19.06.2014 Views

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

Table of Contents<br />

Foreword......................................................................................................................... i<br />

Disclaimer of Responsibility ....................................................................................... iii<br />

Record of Amendments................................................................................................ v<br />

Executive Summary .................................................................................................... vii<br />

Table of Contents......................................................................................................... ix<br />

List of Tables .............................................................................................................. xiii<br />

List of Figures ............................................................................................................. xv<br />

List of Abbreviations and Acronyms....................................................................... xvii<br />

1 Introduction......................................................................................................... 1<br />

1.1 Background................................................................................................ 1<br />

1.2 Aim............................................................................................................. 1<br />

1.3 Scope......................................................................................................... 1<br />

1.4 Approach ................................................................................................... 2<br />

1.5 Functional and <strong>Security</strong> Testing................................................................. 2<br />

1.6 Assumptions .............................................................................................. 2<br />

1.7 Related documents.................................................................................... 2<br />

1.8 Document Structure................................................................................... 2<br />

1.9 Typographic Conventions .......................................................................... 3<br />

1.10 Reference Documents ............................................................................... 3<br />

2 Overview: Information Technology <strong>Security</strong> Guidance for <strong>Windows</strong> <strong>Server</strong><br />

<strong>2003</strong> ..................................................................................................................... 5<br />

2.1 How to Use This Document ....................................................................... 5<br />

2.1.1 Installation....................................................................................... 5<br />

2.1.2 Configuration................................................................................... 5<br />

2.1.3 Monitoring and Enforcement ........................................................... 6<br />

2.2 Assumptions / Restrictions......................................................................... 6<br />

2.2.1 Installation....................................................................................... 6<br />

2.2.2 Policy .............................................................................................. 6<br />

2.2.3 Policy Monitoring and Enforcement................................................. 6<br />

3 Automated Installation....................................................................................... 7<br />

3.1 Initiating Automated Installation ................................................................. 7<br />

3.2 Domain <strong>Server</strong> Installation Configuration file ............................................. 7<br />

3.2.1 Winnt.sif (Domain)........................................................................... 8<br />

3.3 Workgroup <strong>Server</strong> Installation Configuration file...................................... 24<br />

3.3.1 Winnt.sif (Workgroup) ................................................................... 25<br />

4 <strong>Server</strong> Policy Files............................................................................................ 43<br />

4.1 Policy File Application.............................................................................. 43<br />

4.1.1 Policy Application in a Domain...................................................... 43<br />

4.1.2 Policy Application in a Workgroup................................................. 44<br />

Table of Contents March 2004 ix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!