19.06.2014 Views

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Unclassified ITSG for <strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

4.4.2.14 Debug programs<br />

sedebugprivilege =<br />

The ‘sedebugprivilege’ grants the right to debug any kernal process. Program debugging should<br />

never be done in a production environment. In the event it is required, grant rights for a short<br />

time.<br />

4.4.2.15 Deny access to this computer from the network<br />

sedenynetworklogonright = *S-1-5-32-546, *S-1-5-7<br />

The ‘sedenynetworklogonright’ prevents access for a variety of network protocols. The policy<br />

applies the right to Guests and ANONYMOUS LOGON. The Administrators must add the local<br />

accounts ‘Guest’, ‘Support_388945a0’ and Built-in Administrator account.<br />

NOTE:<br />

Given no reason for network access to the system for a group or user, access should<br />

be denied.<br />

4.4.2.16 Deny log on as a batch job<br />

sedenybatchlogonright = *S-1-5-32-546, *S-1-5-7<br />

The ‘sedenybatchlogonright‘ prevents the ability to create batch jobs. This policy applies rights<br />

to Guests and ANONYMOUS LOGON. The Administrators must add the local accounts ‘Guest’<br />

and ‘Support_388945a0’. The batch facility could be used to schedule jobs that result in a DoS.<br />

NOTE:<br />

Given no reason for batch logon access to the system for a group or user, access<br />

should be denied.<br />

4.4.2.17 Deny log on as a service<br />

sedenyservicelogonright = *S-1-5-32-546,*S-1-5-32-544, *S-1-5-7<br />

The ‘sedenyservicelogonright’ prevents access to a variety of network protocols. This policy<br />

applies the rights to Guests, ANONYMOUS LOGON, and Administrators. Administrators must<br />

add the local accounts ‘Guest’, ‘Support_388945a0’ and Built-in Administrator account.<br />

4.4.2.18 Deny log on locally<br />

sedenyinteractivelogonright = *S-1-5-32-546, *S-1-5-7<br />

The ‘sedenyinteractivelogonright’ prevents local access to the system. This policy applies the<br />

rights to Guests and ANONYMOUS LOGON. Administrators must add the local accounts<br />

‘Guest’ and ‘Support_388945a0’.<br />

NOTE:<br />

Given no reason for interactive access to the system for a group, access should be<br />

denied.<br />

52 March 2004 <strong>Server</strong> Policy Files

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!