Wednesday, February 1, 2012

Security Configuration - Windows Server 8

Introduction
The Security Configuration Wizard (SCW) which the first released in Windows Server 2003 Service Pack 1 provide a process on configuring security for Microsoft Windows Operating System.The idea behind the tools is to configure the server with the smaller attack surface. I will show you on how to use
the tools as you read the article. The tools provide the 4 main core function as below :
  • creating
  • editing
  • applying
  • roll back

There security setting that have been configure it doesnt have the same similarity as security templates that came with an INF extention. Security template contain more information but you can embedded it to be part of SCW.

There is nothing much change on Windows Server 8 and the article on this page is still applicable for Microsoft Windows Server 2008 R2 .


Configuration
You can find the security configuration wizard in administration tools in control panel.Once you click on the tools, you will see the wizard as below
welcome to the security configuration wizard

  • As mention earlier, the tools provide the 4 main core function
security configuration wizard configuration action

  • by default it will auto select the computer hostname
security configuration wizard select server

security configuration wizard processing security configuration database

security configuration wizard role-base service configuration

  • the tools have the intelligent to detect any roles installed so it can better plan on what need to be disable and etc.
security configuration wizard select server roles

security configuration wizard select client features

security configuration wizard select administration and other options

security configuration wizard select additional services

  • If you are unsure, what need to do with this screen, you can choose the default option
security configuration wizard handling unspecified services

security configuration wizard handling unspecified services

  • This portion will touches on the network security which would be the firewall configuration, for some organization they will skip this option as the server is located in a highly secure environement
security configuration wizard network security

 security configuration wizard network security rules

  • This is the most important part, as mostly attacker will target the smb. I would recommended this to be configure.
security configuration wizard registry settings

required smb security signature

security configuration wizard outbound authentication methods

security configuration wizard registry settings summary

  • For this option I will write more on my future article on what is the right way to perform audit and etc.
security configuration wizard audit policy

security configuration wizard system audit policy

security configuration wizard audit policy summary

  • Now we have completed all the configuration, we need to save our configuration for further deployment.
security configuration wizard save security policy

  • You need to put a file name before you can press the next button
security configuration wizard security policy file name

security configuration wizard apply security policy

security configuration wizard completing the security configuration wizard

Summary
I hope the article above give you an idea in term on how to use tools. The tools exists on the previous version of windows. You can use the same method to secure your windows boxes.Let us know what you though , learns and hope for next articles!. Connect with us on GOOGLE+ , TWITTER and FACEBOOK.

No comments:

Post a Comment