KEMBAR78
Benchmark - Deploy Security Measures Using Group Policy | PDF | Computer Security | Security
0% found this document useful (0 votes)
76 views18 pages

Benchmark - Deploy Security Measures Using Group Policy

The document outlines the implementation of security measures for Windows Servers based on the CIS Microsoft Windows Server 2022 Benchmark. It details specific security policies for three types of servers, emphasizing the importance of password management, account lockout settings, and auditing for security monitoring. Additionally, it highlights the necessity of compliance audits and the integration of frameworks like NIST and CIS to enhance organizational security beyond legal requirements.

Uploaded by

hb6348248
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views18 pages

Benchmark - Deploy Security Measures Using Group Policy

The document outlines the implementation of security measures for Windows Servers based on the CIS Microsoft Windows Server 2022 Benchmark. It details specific security policies for three types of servers, emphasizing the importance of password management, account lockout settings, and auditing for security monitoring. Additionally, it highlights the necessity of compliance audits and the integration of frameworks like NIST and CIS to enhance organizational security beyond legal requirements.

Uploaded by

hb6348248
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Benchmark - Deploy Security Measures Using Group Policy

By Ononay Das

Professor Timothy Montgomery

ITT-430-O500-Security Driven Systems Administration

GRAND CANYON UNIVERSITY

23 September 2024
Part 1: CIS Benchmark Settings for Windows Servers

Following the review of the CIS Microsoft Windows Server 2022 Benchmark document, I chose

10 specific security policies for each Windows Server. These specific environments were chosen

in order to adhere to best practices and to strengthen the security system of the servers in our lab.

Following is a description of each setting and its significance.

Windows Server Setting Description

Server 1 (Domain

Controller)

1.1.1 Enforce password history Ensures users cannot reuse the same

(24 or more passwords) password for 24 iterations.

1.2.1 Account lockout duration Locks accounts for 15 minutes after

(15 minutes or more) failed logon attempts to prevent brute-

force attacks.

17.1.1 Audit credential Tracks both successful and failed logon

validation (Success and activities for security monitoring.

Failure)

2.2.1 Access credential Prevents unauthorized access to the

manager as a trusted credential manager, reducing credential

caller (No One) theft risk.

9.1.1 Windows Firewall (On - Ensures firewall is enabled by default,

Recommended) blocking unauthorized network traffic.

17.5.4 Audit Logon (Success Captures both successful and failed logon

and Failure) attempts for monitoring suspicious


activity.

2.2.12 Change system time Restricts time changes to prevent

(Administrators, LOCAL timestamp manipulation attacks.

SERVICE)

2.3.9.4 Microsoft Network Disconnects clients when logon hours

Server: Disconnect expire to prevent unauthorized access.

clients when logon hours

expire

18.4.4 Network Security: LAN This policy helps mitigate the risk of

Manager Authentication pass-the-hash

Level

18.9.6 Interactive Logon: Do Disabling this option requires users to

not require press CTRL+ALT+DEL before logging

CTRL+ALT+DEL in, which prevents certain types of

malware from capturing login credentials

Server 2 (Member

Server)

1.1.5 Password must meet Requires passwords to have uppercase,

complexity requirements lowercase, numbers, and symbols for

(Enabled) better security.

1.2.2 Account lockout Locks accounts after 5 failed logon

threshold (5 or fewer attempts to prevent brute-force attacks.

invalid logon attempts)


17.2.6 Audit User Account Audits changes to user accounts to

Management (Success monitor for unauthorized modifications.

and Failure)

2.2.8 Allow log on locally Restricts local logon to administrators to

(Administrators) minimize the attack surface.

18.4.3 Configure SMBv1 client Disables SMBv1 client to remove

driver (Disabled) vulnerabilities associated with outdated

protocols.

17.5.1 Audit account lockout Tracks failed account lockout attempts to

(Failure) identify targeted brute-force attacks.

2.3.7.3 Interactive logon: Locks inactive sessions after 15 minutes

Machine inactivity limit to reduce unauthorized access.

(900 seconds or fewer)

2.3.5.3 Domain controller: Enforces LDAP signing to prevent man-

LDAP server signing in-the-middle attacks during

requirements (Require communication.

signing)

18.9.7 Prevent device metadata Prevents device information from being

retrieval from the internet exposed online, reducing exploitation

(Enabled) risk.

18.10.7.2 Turn off Autoplay for all Disables autoplay to prevent automatic

drives (Enabled) execution of malware from external

drives.
Server 3 (File Server)

1.1.4 Minimum password Enforces a 14-character password

length (14 or more minimum to strengthen password

characters) security.

17.1.3 Audit Kerberos Service Audits Kerberos service tickets to track

Ticket Operations authentication and ticket-related issues.

(Success and Failure)

2.2.10 Allow log on through Restricts remote desktop access to

Remote Desktop Services administrators and authorized users.

(Administrators, Remote

Desktop Users)

18.9.25.4 Password settings: Ensures strong passwords across the

Password Complexity server by enforcing complexity

(Enabled) requirements.

18.9.49.1 Turn off the advertising Disables the advertising ID to protect

ID (Enabled) privacy and reduce the attack surface.

18.9.24.1 Enumeration policy for Blocks external devices that are

devices incompatible incompatible with DMA protection.

with Kernel DMA

protection (Enabled:

Block All)

17.3.2 Audit Process Creation Logs all process creation events to

(Success) identify unauthorized processes.


2.3.10.12 Network Access: Sharing Ensures local users are authenticated

and security model for with their own credentials for share

local accounts (Classic) access.

18.9.17 NTFS Filesystem: Enable Adds an additional layer of security for

NTFS File System file handling on the server.

Enrichment (Enabled)

2.2.13 Change time zone Restricts time zone changes to prevent

(Administrators, LOCAL time manipulation attacks.

SERVICE)

1. Enforce Password History (8 or more passwords)

Path:

Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies >

Password Policy

 Double-click Enforce password history.

 Set the value to 8.


 Click OK.

2. Account Lockout Duration

Path:

Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies >

Account Lockout Policy

 Double-click Account lockout duration.

 Set the value to 30 minutes.


 Click OK.

3. Audit Credential Validation (Success and Failure)

Path:

Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit

Policy Configuration > Audit Policies > Logon/Logoff

 Double-click Audit credential validation.

 Select Configure the following audit events.

 Check Success and Failure.


 Click OK.

4. Access Credential Manager as a Trusted Caller

Path:

Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies >

User Rights Assignment

 Double-click Access credential manager as a trusted caller.

 Remove all entries so that No One is allowed to access it.


 Click OK.

5. Windows Firewall

Path: > Security Settings > Windows Firewall with Advanced Security > Domain Profile

 Double-click Windows Firewall: Protect all network connections.

 Ensure it’s set to On.


 Click OK.

6. Audit Logon (Success and Failure)

Path:

Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit

Policy Configuration > Audit Policies > Logon/Logoff

 Double-click Audit logon.

 Select Configure the following audit events.

 Check Success and Failure.


 Click OK.

7. Change System Time (Administrators, LOCAL SERVICE)

Path:

Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies >

User Rights Assignment

 Double-click Change the system time.

 Ensure only Administrators and LOCAL SERVICE are listed.


 Click OK.

8. Microsoft Network Server: Disconnect Clients When Logon Hours Expire

Path:

Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies >

Security Options

 Double-click Microsoft Network Server: Disconnect clients when logon hours expire.

 Set to Enabled.
 Click OK.

9. Network Security: LAN Manager Authentication Level

Path:

 Computer Configuration > Policies > Windows Settings > Security Settings > Local

Policies > Security Options

1. Double-click Network Security: LAN Manager Authentication Level.

2. Set it to Send NTLMv2 response only. Refuse LM & NTLM.


3. Click OK.

10. Interactive Logon: Do not require CTRL+ALT+DEL (Disabled)

Path:

 Computer Configuration > Policies > Windows Settings > Security Settings > Local

Policies > Security Options

1. Click Do not require CTRL+ALT+DEL.

2. Disabled it.
3. Click OK.

Summary

NIST and CIS serve as effective frameworks in the protection of assets by incorporation of tight

security measures such as Protocols. These frameworks have fundamental safeguards—like

passwords and access to restricted data—for organisations and their employees. Implementing

these best practises does not replace legal obligations and enriches the organisation’s security.

The enforcement of sound security policies is a necessity if an organisation wants its data to be

safe. Security measures such as password implementation, firewall configuration, and logging all

minimise both outside and inside threats. Through implementing these controls organisations

achieve a safe environment where only authorised parties get access and perform unlawful acts

are discouraged.
Others like CIS also help the organisation maintain constant compliance. Legal mandates are

prescribed by law, on the other hand requirements are emphasised on voluntary norms. This way

both strategies can accommodate each other and respond to legal requirements and at the same

time achieve a high level of security.

Last but not the least; compliance audit is crucial in confirming compliance. To some extent,

there are special applications which allow the administrator to examine the logs and make sure

that the policies are being complies with as required. Standard compliance cheque and

assessments serve as a means to ensure the constant health of the system with particular attention

to the security policies and measures and that compliance is taken through proper enforcement

and evaluation at the long run.

CIS and NIST assist in protecting IP through the imposition of strict security measures. These

frameworks set fundamentals of specifics of protections like passwords and access to classified

information. Implementing these best practises is well over and above the basic legal compliance

standards and greatly improves the security.

Having robust security policies and procedure isfor the defense of an organization’s information

is essential. Security policies that may include password proliferation, firewall administration,

and logging decrease the chances of internal and outsider security threats. Such controls help in

establishing organizational security that restricts users from accessing specific areas and prevent

unfavorable occurrences.

Others, such as CIS, also mean continuing compliance on child abuse. While legal requirement

deals with proper regulatory standards, framework deals with proper standard. By integrating
both management types, the organizations are able to fulfil legal requirements while at the same

time accomplish high security.

Last but not least, the audits have to be conducted, in order to cheque the compliance of the

circumstances. Utilities such as Event Viewer assist the administrator in rereading the logs and

guarantee that the policies are as well being practiced. The costs of conducted audits are on

regular basis that help to maintain the integrity of the system in terms of security characteristics,

checking the effectiveness of measures adopted during the verification time.

You might also like