Server security Settings-Local Security policy setting _win server

Source: Internet
Author: User
Tags anonymous
You can also run the input gpedit.msc into the computer configuration →windows settings → security settings → local Policy

Security Policy Automatic Update command: Gpupdate/force (Apply Group Policy automatically does not need to be restarted)


Start Menu-> Administration Tools-> Local Security Policy

A, local policy--> audit policy

Audit policy Change failed successfully
Audit logon event failed successfully
Audit object access failed
Audit process Tracking No audit
Audit directory service access failed
Audit privilege usage failed
Audit system Event failed successfully
Audit account logon event failed successfully
Audit account Management failed successfully
B, local policy--> user Rights Assignment

Shutdown system: Only Administrators group, all other delete.
Deny login via Terminal Services: Join guests, user group
Allow login via Terminal Services: Only join Administrators group, all other delete

C, Local policy--> security options

Interactive login: Do not display last user name enabled
Network access: Do not allow anonymous enumeration of SAM accounts and shares to enable
Network access: Enable for network authentication store credentials is not allowed
Network access: All shares that can be accessed anonymously are deleted
Network access: Anonymous access to all of the lives deleted
Network access: Remote access to the registry path all deleted
Network access: Remotely accessible registry paths and subpath Delete all
Account: Rename guest account rename an account
Accounts: Renaming a system administrator account renaming an account

The setting name in the UI Enterprise Client desktop computers Enterprise Client Portable computers High-security desktop computers High-security portable computers

Account: Local account with blank password allows console login only

is enabled

is enabled

is enabled

is enabled

Accounts: Renaming the system Administrator account

Recommended

Recommended

Recommended

Recommended

Account: Rename guest Account

Recommended

Recommended

Recommended

Recommended

Devices: Allow undock without logging in

is disabled

is enabled

is disabled

is disabled

Devices: Allow format and eject of removable media

Administrators, Interactive Users

Administrators, Interactive Users

Administrators

Administrators

Devices: Preventing users from installing printer drivers

is enabled

is disabled

is enabled

is disabled

Device: Only users logged on locally can access CD-ROM

is disabled

is disabled

is enabled

is enabled

Device: Only users logged on locally can access the floppy disk

is enabled

is enabled

is enabled

is enabled

Device: Unsigned driver installation operation

Allow installation but warn

Allow installation but warn

Prohibit installation

Prohibit installation

Domain member: Requires strong (Windows 2000 or later) session key

is enabled

is enabled

is enabled

is enabled

Interactive logon: Do not display the last user name

is enabled

is enabled

is enabled

is enabled

Interactive logon: No need to press Ctrl+alt+del

is disabled

is disabled

is disabled

is disabled

Interactive logon: Message text when a user attempts to log on

This system is limited to authorized users only. Individuals who attempt to engage in unauthorized access will be prosecuted.

This system is limited to authorized users only. Individuals who attempt to engage in unauthorized access will be prosecuted.

This system is limited to authorized users only. Individuals who attempt to engage in unauthorized access will be prosecuted.

This system is limited to authorized users only. Individuals who attempt to engage in unauthorized access will be prosecuted.

Interactive logon: Message headers when a user attempts to log on

Continuing to use without proper authorization is an offence.

Continuing to use without proper authorization is an offence.

Continuing to use without proper authorization is an offence.

Continuing to use without proper authorization is an offence.

Interactive logon: Number of previous logons that can be cached (in case domain controller is not available)

2

2

0

1

Interactive logon: Prompt user to change password before expiration of password

14 days

14 days

14 days

14 days

Interactive logon: Require Domain Controller authentication to unlock workstation

is disabled

is disabled

is enabled

is disabled

Interactive logon: Smart card removal operation

Lock Workstation

Lock Workstation

Lock Workstation

Lock Workstation

Microsoft Network client: Digitally sign communications (if server agrees)

is enabled

is enabled

is enabled

is enabled

Microsoft Network client: Sends an unencrypted password to a third-party SMB server.

is disabled

is disabled

is disabled

is disabled

Microsoft network server: Idle time required before suspending a session

15 minutes.

15 minutes.

15 minutes.

15 minutes.

Microsoft network server: Digitally signed communications (always)

is enabled

is enabled

is enabled

is enabled

Microsoft network server: Digitally signed communications (if customer agrees)

is enabled

is enabled

is enabled

is enabled

Microsoft network server: Automatically log off users when logon hours are exhausted

is enabled

is disabled

is enabled

is disabled

Network access: Allow anonymous Sid/name conversion

is disabled

is disabled

is disabled

is disabled

Network access: Do not allow anonymous enumeration of SAM accounts and shares

is enabled

is enabled

is enabled

is enabled

Network access: Do not allow anonymous enumeration of SAM accounts and shares

is enabled

is enabled

is enabled

is enabled

Network access: Do not allow storage of credentials or. NET Passports for network authentication

is enabled

is enabled

is enabled

is enabled

Network access: Restricting anonymous access to Named Pipes and shares

is enabled

is enabled

is enabled

is enabled

Network access: Sharing and security mode for local accounts

Classic-Local users authenticate as themselves

Classic-Local users authenticate as themselves

Classic-Local users authenticate as themselves

Classic-Local users authenticate as themselves

Network security: Do not store LAN Manager hash value The next time the password is changed

is enabled

is enabled

is enabled

is enabled

Network security: Force logoff after logon hours

is enabled

is disabled

is enabled

is disabled

Network security: LAN Manager Authentication Level

Send NTLMV2 response only

Send NTLMV2 response only

Send NTLMV2 response \ Deny LM & NTLM only

Send NTLMV2 response \ Deny LM & NTLM only

Network security: Minimum session security for clients based on NTLM SSP (including secure RPC)

No minimum

No minimum

Requires NTLMV2 session security requirements 128-bit encryption

Requires NTLMV2 session security requirements 128-bit encryption

Network security: Minimum session security based on NTLM SSP (including secure RPC) servers

No minimum

No minimum

Requires NTLMV2 session security requirements 128-bit encryption

Requires NTLMV2 session security requirements 128-bit encryption

Recovery Console: Allow automatic system admin logon

is disabled

is disabled

is disabled

is disabled

Recovery Console: Allow floppy copy and access to all drives and folders

is enabled

is enabled

is disabled

is disabled

Shutdown: Allow shutdown before not logged in

is disabled

is disabled

is disabled

is disabled

Shutdown: Clean up the virtual memory paging file

is disabled

is disabled

is enabled

is enabled

System cryptography: Use FIPS compliant algorithms to encrypt, hash, and sign

is disabled

is disabled

is disabled

is disabled

System objects: Default owner of objects created by the Administrator (Administrators) group member

Object Creator

Object Creator

Object Creator

Object Creator

System settings: Using certificate rules for Windows executables for software restriction policies

is disabled

is disabled

is disabled

is disabled



I. Consolidation of System accounts

1. Prohibit enumeration of accounts

We know that some worm viruses that have hacking behavior can be used to scan the Windows 2000/XP system's specified port and then guess the administrator system password through a shared session. Therefore, we need to guard against such intrusions by setting the Prohibit enumeration account in the local security policy, as follows:
In the security settings tree of the list on the left of local security policy, expand Local policy → security options on a level-by-layer basis. View the list of related policies on the right. Here you find Network access: Do not allow anonymous enumeration of SAM accounts and shares, right-click, select Properties from the pop-up menu, and then pop up a dialog box to activate the Enabled option, and then click the Apply button to make the settings effective.

2. Account Management

To prevent intruders from exploiting vulnerabilities to log on to the machine, we will set up renaming the Administrator account name and disabling the Guest account here. Set the method to: in the local policy → Security options branch, locate the account: Guest account status Policy, right-click the pop-up menu, select Properties, and then in the Pop-up Properties dialog box, set its status to deactivated and finally "OK" to exit.

Second, strengthen password security

In "Security Settings", the first is located in the "account Policy → password policy", in its right to set up the view, you can make appropriate settings, so that our system password is relatively safe and difficult to crack. An important way to prevent cracking is to update the password regularly, you can make the following settings: The right mouse click Password Maximum age, in the pop-up menu, select Properties, in the pop-up dialog box, you can customize a password settings can be used after the length of time (limited to 1 to 999).

In addition, local security settings allow you to track user accounts for accessing files or other objects, logon attempts, system shutdown or restart, and similar events by setting Audit object access. Such security settings, and so on. In practical applications, we will gradually find that "local security settings" is indeed an indispensable system security tool

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.