Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd...

70
Windows Vista Security Windows Vista Security Tidbits Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd [email protected] http://blogs.technet.com/steve_lamb

Transcript of Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd...

Page 1: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Windows Vista Security Windows Vista Security TidbitsTidbits

Steve LambTechnical Security Evangelist @ Microsoft Ltd

[email protected]://blogs.technet.com/steve_lamb

Page 2: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

OverviewOverview

User And Group ChangesUser And Group ChangesAdmin accountAdmin accountNew/Missing SIDsNew/Missing SIDsNew/Missing Users and GroupsNew/Missing Users and GroupsCached credentialsCached credentials

Kernel ChangesKernel ChangesBuffer overflow protectionBuffer overflow protection

ACL ChangesACL ChangesEncryption changesEncryption changes

Suite BSuite BTS SSOTS SSOEFS with Smart CardsEFS with Smart Cards

Audit changesAudit changesUser rightsUser rightsNew and changed security optionsNew and changed security optionsFirewallFirewall

Auth IPAuth IP

SMBv2SMBv2

Page 3: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

User and Group ChangesUser and Group Changes

Page 4: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Administrator Account StatusAdministrator Account Status

Page 5: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Administrator Account StatusAdministrator Account Status

Page 6: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Power Users Are Not AnymorePower Users Are Not Anymore

Page 7: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

The Support and Help AccountsThe Support and Help Accounts

Page 8: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

New GroupsNew Groups

Page 9: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Some Additional SIDsSome Additional SIDs

Page 10: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

And A Few More SIDsAnd A Few More SIDs

The Trusted Installer

A Service

INTERNET USER

High integrity SID

Low integrity SIDMedium

integrity SID

System integrity SID

Page 11: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Integrity Levels in TokenIntegrity Levels in Token

Page 12: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

ACL ChangesACL Changes

Page 13: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

ACL ModificationsACL Modifications

Page 14: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Old ACL UIOld ACL UI

Page 15: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

New ACL UINew ACL UI

Page 16: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Owner Needs Explicit PermsOwner Needs Explicit Perms

Page 17: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Kernel ChangesKernel Changes

Page 18: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Better Buffer Overflow ProtectionBetter Buffer Overflow Protection

Second cookie protects exception handlersSecond cookie protects exception handlers

Safer CRT exception handlersSafer CRT exception handlers

No more executable pages outside imagesNo more executable pages outside imagesEnforced by better development practices and Enforced by better development practices and code scanning toolscode scanning tools

/NXCOMPAT linker flag in build tools/NXCOMPAT linker flag in build toolsIf all binaries in a process are marked NX is If all binaries in a process are marked NX is automatically enabled for the processautomatically enabled for the process

Heap protectionHeap protection

Signed kernel code (x64 only)Signed kernel code (x64 only)

Page 19: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Crypto ChangesCrypto Changes

Page 20: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Offline Files Encrypted Per UserOffline Files Encrypted Per User

Page 21: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Encrypted PagefileEncrypted Pagefile

Page 22: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Suite-B CryptoSuite-B Crypto

Software and Smart Card Key Storage ProvidersSoftware and Smart Card Key Storage Providers

Cryptographic configurationCryptographic configuration

NIST ECC Prime Curves support (smart cards NIST ECC Prime Curves support (smart cards too)too)

AESAES

SHA-2SHA-2

IPsec support for AES and ECDHIPsec support for AES and ECDH

ECC cipher suites in SSLECC cipher suites in SSL

EFS with smart cardsEFS with smart cards

Page 23: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Cached Credentials Much TougherCached Credentials Much Tougher

Page 24: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Improved AuditingImproved Auditing

Page 25: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Granular Audit Granular Audit PolicyPolicy

Page 26: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Object Access AuditingObject Access Auditing

Object Access Attempt:Object Server: %1Handle ID: %2Object Type: %3Process ID: %4Image File Name: %5Access Mask: %6

Page 27: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Object Access AuditingObject Access Auditing

An operation was performed on an object.Subject :                                                                 Security ID: %1                Account Name: %2                         Account Domain: %3                Logon ID: %4          Object:                Object Server: %5                Object Type: %6                Object Name: %7                Handle ID: %9Operation:                Operation Type: %8                Accesses: %10                Access Mask: %11                Properties: %12                Additional Info: %13                Additional Info2: %14

Page 28: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Added Auditing ForAdded Auditing For

Registry value change audit events (old+new values)Registry value change audit events (old+new values)

AD change audit events (old+new values)AD change audit events (old+new values)

Improved operation-based auditImproved operation-based audit

Audit events for UACAudit events for UAC

Improved IPSec audit events including support for Improved IPSec audit events including support for AuthIPAuthIP

RPC Call audit eventsRPC Call audit events

Share Access audit eventsShare Access audit events

Share Management eventsShare Management events

Cryptographic function audit eventsCryptographic function audit events

NAP audit events (server only)NAP audit events (server only)

IAS (RADIUS) audit events (server only)IAS (RADIUS) audit events (server only)

Page 29: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

More Info In Event Log UIMore Info In Event Log UI

Page 30: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

XML EventsXML Events

Page 31: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

New Event NumbersNew Event Numbers

Page 32: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

New and Modified User New and Modified User RightsRights

Page 33: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Changes to User RightsChanges to User Rights

All rights for Power Users removedAll rights for Power Users removed

Create global objects does not have INTERACTIVECreate global objects does not have INTERACTIVE

SE_IMPERSONATE has added IIS_IUSRS and SE_IMPERSONATE has added IIS_IUSRS and removed ASPNETremoved ASPNET

Logon as a service is now empty by defaultLogon as a service is now empty by default

Page 34: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

New User RightsNew User Rights

Access credential manager as a trusted caller Access credential manager as a trusted caller

Change time zone user right Change time zone user right

Create symbolic links Create symbolic links

Modify an object label Modify an object label

Synchronize directory service data Synchronize directory service data

Increase a process working setIncrease a process working set

Page 35: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Security Options With Modified Security Options With Modified DefaultsDefaults

Page 36: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Anonymous Named PipesAnonymous Named Pipes

Page 37: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Anonymous Named PipesAnonymous Named Pipes

Page 38: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network access: remotely accessible Network access: remotely accessible registry pathsregistry paths

Page 39: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network access: remotely accessible Network access: remotely accessible registry pathsregistry paths

Page 40: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network access: shares that can be Network access: shares that can be accessed anonymouslyaccessed anonymously

Page 41: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network access: shares that can be Network access: shares that can be accessed anonymouslyaccessed anonymously

Page 42: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network Security: Do not store LAN Network Security: Do not store LAN Manager hash value on next password Manager hash value on next password changechange

Page 43: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network Security: Do not store LAN Network Security: Do not store LAN Manager hash value on next password Manager hash value on next password changechange

Page 44: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network security: LAN Manager Network security: LAN Manager authentication levelauthentication level

Page 45: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network security: LAN Manager Network security: LAN Manager authentication levelauthentication level

Page 46: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Devices: Allowed to format and eject Devices: Allowed to format and eject removable mediaremovable media

Page 47: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Devices: Allowed to format and eject Devices: Allowed to format and eject removable mediaremovable media

Page 48: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Devices: Restrict CD-ROM/Floppy access Devices: Restrict CD-ROM/Floppy access to locally logged on user onlyto locally logged on user only

Page 49: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Devices: Restrict CD-ROM/Floppy access Devices: Restrict CD-ROM/Floppy access to locally logged on user onlyto locally logged on user only

Page 50: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Devices: Unsigned driver installation Devices: Unsigned driver installation behaviorbehavior

Page 51: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Devices: Unsigned driver installation Devices: Unsigned driver installation behaviorbehavior

Page 52: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Why Change It?Why Change It?

Page 53: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Interactive logon: Require smart cardInteractive logon: Require smart card

Page 54: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Interactive logon: Require smart cardInteractive logon: Require smart card

Page 55: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

New Security OptionsNew Security Options

Page 56: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network access: remotely accessible Network access: remotely accessible registry paths and sub-pathsregistry paths and sub-paths

Page 57: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Network access: Restrict anonymous Network access: Restrict anonymous access to named pipes and sharesaccess to named pipes and shares

Page 58: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

System settings: Optional subsystemsSystem settings: Optional subsystems

Page 59: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

System settings: Use certificate rules on System settings: Use certificate rules on windows executables for software windows executables for software restriction policiesrestriction policies

Page 60: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Lots and lots and lots of GP changesLots and lots and lots of GP changes

Page 61: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Last Logon DisplayLast Logon Display

Page 62: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Trusted Path Credential EntryTrusted Path Credential Entry

Page 63: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Smart Card PoliciesSmart Card Policies

Page 64: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

SMBv2SMBv2

Page 65: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

What’s New In SMBv2 What’s New In SMBv2 (in 30 seconds)(in 30 seconds)

Only 16 commands (80 in SMBv1)Only 16 commands (80 in SMBv1)

Implicit sequence number speeds up hashingImplicit sequence number speeds up hashing

SHA-256 signatures (MD-5 in SMBv1)SHA-256 signatures (MD-5 in SMBv1)

Handles reconnections more reliablyHandles reconnections more reliably

Client-side file encryption (yay!!!)Client-side file encryption (yay!!!)

Symbolic links across shares (disabled by Symbolic links across shares (disabled by default)default)

Better load balancing mitigates DOS attacksBetter load balancing mitigates DOS attacks

Page 66: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

MiscellanyMiscellany

Page 67: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

New RDP ControlNew RDP Control

Page 68: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

New RDP ControlNew RDP Control

Page 69: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

Timeless Security Advice!Timeless Security Advice!

Order online:Order online:http://www.protectyourwindowsnetwohttp://www.protectyourwindowsnetwork.comrk.com

Page 70: Windows Vista Security Tidbits Steve Lamb Technical Security Evangelist @ Microsoft Ltd Stephen.lamb@microsoft.com .

© 2006 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

Steve LambTechnical Security Evangelist @ Microsoft Ltd

[email protected]://blogs.technet.com/steve_lamb

Thanks to Jesper M. Johansson, Ph.D. for creating the slidesThanks to Jesper M. Johansson, Ph.D. for creating the slides