Server Security Tweaks
IPsec filters
Our favorite "tweak" is not actually a tweak at all. It is a technology that you can use to prevent systems from talking to each other. IPsec is a layer 3 and 4 host-based security mechanism that enables you to configure authentication and/or encryption settings on a per-port basis. It is one of the most powerful and important security tools ever devised. It is what we use to ensure that hosts cannot send or receive traffic that is not essential for their functioning. Therefore, we do not elaborate on it any further here.
Caution IPsec, incorrectly configured, can be hazardous to your network health; and your career.
IPsec is an absolutely marvelous technology for blocking traffic. In fact, even if you did not intend to block any traffic, that usually is the end result in the first few tries. Do not deploy an IPsec policy on a production network until you have thoroughly tested it and are sure it will work as intended.
In this tutorial:
- Protecting Hosts
- Security Configuration Myths
- Myth 1: Security Guides Make Your System Secure
- Myth 2: If We Hide It, they Not Find It
- Myth 3: The More Tweaks, the Better
- Myth 4: Tweaks Are Necessary
- Myth 5: All Environments Should At Least Use <Insert Favorite Guide Here>
- Myth 6: "High Security" Is an End Goal for All Environments
- Myth 7: Start Securing Your Environment by Applying a Security Guide
- Myth 8: Security Tweaks Can Fix Physical Security Problems
- Myth 9: Security Tweaks Will Stop Worms/Viruses
- Myth 10: An Expert Recommended This Tweak as Defense in Depth
- Server Security Tweaks
- Software Restriction Policies
- Do Not Store LAN Manager Hash Value
- Anonymous Restrictions
- Security Identifiers (SIDs)
- Password Policies
- SMB Message Signing
- Networking LAN Manager Authentication Level
- TCP Hardening
- Restricted Groups
- Audit Settings
- Client Security Tweaks
- Firewalls
- IPsec Filters
- SafeDllSearchMode
- Local Administrator Account Control
- Limit Local Account Use of Blank Passwords to Console Logon Only
- Logon Events
- Allowed to Format and Eject Removable Media
- The Caution ListChanges You Should Not Make
- Crash on Audit Failure
- Clear Virtual Memory Page File
- Security Configuration Tools