MCSA/MCSE 70-290 Exam Prep: Managing and Maintaining a Microsoft Windows Server 2003 Environment (2nd Edition)
| Security Templates are preconfigured files that store typical security configurations for workstations and servers. Windows Server 2003 is shipped with a selection of templates that are stored in the %systemroot%\security\templates directory. The supplied templates cover a wide selection of security scenarios, from a typical low security domain client to a high security domain controller. The attributes of the templates can be copied, pasted, imported, or exported into other templates. This allows the templates to be used as is, or they can be used as the basis for a custom security scheme. A security template can be imported into a local or a nonlocal Group Policy Object, so that any computer or user accounts that the Group Policy Object controls will receive the security settings. If security settings have already been configured in the Group Policy Object, they can be exported to create a new security template that can be applied to other objects. The predefined security templates that are supplied with Windows Server 2003 are designed to provide an appropriate level of security on a Windows Server 2003 domain controller, server, or client computer. However, you must be aware that the default clean-install permissions given to user groups in Windows Server 2003 provide a significant increase in security over previous versions of Windows NT. The local Power Users group in Windows Server 2003 will have security settings roughly equivalent to those granted to the Local Users group in Windows 4.0. The security settings for the Administrators group has not changed. This can create a problem if your network is running applications that are not fully Windows Server 2003 compatible. Part of the specification for applications designed for Windows Server 2003 is that the applications are required to be designed to operate in a more secure environment, by users with fewer security rights. If all your applications are Windows Server 2003 compatible, the security rights that are granted to members of the Users group should be sufficient. If you are still running noncompliant applications on your network, it is possible that your users will have to be members of the Power Users group in order to have the rights necessary to run these applications. Note: Default Security Settings The default security settings are not automatically applied to Windows Server 2003 systems that have been upgraded from Windows NT 4.0 or earlier. On these systems, whatever security was already in place still applies. The default security settings are applied only when Windows Server 2003 is clean-installed onto an NTFS partition. If Windows Server 2003 is installed onto a FAT file system, the security templates cannot be applied.
The security templates are supplied for several security levels:
Creating Security Templates
The Security Templates snap-in is used to work with security templates. You have the option of adding the snap-in to an existing console or creating a new one. To create a new Security Templates console, follow the procedure in Step by Step 16.13.
Now that you have a console to use to work with the security templates, you have the following options:
Customizing Security Templates
One of the quickest ways to apply security is to use one of the templates that Microsoft supplies as a foundation for your own security policy. Then you can just make the necessary configuration changes to fit the needs of your organization. To customize a supplied or existing security template, follow the procedure in Step by Step 16.14.
Now that we have a custom security template, we need to apply it to a workstation or member server to test it. This is where the Security Configuration and Analysis Tool comes in. Using the Security Configuration and Analysis Tool
Managing the security of a network is an ongoing task. There will always be those occasions where, for the sake of expediency a security setting might have been changed to allow a user temporary access or to allow a process to run. These temporary changes often are forgotten and not restored to their proper state. There will also be users or junior network administrators that will make unauthorized changes that are detrimental to network security. These types of incidents can cause a security exposure that could prove costly to your network. The Security Configuration and Analysis tool will compare the security settings of a computer to those of a template, view the results, and resolve any discrepancies that were revealed by the analysis. The tool allows you to perform comparisons with either the standard templates or custom templates that you have created. The tool can also be used to import or configure security settings and apply them to the Group Policy Object for a computer or multiple computers. The Security Configuration and Analysis tool is a standard MMC snap-in that uses a database of security configuration settings to perform its analysis and configuration functions. The database allows templates to be imported or exported, multiple templates to be combined into a common template, and new templates to be created. After the templates are stored in the database, they can be used as the basis for a security analysis. When performing an analysis, the administrator is presented with the current system settings, and the areas where the current settings do not match the template are flagged. While performing the analysis, any discrepancies can be corrected. The Security Configuration and Analysis snap-in is used to work with security templates. You have the option of adding the snap-in to an existing console, or creating a new one. To create a new Security Configuration and Analysis console, follow Step by Step 16.15.
Now that we have a console to use to work with the Security Configuration and Analysis tool, we have the following options:
Before the Security Configuration and Analysis console can be used, you will have to create a database to store the security configuration settings. To create a new Security Configuration and Analysis console, follow Step by Step 16.16.
Note: Clear This Database There is a check box on the Import Template dialog box labeled Clear This Database Before Importing. This is selected if you want to delete the previous templates that were being used for analysis and start fresh. This does not delete the template files from the disk; it removes them only from the database.
After the template is imported into the database, you can change the configuration, import attributes from other templates, or merge it with other templates. The steps needed to configure the settings of the template are similar to those performed when using the other policy tools. Now that we have added the template to the database, we are ready to use it as a basis for the analysis of a computer. The Security Configuration and Analysis tool will compare the settings in the database with those on the chosen system and flag the differences. Then you can use the tool to make configuration changes to the machine, if desired. To analyze system security using the Security Configuration and Analysis tool, follow the procedure in Step by Step 16.17.
To provide a properly secured network, it is important to perform a regular security analysis of each computer. By using the Security Configuration and Analysis tool and database to keep a record of what the proper settings are, this allows the administrator to quickly detect any security exposures and easily correct them. The proper use of security templates requires the network administrator to not only analyze the needs of the users, but also the needs of the installed base of applications. Certain templates are dependent on the presence of only Windows Server 2003 applications and could conceivably prevent legacy applications from running, or they could prevent the users from having access to them. Because the security templates can also modify operating system settings, it is essential that they be thoroughly tested on a test network before they are applied in a production network. |
Категории