Firewalls
Host-based firewalls are becoming all the rage. Windows XP includes a free host-based firewall, and Windows XP Service Pack 2 includes a very good, free host-based firewall, called Windows Firewall (WF). WF includes some very sophisticated management functionality that affords network administrators great control over the firewall. For instance, they can configure it to behave one way when on the internal network, another way when not. They can open up an authenticated IPsec bypass allowing all authenticated IPsec traffic to bypass the firewall, and they can set up program-based exceptions that allow certain firewall-unfriendly programs, such as instant messenger programs, to work properly. In all, the firewall has only one real or imagined shortcomingit does not perform outbound filtering. There are three reasons why: (1) Users do not understand it and therefore it will not help. As we mentioned earlier, if a dialog asking the user to make a security decision is the only thing standing between them and dancing pigs, security does not stand a chance. (2) Given that outbound filtering is a delay feature for the vast majority of users, why expend the limited available resources on that instead of giving administrators a great centrally manageable firewall? (3) Outbound filtering is available in IPsec already.
This does not, of course, mean that outbound filtering is not a worthwhile feature, just that it is not worthwhile for all users. For those who do need it, outbound filtering can be had through third-party firewalls.
We recommend using host-based firewalls on all your clients because they help stop malicious code from getting on the system in the first place.
In this tutorial:
- Protecting Hosts
- Security Configuration Myths
- Myth 1: Security Guides Make Your System Secure
- Myth 2: If We Hide It, they Not Find It
- Myth 3: The More Tweaks, the Better
- Myth 4: Tweaks Are Necessary
- Myth 5: All Environments Should At Least Use <Insert Favorite Guide Here>
- Myth 6: "High Security" Is an End Goal for All Environments
- Myth 7: Start Securing Your Environment by Applying a Security Guide
- Myth 8: Security Tweaks Can Fix Physical Security Problems
- Myth 9: Security Tweaks Will Stop Worms/Viruses
- Myth 10: An Expert Recommended This Tweak as Defense in Depth
- Server Security Tweaks
- Software Restriction Policies
- Do Not Store LAN Manager Hash Value
- Anonymous Restrictions
- Security Identifiers (SIDs)
- Password Policies
- SMB Message Signing
- Networking LAN Manager Authentication Level
- TCP Hardening
- Restricted Groups
- Audit Settings
- Client Security Tweaks
- Firewalls
- IPsec Filters
- SafeDllSearchMode
- Local Administrator Account Control
- Limit Local Account Use of Blank Passwords to Console Logon Only
- Logon Events
- Allowed to Format and Eject Removable Media
- The Caution ListChanges You Should Not Make
- Crash on Audit Failure
- Clear Virtual Memory Page File
- Security Configuration Tools