19.06.2014 Views

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

Windows Server 2003 Recommended Baseline Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Windows</strong> <strong>Server</strong> <strong>2003</strong><br />

<strong>Recommended</strong> <strong>Baseline</strong> <strong>Security</strong> (ITSG-20)<br />

4.4.2.19 Deny log on through Terminal Services<br />

sedenyremoteinteractivelogonright = *S-1-5-32-546, *S-1-5-7<br />

The ‘sedenyremoteinteractivelogonright’ prevents logon through terminal services. This policy<br />

applies rights to Guests and ANONYMOUS LOGON. Administrators must add the local<br />

accounts ‘Guest’, ‘Support_388945a0’ and Built-in Administrator.<br />

NOTE:<br />

Given no reason for terminal services access for a group, access should be denied.<br />

4.4.2.20 Enable computer and user accounts to be trusted for delegation<br />

seenabledelegationprivilege =<br />

The ‘seenabledelegationprivilege’ grants the right to change the ‘trusted for delegation’ setting<br />

on Active Diretory objects. This policy does not grant privileges to anyone. The misuse of this<br />

privilege could lead to impersonation of users in a Domain.<br />

4.4.2.21 Force shutdown from a remote system<br />

seremoteshutdownprivilege =<br />

The ‘seremoteshutdownprivilege’ grants the right to shut the system down from a remote<br />

location. This policy grants rights to noone. <strong>Server</strong>s in a High <strong>Security</strong> zone require physical<br />

access to be shut down.<br />

4.4.2.22 Generate security audits<br />

seauditprivilege = *S-1-5-19,*S-1-5-20<br />

The ‘seauditprivilege’ grants the right to generate records in the security logs. This policy grants<br />

rights to NETWORK SERVICE and LOCAL SERVICE. By limiting rights to non-interactive<br />

accounts, DoS conditions through full logs can be avoided.<br />

4.4.2.23 Impersonate a client after authentication<br />

seimpersonateprivilege = *S-1-5-19,*S-1-5-20<br />

The ‘seimpersonateprivilege’ grants the right for applications to impersonate that client. This<br />

policy grants rights to Local Service and Network Service. For better security, privileges are<br />

limited to non-interactive accounts.<br />

4.4.2.24 Increase scheduling priority<br />

seincreasebasepriorityprivilege = *S-1-5-32-544<br />

The ‘seincreasebasepriorityprivilege’ grants the right to increase process priority. This policy<br />

grants privileges to Administrators. If misused, a DoS condition could starve CPU resources.<br />

<strong>Server</strong> Policy Files March 2004 53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!