonright = *S-1-5-9,*S-1-5-11,*S-1-5-32-544<br />

seprofilesingleprocessprivilege = *S-1-5-32-544<br />

seremoteinteractivelogonright = *S-1-5-32-544<br />

seremoteshutdownprivilege =<br />

serestoreprivilege = *S-1-5-32-544<br />

sesecurityprivilege = *S-1-5-32-544<br />

seservicelogonright = *S-1-5-20,*S-1-5-19<br />

seshutdownprivilege = *S-1-5-32-544<br />

sesyncagentprivilege =<br />

sesystemenvironmentprivilege = *S-1-5-32-544<br />

sesystemprofileprivilege = *S-1-5-32-544<br />

sesystemtimeprivilege = *S-1-5-32-544<br />

setakeownershipprivilege = *S-1-5-32-544<br />

setcbprivilege =<br />

seundockprivilege = *S-1-5-32-544<br />

[Service General Setting]<br />

"6to4", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 151


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"alerter", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"alg", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"appmgmt", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"appmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"appmon", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"aspnet_state", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"audiosrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"binlsvc", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"bits", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"certsvc", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"cisvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

152 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"clipsrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"clussvc", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"comsysapp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"corrtsvc", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"cryptsvc", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"dfs", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"dhcp", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"dhcpserver", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"dmadmin", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"dmserver", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"dns", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 153


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"dnscache", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"elementmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"ersvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"eventlog", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"eventsystem", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"fastuserswitchingcompatibility", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"fax", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"groveler", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"helpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"hidserv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"httpfilter", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

154 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"ias", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"iasjet", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"iisadmin", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"imapiservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)(A;;CCLCSWLOCRRC;;;IU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDR<br />

CWDWO;;;WD)"<br />

"irmon", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"ismserv", 4,<br />

"D:(A;;CCLCSWLOCRRC;;;IU)(A;;GA;;;BA)(A;;GA;;;SY)S:(AU;FA;CCDCLCSWRPWPDT<br />

LOCRSDRCWDWO;;;WD)"<br />

"kdc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lanmanserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lanmanworkstation", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"licenseservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lmhosts", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 155


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"lpdsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"macfile", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"macprint", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"messenger", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mnmsrvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mqds", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mqtgsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"msdtc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"msftpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"msiserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"msmq", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mssql$uddi", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mssql$webdb", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

156 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"mssqlserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mssqlserveradhelper", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"netdde", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"netddedsdm", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"netlogon", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"netman", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"nla", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"nntpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ntfrs", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ntlmssp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ntmssvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"nwcworkstation", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"nwsapagent", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 157


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"plugplay", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"policyagent", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"pop3svc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"protectedstorage", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rasauto", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rasman", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rdsessmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"remote_storage_server", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"remote_storage_user_link", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"remoteaccess", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"remoteregistry", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rpclocator", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rpcss", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

158 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"rsopprov", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sacsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"saldm", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"samss", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"scardsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"schedule", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"seclogon", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sens", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sharedaccess", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"shellhwdetection", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"simptcp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"smtpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"snmp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 159


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"snmptrap", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"spooler", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sptimer", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sqlagent$webdb", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sqlserveragent", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"srvcsurg", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"stisvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"swprv", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sysmonlog", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"tapisrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"termservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"termservlicensing", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"tftpd", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

160 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"themes", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"tlntsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"trksvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"trkwks", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"tssdis", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"uploadmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ups", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"vds", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"vss", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"w32time", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"w3svc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"webclient", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"windowssystemresourcemanager", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 161


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"winhttpautoproxysvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"winmgmt", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wins", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"winsip", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wmdmpmsn", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wmi", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wmiapsrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wmserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wuauserv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wzcsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

A.4 CSE High <strong>Security</strong> – Workgroup <strong>Server</strong> <strong>Baseline</strong>.inf<br />

[Unicode]<br />

Unicode=yes<br />

[Version]<br />

signature="$CHICAGO$"<br />

Revision=1<br />

162 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

[Profile Description]<br />

Description=<strong>Baseline</strong> template for all Workgroup <strong>Server</strong>s in an environment with high security<br />

requirements.<br />

[System Access]<br />

MinimumPasswordAge = 2<br />

MaximumPasswordAge = 42<br />

MinimumPasswordLength = 8<br />

PasswordComplexity = 1<br />

PasswordHistorySize = 24<br />

LockoutBadCount = 10<br />

ResetLockoutCount = 15<br />

LockoutDuration = 15<br />

ForceLogoffWhenHourExpire = 1<br />

NewAdministratorName = "johnsmith"<br />

NewGuestName = "janesmith"<br />

ClearTextPassword = 0<br />

LSAAnonymousNameLookup = 0<br />

EnableAdminAccount = 0<br />

EnableGuestAccount = 0<br />

[System Log]<br />

MaximumLogSize = 16384<br />

AuditLogRetentionPeriod = 2<br />

RestrictGuestAccess = 1<br />

[<strong>Security</strong> Log]<br />

MaximumLogSize = 81920<br />

AuditLogRetentionPeriod = 2<br />

RestrictGuestAccess = 1<br />

[Application Log]<br />

MaximumLogSize = 16384<br />

AuditLogRetentionPeriod = 2<br />

RestrictGuestAccess = 1<br />

Bibliography January <strong>2003</strong> 163


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

[Event Audit]<br />

AuditSystemEvents = 3<br />

AuditLogonEvents = 3<br />

AuditObjectAccess = 2<br />

AuditPrivilegeUse = 3<br />

AuditPolicyChange = 3<br />

AuditAccountManage = 3<br />

AuditProcessTracking = 0<br />

AuditDSAccess = 3<br />

AuditAccountLogon = 3<br />

[Registry Values]<br />

machine\system\software\microsoft\windows<br />

nt\currentversion\winlogon\screensavergraceperiod=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxportsexhausted=4,5<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxdataretransmissions=4,3<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxconnectresponseretransmissi<br />

ons=4,2<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxhalfopen=4, 100<br />

machine\system\currentcontrolset\services\tcpip\parameters\tcpmaxhalfopenretired=4, 80<br />

machine\system\currentcontrolset\services\tcpip\parameters\nonamereleaseondemand=4, 1<br />

machine\system\currentcontrolset\services\tcpip\parameters\synattackprotect=4,1<br />

machine\system\currentcontrolset\services\tcpip\parameters\performrouterdiscovery=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\keepalivetime=4,300000<br />

machine\system\currentcontrolset\services\tcpip\parameters\enablepmtudiscovery=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\enableicmpredirect=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\enabledeadgwdetect=4,0<br />

machine\system\currentcontrolset\services\tcpip\parameters\disableipsourcerouting=4,2<br />

machine\system\currentcontrolset\services\ntds\parameters\ldapserverintegrity=4,2<br />

machine\system\currentcontrolset\services\netlogon\parameters\signsecurechannel=4,1<br />

machine\system\currentcontrolset\services\netlogon\parameters\sealsecurechannel=4,1<br />

machine\system\currentcontrolset\services\netlogon\parameters\requirestrongkey=4,1<br />

machine\system\currentcontrolset\services\netlogon\parameters\requiresignorseal=4,1<br />

164 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

machine\system\currentcontrolset\services\netlogon\parameters\refusepasswordchange=4,0<br />

machine\system\currentcontrolset\services\netlogon\parameters\maximumpasswordage=4,30<br />

machine\system\currentcontrolset\services\netlogon\parameters\disablepasswordchange=4,0<br />

machine\system\currentcontrolset\services\netbt\parameters\nonamereleaseondemand=4,1<br />

machine\system\currentcontrolset\services\ldap\ldapclientintegrity=4,1<br />

machine\system\currentcontrolset\services\lanmanworkstation\parameters\requiresecuritysignatu<br />

re=4,1<br />

machine\system\currentcontrolset\services\lanmanworkstation\parameters\enablesecuritysignatur<br />

e=4,1<br />

machine\system\currentcontrolset\services\lanmanworkstation\parameters\enableplaintextpasswo<br />

rd=4,0<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\restrictnullsessaccess=4,1<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\requiresecuritysignature=4,<br />

1<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionshares=7,<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionpipes=7,<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\enablesecuritysignature=4,1<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\enableforcedlogoff=4,1<br />

machine\system\currentcontrolset\services\lanmanserver\parameters\autodisconnect=4,15<br />

machine\system\currentcontrolset\services\eventlog\security\warninglevel=4,90<br />

machine\system\currentcontrolset\services\afd\parameters\minimumdynamicbacklog=4,20<br />

machine\system\currentcontrolset\services\afd\parameters\maximumdynamicbacklog=4,20000<br />

machine\system\currentcontrolset\services\afd\parameters\enabledynamicbacklog=4,1<br />

machine\system\currentcontrolset\services\afd\parameters\dynamicbackloggrowthdelta=4,10<br />

machine\system\currentcontrolset\control\session manager\subsystems\optional=7,<br />

machine\system\currentcontrolset\control\session manager\safedllsearchmode=4,1<br />

machine\system\currentcontrolset\control\session manager\protectionmode=4,1<br />

machine\system\currentcontrolset\control\session manager\memory<br />

management\clearpagefileatshutdown=4,1<br />

machine\system\currentcontrolset\control\session manager\kernel\obcaseinsensitive=4,1<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedpaths\machine=7,<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedexactpaths\machine=<br />

7,<br />

Bibliography January <strong>2003</strong> 165


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

machine\system\currentcontrolset\control\print\providers\lanman print<br />

services\servers\addprinterdrivers=4,1<br />

machine\system\currentcontrolset\control\lsa\submitcontrol=4,0<br />

machine\system\currentcontrolset\control\lsa\restrictanonymoussam=4,1<br />

machine\system\currentcontrolset\control\lsa\restrictanonymous=4,1<br />

machine\system\currentcontrolset\control\lsa\nolmhash=4,1<br />

machine\system\currentcontrolset\control\lsa\nodefaultadminowner=4,1<br />

machine\system\currentcontrolset\control\lsa\msv1_0\ntlmminserversec=4,537395248<br />

machine\system\currentcontrolset\control\lsa\msv1_0\ntlmminclientsec=4,537395248<br />

machine\system\currentcontrolset\control\lsa\lmcompatibilitylevel=4,5<br />

machine\system\currentcontrolset\control\lsa\limitblankpassworduse=4,1<br />

machine\system\currentcontrolset\control\lsa\fullprivilegeauditing=3,0<br />

machine\system\currentcontrolset\control\lsa\forceguest=4,0<br />

machine\system\currentcontrolset\control\lsa\fipsalgorithmpolicy=4,1<br />

machine\system\currentcontrolset\control\lsa\everyoneincludesanonymous=4,0<br />

machine\system\currentcontrolset\control\lsa\disabledomaincreds=4,1<br />

machine\system\currentcontrolset\control\lsa\crashonauditfail=4,1<br />

machine\system\currentcontrolset\control\lsa\auditbaseobjects=4,0<br />

machine\system\currentcontrolset\control\filesystem\ntfsdisable8dot3namecreation=4,1<br />

machine\software\policies\microsoft\windows\safer\codeidentifiers\authenticodeenabled=4,0<br />

machine\software\policies\microsoft\cryptography\forcekeyprotection=4,2<br />

machine\software\microsoft\windows\currentversion\policies\system\undockwithoutlogon=4,0<br />

machine\software\microsoft\windows\currentversion\policies\system\shutdownwithoutlogon=4,0<br />

machine\software\microsoft\windows\currentversion\policies\system\scforceoption=4,0<br />

machine\software\microsoft\windows\currentversion\policies\system\legalnoticetext=7,This<br />

system is restricted to authorized users. Individuals attempting unauthorized access will be<br />

prosecuted. If unauthorized.<br />

machine\software\microsoft\windows\currentversion\policies\system\legalnoticecaption=1,"IT<br />

IS AN OFFENSE TO CONTINUE WITHOUT PROPER AUTHORIZATION."<br />

machine\software\microsoft\windows\currentversion\policies\system\dontdisplaylastusername=4<br />

,1<br />

machine\software\microsoft\windows\currentversion\policies\system\disablecad=4,0<br />

166 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

machine\software\microsoft\windows\currentversion\policies\explorer\nodrivetypeautorun=4,25<br />

5<br />

machine\system\currentcontrolset\control\services\CDRom\AutoRun=4, 1<br />

machine\software\microsoft\windows nt\currentversion\winlogon\scremoveoption=1,"1"<br />

machine\software\microsoft\windows nt\currentversion\winlogon\passwordexpirywarning=4,14<br />

machine\software\microsoft\windows nt\currentversion\winlogon\forceunlocklogon=4,1<br />

machine\software\microsoft\windows nt\currentversion\winlogon\cachedlogonscount=1,"0"<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatefloppies=1,"1"<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatedasd=1,"0"<br />

machine\software\microsoft\windows nt\currentversion\winlogon\allocatecdroms=1,"1"<br />

machine\software\microsoft\windows nt\currentversion\setup\recoveryconsole\setcommand=4,0<br />

machine\software\microsoft\windows nt\currentversion\setup\recoveryconsole\securitylevel=4,0<br />

machine\software\microsoft\driver signing\policy=3,1<br />

machine\system\currentcontrolset\control\services\Lanman<strong>Server</strong>\Parameters\AutoShare<strong>Server</strong>=<br />

4, 0<br />

machine\Software\Microsoft\OLE\EnableDCOM=4, 0<br />

[Privilege Rights]<br />

seassignprimarytokenprivilege = *S-1-5-19,*S-1-5-20<br />

seauditprivilege = *S-1-5-19,*S-1-5-20<br />

sebackupprivilege = *S-1-5-32-544,*S-1-5-32-551<br />

sebatchlogonright =<br />

sechangenotifyprivilege = *S-1-5-32-544,*S-1-5-32-545,*S-1-5-32-551,*S-1-5-11<br />

secreateglobalprivilege = *S-1-5-32-544,*S-1-5-6<br />

secreatepagefileprivilege = *S-1-5-32-544<br />

secreatepermanentprivilege =<br />

secreatetokenprivilege =<br />

sedebugprivilege =<br />

sedenybatchlogonright = *S-1-5-32-546,*S-1-5-7<br />

sedenyinteractivelogonright = *S-1-5-32-546,*S-1-5-7<br />

sedenynetworklogonright = *S-1-5-7,*S-1-5-32-546<br />

sedenyremoteinteractivelogonright = *S-1-5-32-546,*S-1-5-7<br />

sedenyservicelogonright = *S-1-5-32-546,*S-1-5-7<br />

Bibliography January <strong>2003</strong> 167


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

seenabledelegationprivilege =<br />

seimpersonateprivilege = *S-1-5-19,*S-1-5-20<br />

seincreasebasepriorityprivilege = *S-1-5-32-544<br />

seincreasequotaprivilege = *S-1-5-32-544,*S-1-5-19,*S-1-5-20<br />

seinteractivelogonright = *S-1-5-32-551,*S-1-5-32-544<br />

seloaddriverprivilege = *S-1-5-32-544<br />

selockmemoryprivilege = *S-1-5-32-544<br />

semachineaccountprivilege = *S-1-5-32-544<br />

semanagevolumeprivilege = *S-1-5-32-544<br />

senetworklogonright = *S-1-5-32-544,*S-1-5-11<br />

seprofilesingleprocessprivilege = *S-1-5-32-544<br />

seremoteinteractivelogonright = *S-1-5-32-544<br />

seremoteshutdownprivilege =<br />

serestoreprivilege = *S-1-5-32-544<br />

sesecurityprivilege = *S-1-5-32-544<br />

seservicelogonright = *S-1-5-20,*S-1-5-19<br />

seshutdownprivilege = *S-1-5-32-544<br />

sesyncagentprivilege =<br />

sesystemenvironmentprivilege = *S-1-5-32-544<br />

sesystemprofileprivilege = *S-1-5-32-544<br />

sesystemtimeprivilege = *S-1-5-32-544<br />

setakeownershipprivilege = *S-1-5-32-544<br />

setcbprivilege =<br />

seundockprivilege = *S-1-5-32-544<br />

[Service General Setting]<br />

"6to4", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"alerter", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

168 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"alg", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"appmgmt", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"appmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"appmon", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"aspnet_state", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"audiosrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"binlsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"bits", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"certsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"cisvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"clipsrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"clussvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 169


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"comsysapp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"corrtsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"cryptsvc", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"dfs", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"dhcp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"dhcpserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"dmadmin", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"dmserver", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"dns", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"dnscache", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"elementmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ersvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"eventlog", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

170 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"eventsystem", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"fastuserswitchingcompatibility", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"fax", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"groveler", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"helpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"hidserv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"httpfilter", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ias", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"iasjet", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"iisadmin", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"imapiservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"irmon", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ismserv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 171


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"kdc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lanmanserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lanmanworkstation", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"licenseservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lmhosts", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"lpdsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"macfile", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"macprint", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"messenger", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mnmsrvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mqds", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mqtgsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"msdtc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

172 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"msftpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"msiserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"msmq", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mssql$uddi", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mssql$webdb", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mssqlserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"mssqlserveradhelper", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"netdde", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"netddedsdm", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"netlogon", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"netman", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"nla", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"nntpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 173


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"ntfrs", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ntlmssp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ntmssvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"nwcworkstation", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"nwsapagent", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"plugplay", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"policyagent", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"pop3svc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"protectedstorage", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rasauto", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rasman", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rdsessmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"remote_storage_server", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

174 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"remote_storage_user_link", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"remoteaccess", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"remoteregistry", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rpclocator", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rpcss", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"rsopprov", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sacsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"saldm", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"samss", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"scardsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"schedule", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"seclogon", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sens", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 175


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"sharedaccess", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"shellhwdetection", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"simptcp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"smtpsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"snmp", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"snmptrap", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"spooler", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sptimer", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sqlagent$webdb", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"sqlserveragent", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"srvcsurg", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"stisvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"swprv", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

176 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"sysmonlog", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"tapisrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"termservice", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"termservlicensing", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"tftpd", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"themes", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"tlntsvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"trksvr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"trkwks", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"tssdis", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"uploadmgr", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"ups", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"vds", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 177


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

"vss", 3,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"w32time", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"w3svc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"webclient", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"windowssystemresourcemanager", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"winhttpautoproxysvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"winmgmt", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wins", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"winsip", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wmdmpmsn", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wmi", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wmiapsrv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wmserver", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

178 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

"wuauserv", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"wzcsvc", 4,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

A.5 CSE High <strong>Security</strong> – Member File <strong>Server</strong>.inf<br />

; (c) Microsoft Corporation 1997-<strong>2003</strong><br />

;<br />

; <strong>Security</strong> Configuration Template for <strong>Security</strong> Configuration Editor<br />

;<br />

; Template Name: High <strong>Security</strong> - Bastion Host.inf<br />

; Template Version: 1.0<br />

;<br />

;This <strong>Security</strong> Configuration Template provides settings to support the<br />

;<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> Bastion Host settings for the <strong>Windows</strong><br />

;<strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide. Please read the entire guide before using<br />

;this template.<br />

;<br />

; Release History<br />

; 0001 - Original April 23, <strong>2003</strong><br />

[Unicode]<br />

Unicode=yes<br />

[Version]<br />

signature="$CHICAGO$"<br />

Revision=1<br />

Bibliography January <strong>2003</strong> 179


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

[Service General Setting]<br />

"lanmanserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

A.6 CSE High <strong>Security</strong> – Member Print <strong>Server</strong>.inf<br />

; (c) Microsoft Corporation 1997-<strong>2003</strong><br />

;<br />

; <strong>Security</strong> Configuration Template for <strong>Security</strong> Configuration Editor<br />

;<br />

; Template Name: High <strong>Security</strong> - Print <strong>Server</strong>.inf<br />

; Template Version: 1.0<br />

;<br />

;This <strong>Security</strong> Configuration Template provides settings to support the<br />

;<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> Print <strong>Server</strong> Role settings for the <strong>Windows</strong><br />

;<strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide. Please read the entire guide before using<br />

;this template.<br />

;<br />

; Release History<br />

; 0001 - Original April 23, <strong>2003</strong><br />

[Profile Description]<br />

Incremental Settings for a Print <strong>Server</strong> in an environment with high security requirements.<br />

[Unicode]<br />

Unicode=yes<br />

[Version]<br />

180 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

signature="$CHICAGO$"<br />

Revision=1<br />

[Registry Values]<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedpaths\machine=7,Sof<br />

tware\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\Print,System\CurrentControlSet\Control\Print\Printers<br />

[Service General Setting]<br />

"lanmanserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"spooler", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

A.7 CSE High <strong>Security</strong> – Workgroup File <strong>Server</strong>.inf<br />

; (c) Microsoft Corporation 1997-<strong>2003</strong><br />

;<br />

; <strong>Security</strong> Configuration Template for <strong>Security</strong> Configuration Editor<br />

;<br />

; Template Name: High <strong>Security</strong> - Bastion Host.inf<br />

; Template Version: 1.0<br />

;<br />

;This <strong>Security</strong> Configuration Template provides settings to support the<br />

;<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> Bastion Host settings for the <strong>Windows</strong><br />

;<strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide. Please read the entire guide before using<br />

;this template.<br />

;<br />

; Release History<br />

Bibliography January <strong>2003</strong> 181


Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

; 0001 - Original April 23, <strong>2003</strong><br />

[Unicode]<br />

Unicode=yes<br />

[Version]<br />

signature="$CHICAGO$"<br />

Revision=1<br />

[Registry Values]<br />

machine\system\currentcontrolset\control\lsa\lmcompatibilitylevel=4,4<br />

[Service General Setting]<br />

"lanmanserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

A.8 CSE High <strong>Security</strong> – Workgroup Print <strong>Server</strong>.inf<br />

; (c) Microsoft Corporation 1997-<strong>2003</strong><br />

;<br />

; <strong>Security</strong> Configuration Template for <strong>Security</strong> Configuration Editor<br />

;<br />

; Template Name: High <strong>Security</strong> - Bastion Host.inf<br />

; Template Version: 1.0<br />

;<br />

;This <strong>Security</strong> Configuration Template provides settings to support the<br />

182 March 2004 Bibliography


<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

;<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong> Bastion Host settings for the <strong>Windows</strong><br />

;<strong>Server</strong> <strong>2003</strong> <strong>Security</strong> Guide. Please read the entire guide before using<br />

;this template.<br />

;<br />

; Release History<br />

; 0001 - Original April 23, <strong>2003</strong><br />

[Unicode]<br />

Unicode=yes<br />

[Version]<br />

signature="$CHICAGO$"<br />

Revision=1<br />

[Registry Values]<br />

machine\system\currentcontrolset\control\lsa\lmcompatibilitylevel=4,4<br />

machine\system\currentcontrolset\control\securepipeservers\winreg\allowedpaths\machine=7,Sof<br />

tware\Microsoft\<strong>Windows</strong><br />

NT\CurrentVersion\Print,System\CurrentControlSet\Control\Print\Printers<br />

[Service General Setting]<br />

"lanmanserver", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"browser", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

"spooler", 2,<br />

"D:AR(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCDCLCSWRPWPDTLOCR<br />

SDRCWDWO;;;SY)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)"<br />

Bibliography January <strong>2003</strong> 183

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!