Active Directory report
Transcription
Active Directory report
TESTBED SekChek for Windows Security Report System: PUFFADDER (Snake.com) 10 November 2013 SekChek IPS inbox@sekchek.com www.sekchek.com Declaration The provided observations and recommendations are in response to a benchmarking analysis that compares the client’s information security features against industry. The recommendations are organised to identify possible implications to the company based on the gathered information, to identify an industry average rating of the controls and provide possible recommended actions. The benchmarking analysis and the related observations and recommendations should supplement management’s analysis but should not be and cannot be solely relied upon in any instance to identify and/or remediate information security deficiencies. Further, the observations and recommendations herein do not identify the cause of a possible deficiency or the cause of any previously unidentified deficiencies. The causes of the deficiencies must be determined and addressed by management for the recommendations selected to be relevant. © 1996-2013 SekChek IPS. All rights reserved. SekChek is a registered trademark of SekChek IPS. All other trademarks are the property of their respective owners. Contents SekChek Options 5 System Details 6 System Configuration 7 1. Report Summary 11 1.1 Comparisons Against Industry Average and Leading Practice 12 1.2 Answers to Common Questions 19 1.3 Summary of Changes since the Previous Analysis 23 2. Domain Structure 24 3. Domain Accounts Policy 28 4. Domain Controller Policy Settings (Local Policy) 31 4.1 Audit Policy Settings 31 4.2 Event log Settings 36 4.3 Security Option Settings 38 5. Group Policy Objects 42 5.1 Description and Properties for Group Policy Objects 42 5.2 Summary of GPOs defined on the system 44 5.3 Summary of GPOs and their Links to OUs 45 5.4 Summary of OUs and their Links to GPOs 46 5.5 GPOs Defined and their Details 47 5.6 GPO Version Discrepancies 58 6. Password Setting Objects (PSOs) 59 7. Customer-Selected Registry Key Values 61 8. User Accounts Defined In The Domain 62 9. Groups Defined In the Domain 65 10. Domain Local Groups and their Members 68 11. Domain Global Groups and their Members 72 12. Domain Universal Groups and their Members 75 13. Last Logons, 30 Days and Older 76 14. Passwords, 30 Days and Older 78 15. Passwords that Never Expire 80 16. Accounts not Requiring a Password 82 17. Invalid Logon Attempts Greater than 3 84 18. Users not Allowed to Change Passwords 85 19. Accounts with Expiry Date 86 20. Disabled Accounts 87 21. Locked Out Accounts 88 22. Accounts Whose Passwords Must Change at Next Logon 89 23. Accounts Created in the Last 90 Days 90 24. Rights and Privileges 92 24.1 Descriptions & General Recommendations for Rights 94 24.2 Rights Assigned to Local Groups 98 24.3 Rights Assigned to Universal Groups (Native mode only) 100 24.4 Rights Assigned to Global Groups 101 24.5 Rights Assigned to Users 102 24.6 Rights Assigned to Well-Known Objects 109 24.7 Rights Assigned to External Objects 110 25. Discretionary Access Controls (DACL) for Containers 111 26. Trusted and Trusting Domains 112 27. Servers and Workstations 114 28. Domain Controllers in the Domain 115 29. Accounts Allowed to Dial In through RAS 117 30. Services and Drivers on the Machine 119 31. Server Roles and Features 140 32. Task Scheduler 142 33. Security Updates, Patches and Hot-Fixes 143 34. Products Installed 144 35. Current Network Connections 146 36. Logical Drives 148 37. Network Shares 149 38. Home Directories, Logon Scripts and Profiles 150 39. File Permissions and Auditing 152 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL SekChek Options Reference Number 1201250012 Requester Internal Audit Telephone Number +44 (20) 123 4567 City London Client Country UK Charge Code Snake - Windows Client Code SEK001 Client Industry Type Manufacturing Host Country Belize Security Standards Template 0 - SekChek Default Evaluate Against Industry Type Manufacturing Compare Against Previous Analysis Not Selected Scan All DCs for Last Logon Times Yes (scanned 2 of 2 DCs) Report Format Word 2007 Paper Size A4 (21 x 29.7 cms) Spelling English UK Large Report Format MS-Excel spreadsheet Large Report (Max Lines in Word Tables) 1500 Summary Document Requested Yes Scan Software Version Used Version 5.1.0 Scan Software Release Date 08-Nov-2013 Your SekChek report was produced using the above options and parameters. You can change these settings for all files you send to us for processing via the Options menu in the SekChek Client software on your PC. You can also tailor them (i.e. temporarily override your default options) for a specific file via the Enter Client Details screen. This screen is displayed: For SekChek for NetWare and Windows - during the Scan process on the target Host system; For SekChek for AS/400 and UNIX - during the file encryption process in the SekChek Client software. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 5 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL System Details Domain Name Snake.com (SNAKE) Domain Sid *S-1-5-21-601740674-2353673397-942277617 Forest Snake.com DC Functionality Windows Server 2008 R2 Mode Domain Functionality** Windows Server 2003 Domain Mode Forest Functionality** Windows 2000 Forest Mode Computer Domain Controllers/PUFFADDER Site Name Default-First-Site-Name Windows Version 6.1 (Windows 2008 R2) Build / Service Pack 7601/Service Pack 1 System Locale Id 2052 (x804) Scan Time 08-Nov-2013 15:47 Scanned By Users/ Administrator Report Date: 10 November, 2013 ** Functional Levels (available from SekChek V5.0.4 / Windows Server 2003) DC Functionality: The functional level of the Domain Controller (DC) Domain Functionality: The functional level of the domain Forest Functionality: The functional level of the forest General Note In Active Directory domains, objects, such as user accounts belong to a container object (e.g. an Organizational Unit in a domain or the domain object itself). In this report the path of objects are usually listed. The format of the path is, for example, Orgunit x/Orgunit y. The “/” character separates the containers in the path. Paths are listed from the highest level down. A path can contain a domain name as the first container, for example, abc.xyz.com as a domain name. When the domain name is listed in the path, it means that the containers and object in that path belong to a domain other than the one being analysed. If a path is not listed for an object, it means that the object was defined at the domain level container and not in any container object of the domain. . Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 6 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL System Configuration Operating System OS Name Microsoft Windows Server 2008 R2 Enterprise OS Version, Build 6.1.7601 OS Architecture 64-bit OS Locale Id x0804 OS Serial Number 12345-6789-5183281-84887 OS Installed 2012-08-29 Last BootUp 2013-11-06 Country Code 86 Time Zone GMT +02:00 Boot Device \Device\HarddiskVolume1 System Drive C: Windows Directory C:\Windows System Directory C:\Windows\system32 PAE Enabled No Visible Memory 1.000 GB Free Memory 0.247 GB Encryption Level 256 bits OS Language English - United States OS Stock Keeping Unit Name Enterprise Server Edition Maximum Number of Processes Unknown Number of Licensed Users Unlimited Number of Current Users 3 Registered User Windows User Data Execution Prevention (DEP)... DEP Available Yes DEP Enabled for 32-bit Appls Yes DEP Enabled for Drivers Yes DEP Policy Opt Out System Recovery Options Write an event to the system log Yes Send an administrative alert No Automatically restart Yes Write debugging information Kernel memory dump Dump file %SystemRoot%\MEMORY.DMP Overwrite any existing file Yes BIOS Manufacturer American Megatrends Inc. BIOS 080002 Version 2.3 Release Date 2010-05-05 Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 7 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Base Board (Motherboard) Manufacturer Microsoft Corporation Product Virtual Machine Serial Number 1234-5678-6758-7771-5390-6277-74 Version 7.0 Page Files Number of Page Files 1 Name of Page File #1 C:\pagefile.sys Temporary Page File No Create Date 2011-08-29 Allocated Size 1.000 GB Current Usage 0.179 GB Peak Usage 0.199 GB Computer Manufacturer Microsoft Corporation Model Virtual Machine System Type x64-based PC Remote Desktop Enabled Unknown Nbr of Processors 1 Total Memory 1.000 GB System Registry Size Current = 100.3 MB; Max allowed = 2,048.0 MB Screen Resolution 1680 x 1050 pixels BootUp State Normal boot Wake-up Type Power Switch Boot ROM Supported Yes Infrared (IR) Supported No Power Management Supported No Computer Role Primary Domain Controller Computer Name PUFFADDER Computer Sid *S-1-5-21-601740674-2353673397-942277617-1106 Domain Name (short) SNAKE Domain Name (DNS) Snake.com Processors Number of Processors 1 Processor #1... Manufacturer AuthenticAMD Name AMD Opteron(tm) Processor 6172 Family AMD Opteron 6172 Description AMD64 Family 16 Model 9 Stepping 1 Processor Id 1F8BFBFF000106A5 Clock Speed 3,108 MHz External Clock Speed 200 MHz Address Width 64 bits Data Width 64 bits Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 8 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 Level 2 Cache Size 512 KB Level 2 Cache Speed Unknown MHz Number of Cores 1 Nbr of Logical Processors 1 Chip Socket None Availability Running/Full Power CONFIDENTIAL Network Adapters (IP enabled) Connection Id Local Area Connection Connection Status Connected Name Microsoft Hyper-V Network Adapter #2 Service Name netvsc Manufacturer Microsoft Adapter Type Ethernet 802.3 Speed (Mbs) 10,000 Mbs Last Reset 2013-11-08 14:13:38 IP Enabled Yes IP Address 200.200.100.234 IP Subnet 255.255.255.0 Default Gateway MAC Address 00:15:5D:64:2F:1A DHCP Enabled No DHCP Lease Expires DHCP Lease Obtained DHCP Server DNS Search Order 200.200.100.235, 127.0.0.1 Windows Firewall Domain Profile… Firewall State On (recommended) Inbound Connections Block, allow exceptions (default) Outbound Connections Allow (default) Display Notifications No Allow Unicast Response Yes (default) Private Profile… Firewall State On (recommended) Inbound Connections Block, allow exceptions (default) Outbound Connections Allow (default) Display Notifications No Allow Unicast Response Yes (default) Public Profile… Firewall State On (recommended) Inbound Connections Block, allow exceptions (default) Outbound Connections Allow (default) Display Notifications No Allow Unicast Response Yes (default) Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 9 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Region & Language Options Current Format English (South Africa) Time Format 08:46:32 Short Date 08-Nov-2013 Long Date 08 November 2013 Short Date Format dd-MMM-yyyy Long Date Format dd MMMM yyyy Currency Symbol R Currency (International) ZAR System Locale English (South Africa) Screen Saver Policy Scan Account Users/ Administrator Screen Saver Enabled Yes Screen Saver Timeout 600 seconds Screen Saver Secure Yes User Access Control (UAC) UAC Enabled Yes Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 10 of 154 Security Analysis: TESTBED System: Analysis Date: 1. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Report Summary The following two charts illustrate the diversity of regions and industries that make up the population of systems running Active Directory in our statistics database. The remaining graphs in the Report Summary section evaluate security on your system against this broad base of real-life security averages. SekChek is used by the Big Four audit firms, IS professionals, internal auditors, security consultants & general management in more than 130 countries. Statistics Population by Region As new reviews are processed, summaries of the results (excluding client identification) are automatically added to a unique statistics database containing more than 70,000 assessments. Statistics Population by Industry Type Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 11 of 154 Security Analysis: TESTBED System: Analysis Date: 1.1 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Comparisons Against Industry Average and Leading Practice Summary of Domain Accounts Policy Values This graph compares the Domain Accounts Policy values against the industry average using the following criteria: Country = <All>; Industry Type = Manufacturing; Machine Size (Nbr of Accounts) = <All> This and the following summary reports are of most value when they are used to compare ‘snapshots’ of your security measures at different points in time. Used in this way, they provide a fairly clear picture of whether your security measures are improving or becoming weaker. Industry Average is a dynamic, calculated average for all Active Directory domains analysed by SekChek using the above criteria. It indicates how your security measures compare with those of other organisations using Microsoft Windows systems. Leading Practice is the standard adopted by the top 10 to 20 percent of organisations. Asterisks (*) after Policy Values indicate their relative importance and individual contribution towards security of your system. I.e. Policy Values followed by 3 asterisks (***) are considered more important, and to have a greater impact on security than those followed by 1 asterisk (*). This is an approximation and should be used as a guide only. For more information and details, see the report sections Domain Accounts Policy. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 12 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Comparisons Against Industry Average and Leading Practice (continued) Summary of Domain User Accounts This graph compares against the industry average using the following criteria: Country = <All>; Industry Type = Manufacturing; Machine Size (Nbr of Accounts) = Very Small Above the industry average; About average; Below average Total number of user accounts defined to your domain: 16 This summary report presents the number of user accounts, with the listed characteristics, as a percentage of the total number of accounts defined to your domain. In general, longer bars highlight potential weaknesses in your security measures and should be investigated. For more details, refer to the relevant sections in the main body of the report. The graph is sorted in order of importance. This is an approximation and should be used as a guide only. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 13 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Comparisons Against Industry Average and Leading Practice (continued) Summary of Effective Rights for the Domain Controller This graph compares against the industry average using the following criteria: Country = <All>; Industry Type = Manufacturing; Machine Size (Nbr of Accounts) = Very Small Above the industry average; About average; Below average This summary report presents the number of user accounts, with the listed rights, as a percentage of the total number of accounts defined to the domain controller. These rights are applied via the Local Policy of the domain controller being analysed. Other domain controllers may have different rights defined. For more details of rights assigned, refer to the Rights Assigned to Users sections in the main body of the report. The graph is sorted in alphabetical sequence. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 14 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Comparisons Against Industry Average and Leading Practice (continued) Summary of Domain User Accounts (excluding disabled accounts) This graph compares against the industry average using the following criteria: Country = <All>; Industry Type = Manufacturing; Machine Size (Nbr of Accounts) = Very Small Above the industry average; About average; Below average Total number of user accounts defined to your system: 16 This summary report presents the number of enabled accounts (i.e. excluding accounts with a status of disabled or accounts that are locked) with the listed characteristics, as a percentage of the total number of accounts defined to your system. In general, longer bars highlight potential weaknesses in your security measures and should be investigated. For more details, refer to the relevant sections in the main body of the report. The graph is sorted in order of importance. This is an approximation and should be used as a guide only. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 15 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Comparisons Against Industry Average and Leading Practice (continued) Summary of Effective Rights for the Domain Controller (excl. disabled accounts) This graph compares against the industry average using the following criteria: Country = <All>; Industry Type = Manufacturing; Machine Size (Nbr of Accounts) = Very Small Above the industry average; About average; Below average This summary report presents the number of enabled accounts (i.e. excluding accounts with a status of disabled or accounts that are locked) with the listed rights, as a percentage of the total number of accounts defined to your system. For more details, refer to the Rights Assigned to Users sections in the main body of the report. The graph is sorted in alphabetical sequence. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 16 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Comparisons Against Industry Average and Leading Practice (continued) Summary of Domain Administrator Accounts This graph compares against the industry average using the following criteria: Country = <All>; Industry Type = Manufacturing; Machine Size (Nbr of Accounts) = Very Small Above the industry average; About average; Below average Total number of user accounts with administrative privileges defined to your domain: 2 This summary report presents the number of administrator accounts (i.e. accounts that have administrative privileges), with the listed characteristics, as a percentage of the total number of administrator accounts defined to your domain. In general, longer bars highlight potential weaknesses in your security measures and should be investigated. For more details, refer to the relevant sections in the main body of the report. The graph is sorted in order of importance. This is an approximation and should be used as a guide only. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 17 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Comparisons Against Industry Average and Leading Practice (continued) Summary of Domain Administrator Accounts (excluding disabled accounts) This graph compares against the industry average using the following criteria: Country = <All>; Industry Type = Manufacturing; Machine Size (Nbr of Accounts) = Very Small Above the industry average; About average; Below average Total number of user accounts with administrative privileges defined to your system: 2 This summary report presents the number of enabled administrator accounts (i.e. accounts that have administrative privileges, excluding those accounts with a status of disabled or accounts that are locked) with the listed characteristics, as a percentage of the total number of administrator accounts defined to your system. In general, longer bars highlight potential weaknesses in your security measures and should be investigated. For more details, refer to the relevant sections in the main body of the report. The graph is sorted in order of importance. This is an approximation and should be used as a guide only. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 18 of 154 Security Analysis: TESTBED System: Analysis Date: 1.2 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Answers to Common Questions The following charts are intended to provide quick answers to the most common questions regarding security of a system. The diagrams highlight the relative numbers of objects with the listed attributes. The total population used to plot each chart is included in brackets () after each chart title. Each section includes a link to more detailed information contained in other sections of this report. When were the user accounts created? The charts show when user accounts were created on your system. Grouped by all accounts and accounts with Administrative privileges. Includes active and disabled accounts. More information: Accounts Created in the Last 90 Days When were the group and computer accounts created? The chart shows when the group and computer accounts were created on your system. More information: Accounts Created in the Last 90 Days Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 19 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL What is the status of user accounts? The charts analyse user accounts by their status: active or disabled. An account may be disabled because: its status has been set to disabled; the account has expired; or the account was locked by the system due to excessive password guessing attempts. Note that an account may be both locked and expired, or disabled and expired. 5 out of 16 accounts are disabled on this system. More information: Disabled Accounts, Locked Accounts, Accounts with Expiry Date How active are user accounts? The charts indicate when accounts were last used to logon to the system. Grouped by all accounts and accounts with Administrative privileges. Excludes disabled accounts. SekChek queried 2 out of 2 domain controllers to obtain the information. More information: Last Logons, 30 Days and Older How frequently do users change their passwords? The charts show when user login passwords were last changed. ‘Next Logon’ means that the password must be changed the next time the account is used to logon to the domain. Grouped by all accounts and accounts with Administrative privileges. Excludes disabled accounts. More information: Passwords, 30 Days and Older, Password Must Change at Next Logon Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 20 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Are users forced to change their passwords? The charts show the percentage of accounts with a password that is not required to be changed. Grouped by all accounts and accounts with Administratrative privileges. Excludes disabled accounts. More information: Passwords that Never Expire Are users allowed to change their passwords? The charts show the percentage of accounts that are not allowed to change their passwords. Grouped by all accounts and accounts with Administrative privileges. Excludes disabled accounts. More information: User Accounts not Allowed to Change Password Are users allowed to login without a password? The charts show the percentage of accounts that may have their passwords set to zero length (blank) by an administrative account. Grouped by all accounts and accounts with Administrative privileges. Excludes disabled accounts. More information: Accounts not Requiring a Password Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 21 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL What privileges are assigned to user accounts? The chart shows the percentage of user accounts with Administrative, User and Guest privileges. These privileges are determined by group memberships. Excludes disabled accounts. More information: User Accounts Defined In The Domain What are the types of group accounts? The chart analyses security groups by group type. Excludes Distribution groups. More information: Groups Defined In the Domain What are the service types and their start types? These charts summarise the types of services and drivers installed on the system and their start types. The charts include running and stopped services. More information: Services and Drivers Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 22 of 154 Security Analysis: TESTBED System: Analysis Date: 1.3 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Summary of Changes since the Previous Analysis Need to quickly highlight changes in security controls since your previous review? SekChek’s latest time-comparison graphs are just the solution! Note: The above graph is provided for illustrative purposes only. A collection of easy-to-read reports in a very familiar format provides you with visual indicators of: Whether security has improved, weakened, or remained about the same since your previous analysis The effectiveness of your measures to strengthen controls Whether risk is increasing or decreasing The degree of change, both positive and negative The applications are endless. Some of the practical benefits are: Time savings. Reduced time spent poring over volumes of unconnected information Objectivity. The results are guaranteed to be the same regardless of who performs the review Compliance with legislation. Easier monitoring for compliance with statutory requirements imposed by SOX, HIPAA and other legislative changes relating to corporate governance More powerful justifications. The ability to present more convincing arguments to senior, non-technical management who do not have the time, or the inclination, to understand masses of technical detail Interested? Contact us at inbox@sekchek.com to find out how to get started! Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 23 of 154 Security Analysis: TESTBED System: Analysis Date: 2. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Domain Structure This report section lists the Container objects in the domain. It summarises the Directory structure for your domain and may help you to understand the overall structure of the domain’s Directory structure, especially where it is large or complex. Section Detail Object Name Object Type Snake.com domainDNS --- Amazon organizationalUnit --- Builtin builtinDomain --- Computers container --- Domain Controllers organizationalUnit --- ForeignSecurityPrincipals container --- Managed Service Accounts container --- Program Data container ------ Microsoft container --- System container ------ AdminSDHolder container ------ ComPartitions container ------ ComPartitionSets container ------ DomainUpdates container --------- ActiveDirectoryUpdate container --------- Operations container ------------ 0b7fb422-3609-4587-8c2e-94b10f67d1bf container ------------ 0e660ea3-8a5e-4495-9ad7-ca1bd4638f9e container ------------ 10b3ad2a-6883-4fa7-90fc-6377cbdc1b26 container ------------ 13d15cf0-e6c8-11d6-9793-00c04f613221 container ------------ 231fb90b-c92a-40c9-9379-bacfc313a3e3 container ------------ 2416c60a-fe15-4d7a-a61e-dffd5df864d3 container ------------ 293f0798-ea5c-4455-9f5d-45f33a30703b container ------------ 3051c66f-b332-4a73-9a20-2d6a7d6e6a1c container ------------ 3c784009-1f57-4e2a-9b04-6915c9e71961 container ------------ 3e4f4182-ac5d-4378-b760-0eab2de593e2 container ------------ 446f24ea-cfd5-4c52-8346-96e170bcb912 container ------------ 4aaabc3a-c416-4b9c-a6bb-4b453ab1c1f0 container ------------ 4c93ad42-178a-4275-8600-16811d28f3aa container ------------ 4dfbb973-8a62-4310-a90c-776e00f83222 container ------------ 51cba88b-99cf-4e16-bef2-c427b38d0767 container ------------ 57428d75-bef7-43e1-938b-2e749f5a8d56 container ------------ 5c82b233-75fc-41b3-ac71-c69592e6bf15 container ------------ 5e1574f6-55df-493e-a671-aaeffca6a100 container ------------ 61b34cb0-55ee-4be9-b595-97810b92b017 container ------------ 6ada9ff7-c9df-45c1-908e-9fef2fab008a container Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 24 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Object Name Object Type ------------ 6bcd5678-8314-11d6-977b-00c04f613221 container ------------ 6bcd5679-8314-11d6-977b-00c04f613221 container ------------ 6bcd567a-8314-11d6-977b-00c04f613221 container ------------ 6bcd567b-8314-11d6-977b-00c04f613221 container ------------ 6bcd567c-8314-11d6-977b-00c04f613221 container ------------ 6bcd567d-8314-11d6-977b-00c04f613221 container ------------ 6bcd567e-8314-11d6-977b-00c04f613221 container ------------ 6bcd567f-8314-11d6-977b-00c04f613221 container ------------ 6bcd5680-8314-11d6-977b-00c04f613221 container ------------ 6bcd5681-8314-11d6-977b-00c04f613221 container ------------ 6bcd5682-8314-11d6-977b-00c04f613221 container ------------ 6bcd5683-8314-11d6-977b-00c04f613221 container ------------ 6bcd5684-8314-11d6-977b-00c04f613221 container ------------ 6bcd5685-8314-11d6-977b-00c04f613221 container ------------ 6bcd5686-8314-11d6-977b-00c04f613221 container ------------ 6bcd5687-8314-11d6-977b-00c04f613221 container ------------ 6bcd5688-8314-11d6-977b-00c04f613221 container ------------ 6bcd5689-8314-11d6-977b-00c04f613221 container ------------ 6bcd568a-8314-11d6-977b-00c04f613221 container ------------ 6bcd568b-8314-11d6-977b-00c04f613221 container ------------ 6bcd568c-8314-11d6-977b-00c04f613221 container ------------ 6bcd568d-8314-11d6-977b-00c04f613221 container ------------ 6E157EDF-4E72-4052-A82A-EC3F91021A22 container ------------ 6ff880d6-11e7-4ed1-a20f-aac45da48650 container ------------ 71482d49-8870-4cb3-a438-b6fc9ec35d70 container ------------ 7868d4c8-ac41-4e05-b401-776280e8e9f1 container ------------ 7cfb016c-4f87-4406-8166-bd9df943947f container ------------ 7ffef925-405b-440a-8d58-35e8cd6e98c3 container ------------ 82112ba0-7e4c-4a44-89d9-d46c9612bf91 container ------------ 8437C3D8-7689-4200-BF38-79E4AC33DFA0 container ------------ 860c36ed-5241-4c62-a18b-cf6ff9994173 container ------------ 8ca38317-13a4-4bd4-806f-ebed6acb5d0c container ------------ 8ddf6913-1c7b-4c59-a5af-b9ca3b3d2c4c container ------------ 9738c400-7795-4d6e-b19d-c16cd6486166 container ------------ 98de1d3e-6611-443b-8b4e-f4337f1ded0b container ------------ 9cac1f66-2167-47ad-a472-2a13251310e4 container ------------ a1789bfb-e0a2-4739-8cc0-e77d892d080a container ------------ a3dac986-80e7-4e59-a059-54cb1ab43cb9 container ------------ a86fe12a-0f62-4e2a-b271-d27f601f8182 container ------------ ab402345-d3c3-455d-9ff7-40268a1099b6 container ------------ aed72870-bf16-4788-8ac7-22299c8207f1 container ------------ b96ed344-545a-4172-aa0c-68118202f125 container ------------ bab5f54d-06c8-48de-9b87-d78b796564e4 container Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 25 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Object Name Object Type ------------ c4f17608-e611-11d6-9793-00c04f613221 container ------------ c88227bc-fcca-4b58-8d8a-cd3d64528a02 container ------------ d262aae8-41f7-48ed-9f35-56bbb677573d container ------------ d85c0bfd-094f-4cad-a2b5-82ac9268475d container ------------ dda1d01d-4bd7-4c49-a184-46f9241b560e container ------------ de10d491-909f-4fb0-9abb-4b7865c0fe80 container ------------ f3dd09dd-25e8-4f9c-85df-12d6d2f2f2f5 container ------------ f58300d1-b71a-4db6-88a1-a8b9538beaca container ------------ f607fd87-80cf-45e2-890b-6cf97ec0e284 container ------------ f7ed4553-d82b-49ef-a839-2f38a36bb069 container --------- Windows2003Update container ------ IP Security container ------ Meetings container ------ MicrosoftDNS container ------ Policies container --------- {31B2F340-016D-11D2-945F-00C04FB984F9} groupPolicyContainer ------------ Machine container ------------ User container --------- {4AFDCFC6-BAED-4E1D-A3F8-6D5DC846945A} groupPolicyContainer ------------ Machine container ------------ User container --------- {5471F07B-E3BF-47E6-A2DF-40E55805852D} groupPolicyContainer ------------ Machine container ------------ User container --------- {6AC1786C-016F-11D2-945F-00C04fB984F9} groupPolicyContainer ------------ Machine container ------------ User container --------- {F754BFE4-52E2-45B3-9034-36D5C65E8700} groupPolicyContainer ------------ Machine container ------------ User container --------- {F9BA3B20-1DDA-41D1-B91A-77D94D6EAB7F} groupPolicyContainer ------------ Machine container ------------ User container ------ RAS and IAS Servers Access Check container ------ WinsockServices container ------ WMIPolicy container --------- PolicyTemplate container --------- PolicyType container --------- SOM container --------- WMIGPO container --- TEST GPO PC organizationalUnit --- Users container Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 26 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Domain In Active Directory a domain is a collection of computers defined by the administrator of a Windows 200x* Server network that shares a common directory database. A domain provides access to the centralized user accounts and group accounts maintained by the domain administrator. Each domain defines both an administrative boundary and a security boundary for a collection of objects that are relevant to a specific group of users on a network. A domain is an administrative boundary because administrative privileges do not extend to other domains. It is a security boundary because each domain has a security policy that extends to all accounts within the domain. Domains can be organised into parent-child relationships to form a hierarchy, which is called a domain tree. The domains that are part of a domain tree implicitly trust each other. Multiple domain trees can be connected together into a forest. All trees in a given forest trust each other via transitive hierarchical trust relationships. Organizational Unit An Organizational Unit (OU) is a general-purpose container that can hold objects and other OUs to create a hierarchy within a domain. OUs can form logical administrative units for users, groups, and resource objects, such as printers, computers, applications, and file shares. In large domains, various administrative tasks (such as access rights specification) can be delegated to an administrator for a specific OU, thereby freeing domain administrators from having to support such changes by proxy. Container A Container is used for grouping different objects together. Group Policy Container A Group Policy Container contains Group Policy objects. Active Directory Objects Active Directory objects are either container objects (e.g. OUs and Containers) or leaf objects. A container object stores other objects, and, as such, occupies a specific level in a tree or sub tree hierarchy. A leaf object does not contain other objects. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 27 of 154 Security Analysis: TESTBED System: Analysis Date: 3. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Domain Accounts Policy This report lists the effective Domain Account Policies defined for your system and compares them with Leading Practice. Policy Policy Value Leading Practice Minimum Password Length 7 8 or greater Effective Minimum Password Length 7 8 or greater Maximum Password Age in Days 20 30 to 60 Minimum Password Age in Days 1 0 Password History Size 24 22 or greater Password Complexity Enabled Enabled Reversible Password Encryption Disabled Disabled Lockout Threshold 3 3 Lockout Duration 0 0 Reset Lockout Counter in Minutes 30 1440 Force Logoff When Logon Time Expires Disabled Enabled Rename Administrator Account Not Defined New Name Rename Guest Account Not Defined New Name Allow Lockout of Local Administrator Account Disabled Enabled Disable Password Changes for Machine Accounts Disabled Disabled Number of Password Setting Objects (PSOs) defined on the system: 1 Leading Practice is the standard adopted by the top 10 to 20 percent of organisations. Functions of Accounts Policy Values and Potential Exposures Domain Accounts Policy values set the defaults for all accounts in a domain. Note that certain account policies can be overridden by policies defined in Password Setting Objects (from Windows 2008) and settings defined at account level. Appropriate policy values do not necessarily mean that security at account level is similarly appropriate. You should consult other sections of this report to confirm that security settings for individual accounts do not override your intended policy settings. Minimum Password Length Defines the minimum number of characters a password must contain. If it is zero then blank passwords are allowed. Allowing blank passwords is a very high security risk, as it could allow any person in possession of a valid User ID (Account Name) to gain access to your system if the account has a null password. This policy can be overridden by the Password Complexity policy. See Effective Minimum Password Length for details. The Leading Practice value is 8 or greater. Effective Minimum Password Length The effective minimum number of characters a password must contain when changing a user password. The value is calculated from the settings of the Minimum Password Length and Password Complexity parameters. If the Password Complexity policy is enabled, the system will only accept user passwords with a minimum of 3 characters that comply with Password Complexity requirements. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 28 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL For example: If the Minimum Password Length is 0 and the Password Complexity policy is enabled then the Effective Minimum Password Length will be 3. If the Minimum Password Length is 0 and the Password Complexity policy is disabled then the Effective Minimum Password Length will be 0. If the Minimum Password Length policy is set to a value of 3 or greater then the Effective Minimum Password Length will be the same as the Minimum Password Length policy regardless of the setting of the Password Complexity policy. Maximum Password Age in Days The period of time a password can be used before the system forces the user to change it. The value can be between 1 and 999 days. A value of 0 means that passwords never expire. Passwords that never expire are a security risk as they can be compromised over time. Note that it is possible to override this value in individual user accounts via the Password Never Expires option. Consult the Passwords that Never Expire report section. The Leading Practice value is 30 days. Minimum Password Age in Days The minimum number of days that must elapse between password changes. The value can be between 0 and 999 days. A value of ‘0’ allows a user to change her password immediately if she suspects it is known by someone else. However, this setting can increase the risk of passwords remaining the same despite system-enforced changes. This is because a user could change her password several times in quick succession until it is set back to the original value. Setting the Password History Size to a sufficiently large value can reduce this risk. The Leading Practice value is 0 (no restrictions). Password History Size Determines whether old passwords can be reused. It is the number of new passwords that must be used by a user account before an old password can be reused. For this to be fully effective, immediate changes should not be allowed under Minimum Password Age. The Leading Practice value is 22 or greater. Password Complexity In order to meet the password complexity requirement, passwords must contain characters from (for example) at least three (3) of the following four (4) classes: English Upper Case Letters (A, B, C, ... Z) English Lower Case Letters (a, b, c, ... z) Westernised Arabic Numerals (0, 1, 2, ... 9) Non-alphanumeric ("Special characters") (E.g., punctuation symbols) This policy has an effect on the Effective Minimum Password Length. Reversible Password Encryption Determines whether Windows 200x* will store passwords using reversible encryption. This policy setting provides support for applications, which use protocols that require knowledge of the user password for authentication purposes. Storing passwords using reversible encryption is essentially the same as storing cleartext versions of the passwords. For this reason, this policy should not be enabled unless application requirements outweigh the need to protect password information. By default, this setting is disabled in the Default Domain Group Policy for domains and in the local security policy of workstations and servers. Lockout Threshold, Lockout Duration and Reset Lockout Counter in Minutes Lockout Threshold indicates the number of failed logon attempts for user accounts before accounts are locked out. The value can be 1 to 999 failed attempts. A value of 0 will allow an unlimited number of failed logon attempts. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 29 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Lockout Duration indicates the amount of time an account will remain locked out when the Lockout Threshold is exceeded. The value can be 1 to 99999 minutes; a value of 0 (forever) indicates that the account cannot log on until an administrator unlocks it. N/A is set when Lockout Threshold is set to 0. Reset Lockout Counter in Minutes. Specifies the period within which invalid logon attempts are monitored. I.e. if the number of failed logon attempts defined in Lockout Threshold is reached within the number of minutes defined for Reset Lockout Counter in Minutes the account is locked out for the period specified under Lockout Duration. The value for Reset Lockout Counter in Minutes can be 1 to 99999 minutes. Allowing an excessive or unlimited number of invalid logon attempts can compromise security and allow intruders to log on to your system. Setting the Lockout Duration to 0 (forever) will help ensure that administrators are alerted of potential intruder attacks as only they can unlock accounts. Setting Lockout Duration to a small amount (e.g. 5 minutes) will undermine the effectiveness of the Lockout Threshold and administrators might not be alerted to potential intruder attacks. If the value for Reset Lockout Counter in Minutes is too small (e.g. 1 minute) it will increase the risk of intruders gaining access to your system via repeated password guessing attempts. If the value is too high it may inconvenience genuine users by locking out their accounts when they enter incorrect passwords accidentally. The Leading Practice values are: Lockout Threshold = 3 Lockout Duration = 0 (Forever) Reset Lockout Counter in Minutes = 1440 minutes Force Logoff When Logon Time Expires When enabled users will be forcibly disconnected from servers on the domain immediately after their valid logon hours are exceeded. Valid logon hours are defined at user account level. This option enhances security by ensuring that users are disconnected if they exceed their valid logon hours or do not log off when leaving work. However, it could be disruptive to users who have to work after hours and could compromise data integrity etc. This option should be used at the discretion of Management. Rename Administrator, Rename Guest It is good practice to ensure the Administrator and Guest built-in accounts are renamed via policy. This will minimise the risks of intruders using these well-known accounts when attempting to log on to the domain. Keep in mind that these accounts can also be renamed manually (for example, via the Active Directory Users and Computers interface). However, when compared to the irrevocable policy change method, the disadvantage of the manual approach is that administrative users can simply rename these accounts at a later stage (possibly back to Administrator and Guest). Allow Lockout of Local Administrator Account Allows the built-in administrator account to be locked out from network logons. This policy setting can be modified using the “passprop” command-line utility, which is included in the Windows 2000 Resource Kit. Disable Password Changes for Machine Accounts Removes the requirement that the machine account password be automatically changed every week. This value is ignored in Windows XP and later. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 30 of 154 Security Analysis: TESTBED System: Analysis Date: 4. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Domain Controller Policy Settings (Local Policy) The following 3 subsections relate to the Local Policy on the domain controller being analysed. In Active Directory, each domain controller can have different local policy settings. domain controllers generally inherit the same local policy settings because they typically belong to the same OU (e.g. Domain Controllers) to which the same policies apply. However, if domain controllers belong to different OUs, then different policy settings can be applied to them. This has important security implications as an account can, for example, be granted powerful rights on one or more domain controller while being denied the same rights on other domain controllers. The policy for domain controllers can then be inconsistent and increase security risks. This report provides policy settings for the domain controller where the SekChek Scan process was run. 4.1 Audit Policy Settings Account Logon Audited Events Credential Validation Success & Failure Kerberos Authentication Service Failure Kerberos Service Ticket Operations Failure Other Account Logon Events Failure Account Management Audited Events Application Group Management Success Computer Account Management Success Distribution Group Management Success Other Account Management Events Success Security Group Management Success User Account Management Success Detailed Tracking Audited Events DPAPI Activity Success Process Creation Success & Failure Process Termination Success RPC Events Success DS Access Audited Events Detailed Directory Service Replication No Auditing Directory Service Access No Auditing Directory Service Changes Success Directory Service Replication No Auditing Logon / Logoff Audited Events Account Lockout Success Audit User / Device Claims ** Failure IPsec Extended Mode Failure IPsec Main Mode Success IPsec Quick Mode Failure Logoff Success Logon Success & Failure Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 31 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 Network Policy Server Failure Other Logon/Logoff Events Failure Special Logon Failure Object Access Audited Events Application Generated Success & Failure Central Access Policy Staging ** Failure Certification Services No Auditing Detailed File Share Failure File Share Success & Failure File System No Auditing Filtering Platform Connection Success & Failure Filtering Platform Packet Drop Success & Failure Handle Manipulation Success & Failure Kernel Object No Auditing Other Object Access Events Failure Registry Failure Removable Storage ** Failure SAM No Auditing Policy Change Audited Events Audit Policy Change Success & Failure Authentication Policy Change Success & Failure Authorization Policy Change Success Filtering Platform Policy Change Success MPSSVC Rule-Level Policy Change Success Other Policy Change Events Success Privilege Use Audited Events Non Sensitive Privilege Use Failure Other Privilege Use Events Failure Sensitive Privilege Use Failure System Audited Events IPsec Driver Success Other System Events Success Security State Change Success & Failure Security System Extension Success System Integrity Success & Failure Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) CONFIDENTIAL Page 32 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Explanation of Audit Policy Settings Account Logon Audit logon attempts by privileged accounts that log on to the domain controller. These audit events are generated when the Kerberos Key Distribution Center (KDC) logs on to the domain controller. Credential Validation Audits events generated by validation tests on user account logon credentials. Kerberos Authentication Service Audits events generated by Kerberos authentication ticket-granting ticket (TGT) requests. Kerberos Service Ticket Operations Audits events generated by Kerberos service ticket requests. Other Account Logon Events Audits events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. Account Management Audit attempts to create, delete, or change user or group accounts. Also, audit password changes. Application Group Management Audits events generated by changes to application groups. Computer Account Management Audits events generated by changes to computer accounts, such as when a computer account is created, changed, or deleted. Distribution Group Management Audits events generated by changes to distribution groups. Other Account Management Events Audits events generated by other user account changes that are not covered in this category. Security Group Management Audits events generated by changes to security groups. User Account Management Audits changes to user accounts. Detailed Tracking Audit-specific events, such as program activation, some forms of handle duplication, indirect access to an object, and process exit. DPAPI Activity Audits events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. Process Creation Audits events generated when a process is created or starts. The name of the application or user that created the process is also audited. Process Termination Audits events generated when a process ends. RPC Events Audits inbound remote procedure call (RPC) connections. DS Access Audit attempts to access the directory service. Detailed Directory Service Replication Audits events generated by detailed AD DS replication between domain controllers. Directory Service Access Audits events generated when an AD DS object is accessed. Only AD DS objects with a matching SACL are logged. Directory Service Changes Audits events generated by changes to AD DS objects. Events are logged when an object is created, deleted, modified, moved, or undeleted. Directory Service Replication Audits replication between two AD DS domain controllers. Logon / Logoff Audit attempts to log on to or log off of the system. Also, audit attempts to make a network connection. Account Lockout Audits events generated by a failed attempt to log on to an account that is locked out. Audit User / Device Claims ** From Server 2012. Audits user and device claims information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. User claims are added to a logon token when claims are included with a user's account attributes in Active Directory. IPsec Extended Mode Audits events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations. IPsec Main Mode Audits events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. IPsec Quick Mode Audits events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 33 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Logoff Audits events generated by closing a logon session. These events occur on the computer that was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. Logon Audits events generated by user account logon attempts on a computer. Network Policy Server Audits events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and Unlock. Other Logon/Logoff Events Audits other events related to logon and logoff that are not included in the Logon/Logoff category. Special Logon Audits events generated by special logons. Object Access Audit attempts to access securable objects. Application Generated Audits applications that generate events by using the Windows Auditing application programming interfaces (APIs). Applications designed to use the Windows Auditing API use this subcategory to log auditing events related to their function. Central Access Policy Staging ** From Server 2012. Audits access requests where the permission granted or denied by a proposed policy differs from that granted or denied by the current central access policy on an object. Certification Services Audits Active Directory Certificate Services (AD CS) operations. Detailed File Share Audits every attempt to access objects in a shared folder. File Share Audits attempts to access a shared folder. File System Audits user attempts to access file system objects. A security audit event is generated only for objects that have SACLs and only if the type of access requested, such as Write, Read, or Modify, and the account making the request match the settings in the SACL. Filtering Platform Connection Audits connections that are allowed or blocked by WFP. Filtering Platform Packet Drop Audits packets that are dropped by Windows Filtering Platform (WFP). Handle Manipulation Audits events generated when a handle to an object is opened or closed. Only objects with a matching SACL generate security audit events. Open and close handle events will be audited when both the Handle Manipulation subcategory is enabled along with the corresponding resource manager identified by other Object Access audit subcategory, like File System or Registry. Enabling Handle Manipulation causes implementation-specific security event data to be logged identifying the permissions that were used to grant or deny the access requested by the user; this is also known as "Reason for access". Kernel Object Audits attempts to access the system kernel, which include mutexes and semaphores. Only kernel objects with a matching SACL generate security audit events. Note: The Audit: Audit the access of global system objects policy setting controls the default SACL of kernel objects. Other Object Access Events Audits events generated by the management of Task Scheduler jobs or COM+ objects. Registry Audits attempts to access registry objects. A security audit event is generated only for objects that have SACLs and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL. Removable Storage ** From Server 2012. Audits user attempts to access file system objects on any Removable Storage device. A security audit event is generated for every read or write access to a file object on any Removable Storage device attached to the user’s machine. SAM Audits events generated by attempts to access Security Accounts Manager (SAM) objects. Policy Change Audit attempts to change Policy object rules. Audit Policy Change Audits changes in security audit policy settings. Authentication Policy Change Audits events generated by changes to the authorization policy. Authorization Policy Change Audits events generated by changes to the authentication policy. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 34 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Filtering Platform Policy Change Audits events generated by changes to Windows Filtering Platform (WFP). MPSSVC Rule-Level Policy Change Audits events generated by changes in policy rules used by Windows Firewall. Other Policy Change Events Audits events generated by other security policy changes that are not audited in the Policy Change category. Privilege Use Audit attempts to use privileges. Non Sensitive Privilege Use Audits events generated by the use of nonsensitive privileges (user rights), such as logging on locally or with a Remote Desktop connection, changing the system time, or removing a computer from a docking station. Other Privilege Use Events Audits other privilege use events. Sensitive Privilege Use Audits events generated by the use of sensitive privileges (user rights), such as acting as part of the operating system, backing up files and directories, impersonating a client computer, or generating security audits. System Audit attempts to shut down or restart the computer. Also, audit events that affect system security or the security log. IPsec Driver Audits events that are generated by the IPsec filter driver. Other System Events Audits any of the following events: Startup and shutdown of the Windows Firewall Security policy processing by the Windows Firewall Cryptography key file and migration operations Security State Change Audits events generated by changes in the security state of the computer. Security System Extension Audits events related to security system extensions or services. System Integrity Audits events that violate the integrity of the security subsystem. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 35 of 154 Security Analysis: TESTBED System: Analysis Date: 4.2 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Event log Settings Policy Policy Value Maximum Application Log Size 20480 Maximum Security Log Size 131072 Maximum System Log Size 20480 Restrict Guest Access to Application Log Enabled Restrict Guest Access to Security Log Enabled Restrict Guest Access to System Log Enabled Retain Application Log N/A Retain Security Log N/A Retain System Log N/A Retention Method for Application Log As Needed Retention Method for Security Log As Needed Retention Method for System Log As Needed Shutdown Computer when Security Log is Full Disabled Event Logs Features Event logs contain all events logged by the system auditing controls (audit policy). In this way a wide variety of events can be monitored to track different activities. Information can also be gathered about hardware, software, and system problems. Careful monitoring of event logs can help in predicting and identifying the sources of system problems. For example, if log warnings show that a disk driver can only read or write to a sector after several retries, the sector is likely to go bad eventually. Event logs can also confirm problems with software. If a program crashes, a program event log can provide a record of activity leading up to the event. Windows records events in the following Event logs: Application log The application log contains events logged for programs/applications. Security log The security log contains valid and invalid logon attempts as well as events related to resource use, such as creating, opening, or deleting files or other objects. For example, if you have enabled logon and logoff auditing, attempts to log on to the system are recorded in the security log. System log The system log contains events logged by Windows’ system components. For example, the failure of a driver or other system component to load during start up is recorded in the system log. The event types logged by system components are predetermined by Windows. Log Size and Retention Method for Logs The Log Size is in Kilobytes. When the Log Size Limit is reached the Retention Method for Logs defines the action that will be taken: If Overwrite events as needed (As needed) is selected, the log will not be archived. This option is a good choice for low-maintenance systems. The Overwrite events older than and Retain Log (in days) options specify the appropriate number of days the log will be archived at scheduled intervals. This strategy minimises the chance of losing important log entries and at the same time keeps log sizes reasonable. If the Do not overwrite events (Manually) option is specified all the events will remain in the log. This option requires that the log be cleared manually. When the maximum log size is reached, new events will be discarded. If Overwrite events as needed (As needed) or Do not overwrite events (Manually) options are selected, the Retain Log (in days) option is not available (N/A). Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 36 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Restrict Guest Access to Application, Security, System Logs It is a good practice to enable this feature as it minimises the risks of unauthorised persons getting read access to logs. The Shut down when Security Log is Full option ensures that no auditable activities, including security violations, occur while the system is unable to log them. This option should be used at the discretion of Management, as the system will automatically shutdown when the security log is full. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 37 of 154 Security Analysis: TESTBED System: Analysis Date: 4.3 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Security Option Settings Policy Description Policy Value Allow server operators to Determines if Server Operators are allowed to submit jobs by Disabled schedule tasks means of the AT schedule facility. By default, you must be an administrator in order to submit jobs by means of the AT scheduler. Enabling this security policy setting allows members of the Server Operators group to submit AT schedule jobs on Domain Controllers without having to make them Administrators. This policy is not defined by default. Allow system to be shut Determines whether a computer can be shut down without having Disabled down without having to log to log on to Windows. When this policy is enabled, the Shut Down on command is available on the Windows logon screen. When this policy is disabled, the option to shut down the computer does not appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right in order to perform a system shutdown. By default, this option is enabled on workstations and disabled on servers in Local Computer Policy. Amount of idle time required Determines the amount of continuous idle time that must pass in a 15 before disconnecting session Server Message Block (SMB) session before the session is (minutes) disconnected due to inactivity. Administrators can use this policy to control when a computer disconnects an inactive SMB session. If client activity resumes, the session is automatically reestablished. This policy is defined for servers by default in Local Computer Policy with a default value of 15 minutes. This policy is not defined on workstations. For this policy setting, a value of 0 means to disconnect an idle session as quickly as reasonably possible. Audit the access of global Determines whether access of global system objects will be Disabled system objects audited.These objects are not generally visible to or known by a typical user. Enabling this option can introduce so many audit entries into the security log that locating real security problems becomes considerably more difficult. In some situations, this option can be useful. For example, where custom applications are being developed, the “users” are not just the people that interactively log on, but also the programmers who are developing applications. These programmers might be able to directly access these objects. Audit use of backup and When files are being backed up or restored, the system checks to Disabled restore privilege ensure that the user performing the backup has the Backup or Restore right each time a file is copied to or being restored from backup media. By default, the system does not record these events, because this could flood the security log. This option should be enabled only in special cases of auditing of high-level security installations. Clear virtual memory page A paging file is a system file, so it cannot be encrypted. The file Disabled file when system shuts down system security for paging files prevents any user from gaining access to and reading these files, and these security settings cannot be changed. However, someone other than the authorized user might start the computer under a different operating system to read a Windows 2000 paging file. To prevent others from reading the contents of paging files that might contain plaintext of encrypted files, enabling this option will clear the paging files every time the computer shuts down. Digitally sign client Enabling this option ensures that the Client communicates with Disabled communication (always) only those Servers that are enabled for SMB (Server Message Block) message signing. Digitally sign communication possible) client This option enables the Server Message Block (SMB) Enabled (when authentication protocol on the client. SMB places a digital security signature into each message block. If SMB signing is enabled on a server, then clients that are also enabled for SMB signing will use the new protocol during all subsequent sessions and clients that are not enabled for SMB signing will use the older SMB protocol. Digitally sign server Enabling this option ensures that the Server communicates with Enabled communication (always) only those clients that are enabled for SMB (Server Message Block) message signing. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 38 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 Policy Description Digitally sign communication possible) CONFIDENTIAL Policy Value server This option enables the Server Message Block (SMB) Enabled (when authentication protocol on the server. SMB places a digital security signature into each message block. If SMB signing is enabled on the client, then the server that is also enabled for SMB signing will use the new protocol during all subsequent sessions and the server that is not enabled for SMB signing will use the older SMB protocol. Disable CTRL+ALT+DEL By default, users are required to press CTRL+ALT+DEL before Disabled requirement for logon logging on. This is because programs can be designed to appear as a logon screen and collect account passwords. By pressing CTRL+ALT+DEL these programs can be foiled. Disabling CTRL+ALT+DEL is a potential security risk. Do not display last user By default, Windows 2000 places the username of the last user to Disabled name in logon screen log on the computer in the Username text box of the Logon dialog box. This makes it more convenient for the most frequent user to log on. To help keep usernames secret, you can enable this option. This is especially useful if a computer that is generally accessible is being used, for example, for the (renamed) built-in Administrator account. Message text for attempting to logon users Windows 2000 can display a message box with the caption and text of your choice before a user logs on. Many organizations use this message box to display a warning message that notifies potential users that they can be held legally liable if they attempt to use the computer without having been properly authorized to do so. The absence of such a notice could be construed as an invitation, without restriction, to enter and browse the system. Message title for attempting to logon users This is the title for the message box above. Prevent system maintenance Determines whether the computer account password should be Disabled of computer account prevented from being reset every week. As a part of Windows password 2000 security, computer account passwords are changed automatically every seven days. If this policy is enabled, the machine is prevented from requesting a weekly password change. If this policy is disabled, a new password for the computer account will be generated every week. This policy is defined by default in Local Computer Policy where it is disabled by default. Prevent users from installing Determines whether members of the Users group are prevented Enabled printer drivers from installing print drivers. If this policy is enabled, it prevents users from installing printer drivers on the local machine. This prevents users from "Adding Printers" when the device driver does not exist on the local machine. If this policy is disabled, then a member of the Users group can install printer drivers on the computer. By default, this setting is enabled on servers and disabled on workstations. Prompt user to change Determines how far in advance Windows 2000 should warn users 0 password before expiration that their password is about to expire. By giving the user advanced (days) warning, the user has time to construct a sufficiently strong password. By default, this value is set to 14 days. Recovery automatic logon Console: Allow By default, the Recovery Console requires you to provide the Disabled administrative password for the Administrator account before accessing the system. If this option is set, the Recovery Console does not require you to provide a password and will automatically log on to the system. Activating this policy eliminates a security barrier used to protect your computer against intruders. You should only enable this policy on systems that have controlled access to the console, such as those in rooms that can be locked. Recovery Console: Allow This policy allows a floppy/stiffy drive copy and access to all drives Disabled floppy copy and access to all and all folders during a Recovery Console session (a text-mode drives and all folders command interpreter that allows the system administrator to gain access to the hard disk of a computer running Windows 2000, regardless of the file format used, for basic troubleshooting and system maintenance). Restrict CD-ROM access to By default, Windows 2000 allows any program to access files on Disabled locally logged-on users only CDs. In a highly secure, multi-user environment, it can be useful to allow only the person locally logged on to access those devices. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 39 of 154 Security Analysis: TESTBED System: Analysis Date: Policy PUFFADDER (Snake.com) 08-Nov-2013 Description CONFIDENTIAL Policy Value Restrict floppy access to By default, Windows 2000 allows any program to access files on Disabled locally logged-on users only floppy/stiffy disks. In a highly secure, multi-user environment, it can be useful to allow only the person locally logged on to access those devices. Secure channel: Digitally Determines whether the computer will always digitally encrypt or Enabled encrypt or sign secure sign secure channel data. When a Windows 2000 system joins a channel data (always) domain, a computer account is created. Thereafter, when the system boots, it uses the password for that account to create a secure channel with the domain controller for its domain. Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked and not all information is encrypted. If this policy is enabled, all outgoing secure channel traffic must be either signed or encrypted. If this policy is disabled, signing and encryption are negotiated with the domain controller. By default, this policy is disabled. This option should only be enabled if all of the domain controllers in all the trusted domains support signing and sealing. Secure channel: Digitally Determines whether the computer will always digitally encrypt or Enabled encrypt secure channel data sign secure channel data. When a Windows 2000 system joins a (when possible) domain, a computer account is created. Thereafter, when the system boots, it uses the password for that account to create a secure channel with the domain controller for its domain. Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked and not all information is encrypted. If this policy is enabled, all outgoing secure channel traffic should be encrypted. If this policy is disabled, outgoing secure channel traffic will not be encrypted. By default, this option is enabled. Secure channel: Digitally Determines whether the computer will always digitally encrypt or Enabled sign secure channel data sign secure channel data. When a Windows 2000 system joins a (when possible) domain, a computer account is created. Thereafter, when the system boots, it uses the password for that account to create a secure channel with the domain controller for its domain. Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked and not all information is encrypted. If this policy is enabled, all outgoing secure channel traffic should be signed. If this policy is disabled, no outgoing secure channel traffic will be signed. By default, this option is enabled. Secure channel: Require If this policy is enabled, all outgoing secure channel traffic will Enabled strong (Windows 2000 or require a strong (Windows 2000 or later) encryption key. If this later) session key policy is disabled, the key strength is negotiated with the Domain Controller (DC). This option should only be enabled if all of the DCs in all trusted domains support strong keys. By default, this value is disabled. Send unencrypted password If this policy is enabled, the Server Message Block (SMB) Disabled to connect to third-party SMB redirector is allowed to send clear-text passwords to non-Microsoft servers SMB servers which do not support password encryption during authentication. By default, this option is disabled. This setting can weaken the overall security of an environment and should only be used after careful consideration of the consequences of plain text passwords in your specific environment. Shut down system Determines whether the system should shut down if it is unable to Disabled immediately if unable to log log security events. If this policy is enabled, it causes the system to security audits halt if a security audit cannot be logged for any reason. Typically, an event will fail to be logged when the security audit log is full and the retention method specified for the security log is either Do Not Overwrite Events or Overwrite Events by Days. If the security log is full and an existing entry cannot be overwritten and this security option is enabled, the following blue screen error will occur: STOP: C0000244 {Audit Failed} An attempt to generate a security audit failed. To recover, an administrator must log on, archive the log (if desired), clear the log, and reset this option as desired. By default, this policy is disabled. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 40 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 Policy Description CONFIDENTIAL Policy Value Strengthen default Determines the strength of the default discretionary access control Enabled permissions of global system list (DACL) for objects. Windows 2000 maintains a global list of objects shared system resources such as DOS device names, mutexes, and semaphores. In this way, objects can be located and shared among processes. Each type of object is created with a default DACL that specifies who can access the objects with what permissions. If this policy is enabled, the default DACL is stronger, allowing non-admin users to read shared objects, but not modify shared objects that they did not create. By default, this option is enabled. Unsigned driver installation Determines what should happen when an attempt is made to install Silently succeed behavior a device driver (by means of the Windows 2000 device installer) that has not been certified by the Windows Hardware Quality Lab (WHQL). The options are: Silently succeed, Warn but allow installation, Do not allow installation. The default setting is to Warn but allow installation. Unsigned non-driver Determines what should happen when an attempt is made to install Warn, but allow installation installation behavior a device driver (by means of the Windows 2000 device installer) that has not been certified by the Windows Hardware Quality Lab (WHQL). The options are: Silently succeed, Warn but allow installation, Do not allow installation. The default setting is to Warn but allow installation. Implications The correct Security Option settings will enhance security, auditing and management. Enabling some of these policies can strengthen security but undermine the performance, operational ease of use, or connectivity with clients using third party or earlier versions of authentication protocols. On the other hand, enabling others, will decrease security, but enhance performance, functionality, and connectivity. Risk Rating Low to high. (Dependant on the security setting being considered). Recommended Action Ensure that Security Option settings are set to appropriate values as required. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 41 of 154 Security Analysis: TESTBED System: Analysis Date: 5. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Group Policy Objects The following five sub-sections list important properties of all the Group Policy Objects (GPOs) defined on your system. This includes their status, their links to Organizational Units (OUs), account permissions over the GPOs and the various policies defined by them. Description and Properties for Group Policy Objects Summary of GPOs defined on the system Summary of GPOs and their Links to OUs Summary of OUs and their Links to GPOs Detailed listing of GPOs defined on the system GPO Version Discrepancies 5.1 Description and Properties for Group Policy Objects GPOs are applied in a hierarchical fashion starting with GPOs linked to Containers at the top of the tree and ending with GPO-links at the bottom of the tree. The sequence in which GPOs are applied is: The Local GPO on the machine used to login to the system GPOs linked to Sites Domain-linked GPOs GPOs linked to Organizational Units In general, policies applied later override those defined earlier. However, this can be altered by the ‘No Override’ and ‘Block Inheritance’ options, by disabling a GPO-link or a Policy Configuration segment, or by removing ‘Read’ or ‘Apply Policy’ access from accounts. Explanation of Common Terms What follows is an explanation of the common terms used in this sub-section: GPO Display Name. The user-friendly name for the GPO. GPO Exists on Disk. Indicates whether the GPO physically exists in the SYSVOL directory. If it does not exist it has probably been deleted directly, rather than through the appropriate Group Policy maintenance functions. Computer Configuration Disabled. Indicates the status of the Computer Configuration part of the GPO. If disabled, the various policies (e.g. Rights definitions) defined in the Computer segment of the GPO are ignored when the system applies policy on the system. User Configuration Disabled. Indicates the status of the User Configuration part of the GPO. If disabled, the various policies defined in the User segment of the GPO are ignored when the system applies policy on the system. This does not affect the policies in the Computer segment of the GPO. Container. The name of the Container (OU) objects to which the GPO is linked. Type. The type of the Container object. This can be a Domain, ‘OU’ (Organizational Unit) or Site. No Override. Indicates whether the policies defined in the GPO can be overridden by conflicting policies linked to other Container at lower levels in the Active Directory tree. If ‘Yes’, policies defined in this GPO cannot be overridden by GPOs linked at lower levels. Link Disabled. Indicates the status of the GPO-link to the specified Container. If ‘Yes’, the GPO is not applied to that Container. This does not affect links that the GPO may have to other Container objects. Block Inheritance. Indicates whether policies from higher-level Container are inherited by this Container. If ‘Yes’, policies flowing down from higher-level Container objects are not inherited. If ‘No Override’ and ‘Block Inheritance’ options conflict with each other (i.e. they are both set) the ‘No Override’ option will always take precedence. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 42 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Policies Reported On The following policy definitions are listed for each GPO on your system: GPO Permissions. Lists the permissions that user accounts and groups have over the GPO. The GPO will not be applied to the account (or members of the group) if it does not have ‘Read’ or ‘Extended Rights’ (Apply Group Policy) access to the GPO. Rights Policies. Lists the various Rights defined in the GPO. An empty space in the Account Name column indicates that the Right is defined, but is not assigned to anyone. Rights not listed under ‘Rights Defined’ are not defined in the GPO. Rights policies can only be defined in the Computer Configuration part of the GPO. Event Audit. Lists the various Event Audit settings defined in the GPO. Several events such as when users are logged on, when they access resources, or when they attempt to use special privileges can be configured for the GPO audit. Audited events can only be defined in the Computer Configuration part of the GPO. Event Logging. This lists the control settings such as size and retention method for the Application, Security and System event logs. Event logging can only be defined in the Computer Configuration part of the GPO. System Access. Lists the security control settings for the password and lockout policy in Windows 200x* domains. System access can only be defined in the Computer Configuration part of the GPO. Kerberos Policy. Lists the Kerberos settings defined in the GPO. Kerberos policy can only be defined in the Computer Configuration part of the GPO. Registry Keys. Lists the various Registry keys used to configure security settings for the GPO, including access control, audit, and ownership. Registry keys can only be defined in the Computer Configuration part of the GPO. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 43 of 154 Security Analysis: TESTBED System: Analysis Date: 5.2 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Summary of GPOs defined on the system There are a total of 6 GPOs defined on your system: 0% (0) exist on disk, but are not linked to any container 50% (3) do not exist on disk 0% (0) have the Computer Configuration Disabled 0% (0) have the User Configuration Disabled 50% (3) are not linked to a container Policy GUID Display Name GPO Computer User Nbr Exists Config Config Links on Disk Disabled Disabled {31B2F340-016D-11D2945F-00C04FB984F9} Default Domain Policy No No No 0 {4AFDCFC6-BAED-4E1DA3F8-6D5DC846945A} Regional Settings workstations No No No 0 {5471F07B-E3BF-47E6A2DF-40E55805852D} New Group Policy Object No No No 0 {6AC1786C-016F-11D2945F-00C04fB984F9} Default Domain Controllers Policy Yes No No 1 {F754BFE4-52E2-45B39034-36D5C65E8700} Snake GPO test Yes No No 1 {F9BA3B20-1DDA-41D1B91A-77D94D6EAB7F} Regional and Language Yes No No 1 For details of all GPO properties see worksheet GPOs_Summary in the MS-Excel workbook. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 44 of 154 Security Analysis: TESTBED System: Analysis Date: 5.3 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Summary of GPOs and their Links to OUs Policy GUID Object Object Type No O/Ride Link Block GPO Computer User Disabled Inh at Exists Config Config OU on Disabled Disabled Level Disk {6AC1786C-016F-11D2945F-00C04fB984F9} Domain Controllers OU No No No Yes No No {F754BFE4-52E2-45B39034-36D5C65E8700} TEST GPO PC OU No No No Yes No No {F9BA3B20-1DDA-41D1B91A-77D94D6EAB7F} TEST GPO PC OU Yes No No Yes No No Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 45 of 154 Security Analysis: TESTBED System: Analysis Date: 5.4 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Summary of OUs and their Links to GPOs Note: GPOs are listed in order of precedence. Object Object Type Policy GUID No Link Block GPO Computer User O/Ride Disabled Inh at Exists Config Config OU on Disabled Disabled Level Disk Domain Controllers OU {6AC1786C-016F-11D2945F-00C04fB984F9} No No No Yes No No TEST GPO PC OU {F9BA3B20-1DDA-41D1B91A-77D94D6EAB7F} Yes No No Yes No No OU {F754BFE4-52E2-45B39034-36D5C65E8700} No No No Yes No No Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 46 of 154 Security Analysis: TESTBED System: Analysis Date: 5.5 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL GPOs Defined and their Details System/ Policies/ {31B2F340-016D-11D2-945F-00C04FB984F9} GPO Display Name: Default Domain Policy GPO Exists on Disk: No Computer Configuration Disabled: No User Configuration Disabled: No GPO Links: ** No data found ** GPO Permissions: Account Name Type Permission Allow/Deny Authenticated Users well-known All Extended Rights Allow Authenticated Users well-known Read All Properties Allow CREATOR OWNER well-known Read All Properties Allow Domain Admins group Read All Properties Allow Domain Admins group Read All Properties Allow Domain Users group All Extended Rights Allow Domain Users group Read All Properties Allow Enterprise Admins group Read All Properties Allow ENTERPRISE DOMAIN CONTROLLERS well-known Read All Properties Allow SYSTEM well-known Read All Properties Allow User4 user All Extended Rights Allow User4 user Read All Properties Allow Rights Policies: ** No data found ** Event Audit: ** No data found ** Event Logging: ** No data found ** System Access: ** No data found ** Kerberos Policy: ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 47 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Registry Keys: ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 48 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL System/ Policies/ {4AFDCFC6-BAED-4E1D-A3F8-6D5DC846945A} GPO Display Name: Regional Settings workstations GPO Exists on Disk: No Computer Configuration Disabled: No User Configuration Disabled: No GPO Links: ** No data found ** GPO Permissions: Account Name Type Permission Allow/Deny Authenticated Users well-known All Extended Rights Allow Authenticated Users well-known Read All Properties Allow CREATOR OWNER well-known Read All Properties Allow Domain Admins group Read All Properties Allow Domain Admins group Read All Properties Allow Domain Users group All Extended Rights Allow Domain Users group Read All Properties Allow Enterprise Admins group Read All Properties Allow ENTERPRISE DOMAIN CONTROLLERS well-known Read All Properties Allow SYSTEM well-known Read All Properties Allow User4 user All Extended Rights Allow User4 user Read All Properties Allow Users group All Extended Rights Allow Users group Read All Properties Allow Rights Policies: ** No data found ** Event Audit: ** No data found ** Event Logging: ** No data found ** System Access: ** No data found ** Kerberos Policy: ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 49 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Registry Keys: ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 50 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL System/ Policies/ {5471F07B-E3BF-47E6-A2DF-40E55805852D} GPO Display Name: New Group Policy Object GPO Exists on Disk: No Computer Configuration Disabled: No User Configuration Disabled: No GPO Links: ** No data found ** GPO Permissions: Account Name Type Permission Allow/Deny Authenticated Users well-known All Extended Rights Allow Authenticated Users well-known Read All Properties Allow CREATOR OWNER well-known Read All Properties Allow Domain Admins group Read All Properties Allow Domain Admins group Read All Properties Allow Enterprise Admins group Read All Properties Allow ENTERPRISE DOMAIN CONTROLLERS well-known Read All Properties Allow SYSTEM well-known Read All Properties Allow Rights Policies: ** No data found ** Event Audit: ** No data found ** Event Logging: ** No data found ** System Access: ** No data found ** Kerberos Policy: ** No data found ** Registry Keys: ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 51 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL System/ Policies/ {6AC1786C-016F-11D2-945F-00C04fB984F9} GPO Display Name: Default Domain Controllers Policy GPO Exists on Disk: Yes Computer Configuration Disabled: No User Configuration Disabled: No GPO Links: Object Type No O/Ride Link Block Inheritance Disabled at OU Level Domain Controllers OU No No No GPO Permissions: Account Name Type Authenticated Users well-known All Extended Rights Allow Permission Allow/Deny Authenticated Users well-known Read All Properties Allow CREATOR OWNER well-known Read All Properties Allow Domain Admins group Read All Properties Allow Domain Admins group Read All Properties Allow Enterprise Admins group Read All Properties Allow ENTERPRISE DOMAIN CONTROLLERS well-known Read All Properties Allow SYSTEM well-known Read All Properties Allow Rights Policies: Right Account Name Type Access this computer from the network Administrators group Authenticated Users well-known Enterprise Domain Controllers well-known Everyone well-known Pre-Windows 2000 Compatible Access group Add workstations to domain Authenticated Users well-known Adjust memory quotas for a process *S-1-5-80-1144924461-1383973570-550994615-10934346893433800466 unknown *S-1-5-80-4003569689-492506040-2645153450-11627625682405087996 unknown Administrators group Local Service well-known Network Service well-known Account Operators group Administrators group Backup Operators group Print Operators group Act as part of the operating system Allow log on locally Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 52 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 Right CONFIDENTIAL Account Name Type Server Operators group Administrators group Backup Operators group Server Operators group *S-1-5-80-1144924461-1383973570-550994615-10934346893433800466 unknown *S-1-5-80-4003569689-492506040-2645153450-11627625682405087996 unknown Administrators group Authenticated Users well-known Everyone well-known Pre-Windows 2000 Compatible Access group Administrators group Local Service well-known Server Operators group Administrators group Debug programs Administrators group Deny access to this computer from the network SUPPORT_388945a0 user SophosSAUPUFFADDER0 user SUPPORT_388945a0 user Enable accounts to be trusted for delegation Administrators group Force shutdown from a remote system Administrators group Server Operators group Local Service well-known Network Service well-known Increase scheduling priority Administrators group Load and unload device drivers Administrators group Print Operators group Local Service well-known SUPPORT_388945a0 user *S-1-5-80-1144924461-1383973570-550994615-10934346893433800466 unknown *S-1-5-80-4003569689-492506040-2645153450-11627625682405087996 unknown Network Service well-known SophosSAUPUFFADDER0 user SQLServer2005SQLBrowserUser$PUFFADDER group SYSTEM well-known Manage auditing and security log Administrators group Modify firmware environment values Administrators group Backup files and directories Bypass traverse checking Change the system time Create a page file Create a token object Create permanent shared objects Deny log on as a batch job Deny log on as a service Deny log on locally Generate security audits Lock pages in memory Log on as a batch job Log on as a service Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 53 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Right Account Name Type Profile single process Administrators group Profile system performance Administrators group Remove computer from docking station Administrators group Replace a process-level token *S-1-5-80-1144924461-1383973570-550994615-10934346893433800466 unknown *S-1-5-80-4003569689-492506040-2645153450-11627625682405087996 unknown Local Service well-known Network Service well-known Administrators group Backup Operators group Server Operators group Administrators group Backup Operators group Print Operators group Server Operators group Administrators group Restore files and directories Shut down the system Synchronize directory service data Take ownership of files or other objects Event Audit: Policy Name Policy Value Audit Account Logon Events Success Audit Account Management Success Audit Directory Service Access Success Audit Logon Events Success Audit Object Access No Auditing Audit Policy Change Success Audit Privilege Use No Auditing Audit Process Tracking No Auditing Audit System Events Success Event Logging: ** No data found ** System Access: ** No data found ** Kerberos Policy: ** No data found ** Registry Keys: Registry Key Registry Value HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel 2 Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 54 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Registry Key Registry Value HKLM\System\CurrentControlSet\Services\LanManServer\Parameters\EnableSecuritySignature 1 HKLM\System\CurrentControlSet\Services\LanManServer\Parameters\RequireSecuritySignature 1 HKLM\System\CurrentControlSet\Services\Netlogon\Parameters\RequireSignOrSeal 1 HKLM\System\CurrentControlSet\Services\NTDS\Parameters\LDAPServerIntegrity 1 Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 55 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL System/ Policies/ {F754BFE4-52E2-45B3-9034-36D5C65E8700} GPO Display Name: Snake GPO test GPO Exists on Disk: Yes Computer Configuration Disabled: No User Configuration Disabled: No GPO Links: Object Type No O/Ride Link Block Inheritance Disabled at OU Level TEST GPO PC OU No No No GPO Permissions: Account Name Type Authenticated Users well-known All Extended Rights Allow Permission Allow/Deny Authenticated Users well-known Read All Properties Allow CREATOR OWNER well-known Read All Properties Allow Domain Admins group Read All Properties Allow Domain Admins group Read All Properties Allow Enterprise Admins group Read All Properties Allow ENTERPRISE DOMAIN CONTROLLERS well-known Read All Properties Allow SYSTEM well-known Read All Properties Allow Rights Policies: ** No data found ** Event Audit: ** No data found ** Event Logging: ** No data found ** System Access: ** No data found ** Kerberos Policy: ** No data found ** Registry Keys: ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 56 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL System/ Policies/ {F9BA3B20-1DDA-41D1-B91A-77D94D6EAB7F} GPO Display Name: Regional and Language GPO Exists on Disk: Yes Computer Configuration Disabled: No User Configuration Disabled: No GPO Links: Object Type No O/Ride Link Block Inheritance Disabled at OU Level TEST GPO PC OU Yes No No GPO Permissions: Account Name Type Authenticated Users well-known All Extended Rights Allow Permission Allow/Deny Authenticated Users well-known Read All Properties Allow CREATOR OWNER well-known Read All Properties Allow Domain Admins group Read All Properties Allow Domain Admins group Read All Properties Allow Enterprise Admins group Read All Properties Allow ENTERPRISE DOMAIN CONTROLLERS well-known Read All Properties Allow SYSTEM well-known Read All Properties Allow Rights Policies: ** No data found ** Event Audit: ** No data found ** Event Logging: ** No data found ** System Access: ** No data found ** Kerberos Policy: ** No data found ** Registry Keys: ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 57 of 154 Security Analysis: TESTBED System: Analysis Date: 5.6 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL GPO Version Discrepancies Section Summary SekChek found 0 discrepancies between the versions of GPOs in AD and SYSVOL. Section Detail ** No data found ** Implications The versions of Group Policy Objects (GPOs) defined in Active Directory and in SYSVOL should normally be identical. If the GPO versions differ it may indicate a replication problem. This will cause unintended differences between the policies that are defined and those that are actually applied on the system. Risk Rating Low to high (dependent on the nature of the GPO). Recommended Action Ensure you understand the reason for any discrepancies between the versions of GPO objects. Where appropriate, ensure you take the necessary action to address the cause of the problem. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 58 of 154 Security Analysis: TESTBED System: Analysis Date: 6. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Password Setting Objects (PSOs) Section Summary There is one PSO defined on your system: 0% (0) are not linked to any user or group objects. Section Detail PSO: Snake PSO test Property Value PSO Precedence 1 PSO Description Test PSO 1 PSO DisplayName Test PSO 1 Lockout Duration (never) (D:HH:MM:SS) Lockout Observation Window 1:00:00:00 (D:HH:MM:SS) Lockout Threshold 5 Maximum Password Age 35:00:00:00 (D:HH:MM:SS) Minimum Password Age (none) (D:HH:MM:SS) Minimum Password Length 10 Password Complexity Enabled Y Password History Length 12 Reversible Password Encryption N When Changed (not replicated) 25-Jan-2013 13:34:00 When Created 25-Jan-2013 13:34:00 PSO Applies To... CN=TestGroup3, CN=Users, DC=Snake, DC=com (Object Type= Group, Members= 0) CN=Cloud 2, OU=Amazon, DC=Snake, DC=com (Object Type= Group, Members= 1) Notes Password Setting Objects (PSOs) were introduced in Microsoft Windows Server 2008, and only apply to domains where the domain functional level is set to Windows Server 2008 or higher. PSOs can only be applied to User / inetOrgPerson objects and global security groups. PSO Precedence: Establishes the PSO’s precedence in situations where a user is a member of multiple groups with different password policies. Account Policies (Lockout Duration etc): Refer Domain Accounts Policy for a definition of each policy setting. PSO Applies To: The users and groups to which the Account Policies in the PSO are applied. Implications PSOs allow you to define multiple Account Policies per Active Directory domain, which was not permitted prior to Windows 2008. The main benefit of PSOs is that they allow you to control Account Policies at a more granular level by applying different Account Policies to selected users and groups. Note that the Account Policies defined in a PSO will always override the settings defined in the Domain Accounts Policy for the users and groups to which the PSO is linked. For more information, see SekChek’s white paper MS-Windows Password Settings Objects (PSOs) at: www.sekchek.com/White-Papers.htm. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 59 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Risk Rating Medium to high depending on the policies in effect over groups and users. Recommended Action If PSOs are employed, you should ensure that the Account Policies defined in the PSOs are set to appropriate values. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 60 of 154 Security Analysis: TESTBED System: Analysis Date: 7. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Customer-Selected Registry Key Values Section Summary The following subsection lists the 2 registry keys that were selected during the extract. Section Detail Registry Key Key Value HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Adobe\Acrobat Reader\9.0\Installer - ServiceControl 601 HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Sophos - EEServer v2 Implications The correct settings of certain registry keys will enhance security, auditing and management on the system. For example, having appropriate values for “remote access” will decrease the risk of intruders gaining illegal access to the system. For many registry keys a value of ‘0’ means that the feature is not enabled and a value of ‘1’ or greater means enabled. Risk Rating Low to high. (Dependant on the registry setting being considered). Recommended Action Ensure that registry values are set to appropriate values where applicable. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 61 of 154 Security Analysis: TESTBED System: Analysis Date: 8. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL User Accounts Defined In The Domain Section Summary There are 16 user accounts defined in your domain: 12.5% (2) of user accounts have Administrator privileges 6.3% (1) of user accounts have Guest privileges 81.3% (13) of user accounts have User privileges 0.0% (0) of user accounts are protected against accidental deletion Section Detail Common Name Path Privilege Member of Group Type/ Scope Administrator Users Administrator Administrators SLB Domain Admins SG Domain Users SG Enterprise Admins SU Group Policy Creator Owners SG Schema Admins SU Sophos Administrators Console SL Sophos DB Admins SL Sophos Full Administrators SL SophosAdministrator SL Bradley test TEST GPO PC User Domain Users SG GpLink Test Users Administrator Administrators SLB Domain Users SG Sophos Administrators Console SL Guest Users Guest krbtgt Users User SekTest User4 Users User Sophos DB Admins SL Sophos Full Administrators SL SophosAdministrator SL Domain Guests SG Guests SekTest User5 SekTest User6 SekTest User7 Users Users Users User User User Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Denied RODC Replication Group SLB Password SL Domain Users SG Domain Users SG Utilisateurs EPM Sharepoint SG Domain Users SG Utilisateurs EPM Sharepoint SG Domain Users SG Sophos Administrators Console SL Sophos DB Admins SL Sophos Full Administrators SL SophosAdministrator SL Utilisateurs EPM Sharepoint SG Domain Users SG Page 62 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Common Name Path Privilege SekTest User9 Users User Member of Group Type/ Scope Utilisateurs EPM Sharepoint SG Domain Users SG Utilisateurs EPM Sharepoint SG SophosSAUPUFFADDER0 Users User Domain Users SG SophosUpdateMgr Users User Domain Users SG Sun user Amazon User Domain Users SG Nature SG SUPPORT_388945a0 Users User Domain Users SG HelpServicesGroup SL Cloud 1 SG Domain Users SG Cloud 2 SG Domain Users SG Virtual1 Cloud Virtual2 Cloud Amazon Amazon User User For details of all user properties see worksheet _All_User_Accounts in the MS-Excel workbook. For definitions of the properties please see Glossary of Terms. For details of internal system accounts see worksheet System_Accounts in the MS-Excel workbook. Note. The above is a list of user accounts, which have been defined in the domain. It does not include user accounts from other domains or servers that are members of this domain’s groups. For those other accounts, consult the report sections: Domain Local Groups and their Members, Domain Global Groups and their Members and Domain Universal Groups and their Members. Account Name: This name is unique in the domain. Common Name: This name is unique inside the container or organizational unit but can be duplicated in a different container for another user with a different Account Name (above). This is the name under which the user is listed in the Active Directory MMC Console under the container it belongs to. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Group Type / Scope: SG – Security Global SL – Security Local SLB – Security Local - Builtin SU – Security Universal Note. The list only shows memberships of Security groups. I.e. memberships of Distribution groups are excluded from the list. For a more detailed description of group types refer to report section Groups Defined in the Domain . Implications Varying levels of control (rights) over the domain, domain containers and domain organizational units can be delegated to users and/or groups of the domain or other domains. If users belong to groups with permissions and rights greater than they need, they will have access to resources and system functions not in line with their job functions. The Administrator privilege is the most powerful privilege in the domain and can perform all actions on the domain. Users with Administrator privilege have full control over the domain resources. Members of groups such as Print Operators, Account Operators, Server Operators and Backup Operators also acquire special privileges. Consult the report section titled: Domain Local Groups and their Members, for a more detailed analysis. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 63 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Risk Rating Medium to high (dependent on users’ job functions and the number of accounts with special privileges). Recommended Action Ensure that user accounts are defined in containers or organizational units where the controls over them are appropriate. Users’ rights and group memberships should be checked to ensure they are not granted unnecessary privileges or rights. Most users should be assigned to the built-in global group Domain Users and the built-in local group Users. The number of accounts with Administrator privilege should be kept to a minimum. These accounts should only be used for administrative functions. Users with administrative privileges should use a separate account for normal dayto-day use. You should consider renaming the built-in Administrator account to a less obvious name to lessen the possibility of hackers guessing the password, as they would have to guess the account name also. This account can never be locked out due to failed logon attempts. The account cannot be disabled or deleted. You should consider renaming the built-in Guest account to a less obvious name. Hackers trying to obtain illegal access often target this account. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 64 of 154 Security Analysis: TESTBED System: Analysis Date: 9. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Groups Defined In the Domain Section Summary All Group Types There are a total of 57 group accounts defined on your domain: 64.9% (37) of groups are Local Groups 29.8% (17) of groups are Global Groups 5.3% (3) of groups are Universal Groups 0.0% (0) of groups are Application Basic Groups 0.0% (0) of groups are Application Query Groups 0.0% (0) of groups are protected against accidental deletion Security Groups Only There are 57 security groups defined on your domain: 64.9% (37) of these are Local security Groups 29.8% (17) of these are Global security Groups 5.3% (3) of these are Universal security Groups Section Detail Common Name Path Type/ Scope Account Operators Builtin SLB Administrators Builtin SLB Allowed RODC Password Replication Group Users SL Backup Operators Builtin SLB Cert Publishers Users SL Certificate Service DCOM Access Builtin SLB Cloud 1 Amazon SG Cloud 2 Amazon SG Cryptographic Operators Builtin SLB Denied RODC Password Replication Group Users SL Distributed COM Users Builtin SLB DnsAdmins Users SL DnsUpdateProxy Users SG Domain Admins Users SG Domain Computers Users SG Domain Controllers Users SG Domain Guests Users SG Domain Users Users SG Enterprise Admins Users SU Enterprise Read-only Domain Controllers Users SU Event Log Readers Builtin SLB Group Policy Creator Owners Users SG Guests Builtin SLB HelpServicesGroup Users SL IIS_IUSRS Builtin SLB Incoming Forest Trust Builders Builtin SLB Nature Amazon SG Network Configuration Operators Builtin SLB Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 65 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Common Name Path Type/ Scope Performance Log Users Builtin SLB Performance Monitor Users Builtin SLB Pre-Windows 2000 Compatible Access Builtin SLB Print Operators Builtin SLB RAS and IAS Servers Users SL Read-only Domain Controllers Users SG Remote Desktop Users Builtin SLB Replicator Builtin SLB Schema Admins Users SU Server Operators Builtin SLB Sophos Console Administrators Users SL Sophos DB Admins Users SL Sophos Full Administrators Users SL SophosAdministrator Users SL SophosDomainAdministrator Users SG SophosDomainPowerUser Users SG SophosDomainUser Users SG SophosOnAccess Users SL SophosPowerUser Users SL SophosUser Users SL SQLServer2005SQLBrowserUser$PUFFADDE Users R SL SQLServerMSSQLServerADHelperUser$PUF FADDER Users SL TelnetClients Users SL Terminal Server License Servers Builtin SLB TestGroup3 Users SG TestGroup4 Users SG Users Builtin SLB Utilisateurs EPM Sharepoint Users SG Windows Authorization Access Group Builtin SLB For details of all properties see worksheet Group_Accounts in the MS-Excel workbook. For definitions of the properties please see Glossary of Terms. NOTE: The above is a list of groups, which have been defined in the domain. It does not include groups, from other domains or servers that are members of this domain’s groups. Account Name: This name is unique in the domain. Common Name: This name is unique inside the container or organizational unit but can be duplicated in a different container for another group with a different Account Name (above). This is the name under which the group is listed in the Active Directory MMC Console under the container it belongs to. Path: Container or Organizational Unit the group belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 66 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Group Type/Scope: AB AQ DG DL DU SG SL SLB SU Application Basic Application Query Distribution Global Distribution Local Distribution Universal Security Global Security Local Security Local - Builtin Security Universal There are 3 types of groups in Windows 200x* domains: Security groups Distribution groups Application groups Security groups can define permissions on resources and objects. When assigning permissions for resources (file shares, printers, and so on), administrators should assign those permissions to a security group rather than to the individual users. The permissions are assigned once to the group, instead of several times to each individual user. This helps simplify the maintenance and administration of a network. Distribution groups are not security-enabled. Distribution groups can be used, for example, with e-mail applications (such as Exchange), to send e-mail to collections of users. Application groups are not security enabled and include basic application groups and LDAP query groups. Application groups are specific to Authorization Manager role-based administration. An application group is a group of users, computers, or other security principals. An application group is not a group of applications. Membership of an Application Query group is dynamically calculated from LDAP queries. Each security and distribution group has a scope that identifies the extent to which the group is applied in the domain tree or forest. There are three different group scopes: universal, global, and local. Built-in Local Security groups are defined by the Windows 200x* security system. They cannot be moved or deleted from their original container (Builtin). Those groups cannot be members of other groups. For membership of groups and more details on group scope, consult the report sections: Domain Local Groups and their Members, Domain Global Groups and their Members and Domain Universal Groups and their Members. Implications Varying levels of control (rights) over the domain; domain containers and domain organizational units can be delegated to groups of the domain or other domains. Risk Rating Medium to high (dependent on groups’ functions and what controls are granted over the groups). Recommended Action Ensure that groups are defined in containers or organizational units where the controls over them are appropriate. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 67 of 154 Security Analysis: TESTBED System: Analysis Date: 10. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Domain Local Groups and their Members Section Summary There are a total of 37 Local Security groups, containing the following 47 members, defined on your domain: 59.5% (22) of these groups are empty / have no members 2.1% (1) of the members are defined in other domains Section Detail Group Name Member Member Domain Mbr Class Account Operators Administrators Administrator user Domain Admins group Enterprise Admins group GpLinkTest user Allowed RODC Password Replication Group Backup Operators Cert Publishers Certificate Service DCOM Access Cryptographic Operators Denied RODC Password Replication Cert Publishers Group group Domain Admins group Domain Controllers group Enterprise Admins group Group Policy Creator Owners group krbtgt user Read-only Domain Controllers group Schema Admins group Domain Guests group Distributed COM Users DnsAdmins Event Log Readers Guests Guest user HelpServicesGroup SUPPORT_388945a0 user IIS_IUSRS IUSR Unknown unknown Domain (NT AUTHORITY) Incoming Forest Trust Builders Network Configuration Operators Performance Log Users Performance Monitor Users Pre-Windows 2000 Compatible Access Authenticated Users well-known Print Operators RAS and IAS Servers Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 68 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Group Name Member Member Domain Mbr Class Remote Desktop Users Cloud 1 group Cloud 2 group Administrator user Domain Admins group Enterprise Admins group GpLinkTest user User6 user Administrator user Domain Admins group Enterprise Admins group GpLinkTest user User6 user Administrator user Domain Admins group Enterprise Admins group GpLinkTest user User6 user Administrator user Domain Admins group Enterprise Admins group GpLinkTest user SophosDomainAdministrator group User6 user SophosPowerUser SophosDomainPowerUser group SophosUser Domain Users group SophosDomainUser group Authenticated Users well-known Domain Users group Interactive well-known Enterprise Domain Controllers well-known Replicator Server Operators Sophos Console Administrators Sophos DB Admins Sophos Full Administrators SophosAdministrator SophosOnAccess SQLServer2005SQLBrowserUser$PUFF ADDER SQLServerMSSQLServerADHelperUser$ PUFFADDER TelnetClients Terminal Server License Servers Users Windows Authorization Access Group Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 69 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Notes Members of Local Distribution groups are not listed here, as there is no security implication on these groups. Group Account Name or Member Account Name: This name is unique in the domain. Member Domain: The name of a trusted domain, if the group member is an external account. If the member belongs to the domain analysed, this field will be empty. Member Class: When = Unknown, it means that the account or group is a member of the local group but that the server/domain where the account or group is registered could not be reached to obtain the account information. The local groups showing these accounts as members should be checked to establish the origin and details of these accounts. When a server/domain cannot be reached for account information, the server/domain is either not available through the network or the server/domain no longer exists in the domain. Domain Local Groups Groups with domain local scope can have as their members groups and accounts from Windows 200x* or Windows NT domains and can be used to grant permissions only within a domain. Groups with a domain local scope are referred to as Local Groups. In native-mode Windows 200x* domains, Local Groups can have accounts, global groups, and universal groups from any domain, as well as local groups from the same domain, as members. In mixed-mode Windows 200x* domains, Local Groups can have accounts and global groups from any domain as members but cannot have local groups as members. Groups with domain local scope are typically used to define and manage access to resources within a single domain. Built-in Local Groups are installed in the domain. These groups are security groups and represent common sets of rights and permissions that can be used to grant certain roles, rights, and permissions to the accounts and groups that are placed into these default groups. Default groups with domain local scope are located in the ‘Builtin’ container. The default (built-in) Local Groups are: Account Operators Administrators Backup Operators Guests Pre-Windows 2000 Compatible Access Print Operators Replicator Server Operators Users These built-in groups have domain local scope and are primarily used to assign default sets of permissions to users who may have some administrative control in that domain. For example, the Administrators group in a domain has a broad set of administrative authority over all accounts and resources in the domain. The following shows the default rights held by some of these groups. Administrators: Members of the Administrators group have full control over the computer. It is the only built-in group that is automatically granted every built-in right and ability in the system. Backup Operators: Members of the Backup Operators group can back up and restore files on the computer, regardless of any permissions that protect those files. They can also log onto the computer and shut it down, but they cannot change security settings. Replicator: The Replicator group supports directory replication functions. The only member of the Replicator group should be a domain user account used to log on the Replicator services of the domain controller. Do not add the user accounts of actual users to this group. Implications If users or groups belong to Local Groups with permissions and rights greater than they need, they will have access to unnecessary resources and functions via the permissions and rights associated with the Local Groups. The built-in Local Group, which has normal default user rights and permissions, is the Users group. Another built-in Local Group with limited default privileges is Guests. Built-in Local Groups cannot be deleted. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 70 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL New Local Groups can be created and powerful rights (e.g. Take Ownership of Files and other Objects) can be assigned to them. Risk Rating Medium to high (dependent on users’ job functions and groups’ roles). Recommended Action Privileges and rights acquired by users and groups via their membership of Local Groups should be checked to ensure they are consistent with the users’ job functions and groups’ roles. Most users or groups should be assigned to the Users Local Group. Users or groups assigned to privileged Local Groups should be kept to a minimum and their membership fully justified. As a rule, only individual users and not groups, should be added to privileged Local Groups as this affords better control. Those accounts or groups from other domains, which are members of privileged Local Groups, should be carefully checked and fully justified. If it can be avoided, users and groups from other domains should not be members of privileged Local Groups. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 71 of 154 Security Analysis: TESTBED System: Analysis Date: 11. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Domain Global Groups and their Members Section Summary There are a total of 17 Global Security groups, containing the following 30 members, defined on your domain: 41.2% (7) of these groups are empty / have no members Section Detail Group Name Member Member Class Cloud 1 Virtual1 user Cloud 2 Virtual2 user Domain Admins Administrator user Domain Computers BEOWOLF Computer REDWOLF Computer BOOMSLANG Computer PUFFADDER Computer Domain Guests Guest user Domain Users Administrator user bradley user GpLinkTest user krbtgt user DnsUpdateProxy Domain Controllers SophosSAUPUFFADDER0 user SophosUpdateMgr user Sun user SUPPORT_388945a0 user User4 user User5 user User6 user User7 user User9 user Virtual1 user Virtual2 user Group Policy Creator Owners Administrator user Nature Sun user User4 user User5 user User6 user User7 user User9 user Read-only Domain Controllers SophosDomainAdministrator SophosDomainPowerUser SophosDomainUser TestGroup3 TestGroup4 Utilisateurs EPM Sharepoint Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 72 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Notes Group Account Name or Member Account Name: This name is unique in the domain. Global Group Groups with global scope can have as their members groups and accounts only from the domain in which the group is defined and can be granted permissions in any domain in a domain tree or forest. Groups with a global scope are referred to as Global Groups. In native-mode Windows 200x* domains, Global Groups can have, as their members, accounts from the same domain and global groups from the same domain. In mixed-mode Windows 200x* domains, Global Groups can have, as their members, accounts from the same domain but cannot have groups as members. Default predefined groups with global scope are normally located in the Users container. The predefined Global Groups placed in the Users container are: Cert Publishers Domain Admins Domain Computers Domain Controllers Domain Guests Domain Users Enterprise Admins Group Policy Admins Schema Admins These groups with global scope can be used to collect the various types of user accounts in the domain (regular users, administrators, and guests) into groups. These groups can then be placed in Local Groups. By default, any user account created in a domain is automatically added to the Domain Users group and any computer account created is automatically added to the Domain Computers group. The Domain Users and Domain Computers groups can be used to represent all the accounts created in the domain. For example, if all the users in this domain need to have access to a printer, permissions for the printer can be assigned to the Domain Users group (or the Domain Users group can be placed into a local group that has permissions for the printer). Groups with global scope are normally used to manage directory objects that require daily maintenance, such as user and computer accounts. Because groups with global scope are not replicated outside their own domain, accounts in a group having global scope can be changed frequently without generating replication traffic to the global catalog. Global groups cannot be created or maintained on Windows NT/200x* Workstations or Windows NT/200x* Servers, which are not Domain Controllers. However, for Windows NT/200x* Workstations or NT/200x* Server computers that participate in a domain, domain global groups can be granted rights and permissions at those workstations or servers, and can be members of local groups at those workstations or servers. Implications If users are assigned to global groups with permissions and rights greater than they need, they will have access to unnecessary system resources and functions via the permissions and rights associated with the global groups. Global groups can be members of local groups in the domain and other domains or members of other global groups in the domain, thus acquiring their rights and granting those rights to users belonging to the global groups. New global groups can be created and powerful rights (e.g. Take Ownership of Files and other Objects) assigned to them. Risk Rating Medium to high (dependent on users’ job functions and groups’ functions). Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 73 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Recommended Action Privileges and rights assigned to global groups and their membership of other groups should be checked to ensure that they are justified. Most users should only be assigned to the Domain Users global group. Users assigned to privileged global groups (such as Domain Admins) should be kept to a minimum and their membership fully justified. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 74 of 154 Security Analysis: TESTBED System: Analysis Date: 12. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Domain Universal Groups and their Members Section Summary There are a total of 3 Universal Security groups, containing the following 2 members, defined in your domain: 33.3% (1) of these groups are empty / have no members 0.0% (0) of these members are defined in other domains Section Detail Group Name Member Member Domain Mbr Class Enterprise Admins Administrator user Administrator user Enterprise Read-only Domain Controllers Schema Admins Notes Group Account Name or Member Account Name: This name is unique in the domain. Member Domain: The name of a trusted domain, if the group member is an external account. If the member belongs to the domain analyzed, this field will be empty. Member Class: When = Unknown, it means that the account or group is a member of the universal group but that the server/domain where the account or group is registered could not be reached to obtain the account information. The universal groups showing these accounts as members should be checked to establish the origin and details of these accounts. When a server/domain cannot be reached for account information, the server/domain is either not available through the network or the server/domain no longer exists in the domain. Universal Groups Groups with universal scope can have as members groups and accounts from any Windows 200x* domain in the domain tree or forest and can be granted permissions in any domain in the domain tree or forest. Groups with a universal scope are referred to as Universal Groups. In native-mode Windows 200x* domains, Universal Groups can have, as their members, accounts from any domain, global groups from any domain and universal groups from any domain. In mixed-mode Windows 200x* domains, groups with universal scope cannot be created. Groups with universal scope can be used to consolidate groups that span domains. For example, global groups from different domains can be nested in universal groups. Using this strategy, any membership changes in the groups having global scope do not affect the group with universal scope. Implications If users or groups are assigned to universal groups with permissions and rights greater than they need, they will have access to unnecessary resources and functions via the permissions and rights associated with the universal groups. Risk Rating Medium to high (dependent on users’ job functions and groups’ functions). Recommended Action Privileges and rights assigned to universal groups and their membership of other groups should be checked to ensure that they are justified. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 75 of 154 Security Analysis: TESTBED System: Analysis Date: 13. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Last Logons, 30 Days and Older Section Summary All Accounts 50.0% (8) of the user accounts on your domain have not logged-on in the last 30 days: 43.8% (7) have not logged-on in the last 60 days 43.8% (7) have not logged-on in the last 90 days 37.5% (6) have not logged-on in the last 180 days 37.5% (6) have not logged-on in the last 360 days 37.5% (6) have not logged-on in the last 2 years 37.5% (6) have never been used, or their last logon date is unknown Excluding Disabled Accounts 25.0% (4) of the user accounts on your domain have not logged-on in the last 30 days: 18.8% (3) have not logged-on in the last 60 days 18.8% (3) have not logged-on in the last 90 days 18.8% (3) have not logged-on in the last 180 days 18.8% (3) have not logged-on in the last 360 days 18.8% (3) have not logged-on in the last 2 years 18.8% (3) have never been used, or their last logon date is unknown All Administrator Accounts 0.0% (0) of the administrator accounts on your domain have not logged-on in the last 30 days: 0.0% (0) have not logged-on in the last 60 days 0.0% (0) have not logged-on in the last 90 days 0.0% (0) have not logged-on in the last 180 days 0.0% (0) have not logged-on in the last 360 days 0.0% (0) have not logged-on in the last 2 years 0.0% (0) have never been used, or their last logon date is unknown Administrator Accounts (Excluding Disabled Accounts) 0.0% (0) of the administrator accounts on your domain have not logged-on in the last 30 days: 0.0% (0) have not logged-on in the last 60 days 0.0% (0) have not logged-on in the last 90 days 0.0% (0) have not logged-on in the last 180 days 0.0% (0) have not logged-on in the last 360 days 0.0% (0) have not logged-on in the last 2 years 0.0% (0) have never been used, or their last logon date is unknown Domain Controllers (DCs) Scanned SekChek scanned 2 out of 2 DCs for users' last logon times. See Domain Controllers in the Domain for more information. The last logon for the builtin Administrator account was 0 days ago. Industry Average Comparison (> 30 days) Note: This is an exception report, so only lists accounts that have not logged on in the last 30 days. I.e. if an account logged in 29 days ago (or more recently) it will not be listed in the report section. Section Detail Last Logon Account Name Path State Privilege Guest Users D Guest krbtgt Users D User Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 76 of 154 Security Analysis: TESTBED System: Analysis Date: Last Logon PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Account Name Path State Privilege SophosSAUPUFFADDER0 Users User SophosUpdateMgr Users User Sun Amazon User SUPPORT_388945a0 Users D User 02-Aug-2013 User6 Users E User 24-Sep-2013 User4 Users User Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Account State: Account is Disabled (D), Locked (L), Expired (E), or a combination of them. Eg. (DL) (DE). Implications Some of these user accounts may no longer be required. Inactive user accounts are a prime target for intruders. If their passwords are compromised, they can be used with little fear of detection. Risk Rating Low to Medium. Recommended Action The list of accounts should be reviewed and redundant ones should be deleted. Accounts that will be required later (longer term), should be disabled until required. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 77 of 154 Security Analysis: TESTBED System: Analysis Date: 14. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Passwords, 30 Days and Older Section Summary All Accounts 50.0% (8) of the user accounts on your domain have not had their passwords changed in the last 30 days: 43.8% (7) have not had their passwords changed in the last 60 days 43.8% (7) have not had their passwords changed in the last 90 days 43.8% (7) have not had their passwords changed in the last 180 days 25.0% (4) have not had their passwords changed in the last 360 days 12.5% (2) have not had their passwords changed in the last 2 years Excluding Disabled Accounts 25.0% (4) of the user accounts on your domain have not had their passwords changed in the last 30 days: 18.8% (3) have not had their passwords changed in the last 60 days 18.8% (3) have not had their passwords changed in the last 90 days 18.8% (3) have not had their passwords changed in the last 180 days 12.5% (2) have not had their passwords changed in the last 360 days 6.3% (1) have not had their passwords changed in the last 2 years All Administrator Accounts 50.0% (1) of the administrator accounts on your domain have not had their passwords changed in the last 30 days: 50.0% (1) have not had their passwords changed in the last 60 days 50.0% (1) have not had their passwords changed in the last 90 days 50.0% (1) have not had their passwords changed in the last 180 days 50.0% (1) have not had their passwords changed in the last 360 days 50.0% (1) have not had their passwords changed in the last 2 years Administrator Accounts (Excluding Disabled Accounts) 50.0% (1) of the administrator accounts on your domain have not had their passwords changed in the last 30 days: 50.0% (1) have not had their passwords changed in the last 60 days 50.0% (1) have not had their passwords changed in the last 90 days 50.0% (1) have not had their passwords changed in the last 180 days 50.0% (1) have not had their passwords changed in the last 360 days 50.0% (1) have not had their passwords changed in the last 2 years The password for the builtin Administrator account was last changed 1556 days ago. Industry Average Comparison (> 30 days) Note: This is an exception report, so only lists accounts whose passwords have not changed in the last 30 days. I.e. if an account's password was changed 29 days ago (or more recently) it will not be listed in the report section. Section Detail Password Account Name Age (days) Path State Privilege 1556 Administrator Users 1556 SUPPORT_388945a0 Users D User 436 krbtgt Users D User 436 User5 Users User 337 User6 Users E User 292 User9 Users LE User Administrator Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 78 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Password Account Name Age (days) Path State Privilege 270 User7 Users User 51 User4 Users User Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Account State: L Locked An account is automatically locked by the system once the number of invalid login attempts, as defined by the security policy, has been reached. D Disabled A disabled account has been manually disabled by the administrator. E Expired An account expires once the expiry date, which has been set by the administrator is reached. DE Disabled & Expired An expired account which has also been manually disabled by the administrator. DL Disabled & Locked A locked account which has also been manually disabled by the administrator. Implications This could indicate that these users are not required to change their passwords on a regular basis or that the accounts are inactive and redundant. A password that is not changed on a frequent basis increases the risk of it being compromised over time. Risk Rating Medium. If password controls are weak (e.g. Password Never Expires set in user accounts) the risk is high. Recommended Action The accounts should be reviewed and deleted if they are no longer required. Otherwise, their password change interval should be brought in line with installation standards. The Leading Practice is to force users to change their passwords every 30 to 60 days. Some service accounts, such as for SMS, normally do not have their passwords changed frequently. For those accounts, the account name and password should be such that they are very difficult to guess. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 79 of 154 Security Analysis: TESTBED System: Analysis Date: 15. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Passwords that Never Expire Section Summary All Accounts 87.5% (14) of users are never required to change their passwords due to security settings in individual user accounts. Excluding Disabled Accounts 62.5% (10) of users are never required to change their passwords due to security settings in individual user accounts. All Administrator Accounts 50.0% (1) of administrator accounts are never required to change their passwords due to security settings in individual user accounts. Administrator Accounts (Excluding Disabled Accounts) 50.0% (1) of administrator accounts are never required to change their passwords due to security settings in individual user accounts. Industry Average Comparison Section Detail Account Name Path State Privilege Administrator Users Administrator bradley TEST GPO PC User Guest Users D Guest SophosSAUPUFFADDER0 Users User SophosUpdateMgr Users User Sun Amazon User SUPPORT_388945a0 Users User4 Users User5 Users User6 Users User7 Users User9 Users Virtual1 Amazon User Virtual2 Amazon User D User User User E User User LE User Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Account State: Account is Disabled (D), Locked (L), Expired (E), or a combination of them. Eg. (DL) (DE). Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 80 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Implications If users are not required to change their passwords on a frequent basis, their passwords are likely to become known to other employees and potential intruders. The user profile could then be used to gain unauthorised access to systems and data until the real user changes the password to a new one. The password change interval is set in the Password Policies. However, the system default can be overridden via the Password Never Expires parameter at user account level. Risk Rating Medium to High. Recommended Action Password change intervals for these user accounts should be brought in-line with the installation standard. The Leading Practice for a password change interval is between 30 and 60 days. You should also check the Accounts Policy to confirm that the Maximum Password Change Interval is set to an acceptable value. Some service accounts, such as for SMS, normally do not have their passwords changed frequently. For those accounts, the account name and password should be such that they are very difficult to guess. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 81 of 154 Security Analysis: TESTBED System: Analysis Date: 16. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Accounts not Requiring a Password Section Summary All Accounts 6.3% (1) of users are allowed to logon with a zero length password due to security settings in individual user accounts. Excluding Disabled Accounts 0.0% (0) of users are allowed to logon with a zero length password due to security settings in individual user accounts. All Administrator Accounts 0.0% (0) of administrator accounts are allowed to logon with a zero length password due to security settings in individual user accounts. Administrator Accounts (Excluding Disabled Accounts) 0.0% (0) of administrator accounts are allowed to logon with a zero length password due to security settings in individual user accounts. Industry Average Comparison Section Detail Account Name Path Guest State Privilege Users D Guest Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See the General Note in the System Details section for a general explanation of paths. Account State: Account is Disabled (D), Locked (L), Expired (E), or a combination of them. Eg. (DL) (DE). Implications The setting that allows zero-length (null) passwords to be defined at user account level is one of the values that cannot be displayed via the standard Windows 'Active Directory Users and Computers' interface. It can only be displayed (or set) via a special programmatic interface. An Administrator can set passwords for the listed accounts to null regardless of domain-level security settings. The accounts could then be used to login to the system without a password, despite the security policy settings defined at domain-level. However, the system will not allow users to change their own passwords to null provided that domainlevel security settings prevent it. This can only be done by an Administrator via the 'Reset Password' function or via a programmatic interface. Because SekChek for Windows does not analyse user passwords it is not possible to determine which of the listed accounts actually have null passwords assigned to them. For more information, see SekChek’s white paper MS-Windows Accounts not Requiring a Password at: www.sekchek.com/White-Papers.htm. Risk Rating Low to High. (Dependant on the privileges assigned to the user account) In general, allowing the use of null passwords is a very high security risk, because it will allow any person in possession of a valid account name to gain access to your system and information resources. However, there may be Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 82 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL some special situations where it is appropriate for null passwords to be assigned to some special accounts (e.g. anonymous access with minimal privileges). Recommended Action In general, you should ensure strong passwords are assigned to all user accounts defined on your system. The Leading Practice for a minimum password length is 7 characters. You should also ensure that all accounts allowed null passwords are fully justified. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 83 of 154 Security Analysis: TESTBED System: Analysis Date: 17. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Invalid Logon Attempts Greater than 3 Section Summary All Accounts 0.0% (0) of user accounts have invalid logon attempts greater than 3. Excluding Disabled Accounts 0.0% (0) of user accounts have invalid logon attempts greater than 3. All Administrator Accounts 0.0% (0) of administrator accounts have invalid logon attempts greater than 3. Administrator Accounts (Excluding Disabled Accounts) 0.0% (0) of administrator accounts have invalid logon attempts greater than 3. Industry Average Comparison Section Detail ** No data found ** Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Account State: Account is Disabled (D), Locked (L), Expired (E), or a combination of them. Eg. (DL) (DE). Implications Invalid logon attempts indicate the number of unsuccessful attempts at signing on to your system with the listed accounts. The value is reset to ‘0’ after a successful sign-on to the system. Consistently high values could indicate that an intruder is attempting to guess user passwords to gain access to your system. The Lockout Threshold parameter in the Account Lockout Policies determines the number of failed logon attempts for user accounts before accounts are locked out. Risk Rating Low to Medium. (Dependent on the value assigned to the Lockout Threshold parameter in the Account Lockout Policies) Recommended Action You should ensure that the Lockout Threshold in the Accounts Policy is set to a reasonable value. A value of 3 is the Leading Practice. Ideally, the Lockout Duration should be set to 0 (forever) in the Accounts Policy. This ensures that accounts are locked when the lockout threshold is exceeded and can only be unlocked by Administrators. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 84 of 154 Security Analysis: TESTBED System: Analysis Date: 18. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Users not Allowed to Change Passwords Section Summary All Accounts 56.3% (9) of the users defined to your system are not allowed to change their passwords. Excluding Disabled Accounts 37.5% (6) of the users defined to your system are not allowed to change their passwords. All Administrator Accounts 0.0% (0) of the administrator accounts defined to your system are not allowed to change their passwords. Administrator Accounts (Excluding Disabled Accounts) 0.0% (0) of the administrator accounts defined to your system are not allowed to change their passwords. Industry Average Comparison Section Detail Account Name Path State Privilege Guest Users D Guest SophosSAUPUFFADDER0 Users User SophosUpdateMgr Users User Sun Amazon User SUPPORT_388945a0 Users User7 Users User9 Users Virtual1 Amazon User Virtual2 Amazon User D User User LE User Implications If users are not permitted to change their passwords on a frequent basis, their passwords are likely to become known to other employees and potential intruders. The user profile could then be used to gain unauthorised access to systems and data until the password is changed to a new one. The password change interval is set in the Accounts Policy. However, individual accounts can have the User Cannot Change Password parameter set which overrides the policy standard. A value of Yes in the Account Disabled column indicates that the account has been disabled by a security administrator, is locked due to excessive failed login attempts, or has expired. See Disabled Accounts for details. Risk Rating Medium to High. Recommended Action The User Cannot Change Password parameter in user accounts should only be set for those accounts where a common sign on is required (The “built in” Guest account is an example of a “common” account). The privileges and group membership of these accounts should be carefully monitored. Some service accounts, such as for SMS, normally do not have their passwords changed frequently. For those accounts, the account name and password should be such that they are very difficult to guess. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 85 of 154 Security Analysis: TESTBED System: Analysis Date: 19. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Accounts with Expiry Date Section Summary All Accounts 12.5% (2) of user accounts are set to expire on a certain date. 12.5% (2) of accounts have expired All Administrator Accounts 0.0% (0) of administrator accounts are set to expire on a certain date. 0.0% (0) of administrator accounts have expired Section Detail: Account Name Path Account Expires Privilege User6 Users 06-Oct-2011 User User9 Users 01-Oct-2011 User Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Implications The Account Expires parameter allows you to ensure the account is automatically disabled on the assigned date. When an account expires, a user who is logged on remains logged on but cannot establish new network connections. After logging off, that user cannot log on again unless the expiration date is reset or cleared. Risk Rating Low to Medium. Recommended Action It is good practice to set an expiration date for temporary accounts or accounts assigned to contractors and part-time workers. For added security and to help ensure that accounts are disabled when no longer used, you could consider setting expiration dates for all user accounts. Note however, that this will add to the administrative workload and may inconvenience genuine users when their accounts expire and need to be reset by an administrator. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 86 of 154 Security Analysis: TESTBED System: Analysis Date: 20. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Disabled Accounts Section Summary All Accounts 18.8% (3) of user accounts have been disabled. All Administrator Accounts 0.0% (0) of administrator accounts have been disabled. Industry Average Comparison Section Detail Account Name Path Last Logon Privilege Guest Users Guest krbtgt Users User SUPPORT_388945a0 Users User Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Implications No security risks. A housekeeping issue only. Accounts are disabled because they have reached the expiration date or have been disabled by the administrator. Risk Rating None. Recommended Action These accounts should be checked and deleted if no longer required. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 87 of 154 Security Analysis: TESTBED System: Analysis Date: 21. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Locked Out Accounts Section Summary All Accounts 6.3% (1) of user accounts are 'locked out'. All Administrator Accounts 0.0% (0) of administrator accounts are 'locked out'. Industry Average Comparison Section Detail Account Name Path Last Logon Privilege User9 Users 07-Nov-2013 User Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Implications These accounts are locked due to an excessive number of failed logon attempts. This could be an indication that intruders are attempting to access your system. Lockout Threshold in the accounts policy defines the number of failed logon attempts for user accounts before accounts are locked out. Risk Rating Medium to High. Recommended Action The reason these accounts have been “locked out” should be investigated and appropriate action taken. You should ensure that the Lockout Threshold is set to a reasonable value. A value of 3 is the Leading Practice. Ideally, the Lockout Duration should be set to 0 (forever) in the Accounts Policy. This ensures that accounts are locked when the lockout threshold is exceeded and can only be unlocked by Administrators. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 88 of 154 Security Analysis: TESTBED System: Analysis Date: 22. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Accounts Whose Passwords Must Change at Next Logon Section Summary All Accounts 6.3% (1) of user accounts must change their password at next logon. Excluding Disabled Accounts 0.0% (0) of user accounts must change their password at next logon. All Administrator Accounts 0.0% (0) of administrator accounts must change their password at next logon. Administrator Accounts (Excluding Disabled Accounts) 0.0% (0) of administrator accounts must change their password at next logon. Section Detail Account Name Path krbtgt State Privilege Users D User Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the user belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Account State: Account is Disabled (D), Locked (L), Expired (E), or a combination of them. Eg. (DL) (DE). Implications The list details those accounts that must change their password at next logon. This can be as a result of a new account or as a result of the account password having been reset by an administrator with the indicator User Must Change Password At Next Logon turned on. If the chosen passwords are default passwords known to most persons, those accounts could be used by anybody to gain illegal access to the domain with the rights/privileges of the account. Risk Rating Low to Medium (depending on the password assigned by the administrator). Recommended Action It is good practice to set the User Must Change Password At Next Logon indicator for new user accounts or when administrators reset passwords. This will force the user to change the initial or new password allocated at the first or next logon. The password chosen by the administrator should be unique and not a default password known to most persons. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 89 of 154 Security Analysis: TESTBED System: Analysis Date: 23. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Accounts Created in the Last 90 Days Section Summary All Accounts 68.8% (11) of user accounts were created in the last 360 days: 18.8% (3) were created in the last 30 days 18.8% (3) were created in the last 60 days 43.8% (7) were created in the last 90 days 43.8% (7) were created in the last 180 days 68.8% (11) were created in the last 360 days 31.3% (5) were created more than a year ago All Administrator Accounts 50.0% (1) of administrator accounts were created in the last 360 days: 0.0% (0) were created in the last 30 days 0.0% (0) were created in the last 60 days 0.0% (0) were created in the last 90 days 0.0% (0) were created in the last 180 days 50.0% (1) were created in the last 360 days 50.0% (1) were created more than a year ago Group Accounts 19.3% (11) of group accounts were created in the last 360 days: 5.3% (3) were created in the last 30 days 5.3% (3) were created in the last 60 days 5.3% (3) were created in the last 90 days 5.3% (3) were created in the last 180 days 19.3% (11) were created in the last 360 days 80.7% (46) were created more than a year ago Computer Accounts 25.0% (1) of computer accounts were created in the last 360 days: 0.0% (0) were created in the last 30 days 0.0% (0) were created in the last 60 days 0.0% (0) were created in the last 90 days 0.0% (0) were created in the last 180 days 25.0% (1) were created in the last 360 days 75.0% (3) were created more than a year ago Note: This is an exception report, so it only lists accounts created in the last 90 days. For details of accounts created more than 90 days ago, see column 'Created' in worksheets _All_User_Accounts and Group_Accounts in the MSExcel workbook. Section Detail Create Date Account Name Path Account Type Privilege 07-Nov-2013 Cloud 1 Amazon Group - 07-Nov-2013 Cloud 2 Amazon Group - 07-Nov-2013 Nature Amazon Group - 07-Nov-2013 Sun Amazon User User 07-Nov-2013 Virtual1 Amazon User User 07-Nov-2013 Virtual2 Amazon User User 29-Aug-2013 User5 Users User User 29-Aug-2013 User6 Users User User 29-Aug-2013 User7 Users User User Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 90 of 154 Security Analysis: TESTBED System: Analysis Date: Create Date PUFFADDER (Snake.com) 08-Nov-2013 Account Name 29-Aug-2013 User9 CONFIDENTIAL Path Account Type Privilege Users User User Notes Account Name: This name is unique in the domain. Path: Container or Organizational Unit the account belongs to. The higher-level containers or organizational units are written first in the path, followed by the lower level containers or organizational units. See General Note in the System Details section for a general explanation on paths. Account Type: User or Group. Implications The authorisation of new accounts, as well as changes to existing accounts, are key management controls that underpin the security of system and information resources. If accounts are defined without management’s knowledge or authorisation, they could be used to gain illegal access to your domain and system resources with little fear of detection. Risk Rating High (if accounts are defined without appropriate management authorisation). Recommended Action You should ensure management authorisation was formally provided prior to defining new accounts. Supporting documentation should minimally include: a reason for creating the account; the security groups the account should belong to; and the system resources required by the account owner. Before management gives an employee access to a user account they should ensure the employee is made aware of the organisation’s security policies and the employee’s responsibilities for system security. Independent audits of new accounts should be conducted on a regular basis to ensure management controls are appropriate and are being applied in a consistent and effective manner. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 91 of 154 Security Analysis: TESTBED System: Analysis Date: 24. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Rights and Privileges The following seven subsections provide general recommendations regarding rights, and analyses of the Effective rights assigned to Local, Global and Universal groups, user accounts, Well Known objects and external objects: Descriptions & General Recommendations for Rights Rights Assigned to Local Groups Rights Assigned to Universal Groups (Native mode only) Rights Assigned to Global Groups Rights Assigned to Users Rights Assigned to Well-Known Objects Rights Assigned to External Objects Notes In Windows 200x* domains, each domain controller can have different "local policy" settings. The domain controllers usually inherit the same "local policy" settings by belonging to one Organizational Unit (e.g. Domain Controllers) to which the same policies apply. However, by having domain controllers, for example, in different Organizational Units, different "local policies" can be applied to domain controllers. This has important security implications as accounts can, for example, be granted powerful rights on one or more domain controller while being denied the same rights on other domain controllers. Implications Rights and privileges allow users to perform certain actions on the system, such as the ability to Backup Files & Directories. Rights/Privileges apply to the system as a whole and are different to permissions, which apply to specific objects. User rights fall into two general categories: logon rights and privileges. Logon rights control who is authorized to log on to a computer and how they can log on. Privileges control access to system resources, and they can override the permissions that are set on a particular object on the computer. The special account LocalSystem has built-in capabilities that correspond to almost all privileges and logon rights. Processes that are running as part of the operating system are associated with this account, and they require a complete set of user rights. The system services that are supplied with Windows 200x* are configured automatically to run as LocalSystem. Although other services can be configured to also run under this account, it is recommended that this be done with care. Logon rights control how security principals are allowed access to the computer, whether from the keyboard or through a network connection, or whether as a service or as a batch job. For each logon method, there exists a pair of logon rights, one to allow logging on to the computer and another to deny logging on to the computer. A deny logon right can be used to exclude groups or individual accounts that have been assigned an allow logon right. Deny rights take precedence over allow rights. Rights and privileges are assigned to specific accounts directly via the User Rights policy, or indirectly via group membership. Note that members of a Local, Global or Universal group automatically inherit all rights granted to that group. This includes Global groups or users from other domains that are members of a Local or Universal group. To ease the task of account administration, it is recommended that Rights are primarily assigned to groups rather than to individual user accounts. When Rights are assigned to a group, the Rights are assigned automatically to each user who is added to the group. This is easier than assigning Rights to individual user accounts as each account is created. If users are given inappropriate rights it can lead to a high security risk. Risk Rating Medium to high depending on the rights granted to groups and users. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 92 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Recommended Action Rights should be justified according to the person’s job function. In general, rights should be assigned by adding user accounts to one of the built-in groups that already has the needed rights, rather than by administering the User Rights policy. The recommendations on the following page serve as a guideline only. Powerful rights should only be granted to users or special accounts (e.g. SMS account) when absolutely necessary. They should also be reviewed on a regular basis. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 93 of 154 Security Analysis: TESTBED System: Analysis Date: 24.1 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Descriptions & General Recommendations for Rights Right Description Recommendation Access this computer from the Allows a user to connect to the computer from the Initially granted to Administrators, network network. By default, this right is assigned to Everyone and Power Users. Restrict as Administrators, Everyone, and Power Users. required. Act as part of the operating Allows a process to authenticate like a user and thus Grant to no one. system gain access to the same resources as a user. Only low-level authentication services should require this privilege. Note that potential access is not limited to what is associated with the user by default; the calling process might request that arbitrary additional privileges be added to the access token. Note that the calling process can also build an anonymous token that does not provide a primary identity for tracking events in the audit log. When a service requires this privilege, configure the service to use the LocalSystem account (which already includes the privilege), rather than create a separate account and assign the privilege to it. Add workstations to domain Allows a user to add workstations to the domain. Grant to Administrators and Account Adding a workstation to a domain enables the Operators. workstation to recognize the domain's user and global groups accounts. By default, members of a domain's Administrators and Account Operators groups have the right to add a workstation to a domain. This right cannot be taken away. They can also grant this right to other users. Adjust memory quotas for a Allows a process that has Write Property access to Grant to no one. process another process to increase the processor quota that is assigned to the other process. This privilege is useful for system tuning, but it can be abused, as in a denialof-service attack. By default, this privilege is assigned to Administrators. Allow log on locally Allows a user to log on locally at the computer’s For servers and domain controllers (I.e. keyboard. For servers and domain controllers, by not work stations), grant to default, this right is assigned to Administrators, Administrators and Operators only. Account Operators, Backup Operators, Print Operators, and Server Operators. Allow log on through Terminal Windows XP (or later) only. Allows a user to log on to By default, this right is assigned to Services the computer by using a Remote Desktop connection. Administrators and Remote Desktop Users. Backup files and directories Allows the user to circumvent file and directory Grant only to Administrator and Backup permissions to back up the system. The privilege is Operator. selected only when an application attempts access through the NTFS backup application programming interface (API). Otherwise, normal file and directory permissions apply. By default, this privilege is assigned to Administrators and Backup Operators. (See also “Restore files and directories” in this table.) Bypass traverse checking Allows the user to pass through folders to which the Restrict as required. It is enabled by user otherwise has no access while navigating an default for all users. object path in any Microsoft® Windows® file system or in the registry. This privilege does not allow the user to list the contents of a folder; it allows the user only to traverse its directories. By default, this privilege is assigned to Administrators, Backup Operators, Power Users, Users, and Everyone. Change the system time Allows the user to set the time for the internal clock of Grant to Administrators only. the computer. By default, this privilege is assigned to Administrators and Power Users. Create a page file Allows the user to create and change the size of a Grant to Administrators only. pagefile. This is done by specifying a paging file size for a particular drive under Performance Options on the Advanced tab of System Properties. By default, this privilege is assigned to Administrators. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 94 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Right Description Create a token object Allows a process to create an access token by calling Grant to no one. NtCreateToken() or other token-creating APIs. When a process requires this privilege, use the LocalSystem account (which already includes the privilege), rather than create a separate user account and assign this privilege to it. Create global objects Windows 2000 (SP4 or later) only. Allows a user account to create global objects in a Terminal Services session. Note that users can still create sessionspecific objects without being assigned this user right. Create objects permanent Recommendation By default, members of the Administrators group, the System account, and Services that are started by the Service Control Manager are assigned the "Create global objects" user right. shared Allows a process to create a directory object in the Grant to no one or to Administrators Windows object manager. This privilege is useful to only. kernel-mode components that extend the Windows object namespace. Components that are running in kernel mode already have this privilege assigned to them; it is not necessary to assign them the privilege. Debug programs Allows the user to attach a debugger to any process. Grant to no one unless required for This privilege provides access to sensitive and critical development purposes. operating system components. By default, this privilege is assigned to Administrators. Deny access to this computer Prohibits a user or group from connecting to the Grant as required. from the network computer from the network. By default, no one is denied this right. Deny log on as a batch job Prohibits a user or group from logging on through a Grant as required. batch-queue facility. By default, no one is denied the right to log on as a batch job. Deny log on as a service Prohibits a user or group from logging on as a service. Grant as required. By default, no one is denied the right to log on as a service. Deny log on locally Prohibits a user or group from logging on locally at the Grant as required. keyboard. By default, no one is denied this right. Deny log on through Terminal Windows XP (or later) only. Prohibits a user from Grant as required. Services logging on to the computer using a Remote Desktop connection. Enable accounts to be trusted Allows the user to change the Trusted for Delegation for delegation setting on a user or computer object in Active Directory. The user or computer that is granted this privilege must also have write access to the account control flags on the object. Delegation of authentication is a capability that is used by multi-tier client/server applications. It allows a front-end service to use the credentials of a client in authenticating to a back-end service. Grant to Administrators only. Misuse of this privilege could make the network vulnerable to sophisticated attacks using Trojan horse programs that impersonate incoming clients and use their credentials to gain access to network resources. Force shutdown from a remote Allows a user to shut down a computer from a remote Grant to Administrators only. system location on the network. (See also “Shut down the system” in this table.) By default, this privilege is assigned to Administrators. Generate security audits Impersonate a authentication Client Allows a process to generate entries in the security Give this right to secure servers. log. The security log is used to trace unauthorized system access. (See also “Manage auditing and security log” in this table.) after Windows 2000 (SP4 or later) only. Permits programs By default, members of the that run on behalf of the user to impersonate a client. Administrators group and the System This security setting helps to prevent unauthorized account are assigned the right. servers from impersonating clients that connect to it through methods such as remote procedure calls (RPC) or named pipes. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 95 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Right Description Recommendation Increase scheduling priority Allows a process that has Write Property access to Grant to Administrators only. another process to increase the execution priority of the other process. A user with this privilege can change the scheduling priority of a process in the Task Manager dialog box. By default, this privilege is assigned to Administrators. Load and unload device drivers Allows a user to install and uninstall Plug and Play Grant to Administrators only. device drivers. This privilege does not apply to device drivers that are not Plug and Play; these device drivers can be installed only by Administrators. Note that device drivers run as trusted (highly privileged) programs; a user can abuse this privilege by installing hostile programs and giving them destructive access to resources. By default, this privilege is assigned to Administrators. Lock pages in memory Allows a process to keep data in physical memory, Grant to no one. which prevents the system from paging the data to virtual memory on disk. Assigning this privilege can result in significant degradation of system performance. This privilege is obsolete and is therefore never selected. Log on as a batch job Allows a user to log on by using a batch-queue facility. Grant to no one. By default, this right is assigned to Administrators. Log on as a service Allows a security principal to log on as a service. Grant to no one. Services can be configured to run under the LocalSystem account, which has a built-in right to log on as a service. Any service that runs under a separate account must be assigned the right. By default, this right is not assigned to anyone. Manage auditing and security Allows a user to specify object access auditing options Grant to Administrators only. log for individual resources such as files, Active Directory objects, registry keys and other objects. Object access auditing is not actually performed unless you have enabled it in Audit Policy (under Security Settings, Local Policies). A user who has this privilege also can view and clear the security log from Event Viewer. By default, this privilege is assigned to Administrators. Modify firmware environment Allows modification of system environment variables Grant to Administrators only. values either by a process through an API or by a user through System Properties. By default, this privilege is assigned to Administrators. Perform volume maintenance Windows XP (or later) only. Allows a non- By default, this right is assigned to tasks administrative or remote user to manage volumes or members of the Administrators group. disks. The operating system checks for the privilege in a user's access token when a process running in the user's security context calls SetFileValidData(). Profile single process Allows a user to run Microsoft® Windows NT® and Grant to Administrators only. Windows 2000 performance-monitoring tools to monitor the performance of nonsystem processes. By default, this privilege is assigned to Administrators and Power Users. Profile system performance Allows a user to run Windows NT and Windows 2000 Grant to Administrators or Operators. performance-monitoring tools to monitor the performance of system processes. By default, this privilege is assigned to Administrators. Remove computer docking station from Allows the user of a portable computer to undock the Grant as required. computer by clicking Eject PC on the Start menu. By default, this privilege is assigned to Administrators, Power Users, and Users. Replace a process-level token Allows a parent process to replace the access token Grant to no one. This is a powerful right that is associated with a child process. used only by the system. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 96 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Right Description Recommendation Restore files and directories Allows a user to circumvent file and directory Grant to Administrators and Backup permissions when restoring backed-up files and Operators only. This right overrides file directories and to set any valid security principal as the and directory permissions. owner of an object. (See also “Back up files and directories” in this table.) By default, this privilege is assigned to Administrators and Backup Operators. Shut down the system Allows a user to shut down the local computer. At domain level this applies to all domain controllers in the domain. On a server or workstation, this applies to that machine only. Grant to Administrators and Operators only. Especially for domain controllers or servers. On workstations, this can be granted to all users. Synchronize directory service Allows a process to provide directory synchronization Grant to Administrators only. data services. This privilege is relevant only on domain controllers. By default, this privilege is assigned to the Administrator and LocalSystem accounts on domain controllers. Take ownership of files or other Allows a user to take ownership of any securable Grant to Administrators only. This right objects object in the system, including Active Directory objects, overrides permissions protecting the files and folders, printers, registry keys, processes, and object(s). threads. At domain level this applies to all domain controllers in the domain. On a server or workstation, this applies to that machine only. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 97 of 154 Security Analysis: TESTBED System: Analysis Date: 24.2 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Rights Assigned to Local Groups Local groups can acquire rights indirectly via membership of another group or groups (the column Group Account Name) or by direct assignment (the column Group Account Name is empty). E.g. Local Group has Right via membership of Local1*Local2*Local3 In Native Mode domains, a Local Security Group can be a member of other Local Security Groups. Rights can propagate through nested security groups. In those cases, the Group Account Name will be written in the format of: Group1*Group2*Group3…, starting from the higher-level group from which the group acquires the right. In Mixed Mode domains, a Local Security Group cannot be a member of another Local Security Group. For a complete list of groups see report section Groups Defined in the Domain . Local Group Right Via Groups Account Operators Allow log on locally Administrators Access this computer from the network Adjust memory quotas for a process Allow log on locally Allow log on through Terminal Services Backup files and directories Bypass traverse checking Change the system time Create a page file Create global objects Debug programs Enable accounts delegation to be trusted for Force shutdown from a remote system Impersonate a Client after authentication Increase scheduling priority Load and unload device drivers Manage auditing and security log Modify firmware environment values Perform volume maintenance tasks Profile single process Profile system performance Remove computer from docking station Restore files and directories Shut down the system Take ownership of files or other objects Backup Operators Allow log on locally Backup files and directories Restore files and directories Shut down the system Pre-Windows 2000 Compatible Access Access this computer from the network Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 98 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 Local Group CONFIDENTIAL Right Via Groups Bypass traverse checking Print Operators Allow log on locally Load and unload device drivers Shut down the system Server Operators Allow log on locally Backup files and directories Change the system time Force shutdown from a remote system Restore files and directories Shut down the system SQLServer2005SQLBrowserUser$PUFFADDE R Log on as a service Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 99 of 154 Security Analysis: TESTBED System: Analysis Date: 24.3 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Rights Assigned to Universal Groups (Native mode only) Universal groups can acquire rights indirectly via membership of another Universal or Local security group or groups (the column Group Account Name) or by direct assignment (the column Group Account Name is empty). E.g. Universal Group has Right via membership of Local1*Local2*Universal1*Universal2 or Universal1*Universal2*Universal3 In Native Mode domains, a Universal Security Group can be a member of other Universal or Local Security Groups. Rights can propagate through nested security groups. In those cases, the Group Account Name will be written in the format of: Group1*Group2*Group3…, starting from the higher-level group from which the group acquires the right. In Mixed Mode domains, Universal Security Groups cannot be created. For a complete list of groups see report section Groups Defined in the Domain . ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 100 of 154 Security Analysis: TESTBED System: Analysis Date: 24.4 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Rights Assigned to Global Groups Global groups can acquire rights indirectly via membership of another group or groups (the column Group Account Name) or by direct assignment (the column Group Account Name is empty). E.g. Global Group has Right via membership of LocalGroup or Local1*Local2*Universal1*Global1 or Universal1*Universal2*Global1 or Global1*Global2*Global3 In Native Mode domains a Global Security Group can be a member of other Global, Universal or Local Security Groups. Rights can propagate through nested security groups. In those cases, the Group Account Name will be written in the format of: Group1*Group2*Group3…, starting from the higher-level group from which the group acquires the right. In Mixed Mode domains a Global Security Group can be a member of Local Security Groups only. For a complete list of groups see report section Groups Defined in the Domain . Global Group Right Domain Admins Access this computer from the network Via Groups Administrators Adjust memory quotas for a process Administrators Allow log on locally Administrators Allow log on through Terminal Services Administrators Backup files and directories Administrators Bypass traverse checking Administrators Change the system time Administrators Create a page file Administrators Create global objects Administrators Debug programs Administrators Enable accounts to be trusted for delegation Administrators Force shutdown from a remote system Administrators Impersonate a Client after authentication Administrators Increase scheduling priority Administrators Load and unload device drivers Administrators Manage auditing and security log Administrators Modify firmware environment values Administrators Perform volume maintenance tasks Administrators Profile single process Administrators Profile system performance Administrators Remove computer from docking station Administrators Restore files and directories Administrators Shut down the system Administrators Take ownership of files or other objects Administrators Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 101 of 154 Security Analysis: TESTBED System: Analysis Date: 24.5 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Rights Assigned to Users The following two reports list all rights assigned to users, including rights assigned directly to users (the column Group Account Name is empty), and rights acquired indirectly via membership of groups or nested groups (the column Group Account Name). The first report is Grouped by Right and the second is Grouped by User Account. In cases of rights acquired indirectly, the Group Account Name will be written in the format of: Group1*Group2*Group3…, starting from the higher-level group from which the user acquires the right. E.g. User Account has Right via membership of Group1*Group2*Group3 Consult reports Rights Assigned to Local Groups, Rights Assigned to Universal Groups (Native mode only) and Rights Assigned to Global Groups for a complete list of rights assigned to all Groups. For a complete list of groups see report section Groups Defined in the Domain . Section Summary 12.5% (2) of user accounts have right 'Access this computer from the network' 6.3% (1) of user accounts have right 'Deny access to this computer from the network' 12.5% (2) of user accounts have right 'Access this computer from the network(Effective)' 0.0% (0) of user accounts have right 'Act as part of the operating system' 0.0% (0) of user accounts have right 'Add workstations to domain' 12.5% (2) of user accounts have right 'Adjust memory Quotas for a process' 12.5% (2) of user accounts have right 'Backup files and directories' 12.5% (2) of user accounts have right 'Bypass traverse checking' 12.5% (2) of user accounts have right 'Change the system time' 0.0% (0) of user accounts have right 'Create a token object' 12.5% (2) of user accounts have right 'Create global objects' 12.5% (2) of user accounts have right 'Create a page file' 0.0% (0) of user accounts have right 'Create permanent shared objects' 12.5% (2) of user accounts have right 'Debug programs' 12.5% (2) of user accounts have right 'Force shutdown from a remote system' 0.0% (0) of user accounts have right 'Generate security audits' 12.5% (2) of user accounts have right 'Impersonate a Client after authentication' 12.5% (2) of user accounts have right 'Increase scheduling priority' 12.5% (2) of user accounts have right 'Load and unload device drivers' 0.0% (0) of user accounts have right 'Lock pages in memory' 6.3% (1) of user accounts have right 'Log on as a batch job' 0.0% (0) of user accounts have right 'Deny logon as a batch job' 6.3% (1) of user accounts have right 'Logon as a batch job(Effective)' 6.3% (1) of user accounts have right 'Log on as a service' 0.0% (0) of user accounts have right 'Deny logon as a service' 6.3% (1) of user accounts have right 'Logon as a service(Effective)' 12.5% (2) of user accounts have right 'Log on locally' 12.5% (2) of user accounts have right 'Deny user from logging on locally' 12.5% (2) of user accounts have right 'Log on locally(Effective)' 12.5% (2) of user accounts have right 'Allow logon through Terminal Services' 0.0% (0) of user accounts have right 'Deny logon through Terminal Services' 12.5% (2) of user accounts have right 'Logon through Terminal Services(Effective)' 12.5% (2) of user accounts have right 'Manage auditing and security log' 12.5% (2) of user accounts have right 'Modify firmware environment values' 12.5% (2) of user accounts have right 'Perform volume maintenance tasks' 12.5% (2) of user accounts have right 'Profile single process' 12.5% (2) of user accounts have right 'Profile system performance' 0.0% (0) of user accounts have right 'Replace a process-level token' 12.5% (2) of user accounts have right 'Restore files and directories' 12.5% (2) of user accounts have right 'Shut down the system' 12.5% (2) of user accounts have right 'Take ownership of files or other objects' 12.5% (2) of user accounts have right 'Set the Trusted for Delegation setting' 12.5% (2) of user accounts have right 'Undock a laptop with the Windows 2000 interface' 0.0% (0) of user accounts have right 'Synchronize directory service data' Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 102 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Grouped by Right Note. Where the Account Name is blank this means that the Privilege is assigned to nobody. Right Account Name Via Groups Access this computer from the network Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Access this computer from the network (Effective) Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Act as part of the operating system Adjust memory quotas for a process Allow log on locally Allow log on through Terminal Services Backup files and directories Bypass traverse checking Change the system time Create a page file Create a token object Create global objects Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 103 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 Right CONFIDENTIAL Account Name Via Groups Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Create permanent shared objects Debug programs Deny access to this computer from the network SUPPORT_388945a0 Deny log on as a batch job Deny log on as a service Deny log on locally SophosSAUPUFFADDER0 SUPPORT_388945a0 Deny log on through Terminal Services Enable accounts to be trusted for delegation Force shutdown from a remote system Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Generate security audits Impersonate a Client after authentication Increase scheduling priority Load and unload device drivers Lock pages in memory Log on as a batch job SUPPORT_388945a0 Log on as a batch job (Effective) SUPPORT_388945a0 Log on as a service SophosSAUPUFFADDER0 Log on as a service (Effective) SophosSAUPUFFADDER0 Manage auditing and security log Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 104 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Right Account Name Via Groups Modify firmware environment values Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Administrator Administrators Administrator Administrators*Domain Admins Administrator Administrators*Enterprise Admins GpLinkTest Administrators Perform volume maintenance tasks Profile single process Profile system performance Remove computer from docking station Replace a process-level token Restore files and directories Shut down the system Synchronize directory service data Take ownership of files or other objects Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 105 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Grouped by User Account Note. Where the Account Name is blank this means that the Privilege is assigned to nobody. Account Name Right Via Groups Act as part of the operating system Create a token object Create permanent shared objects Deny log on as a batch job Deny log on as a service Deny log on through Terminal Services Generate security audits Lock pages in memory Replace a process-level token Synchronize directory service data Administrator Access this computer from the network Administrators Administrators*Domain Admins Administrators*Enterprise Admins Access this computer from the network (Effective) Administrators Administrators*Domain Admins Administrators*Enterprise Admins Adjust memory quotas for a process Administrators Administrators*Domain Admins Administrators*Enterprise Admins Allow log on locally Administrators Administrators*Domain Admins Administrators*Enterprise Admins Allow log on through Terminal Services Administrators Administrators*Domain Admins Administrators*Enterprise Admins Backup files and directories Administrators Administrators*Domain Admins Administrators*Enterprise Admins Bypass traverse checking Administrators Administrators*Domain Admins Administrators*Enterprise Admins Change the system time Administrators Administrators*Domain Admins Administrators*Enterprise Admins Create a page file Administrators Administrators*Domain Admins Administrators*Enterprise Admins Create global objects Administrators Administrators*Domain Admins Administrators*Enterprise Admins Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 106 of 154 Security Analysis: TESTBED System: Analysis Date: Account Name PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Right Via Groups Debug programs Administrators Administrators*Domain Admins Administrators*Enterprise Admins Enable accounts to be trusted for delegation Administrators Administrators*Domain Admins Administrators*Enterprise Admins Force shutdown from a remote system Administrators Administrators*Domain Admins Administrators*Enterprise Admins Impersonate a Client after authentication Administrators Administrators*Domain Admins Administrators*Enterprise Admins Increase scheduling priority Administrators Administrators*Domain Admins Administrators*Enterprise Admins Load and unload device drivers Administrators Administrators*Domain Admins Administrators*Enterprise Admins Manage auditing and security log Administrators Administrators*Domain Admins Administrators*Enterprise Admins Modify firmware environment values Administrators Administrators*Domain Admins Administrators*Enterprise Admins Perform volume maintenance tasks Administrators Administrators*Domain Admins Administrators*Enterprise Admins Profile single process Administrators Administrators*Domain Admins Administrators*Enterprise Admins Profile system performance Administrators Administrators*Domain Admins Administrators*Enterprise Admins Remove computer from docking station Administrators Administrators*Domain Admins Administrators*Enterprise Admins Restore files and directories Administrators Administrators*Domain Admins Administrators*Enterprise Admins Shut down the system Administrators Administrators*Domain Admins Administrators*Enterprise Admins Take ownership of files or other objects Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Administrators Page 107 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 Account Name Right CONFIDENTIAL Via Groups Administrators*Domain Admins Administrators*Enterprise Admins GpLinkTest Access this computer from the network Administrators Access this computer from the network (Effective) Administrators Adjust memory quotas for a process Administrators Allow log on locally Administrators Allow log on through Terminal Services Administrators Backup files and directories Administrators Bypass traverse checking Administrators Change the system time Administrators Create a page file Administrators Create global objects Administrators Debug programs Administrators Enable accounts to be trusted for delegation Administrators Force shutdown from a remote system Administrators Impersonate a Client after authentication Administrators Increase scheduling priority Administrators Load and unload device drivers Administrators Manage auditing and security log Administrators Modify firmware environment values Administrators Perform volume maintenance tasks Administrators Profile single process Administrators Profile system performance Administrators Remove computer from docking station Administrators Restore files and directories Administrators Shut down the system Administrators Take ownership of files or other objects Administrators SophosSAUPUFFADDER0 Deny log on locally Log on as a service Log on as a service (Effective) SUPPORT_388945a0 Deny access to this computer from the network Deny log on locally Log on as a batch job Log on as a batch job (Effective) Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 108 of 154 Security Analysis: TESTBED System: Analysis Date: 24.6 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Rights Assigned to Well-Known Objects Notes Well-Known Objects are special identities defined by the Windows 200x* security system, such as Everyone, Local System, Principal Self, Authenticated Users, Creator Owner, and so on. The following report lists rights assigned to Well-Known Objects, including rights assigned directly (the column Group Account Name is empty), and rights acquired indirectly via membership of groups or nested groups (the column Group Account Name). In cases of rights acquired indirectly, the Group Account Name will be written in the format of: Group1*Group2*Group3…, starting from the higher-level group from which the user acquires the right. E.g. WellKnown Object via has Right Group1*Group2*Group3 membership of Consult reports Rights Assigned to Local Groups, Rights Assigned to Universal Groups (Native mode only) and Rights Assigned to Global Groups for a complete list of rights assigned to all Groups. For a complete list of groups see report section Groups Defined in the Domain . Account Name Right Authenticated Users Access this computer from the network Access this computer from the network Via Groups Pre-Windows 2000 Compatible Access Add workstations to domain Bypass traverse checking Bypass traverse checking Pre-Windows 2000 Compatible Access Enterprise Domain Controllers Access this computer from the network Everyone Access this computer from the network Bypass traverse checking Service Create global objects Impersonate a Client after authentication SYSTEM Log on as a service Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 109 of 154 Security Analysis: TESTBED System: Analysis Date: 24.7 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Rights Assigned to External Objects Notes The external objects are users, groups or computers that belong to other domains. When “Unknown” is reflected, it means that the server/domain where the object is registered could not be reached to obtain the information. When a server/domain cannot be reached for information, the server/domain is either not available through the network or the server/domain no longer exists in the domain. The following report lists rights assigned to external objects, including rights assigned directly (the column Group Account Name is empty), and rights acquired indirectly via membership of groups or nested groups (the column Group Account Name). In cases of rights acquired indirectly, the Group Account Name will be written in the format of: Group1*Group2*Group3…, starting from the higher-level group from which the user acquires the right. E.g. via External Object has Right membership Group1*Group2*Group3 of Consult reports Rights Assigned to Local Groups, Rights Assigned to Universal Groups (Native mode only) and Rights Assigned to Global Groups for a complete list of rights assigned to all Groups. For a complete list of groups see report section Groups Defined in the Domain . ** No data found ** Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 110 of 154 Security Analysis: TESTBED System: Analysis Date: 25. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Discretionary Access Controls (DACL) for Containers Section Summary This report section analyses 4,572 DACLs defined on the following classes of container objects: Containers: 4,366 DACLs Domains: 51 DACLs Organizational Units: 129 DACLs Sites: 26 DACLs Notes A discretionary access control list (DACL) is an ordered list of access control entries (ACEs) that define the permissions that apply to an object and its properties. Each ACE identifies an account (user, group, well-known object) and specifies a set of permissions allowed or denied for that account. Key: Permission The permission(s) the trustee has over the object. Type Allow = Allow permission to trustee Deny = Deny Permission to trustee The account to which the permission is assigned for the specified object. (G) = Group; (U) = User; (W) = Well-Known Object; (C) = Computer; (?) = The account is from an external domain and we cannot resolve the account type The object on which the account has the permission. (D) = Domain; (OU) = Organizational Unit; (C) = Container; (S) = Site Specifies where the permissions are applied: This object only This object and all child objects Child objects only Computer objects Group objects GroupPolicyContainer objects Organizational Unit objects Site objects Trusted Domain objects User objects P -The permission applies to objects within the container specified (object the permission applies to) only. If omitted, the permission will propagate to all child objects of the container within the tree. I - The permission is inherited from the parent object. If omitted, the permission is defined directly on the specified object. PI – Both Options Trustee Object Permission Applies To Bhvr (Behaviour) Section Detail For details see worksheet DACLs in the MS-Excel workbook. Implications Some of the permissions are very powerful and they should be carefully assigned to users and groups. Risk Rating Medium to High. (If users are assigned powerful Permissions that are not in line with their job functions.) Recommended Action You should check that the listed permissions over objects are appropriate and in line with users’ job functions. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 111 of 154 Security Analysis: TESTBED System: Analysis Date: 26. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Trusted and Trusting Domains Section Summary The domain being analysed has trust relationships with 2 other domains 50.0% (1) are trusted domains 50.0% (1) are trusting domains 0.0% (0) are both trusted and trusting domains Section Detail Domain Name Trust Type Attributes Trusted Trusting SnakeNY MIT Kerberos realm Disallow transitivity SnakeWP MIT Kerberos realm Disallow transitivity Yes Yes Implications A trust relationship is a link between two domains where the trusting domain honours logon authentications of the trusted domain. Active Directory services support two forms of trust relationships: one-way, non-transitive trusts and two-way, transitive trusts. In a one-way trust relationship, if Domain A trusts Domain B, Domain B does not automatically trust Domain A. In a non-transitive trust relationship, if Domain A trusts Domain B and Domain B trusts Domain C, then Domain A does not automatically trust Domain C. Networks running Windows NT 4.0 and earlier versions of Windows NT use one-way, non-transitive trust relationships. You manually create one-way, non-transitive trust relationships between existing domains. As a result, a Windows NT 4.0 (or earlier Windows NT) network with several domains requires the creation of many trust relationships. Active Directory services support this type of trust for connections to existing Windows NT 4.0 and earlier domains and to allow the configuration of trust relationships with domains in other domain trees. A two-way, transitive trust is the relationship between parent and child domains within a domain tree and between the top-level domains in a forest of domain trees. This is the default. Trust relationships among domains in a tree are established and maintained automatically. Transitive trust is a feature of the Kerberos authentication protocol, which provides for distributed authentication and authorization in Windows 200x*. In a two-way trust relationship, if Domain A trusts Domain B, then Domain B trusts Domain A. In a transitive trust relationship, if Domain A trusts Domain B and Domain B trusts Domain C, then Domain A trusts Domain C. Therefore in a two-way, transitive trust relationship, if DomainA trusts DomainB and DomainB trusts DomainC, then DomainA trusts DomainC and DomainC trusts DomainA. If a two-way, transitive trust exists between two domains, you can assign permissions to resources in one domain to user and group accounts in the other domain, and vice versa. Two-way, transitive trust relationships are the default in Windows 200x*. When you create a new child domain in a domain tree, a trust relationship is established automatically with its parent domain, which imparts a trust relationship with every other domain in the tree. As a result, users in one domain can access resources to which they have been granted permission in all other domains in a tree. Note, however, that the single logon enabled by trusts does not necessarily imply that the authenticated user has rights and permissions in all domains. The trusting domain will rely on the trusted domain to verify the userid and password of users logging on the trusted domain. Trusted domains can potentially provide paths for illegal access to the trusting domains. Weak security standards applied in trusted domains can undermine security on the trusting domains. Risk Rating Medium to High (dependant on the quality of security standards applied in trusted domains). Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 112 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Recommended Action You should satisfy yourself that security in domains trusted by your domain is implemented and administered to appropriate standards. You should consider running SekChek on domain controllers for all trusted domains. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 113 of 154 Security Analysis: TESTBED System: Analysis Date: 27. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Servers and Workstations Notes Role: DC = Domain Controller, S = Server, WS = Workstation When OS & Version = Not defined and Role = blank, it means that SekChek could not obtain the information or that the object does not refer to an actual machine. Section Summary There are 4 computer accounts defined in your domain: 50.0% (2) are Domain Controllers 0.0% (0) are Servers 50.0% (2) are Workstations 0.0% (0) of computer accounts are protected against accidental deletion Breakdown of Operating Systems: 25.0% (1) are running Windows 7 Enterprise 25.0% (1) are running Windows Server 2003 25.0% (1) are running Windows Server 2008 R2 Enterprise 25.0% (1) are running Windows Vista? Enterprise Section Detail Common Name Path OS & Version Role BEOWOLF Computers Windows Vista? Enterprise 6.0 (6002) WS BOOMSLANG Domain Controllers Windows Server 2003 5.2 (3790) PUFFADDER Domain Controllers Windows Server 2008 R2 Enterprise 6.1 (7601) DC REDWOLF Computers Windows 7 Enterprise 6.1 (7601) DC WS Implications Every server and workstation will provide various services to users within the domain. Servers normally offer services such as SQL databases, business applications, Active Directory, Email and remote access services. Workstations are normally used by end users to logon to thedomain and make use of domain resources and services as required. Resources and services can be shared, with varying access permission settings, on all servers and workstations. Every server and workstation is a potential security risk because they provide an access path to domain resources. Risk Rating Medium to High (Depending on the type of servers, their configuration and security setting standards applied). Recommended Action You should ensure that: Configurations and security settings are defined to appropriate standards Services and resources are appropriately restricted on servers and workstations Accounts databases have the appropriate security settings to help prevent illegal access The rights assigned to accounts and groups are effectively controlled Effective virus detection and prevention services are installed, running and started automatically at system startup time Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 114 of 154 Security Analysis: TESTBED System: Analysis Date: 28. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Domain Controllers in the Domain Section Summary There are 2 Domain Controllers (DCs) defined in your domain. 0 DCs are configured as Read Only Domain Controllers (RODC) 100.0% (2) were scanned for users' last logon times. Section Detail Common Name Path BOOMSLANG Scanned for RODC FSMO/GC Role Last Logons Domain Controllers Yes No Domain Naming Master Global Catalog Schema Master PUFFADDER Domain Controllers Yes No Global Catalog Infrastructure Master PDC Emulator RID Master Domain Controller A domain controller (DC) is a computer running Windows 200x* Server that holds a copy of Active Directory. DCs authenticate domain logons and track changes made to accounts, groups, and policy and trust relationships in a domain. A domain can contain more than one DC. Windows 200x* Server domain controllers provide an extension of the capabilities and features provided by Windows NT Server 4.0 domain controllers. For example, domain controllers in Windows 200x* support multimaster replication, synchronizing data on each domain controller and ensuring consistency of information over time. Multimaster replication is an evolution of the primary and backup domain controller of Windows NT Server 4.0, in which only one server, the primary domain controller, had a read and write copy of the directory. Read Only Domain Controller (RODC) A read-only domain controller (RODC) was introduced in the Windows Server 2008 operating system. Except for account passwords, an RODC holds all the Active Directory objects and attributes that a writable domain controller holds. However, changes cannot be made to the database that is stored on the RODC. Changes must be made on a writable domain controller and then replicated back to the RODC. Flexible Single Master Operation (FSMO) Roles FSMO Roles are roles assigned to Domain Controllers on a domain running Active Directory, and include: Domain Naming Master: The domain naming master FSMO role holder is the DC responsible for making changes to the forest-wide domain name space of the directory. This DC is the only one that can add or remove a domain from the directory. Unique per enterprise; as such, it is possible that this role is not held by a DC on this domain. Infrastructure Master: When an object in Domain A is referenced by another object in Domain B, it represents the reference by the GUID, the SID (for references to security principals), and the DN of the Active Directory object being referenced. The infrastructure FSMO role holder is the DC responsible for updating an object's SID and distinguished name in a cross-domain object reference. Unique per domain. PDC Emulator: In a Windows 200x domain, the PDC emulator role holder retains the following functions: Password changes performed by other DCs in the domain are replicated preferentially to the PDC emulator. Authentication failures that occur at a given DC in a domain because of an incorrect password are forwarded to the PDC emulator before a bad password failure message is reported to the user. Account lockout is processed on the PDC emulator. Unique per domain. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 115 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL RID Master: The RID (Relative ID) Master is responsible for assigning pools of RIDs to other DCs on the domain. Each DC on a domain is allowed to create new security principal objects. The RID Master issues each DC with a pool of RIDs to assign to these newly created objects. Naturally, as new objects are created, this pool diminishes. Once the pool falls below a threshold, the DC issues a request to the RID Master for an additional pool of RIDs. Unique per domain. Schema Master: The DC holding the role of Schema Master is responsible for processing updates to the AD schema. Once the Schema Master updates the AD schema, these changes are then replicated to other DCs on the domain. Unique per enterprise; as such, it is possible that this role is not held by a DC on this domain. Global Catalog (GC) A DC can also hold a copy of the global catalog. The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in an Active Directory forest. The global catalog is stored on DCs that have been designated as global catalog servers and is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different DCs. The global catalog provides the ability to locate objects from any domain without having to know the domain name. A global catalog server is a DC that, in addition to its full, writable domain directory partition replica, also stores a partial, read-only replica of all other domain directory partitions in the forest. The additional domain directory partitions are partial because only a limited set of attributes is included for each object. By including only the attributes that are most used for searching, every object in every domain in even the largest forest can be represented in the database of a single global catalog server. Risk Rating Low to medium depending on the security standards applied to all Domain Controllers in the Domain. Recommended Action You should confirm that the security standards applied to all Domain Controllers conform to the expected security standards. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 116 of 154 Security Analysis: TESTBED System: Analysis Date: 29. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Accounts Allowed to Dial In through RAS Section Summary SekChek could not determine whether there are any RAS servers on the network because the host system's Computer Browser service was not running during the Scan. All Acounts 12.5% (2) of users have permission to dial-in to your domain through RAS 0.0% (0) of these users are not called back by RAS 100.0% (2) of these users can set their own RAS Call-back Number 0.0% (0) of these users have their RAS Call-back Number set by the Administrator Excluding Disabled Accounts 12.5% (2) of users have permission to dial-in to your domain through RAS 0.0% (0) of these users are not called back by RAS 100.0% (2) of these users can set their own RAS Call-back Number 0.0% (0) of these users have their RAS Call-back Number set by the Administrator All Administrator Acounts 0.0% (0) of administrator accounts have permission to dial-in to your domain through RAS Administrator Accounts (Excluding Disabled Accounts) 0.0% (0) of administrator accounts have permission to dial-in to your domain through RAS Section Detail SekChek could not determine whether there are any RAS servers on the network because the host system's Computer Browser service was not running during the Scan. ** No data found ** The following profiles have permission to dial-in to your domain through RAS: Account Name Callback Callback Nbr Phone Service Set By Number Type Privilege Account State Virtual1 Yes Caller Callback Framed User Virtual2 Yes Caller Callback Framed User LEGEND: Call Back = Yes Callback Number Set By = Administrator Callback Number Set By = Caller Phone Number Account State : : : : The Server will call back the user before log on is allowed. The call back number is pre set. The user provides a call back number every time. Reflects the pre set phone number for call back. Account is Disabled (D), Locked (L), Expired (E), or a combination of them. Eg. (DL) (DE). If there are accounts listed with RAS privileges and no RAS servers found, it means that the accounts have been granted RAS privileges but that either: No RAS servers were visible when this analysis was done; or There was a RAS service installed at some stage but it has been discontinued. 0 ports listed in RAS servers indicates that the server has the RAS service configured but not active (started). Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 117 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Implications RAS (Remote Access Service) allows users to access your system remotely via modems, ISDN etc. RAS increases the risk of unauthorised access to your system because your system is visible to a much larger number of potential intruders via the public telephone network. The risk is greater if privileged users, such as Administrators, are allowed access through RAS. In general, multiple RAS servers also increase security risks simply because the number of external access points, which all require securing, is obviously greater. The strength of general security and RAS security on those servers is an important factor in controlling the risks. You will obtain the most comprehensive view of RAS privileges by running SekChek on the domain controller, selected RAS servers, and domain controllers for each trusted domain and on their RAS servers. When servers and workstations are members of a domain, they will usually allow users to logon to the domain. For workstations and servers that are not domain members (i.e. Standalone machines), domain logon is normally not available to users. Inappropriate security settings in RAS can create significant security exposures. Risk Rating Medium to high (dependent on settings for RAS users, RAS parameters and the strength of password controls.). Recommended Action You should only grant dial in (RAS) access to those users who require it for their job functions. Ensure that RAS access is not granted to all user accounts by default. In general, you should ensure that the call back feature is enabled for all RAS users and that a pre-set phone number is used. Do not grant RAS access to privileged accounts (e.g. Administrators) unless absolutely necessary. If possible, restrict the log-on hours for RAS users. This feature can be set for individual user accounts. Ensure that the option to prevent clear-text passwords being negotiated is utilised. This is a setting within RAS. Review the RAS settings on all RAS servers on a regular basis and ensure that appropriate security standards are applied on all of these machines. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 118 of 154 Security Analysis: TESTBED System: Analysis Date: 30. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Services and Drivers on the Machine Section Summary There are a total of 367 Services installed. These Services include the following types: 53.1% (195) are Kernel Drivers 7.4% (27) are File System Drivers 12.5% (46) are Own Process 26.4% (97) are Shared Process 0.5% (2) are Own Process (Interactive) 0.0% (0) are Shared Process (Interactive) The Services start types are: 8.2% (30) System Boot 7.1% (26) System 18.5% (68) Automatic 62.7% (230) Manual 3.5% (13) Disabled Their current states are: 52.3% (192) Stopped 0.0% (0) Starting 0.0% (0) Stopping 47.7% (175) Running 0.0% (0) Continuing 0.0% (0) Pausing 0.0% (0) Paused Following are two reports. The first enumerates services, their state and start type. The second enumerates services with their logon account and path name containing the executable. The services listed are on the machine being analysed and do not reflect services installed on other machines. Section Detail Service Name Display Name State 1394ohci 1394 OHCI Compliant Host Controller Stopped Kernel Driver Manual ACPI Microsoft ACPI Driver Running Kernel Driver Boot AcpiPmi ACPI Power Meter Driver Stopped Kernel Driver Manual adp94xx adp94xx Stopped Kernel Driver Manual adpahci adpahci Stopped Kernel Driver Manual adpu320 adpu320 Stopped Kernel Driver Manual ADWS Active Directory Web Services Running Own Process Automatic AeLookupSvc Application Experience Running Shared Process Manual AFD Ancillary Function Driver for Winsock Running Kernel Driver System agp440 Intel AGP Bus Filter Stopped Kernel Driver Manual ALG Application Layer Gateway Service Stopped Own Process Manual aliide aliide Stopped Kernel Driver Manual amdide amdide Stopped Kernel Driver Manual AmdK8 AMD K8 Processor Driver Stopped Kernel Driver Manual AmdPPM AMD Processor Driver Stopped Kernel Driver Manual Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 119 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State amdsata amdsata Stopped Kernel Driver Manual amdsbs amdsbs Stopped Kernel Driver Manual amdxata amdxata Running Kernel Driver Boot AppID AppID Driver Stopped Kernel Driver Manual AppIDSvc Application Identity Stopped Shared Process Manual Appinfo Application Information Stopped Shared Process Manual AppMgmt Application Management Running Shared Process Manual arc arc Stopped Kernel Driver Manual arcsas arcsas Stopped Kernel Driver Manual AsyncMac RAS Asynchronous Media Driver Running Kernel Driver Manual atapi IDE Channel Running Kernel Driver Boot AudioEndpointBuilder Windows Audio Endpoint Builder Stopped Shared Process Manual AudioSrv Windows Audio Stopped Shared Process Manual b06bdrv Broadcom NetXtreme II VBD Stopped Kernel Driver Manual b57nd60a Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0 Stopped Kernel Driver Manual BDESVC BitLocker Drive Encryption Service Stopped Shared Process Manual Beep Beep Stopped Kernel Driver Manual BFE Base Filtering Engine Running Shared Process Automatic BITS Background Intelligent Transfer Service Stopped Shared Process Manual blbdrive blbdrive Running Kernel Driver System bowser Browser Support Driver Running File System Driver Manual BrFiltLo Brother USB Mass-Storage Lower Filter Driver Stopped Kernel Driver Manual BrFiltUp Brother USB Mass-Storage Upper Filter Driver Stopped Kernel Driver Manual Browser Computer Browser Stopped Shared Process Disabled Brserid Brother MFC Serial Port Interface Driver (WDM) Stopped Kernel Driver Manual BrSerWdm Brother WDM Serial driver Stopped Kernel Driver Manual BrUsbMdm Brother MFC USB Fax Only Modem Stopped Kernel Driver Manual BrUsbSer Brother MFC USB Serial WDM Driver Stopped Kernel Driver Manual cdfs CD/DVD File System Reader Running File System Driver Disabled cdrom CD-ROM Driver Running Kernel Driver System CertPropSvc Certificate Propagation Running Shared Process Manual CLFS Common Log (CLFS) Running Kernel Driver Boot clr_optimization_v2.0.50727_32 Microsoft .NET Framework NGEN v2.0.50727_X86 Running Own Process Automatic clr_optimization_v2.0.50727_64 Microsoft .NET Framework NGEN v2.0.50727_X64 Running Own Process Automatic CmBatt Microsoft ACPI Control Method Battery Driver Stopped Kernel Driver Manual cmdide cmdide Stopped Kernel Driver Manual CNG CNG Running Kernel Driver Boot Compbatt Compbatt Stopped Kernel Driver Manual CompositeBus Composite Bus Enumerator Driver Running Kernel Driver Manual COMSysApp COM+ System Application Stopped Own Process Manual crcdisk Crcdisk Filter Driver Stopped Kernel Driver Disabled CryptSvc Cryptographic Services Running Shared Process Automatic DcomLaunch DCOM Server Process Launcher Running Shared Process Automatic Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 120 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State defragsvc Disk Defragmenter Stopped Own Process Manual Dfs DFS Namespace Running Own Process Automatic DfsC DFS Namespace Client Driver Running File System Driver System DfsDriver DFS Namespace Server Filter Driver Running File System Driver System DFSR DFS Replication Running Own Process Automatic DfsrRo DFS Replication ReadOnly Driver Running File System Driver Boot Dhcp DHCP Client Running Shared Process Automatic discache System Attribute Cache Running Kernel Driver System Disk Disk Driver Running Kernel Driver Boot DNS DNS Server Running Own Process Automatic Dnscache DNS Client Running Shared Process Automatic dot3svc Wired AutoConfig Stopped Shared Process Manual DPS Diagnostic Policy Service Running Shared Process Automatic DXGKrnl LDDM Graphics Subsystem Stopped Kernel Driver Manual EapHost Extensible Authentication Protocol Stopped Shared Process Manual ebdrv Broadcom NetXtreme II 10 GigE VBD Stopped Kernel Driver Manual EFS Encrypting File System (EFS) Stopped Shared Process Manual elxstor elxstor Stopped Kernel Driver Manual ErrDev Microsoft Hardware Error Device Driver Stopped Kernel Driver Manual eventlog Windows Event Log Running Shared Process Automatic EventSystem COM+ Event System Running Shared Process Automatic exfat exFAT File System Driver Stopped File System Driver Manual fastfat FAT12/16/32 File System Driver Stopped File System Driver Manual FCRegSvc Microsoft Fibre Channel Platform Registration Service Stopped Shared Process Manual fdc Floppy Disk Controller Driver Running Kernel Driver Manual fdPHost Function Discovery Provider Host Running Shared Process Manual FDResPub Function Discovery Resource Publication Stopped Shared Process Manual FileInfo File Information FS MiniFilter Stopped File System Driver Manual Filetrace Filetrace Stopped File System Driver Manual flpydisk Floppy Disk Driver Running Kernel Driver Manual FltMgr FltMgr Running File System Driver Boot FontCache Windows Font Cache Service Running Shared Process Automatic FontCache3.0.0.0 Windows Presentation Foundation Font Cache 3.0.0.0 Stopped Own Process Manual FsDepends File System Dependency Minifilter Stopped File System Driver Manual fvevol Bitlocker Drive Encryption Filter Driver Running Kernel Driver Boot gagp30kx Microsoft Generic AGPv3.0 Filter for K8 Processor Stopped Kernel Driver Platforms Manual gpsvc Group Policy Client Running Shared Process Automatic HDAudBus Microsoft UAA Bus Driver for High Definition Audio Stopped Kernel Driver Manual HidBatt HID UPS Battery Driver Stopped Kernel Driver Manual hidserv Human Interface Device Access Stopped Shared Process Manual HidUsb Microsoft HID Class Driver Stopped Kernel Driver Manual hkmsvc Health Key and Certificate Management Stopped Shared Process Manual Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 121 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State HpSAMD HpSAMD Stopped Kernel Driver Manual HTTP HTTP Running Kernel Driver Manual hwpolicy Hardware Policy Driver Running Kernel Driver Boot i8042prt i8042 Keyboard and PS/2 Mouse Port Driver Running Kernel Driver Manual iaStorV Intel RAID Controller Windows 7 Stopped Kernel Driver Manual idsvc Windows CardSpace Stopped Shared Process Manual iirsp iirsp Stopped Kernel Driver Manual IKEEXT IKE and AuthIP IPsec Keying Modules Stopped Shared Process Manual intelide intelide Running Kernel Driver Boot intelppm Intel Processor Driver Running Kernel Driver Manual ioatdma Intel(R) QuickData Technology Device Stopped Kernel Driver Manual IPBusEnum PnP-X IP Bus Enumerator Stopped Shared Process Disabled IpFilterDriver IP Traffic Filter Driver Stopped Kernel Driver Manual iphlpsvc IP Helper Running Shared Process Automatic IPMIDRV IPMIDRV Stopped Kernel Driver Manual IPNAT IP Network Address Translator Stopped Kernel Driver Manual isapnp isapnp Stopped Kernel Driver Manual iScsiPrt iScsiPort Driver Stopped Kernel Driver Manual IsmServ Intersite Messaging Running Own Process Automatic kbdclass Keyboard Class Driver Running Kernel Driver Manual kbdhid Keyboard HID Driver Stopped Kernel Driver Manual kdc Kerberos Key Distribution Center Running Shared Process Automatic KeyIso CNG Key Isolation Stopped Shared Process Manual KSecDD KSecDD Running Kernel Driver Boot KSecPkg KSecPkg Running Kernel Driver Boot ksthunk Kernel Streaming Thunks Stopped Kernel Driver Manual KtmRm KtmRm for Distributed Transaction Coordinator Stopped Shared Process Manual LanmanServer Server Running Shared Process Automatic LanmanWorkstation Workstation Running Shared Process Automatic lltdio Link-Layer Topology Discovery Mapper I/O Driver Running Kernel Driver Automatic lltdsvc Link-Layer Topology Discovery Mapper Stopped Shared Process Manual lmhosts TCP/IP NetBIOS Helper Running Shared Process Automatic LSI_FC LSI_FC Stopped Kernel Driver Manual LSI_SAS LSI_SAS Stopped Kernel Driver Manual LSI_SAS2 LSI_SAS2 Stopped Kernel Driver Manual LSI_SCSI LSI_SCSI Stopped Kernel Driver Manual luafv UAC File Virtualization Running File System Driver Automatic megasas megasas Stopped Kernel Driver Manual MegaSR MegaSR Stopped Kernel Driver Manual Microsoft SharePoint Microsoft SharePoint Workspace Audit Service Workspace Audit Service Stopped Own Process Manual MMCSS Multimedia Class Scheduler Stopped Shared Process Manual Modem Modem Stopped Kernel Driver Manual Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 122 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State monitor Microsoft Monitor Class Function Driver Service Stopped Kernel Driver Manual mouclass Mouse Class Driver Running Kernel Driver Manual mouhid Mouse HID Driver Running Kernel Driver Manual mountmgr Mount Point Manager Running Kernel Driver Boot mpio Microsoft Multi-Path Bus Driver Stopped Kernel Driver Manual mpsdrv Windows Firewall Authorization Driver Running Kernel Driver Manual MpsSvc Windows Firewall Running Shared Process Automatic mrxsmb SMB MiniRedirector Wrapper and Engine Running File System Driver Manual mrxsmb10 SMB 1.x MiniRedirector Running File System Driver Manual mrxsmb20 SMB 2.0 MiniRedirector Running File System Driver Manual msahci msahci Stopped Kernel Driver Manual msdsm Microsoft Multi-Path Device Specific Module Stopped Kernel Driver Manual MSDTC Distributed Transaction Coordinator Running Own Process Automatic Msfs Msfs Running File System Driver System mshidkmdf Pass-through HID to KMDF Filter Driver Stopped Kernel Driver Manual msisadrv msisadrv Running Kernel Driver Boot MSiSCSI Microsoft iSCSI Initiator Service Stopped Shared Process Manual msiserver Windows Installer Stopped Own Process Manual MsRPC MsRPC Stopped Kernel Driver Manual mssmbios Microsoft System Management BIOS Driver Running Kernel Driver System MSSQL$SOPHOS SQL Server (SOPHOS) Running Own Process Automatic MSSQLServerADHelper100 SQL Active Directory Helper Service Stopped Own Process Disabled MTConfig Microsoft Input Configuration Driver Stopped Kernel Driver Manual Mup Mup Running File System Driver Boot napagent Network Access Protection Agent Stopped Shared Process Manual NDIS NDIS System Driver Running Kernel Driver Boot NdisCap NDIS Capture LightWeight Filter Stopped Kernel Driver Manual NdisTapi Remote Access NDIS TAPI Driver Running Kernel Driver Manual Ndisuio NDIS Usermode I/O Protocol Stopped Kernel Driver Manual NdisWan Remote Access NDIS WAN Driver Running Kernel Driver Manual NDProxy NDIS Proxy Running Kernel Driver Manual NetBIOS NetBIOS Interface Running File System Driver System NetBT NetBT Running Kernel Driver System Netlogon Netlogon Running Shared Process Automatic Netman Network Connections Running Shared Process Manual netprofm Network List Service Running Shared Process Manual NetTcpPortSharing Net.Tcp Port Sharing Service Stopped Shared Process Disabled netvsc netvsc Running Kernel Driver Manual nfrd960 nfrd960 Stopped Kernel Driver Manual NlaSvc Network Location Awareness Running Shared Process Automatic Npfs Npfs Running File System Driver System nsi Network Store Interface Service Running Shared Process Automatic nsiproxy NSI proxy service driver. Running Kernel Driver System Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 123 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State NTDS Active Directory Domain Services Running Shared Process Automatic NtFrs File Replication Service Running Own Process Automatic Ntfs Ntfs Running File System Driver Manual Null Null Running Kernel Driver System nv_agp NVIDIA nForce AGP Bus Filter Stopped Kernel Driver Manual nvraid nvraid Stopped Kernel Driver Manual nvstor nvstor Stopped Kernel Driver Manual ohci1394 1394 OHCI Compliant Host Controller (Legacy) Stopped Kernel Driver Manual ose Office Source Engine Stopped Own Process Manual osppsvc Office Software Protection Platform Stopped Own Process Manual Parport Parallel port driver Stopped Kernel Driver Manual partmgr Partition Manager Running Kernel Driver Boot pci PCI Bus Driver Running Kernel Driver Boot pciide pciide Stopped Kernel Driver Manual pcmcia pcmcia Stopped Kernel Driver Manual pcw Performance Counters for Windows Driver Running Kernel Driver Boot PEAUTH PEAUTH Running Kernel Driver Automatic PerfHost Performance Counter DLL Host Stopped Own Process Manual pla Performance Logs & Alerts Stopped Shared Process Manual PlugPlay Plug and Play Running Shared Process Automatic PolicyAgent IPsec Policy Agent Stopped Shared Process Manual Power Power Running Shared Process Automatic PptpMiniport WAN Miniport (PPTP) Running Kernel Driver Manual Processor Processor Driver Stopped Kernel Driver Manual ProfSvc User Profile Service Running Shared Process Automatic ProtectedStorage Protected Storage Stopped Shared Process Manual Psched QoS Packet Scheduler Running Kernel Driver System ql2300 ql2300 Stopped Kernel Driver Manual ql40xx ql40xx Stopped Kernel Driver Manual RasAcd Remote Access Auto Connection Driver Stopped Kernel Driver Manual RasAgileVpn WAN Miniport (IKEv2) Running Kernel Driver Manual RasAuto Remote Access Auto Connection Manager Stopped Shared Process Manual Rasl2tp WAN Miniport (L2TP) Running Kernel Driver Manual RasMan Remote Access Connection Manager Stopped Shared Process Manual RasPppoe Remote Access PPPOE Driver Running Kernel Driver Manual RasSstp WAN Miniport (SSTP) Running Kernel Driver Manual rdbss Redirected Buffering Sub Sysytem Running File System Driver System rdpbus Remote Desktop Device Redirector Bus Driver Running Kernel Driver Manual RDPCDD RDPCDD Running Kernel Driver System RDPDR Terminal Server Device Redirector Driver Running Kernel Driver Manual RDPENCDD RDP Encoder Mirror Driver Running Kernel Driver System RDPREFMP Reflector Display Driver used to gain access to Running Kernel Driver graphics data System Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 124 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State RDPWD RDP Winstation Driver Running Kernel Driver Manual RemoteAccess Routing and Remote Access Stopped Shared Process Disabled RemoteRegistry Remote Registry Running Shared Process Automatic RpcEptMapper RPC Endpoint Mapper Running Shared Process Automatic RpcLocator Remote Procedure Call (RPC) Locator Stopped Own Process Manual RpcSs Remote Procedure Call (RPC) Running Shared Process Automatic RSoPProv Resultant Set of Policy Provider Stopped Shared Process Manual rspndr Link-Layer Topology Discovery Responder Running Kernel Driver Automatic s3cap s3cap Running Kernel Driver Manual sacdrv sacdrv Stopped Kernel Driver Boot sacsvr Special Administration Console Helper Stopped Shared Process Manual SamSs Security Accounts Manager Running Shared Process Automatic SAVAdminService Sophos Anti-Virus status reporter Running Own Process Automatic SAVOnAccess SAVOnAccess Running File System Driver System SAVService Sophos Anti-Virus Running Own Process Automatic sbp2port SBP-2 Transport/Protocol Bus Driver Stopped Kernel Driver Manual SCardSvr Smart Card Stopped Shared Process Manual scfilter Smart card PnP Class Filter Driver Stopped Kernel Driver Manual Schedule Task Scheduler Running Shared Process Automatic SCPolicySvc Smart Card Removal Policy Stopped Shared Process Manual secdrv Security Driver Running Kernel Driver Automatic seclogon Secondary Logon Stopped Shared Process Manual SENS System Event Notification Service Running Shared Process Automatic Serenum Serenum Filter Driver Running Kernel Driver Manual Serial Serial port driver Running Kernel Driver System sermouse Serial Mouse Driver Stopped Kernel Driver Manual SessionEnv Remote Desktop Configuration Running Shared Process Manual sffdisk SFF Storage Class Driver Stopped Kernel Driver Manual sffp_mmc SFF Storage Protocol Driver for MMC Stopped Kernel Driver Manual sffp_sd SFF Storage Protocol Driver for SDBus Stopped Kernel Driver Manual sfloppy High-Capacity Floppy Disk Drive Stopped Kernel Driver Manual SharedAccess Internet Connection Sharing (ICS) Stopped Shared Process Disabled ShellHWDetection Shell Hardware Detection Running Shared Process Automatic SiSRaid2 SiSRaid2 Stopped Kernel Driver Manual SiSRaid4 SiSRaid4 Stopped Kernel Driver Manual Smb Message-oriented TCP/IP and TCP/IPv6 Protocol Stopped Kernel Driver (SMB session) Manual SNMPTRAP SNMP Trap Stopped Own Process Manual Sophos Agent Sophos Agent Running Own Process Automatic Sophos AutoUpdate Service Sophos AutoUpdate Service Running Own Process Automatic Sophos Certification Manager Sophos Certification Manager Running Own Process Automatic Sophos Management Service Sophos Management Service Running Own Process Automatic Sophos Message Router Sophos Message Router Running Own Process Automatic Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 125 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State SophosBootDriver SophosBootDriver Stopped Kernel Driver Disabled spldr Security Processor Loader Driver Running Kernel Driver Boot Spooler Print Spooler Running Own Process(I) Automatic sppsvc Software Protection Stopped Own Process Automatic sppuinotify SPP Notification Service Stopped Shared Process Manual SQLAgent$SOPHOS SQL Server Agent (SOPHOS) Stopped Own Process Disabled SQLBrowser SQL Server Browser Running Own Process Automatic SQLWriter SQL Server VSS Writer Running Own Process Automatic srv Server SMB 1.xxx Driver Running File System Driver Manual srv2 Server SMB 2.xxx Driver Running File System Driver Manual srvnet srvnet Running File System Driver Manual SSDPSRV SSDP Discovery Stopped Shared Process Disabled SstpSvc Secure Socket Tunneling Protocol Service Stopped Shared Process Manual stexstor stexstor Stopped Kernel Driver Manual storflt Disk Virtual Machine Bus Acceleration Filter Driver Running Kernel Driver Boot storvsc storvsc Stopped Kernel Driver Manual storvsp storvsp Stopped Kernel Driver Manual SUM Sophos Update Manager Running Own Process Automatic swenum Software Bus Driver Running Kernel Driver Manual swi_service Sophos Web Intelligence Service Running Own Process Automatic swprv Microsoft Software Shadow Copy Provider Stopped Own Process Manual SynthVid SynthVid Running Kernel Driver Manual TapiSrv Telephony Stopped Own Process Manual TBS TPM Base Services Stopped Shared Process Manual Tcpip TCP/IP Protocol Driver Running Kernel Driver Boot TCPIP6 Microsoft IPv6 Protocol Driver Stopped Kernel Driver Manual tcpipreg TCP/IP Registry Compatibility Running Kernel Driver Automatic TDPIPE TDPIPE Stopped Kernel Driver Manual TDTCP TDTCP Running Kernel Driver Manual tdx NetIO Legacy TDI Support Driver Running Kernel Driver System TermDD Terminal Device Driver Running Kernel Driver System TermService Remote Desktop Services Running Shared Process Manual THREADORDER Thread Ordering Server Stopped Shared Process Manual TrkWks Distributed Link Tracking Client Stopped Shared Process Manual TrustedInstaller Windows Modules Installer Running Own Process Manual tssecsrv Remote Desktop Services Security Filter Driver Running Kernel Driver Manual TsUsbFlt TsUsbFlt Stopped Kernel Driver Manual tunnel Microsoft Tunnel Miniport Adapter Driver Running Kernel Driver Manual uagp35 Microsoft AGPv3.5 Filter Stopped Kernel Driver Manual udfs udfs Stopped File System Driver Disabled UI0Detect Interactive Services Detection Stopped Own Process(I) Manual uliagpkx Uli AGP Bus Filter Stopped Kernel Driver Manual umbus UMBus Enumerator Driver Running Kernel Driver Manual Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 126 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State UmPass Microsoft UMPass Driver Stopped Kernel Driver Manual UmRdpService Remote Desktop Services UserMode Port Redirector Running Shared Process Manual upnphost UPnP Device Host Stopped Shared Process Disabled usbccgp Microsoft USB Generic Parent Driver Stopped Kernel Driver Manual usbehci Microsoft USB 2.0 Enhanced Host Controller Miniport Stopped Kernel Driver Driver Manual usbhub Microsoft USB Standard Hub Driver Stopped Kernel Driver Manual usbohci Microsoft USB Open Host Controller Miniport Driver Stopped Kernel Driver Manual usbprint Microsoft USB PRINTER Class Stopped Kernel Driver Manual USBSTOR USB Mass Storage Driver Stopped Kernel Driver Manual usbuhci Microsoft USB Universal Host Controller Miniport Stopped Kernel Driver Driver Manual UxSms Desktop Window Manager Session Manager Running Shared Process Automatic VaultSvc Credential Manager Stopped Shared Process Manual vdrvroot Microsoft Virtual Drive Enumerator Driver Running Kernel Driver Boot vds Virtual Disk Running Own Process Manual vga vga Stopped Kernel Driver Manual VgaSave VgaSave Running Kernel Driver System vhdmp vhdmp Stopped Kernel Driver Manual viaide viaide Stopped Kernel Driver Manual Vid Vid Stopped Kernel Driver Manual vmbus Virtual Machine Bus Running Kernel Driver Boot VMBusHID VMBusHID Running Kernel Driver Manual vmicheartbeat Hyper-V Heartbeat Service Running Own Process Automatic vmickvpexchange Hyper-V Data Exchange Service Running Own Process Automatic vmicshutdown Hyper-V Guest Shutdown Service Running Own Process Automatic vmictimesync Hyper-V Time Synchronization Service Running Own Process Automatic vmicvss Hyper-V Volume Shadow Copy Requestor Running Own Process Automatic volmgr Volume Manager Driver Running Kernel Driver Boot volmgrx Dynamic Volume Manager Running Kernel Driver Boot volsnap Storage volumes Running Kernel Driver Boot vsmraid vsmraid Stopped Kernel Driver Manual VSS Volume Shadow Copy Stopped Own Process Manual W32Time Windows Time Running Shared Process Manual WacomPen Wacom Serial Pen HID Driver Stopped Kernel Driver Manual WANARP Remote Access IP ARP Driver Stopped Kernel Driver Manual Wanarpv6 Remote Access IPv6 ARP Driver Running Kernel Driver System WcsPlugInService Windows Color System Stopped Shared Process Manual Wd Wd Stopped Kernel Driver Manual Wdf01000 Kernel Mode Driver Frameworks service Running Kernel Driver Boot WdiServiceHost Diagnostic Service Host Stopped Shared Process Manual WdiSystemHost Diagnostic System Host Stopped Shared Process Manual Wecsvc Windows Event Collector Stopped Shared Process Manual wercplsupport Problem Reports and Solutions Control Panel Support Stopped Shared Process Manual Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Page 127 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Display Name State WerSvc Windows Error Reporting Service Stopped Shared Process Manual WfpLwf WFP Lightweight Filter Running Kernel Driver System WIMMount WIMMount Stopped File System Driver Manual WinHttpAutoProxySvc WinHTTP Web Proxy Auto-Discovery Service Stopped Shared Process Manual Winmgmt Windows Management Instrumentation Running Shared Process Automatic WinRM Windows Remote Management (WS-Management) Running Shared Process Automatic WmiAcpi Microsoft Windows Management Interface for ACPI Stopped Kernel Driver Manual wmiApSrv WMI Performance Adapter Stopped Own Process Manual WPDBusEnum Portable Device Enumerator Service Stopped Shared Process Manual ws2ifsl Windows Socket 2.0 Non-IFS Service Provider Running Kernel Driver Support Environment System wuauserv Windows Update Running Shared Process Automatic WudfPf User Mode Driver Frameworks Platform Driver Stopped Kernel Driver Manual wudfsvc Windows Driver Foundation - User-mode Driver Stopped Shared Process Framework Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Service Type Start Type Manual Page 128 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Section Detail Service Name Logon Name Path Name 1394ohci \SystemRoot\system32\drivers\1394ohci.sys ACPI \SystemRoot\system32\drivers\ACPI.sys AcpiPmi \SystemRoot\system32\drivers\acpipmi.sys adp94xx \SystemRoot\system32\DRIVERS\adp94xx.sys adpahci \SystemRoot\system32\DRIVERS\adpahci.sys adpu320 \SystemRoot\system32\DRIVERS\adpu320.sys ADWS LocalSystem C:\Windows\ADWS\Microsoft.ActiveDirectory.WebServices.exe AeLookupSvc localSystem C:\Windows\system32\svchost.exe -k netsvcs AFD \SystemRoot\system32\drivers\afd.sys agp440 \SystemRoot\system32\drivers\agp440.sys ALG NT AUTHORITY\ LocalService C:\Windows\System32\alg.exe aliide \SystemRoot\system32\drivers\aliide.sys amdide \SystemRoot\system32\drivers\amdide.sys AmdK8 \SystemRoot\system32\DRIVERS\amdk8.sys AmdPPM \SystemRoot\system32\DRIVERS\amdppm.sys amdsata \SystemRoot\system32\drivers\amdsata.sys amdsbs \SystemRoot\system32\DRIVERS\amdsbs.sys amdxata \SystemRoot\system32\drivers\amdxata.sys AppID \SystemRoot\system32\drivers\appid.sys AppIDSvc NT Authority\ LocalService C:\Windows\system32\svchost.exe LocalServiceAndNoImpersonation Appinfo LocalSystem C:\Windows\system32\svchost.exe -k netsvcs AppMgmt LocalSystem C:\Windows\system32\svchost.exe -k netsvcs arc \SystemRoot\system32\DRIVERS\arc.sys arcsas \SystemRoot\system32\DRIVERS\arcsas.sys AsyncMac system32\DRIVERS\asyncmac.sys atapi -k \SystemRoot\system32\drivers\atapi.sys AudioEndpointBuilder LocalSystem C:\Windows\System32\svchost.exe LocalSystemNetworkRestricted -k AudioSrv NT AUTHORITY\ LocalService C:\Windows\System32\svchost.exe LocalServiceNetworkRestricted -k b06bdrv \SystemRoot\system32\DRIVERS\bxvbda.sys b57nd60a BDESVC system32\DRIVERS\b57nd60a.sys localSystem C:\Windows\System32\svchost.exe -k netsvcs BFE NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork BITS LocalSystem C:\Windows\System32\svchost.exe -k netsvcs Beep blbdrive system32\DRIVERS\blbdrive.sys bowser system32\DRIVERS\bowser.sys BrFiltLo \SystemRoot\system32\DRIVERS\BrFiltLo.sys BrFiltUp \SystemRoot\system32\DRIVERS\BrFiltUp.sys Browser Brserid LocalSystem C:\Windows\System32\svchost.exe -k netsvcs \SystemRoot\System32\Drivers\Brserid.sys Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 129 of 154 Security Analysis: TESTBED System: Analysis Date: Service Name PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Logon Name Path Name BrSerWdm \SystemRoot\System32\Drivers\BrSerWdm.sys BrUsbMdm \SystemRoot\System32\Drivers\BrUsbMdm.sys BrUsbSer \SystemRoot\System32\Drivers\BrUsbSer.sys cdfs system32\DRIVERS\cdfs.sys cdrom CertPropSvc \SystemRoot\system32\drivers\cdrom.sys LocalSystem C:\Windows\system32\svchost.exe -k netsvcs CLFS \SystemRoot\System32\CLFS.sys clr_optimization_v2.0.50727_32 LocalSystem C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.e xe clr_optimization_v2.0.50727_64 LocalSystem C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw .exe CmBatt \SystemRoot\system32\DRIVERS\CmBatt.sys cmdide \SystemRoot\system32\drivers\cmdide.sys CNG \SystemRoot\System32\Drivers\cng.sys Compbatt \SystemRoot\system32\DRIVERS\compbatt.sys CompositeBus \SystemRoot\system32\drivers\CompositeBus.sys COMSysApp LocalSystem C:\Windows\system32\dllhost.exe FD88-11D1-960D-00805FC79235} crcdisk /Processid:{02D4B3F1- \SystemRoot\system32\DRIVERS\crcdisk.sys CryptSvc NT Authority\ NetworkService C:\Windows\system32\svchost.exe -k NetworkService DcomLaunch LocalSystem C:\Windows\system32\svchost.exe -k DcomLaunch defragsvc localSystem C:\Windows\system32\svchost.exe -k defragsvc Dfs LocalSystem C:\Windows\system32\dfssvc.exe DfsC System32\Drivers\dfsc.sys DfsDriver system32\drivers\dfs.sys DFSR LocalSystem C:\Windows\system32\DFSRs.exe DfsrRo Dhcp \SystemRoot\system32\drivers\dfsrro.sys NT Authority\ LocalService discache C:\Windows\system32\svchost.exe LocalServiceNetworkRestricted -k System32\drivers\discache.sys Disk \SystemRoot\system32\DRIVERS\disk.sys DNS LocalSystem C:\Windows\system32\dns.exe Dnscache NT NetworkService dot3svc localSystem C:\Windows\system32\svchost.exe LocalSystemNetworkRestricted DPS NT AUTHORITY\ LocalService C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork AUTHORITY\ C:\Windows\system32\svchost.exe -k NetworkService DXGKrnl EapHost \SystemRoot\System32\drivers\dxgkrnl.sys localSystem ebdrv EFS -k C:\Windows\System32\svchost.exe -k netsvcs \SystemRoot\system32\DRIVERS\evbda.sys LocalSystem elxstor C:\Windows\System32\lsass.exe \SystemRoot\system32\DRIVERS\elxstor.sys ErrDev \SystemRoot\system32\drivers\errdev.sys eventlog NT AUTHORITY\ LocalService C:\Windows\System32\svchost.exe LocalServiceNetworkRestricted EventSystem NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe -k LocalService Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) -k Page 130 of 154 Security Analysis: TESTBED System: Analysis Date: Service Name PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Logon Name Path Name NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe LocalServiceNetworkRestricted exfat fastfat FCRegSvc fdc -k system32\DRIVERS\fdc.sys fdPHost NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe -k LocalService FDResPub NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe LocalServiceAndNoImpersonation FileInfo system32\drivers\fileinfo.sys Filetrace system32\drivers\filetrace.sys flpydisk system32\DRIVERS\flpydisk.sys FltMgr \SystemRoot\system32\drivers\fltmgr.sys -k FontCache NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe LocalServiceAndNoImpersonation -k FontCache3.0.0.0 NT Authority\ LocalService C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\Presentatio nFontCache.exe FsDepends System32\drivers\FsDepends.sys fvevol \SystemRoot\System32\DRIVERS\fvevol.sys gagp30kx \SystemRoot\system32\DRIVERS\gagp30kx.sys gpsvc LocalSystem C:\Windows\system32\svchost.exe -k netsvcs HDAudBus \SystemRoot\system32\drivers\HDAudBus.sys HidBatt \SystemRoot\system32\DRIVERS\HidBatt.sys hidserv LocalSystem HidUsb hkmsvc C:\Windows\system32\svchost.exe LocalSystemNetworkRestricted \SystemRoot\system32\drivers\hidusb.sys localSystem C:\Windows\System32\svchost.exe -k netsvcs HpSAMD \SystemRoot\system32\drivers\HpSAMD.sys HTTP system32\drivers\HTTP.sys hwpolicy \SystemRoot\System32\drivers\hwpolicy.sys i8042prt \SystemRoot\system32\drivers\i8042prt.sys iaStorV \SystemRoot\system32\drivers\iaStorV.sys idsvc LocalSystem iirsp IKEEXT C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\infocard.exe \SystemRoot\system32\DRIVERS\iirsp.sys LocalSystem C:\Windows\system32\svchost.exe -k netsvcs intelide \SystemRoot\system32\drivers\intelide.sys intelppm system32\DRIVERS\intelppm.sys ioatdma \SystemRoot\System32\Drivers\qd260x64.sys IPBusEnum LocalSystem IpFilterDriver iphlpsvc -k C:\Windows\system32\svchost.exe LocalSystemNetworkRestricted -k system32\DRIVERS\ipfltdrv.sys LocalSystem C:\Windows\System32\svchost.exe -k NetSvcs IPMIDRV \SystemRoot\system32\drivers\IPMIDrv.sys IPNAT System32\drivers\ipnat.sys isapnp \SystemRoot\system32\drivers\isapnp.sys iScsiPrt \SystemRoot\system32\drivers\msiscsi.sys Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 131 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Logon Name Path Name IsmServ LocalSystem C:\Windows\System32\ismserv.exe kbdclass \SystemRoot\system32\drivers\kbdclass.sys kbdhid \SystemRoot\system32\drivers\kbdhid.sys kdc LocalSystem C:\Windows\System32\lsass.exe KeyIso LocalSystem C:\Windows\system32\lsass.exe KSecDD \SystemRoot\System32\Drivers\ksecdd.sys KSecPkg \SystemRoot\System32\Drivers\ksecpkg.sys ksthunk \SystemRoot\system32\drivers\ksthunk.sys KtmRm NT NetworkService LanmanServer LocalSystem LanmanWorkstation NT NetworkService AUTHORITY\ C:\Windows\System32\svchost.exe NetworkServiceAndNoImpersonation -k C:\Windows\system32\svchost.exe -k netsvcs AUTHORITY\ C:\Windows\System32\svchost.exe -k NetworkService lltdio system32\DRIVERS\lltdio.sys lltdsvc NT AUTHORITY\ LocalService C:\Windows\System32\svchost.exe -k LocalService lmhosts NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe LocalServiceNetworkRestricted LSI_FC \SystemRoot\system32\DRIVERS\lsi_fc.sys LSI_SAS \SystemRoot\system32\DRIVERS\lsi_sas.sys LSI_SAS2 \SystemRoot\system32\DRIVERS\lsi_sas2.sys LSI_SCSI \SystemRoot\system32\DRIVERS\lsi_scsi.sys luafv \SystemRoot\system32\drivers\luafv.sys megasas \SystemRoot\system32\DRIVERS\megasas.sys MegaSR \SystemRoot\system32\DRIVERS\MegaSR.sys Microsoft SharePoint NT AUTHORITY\ LocalService Workspace Audit Service C:\Program Files Office\Office14\GROOVE.EXE'' /auditservice MMCSS C:\Windows\system32\svchost.exe -k netsvcs LocalSystem Modem system32\drivers\modem.sys monitor system32\DRIVERS\monitor.sys mouclass \SystemRoot\system32\drivers\mouclass.sys mouhid system32\DRIVERS\mouhid.sys mountmgr \SystemRoot\System32\drivers\mountmgr.sys mpio \SystemRoot\system32\drivers\mpio.sys mpsdrv System32\drivers\mpsdrv.sys MpsSvc NT Authority\ LocalService system32\DRIVERS\mrxsmb.sys mrxsmb10 system32\DRIVERS\mrxsmb10.sys mrxsmb20 system32\DRIVERS\mrxsmb20.sys msahci \SystemRoot\system32\drivers\msahci.sys msdsm \SystemRoot\system32\drivers\msdsm.sys NT NetworkService (x86)\Microsoft C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork mrxsmb MSDTC -k AUTHORITY\ C:\Windows\System32\msdtc.exe Msfs mshidkmdf \SystemRoot\System32\drivers\mshidkmdf.sys msisadrv \SystemRoot\system32\drivers\msisadrv.sys Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 132 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Logon Name Path Name MSiSCSI LocalSystem C:\Windows\system32\svchost.exe -k netsvcs msiserver LocalSystem C:\Windows\system32\msiexec.exe /V MsRPC mssmbios \SystemRoot\system32\drivers\mssmbios.sys MSSQL$SOPHOS LocalSystem C:\Program Files (x86)\Microsoft Server\MSSQL10.SOPHOS\MSSQL\Binn\sqlservr.exe'' sSOPHOS SQL - MSSQLServerADHelper100 LocalSystem C:\Program Files (x86)\Microsoft Server\100\Shared\SQLADHLP.EXE SQL MTConfig \SystemRoot\system32\DRIVERS\MTConfig.sys Mup \SystemRoot\System32\Drivers\mup.sys napagent NT NetworkService AUTHORITY\ C:\Windows\System32\svchost.exe -k NetworkService NDIS \SystemRoot\system32\drivers\ndis.sys NdisCap system32\DRIVERS\ndiscap.sys NdisTapi system32\DRIVERS\ndistapi.sys Ndisuio system32\DRIVERS\ndisuio.sys NdisWan system32\DRIVERS\ndiswan.sys NDProxy NetBIOS system32\DRIVERS\netbios.sys NetBT System32\DRIVERS\netbt.sys Netlogon LocalSystem C:\Windows\system32\lsass.exe Netman LocalSystem C:\Windows\System32\svchost.exe LocalSystemNetworkRestricted netprofm NT AUTHORITY\ LocalService C:\Windows\System32\svchost.exe -k LocalService NetTcpPortSharing NT AUTHORITY\ LocalService C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMSvcHost.exe netvsc \SystemRoot\system32\drivers\netvsc60.sys nfrd960 \SystemRoot\system32\DRIVERS\nfrd960.sys NlaSvc NT NetworkService -k AUTHORITY\ C:\Windows\System32\svchost.exe -k NetworkService Npfs nsi NT Authority\ LocalService nsiproxy C:\Windows\system32\svchost.exe -k LocalService system32\drivers\nsiproxy.sys NTDS LocalSystem C:\Windows\System32\lsass.exe NtFrs LocalSystem C:\Windows\system32\ntfrs.exe Ntfs Null nv_agp \SystemRoot\system32\drivers\nv_agp.sys nvraid \SystemRoot\system32\drivers\nvraid.sys nvstor \SystemRoot\system32\drivers\nvstor.sys ohci1394 \SystemRoot\system32\drivers\ohci1394.sys ose LocalSystem osppsvc NT NetworkService Parport C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE AUTHORITY\ C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE \SystemRoot\system32\DRIVERS\parport.sys Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 133 of 154 Security Analysis: TESTBED System: Analysis Date: Service Name PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Logon Name Path Name partmgr \SystemRoot\System32\drivers\partmgr.sys pci \SystemRoot\system32\drivers\pci.sys pciide \SystemRoot\system32\drivers\pciide.sys pcmcia \SystemRoot\system32\DRIVERS\pcmcia.sys pcw \SystemRoot\System32\drivers\pcw.sys PEAUTH system32\drivers\peauth.sys PerfHost NT AUTHORITY\ LocalService C:\Windows\SysWow64\perfhost.exe pla NT AUTHORITY\ LocalService C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork PlugPlay LocalSystem C:\Windows\system32\svchost.exe -k DcomLaunch PolicyAgent NT Authority\ NetworkService C:\Windows\system32\svchost.exe NetworkServiceNetworkRestricted Power LocalSystem C:\Windows\system32\svchost.exe -k DcomLaunch PptpMiniport system32\DRIVERS\raspptp.sys Processor \SystemRoot\system32\DRIVERS\processr.sys ProfSvc LocalSystem C:\Windows\system32\svchost.exe -k netsvcs ProtectedStorage LocalSystem C:\Windows\system32\lsass.exe Psched system32\DRIVERS\pacer.sys ql2300 \SystemRoot\system32\DRIVERS\ql2300.sys ql40xx \SystemRoot\system32\DRIVERS\ql40xx.sys RasAcd System32\DRIVERS\rasacd.sys RasAgileVpn system32\DRIVERS\AgileVpn.sys RasAuto localSystem C:\Windows\System32\svchost.exe -k netsvcs Rasl2tp RasMan -k system32\DRIVERS\rasl2tp.sys localSystem C:\Windows\System32\svchost.exe -k netsvcs RasPppoe system32\DRIVERS\raspppoe.sys RasSstp system32\DRIVERS\rassstp.sys rdbss system32\DRIVERS\rdbss.sys rdpbus system32\DRIVERS\rdpbus.sys RDPCDD System32\DRIVERS\RDPCDD.sys RDPDR System32\drivers\rdpdr.sys RDPENCDD system32\drivers\rdpencdd.sys RDPREFMP system32\drivers\rdprefmp.sys RDPWD RemoteAccess localSystem C:\Windows\System32\svchost.exe -k netsvcs RemoteRegistry NT AUTHORITY\ LocalService RpcEptMapper NT NetworkService AUTHORITY\ C:\Windows\system32\svchost.exe -k RPCSS RpcLocator NT NetworkService AUTHORITY\ C:\Windows\system32\locator.exe RpcSs NT NetworkService AUTHORITY\ C:\Windows\system32\svchost.exe -k rpcss RSoPProv LocalSystem C:\Windows\system32\svchost.exe -k regsvc C:\Windows\system32\RSoPProv.exe rspndr system32\DRIVERS\rspndr.sys s3cap \SystemRoot\system32\drivers\vms3cap.sys sacdrv \SystemRoot\system32\DRIVERS\sacdrv.sys Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 134 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Logon Name Path Name sacsvr LocalSystem C:\Windows\System32\svchost.exe -k netsvcs SamSs LocalSystem C:\Windows\system32\lsass.exe SAVAdminService LocalSystem C:\Program Files (x86)\Sophos\Sophos Virus\SAVAdminService.exe SAVOnAccess SAVService system32\DRIVERS\savonaccess.sys NT AUTHORITY\ LocalService sbp2port SCardSvr Anti- C:\Program Files Virus\SavService.exe (x86)\Sophos\Sophos Anti- \SystemRoot\system32\drivers\sbp2port.sys NT AUTHORITY\ LocalService scfilter C:\Windows\system32\svchost.exe LocalServiceAndNoImpersonation -k System32\DRIVERS\scfilter.sys Schedule LocalSystem C:\Windows\system32\svchost.exe -k netsvcs SCPolicySvc LocalSystem C:\Windows\system32\svchost.exe -k netsvcs seclogon LocalSystem C:\Windows\system32\svchost.exe -k netsvcs SENS LocalSystem C:\Windows\system32\svchost.exe -k netsvcs secdrv Serenum system32\DRIVERS\serenum.sys Serial system32\DRIVERS\serial.sys sermouse \SystemRoot\system32\DRIVERS\sermouse.sys SessionEnv localSystem C:\Windows\System32\svchost.exe -k netsvcs sffdisk \SystemRoot\system32\drivers\sffdisk.sys sffp_mmc \SystemRoot\system32\drivers\sffp_mmc.sys sffp_sd \SystemRoot\system32\drivers\sffp_sd.sys sfloppy \SystemRoot\system32\DRIVERS\sfloppy.sys SharedAccess LocalSystem C:\Windows\System32\svchost.exe -k netsvcs ShellHWDetection LocalSystem C:\Windows\System32\svchost.exe -k netsvcs SiSRaid2 \SystemRoot\system32\DRIVERS\SiSRaid2.sys SiSRaid4 \SystemRoot\system32\DRIVERS\sisraid4.sys Smb system32\DRIVERS\smb.sys SNMPTRAP NT AUTHORITY\ LocalService C:\Windows\System32\snmptrap.exe Sophos Agent LocalSystem C:\Program Files (x86)\Sophos\Enterprise Console\Remote Management System\ManagementAgentNT.exe'' -service name Agent Sophos AutoUpdate Service LocalSystem C:\Program Files (x86)\Sophos\AutoUpdate\ALsvc.exe'' Sophos Certification Manager LocalSystem C:\Program Files (x86)\Sophos\Enterprise Console\CertificationManagerServiceNT.exe'' -background ORBSvcConf ''C:\Program Files (x86)\Sophos\Enterprise Console\svc.conf Sophos Management Service LocalSystem C:\Program Files Console\MgntSvc.exe'' Sophos Message Router LocalSystem C:\Program Files (x86)\Sophos\Enterprise Console\Remote Management System\RouterNT.exe'' -service -name Router ORBListenEndpoints iiop://:8193/ssl_port=8194 SophosBootDriver (x86)\Sophos\Enterprise system32\DRIVERS\SophosBootDriver.sys spldr Spooler LocalSystem sppsvc NT NetworkService C:\Windows\System32\spoolsv.exe AUTHORITY\ C:\Windows\system32\sppsvc.exe Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 135 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Logon Name Path Name sppuinotify NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe -k LocalService SQLAgent$SOPHOS NT AUTHORITY\ NETWORK C:\Program Files (x86)\Microsoft SQL SERVICE Server\MSSQL10.SOPHOS\MSSQL\Binn\SQLAGENT.EXE'' -i SOPHOS SQLBrowser NT AUTHORITY\ SERVICE SQLWriter LocalSystem LOCAL C:\Program Files (x86)\Microsoft Server\90\Shared\sqlbrowser.exe C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe srv System32\DRIVERS\srv.sys srv2 System32\DRIVERS\srv2.sys srvnet System32\DRIVERS\srvnet.sys SSDPSRV NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe LocalServiceAndNoImpersonation SstpSvc NT Authority\ LocalService C:\Windows\system32\svchost.exe -k LocalService -k stexstor \SystemRoot\system32\DRIVERS\stexstor.sys storflt \SystemRoot\system32\drivers\vmstorfl.sys storvsc \SystemRoot\system32\drivers\storvsc.sys storvsp SUM \SystemRoot\system32\drivers\storvsp.sys LocalSystem C:\Program Files Console\SUM\SUMService.exe swenum (x86)\Sophos\Enterprise \SystemRoot\system32\drivers\swenum.sys swi_service NT AUTHORITY\ LocalService C:\Program Files (x86)\Sophos\Sophos Intelligence\swi_service.exe swprv LocalSystem C:\Windows\System32\svchost.exe -k swprv SynthVid Anti-Virus\Web \SystemRoot\system32\drivers\VMBusVideoM.sys TapiSrv NT NetworkService TBS NT AUTHORITY\ LocalService AUTHORITY\ C:\Windows\System32\svchost.exe -k tapisrv C:\Windows\System32\svchost.exe LocalServiceAndNoImpersonation Tcpip \SystemRoot\System32\drivers\tcpip.sys TCPIP6 system32\DRIVERS\tcpip.sys tcpipreg System32\drivers\tcpipreg.sys TDPIPE system32\drivers\tdpipe.sys TDTCP system32\drivers\tdtcp.sys tdx system32\DRIVERS\tdx.sys TermDD \SystemRoot\system32\drivers\termdd.sys -k TermService NT Authority\ NetworkService C:\Windows\System32\svchost.exe -k termsvcs THREADORDER NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe -k LocalService TrkWks LocalSystem C:\Windows\System32\svchost.exe LocalSystemNetworkRestricted TrustedInstaller localSystem C:\Windows\servicing\TrustedInstaller.exe tssecsrv System32\DRIVERS\tssecsrv.sys TsUsbFlt system32\drivers\tsusbflt.sys tunnel system32\DRIVERS\tunnel.sys uagp35 \SystemRoot\system32\DRIVERS\uagp35.sys udfs system32\DRIVERS\udfs.sys UI0Detect uliagpkx SQL LocalSystem -k C:\Windows\system32\UI0Detect.exe \SystemRoot\system32\drivers\uliagpkx.sys Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 136 of 154 Security Analysis: TESTBED System: Analysis Date: Service Name PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Logon Name Path Name umbus system32\DRIVERS\umbus.sys UmPass \SystemRoot\system32\DRIVERS\umpass.sys UmRdpService localSystem C:\Windows\System32\svchost.exe LocalSystemNetworkRestricted -k upnphost NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe LocalServiceAndNoImpersonation -k usbccgp \SystemRoot\system32\drivers\usbccgp.sys usbehci \SystemRoot\system32\DRIVERS\usbehci.sys usbhub \SystemRoot\system32\drivers\usbhub.sys usbohci \SystemRoot\system32\DRIVERS\usbohci.sys usbprint \SystemRoot\system32\DRIVERS\usbprint.sys USBSTOR \SystemRoot\system32\drivers\USBSTOR.SYS usbuhci \SystemRoot\system32\DRIVERS\usbuhci.sys UxSms localSystem C:\Windows\System32\svchost.exe LocalSystemNetworkRestricted VaultSvc LocalSystem C:\Windows\system32\lsass.exe vdrvroot vds -k \SystemRoot\system32\drivers\vdrvroot.sys LocalSystem C:\Windows\System32\vds.exe vga system32\DRIVERS\vgapnp.sys VgaSave \SystemRoot\System32\drivers\vga.sys vhdmp \SystemRoot\system32\drivers\vhdmp.sys viaide \SystemRoot\system32\drivers\viaide.sys Vid \SystemRoot\system32\drivers\Vid.sys vmbus \SystemRoot\system32\drivers\vmbus.sys VMBusHID \SystemRoot\system32\drivers\VMBusHID.sys vmicheartbeat NT NetworkService AUTHORITY\ C:\Windows\system32\vmicsvc.exe -feature Heartbeat vmickvpexchange NT AUTHORITY\ LocalService C:\Windows\system32\vmicsvc.exe -feature KvpExchange vmicshutdown LocalSystem C:\Windows\system32\vmicsvc.exe -feature Shutdown vmictimesync NT AUTHORITY\ LocalService C:\Windows\system32\vmicsvc.exe -feature TimeSync vmicvss LocalSystem C:\Windows\system32\vmicsvc.exe -feature VSS volmgr \SystemRoot\system32\drivers\volmgr.sys volmgrx \SystemRoot\System32\drivers\volmgrx.sys volsnap \SystemRoot\system32\drivers\volsnap.sys vsmraid \SystemRoot\system32\DRIVERS\vsmraid.sys VSS LocalSystem C:\Windows\system32\vssvc.exe W32Time NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe -k LocalService WacomPen \SystemRoot\system32\DRIVERS\wacompen.sys WANARP system32\DRIVERS\wanarp.sys Wanarpv6 system32\DRIVERS\wanarp.sys WcsPlugInService NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe -k wcssvc Wd \SystemRoot\system32\DRIVERS\wd.sys Wdf01000 \SystemRoot\system32\drivers\Wdf01000.sys WdiServiceHost NT AUTHORITY\ LocalService C:\Windows\System32\svchost.exe -k LocalService Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 137 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Name Logon Name Path Name WdiSystemHost LocalSystem C:\Windows\System32\svchost.exe LocalSystemNetworkRestricted Wecsvc NT NetworkService wercplsupport localSystem C:\Windows\System32\svchost.exe -k netsvcs WerSvc localSystem C:\Windows\System32\svchost.exe -k WerSvcGroup -k AUTHORITY\ C:\Windows\system32\svchost.exe -k NetworkService WfpLwf system32\DRIVERS\wfplwf.sys WIMMount system32\drivers\wimmount.sys WinHttpAutoProxySvc NT AUTHORITY\ LocalService C:\Windows\system32\svchost.exe -k LocalService Winmgmt localSystem C:\Windows\system32\svchost.exe -k netsvcs WinRM NT NetworkService WmiAcpi AUTHORITY\ C:\Windows\System32\svchost.exe -k NetworkService \SystemRoot\system32\drivers\wmiacpi.sys wmiApSrv localSystem C:\Windows\system32\wbem\WmiApSrv.exe WPDBusEnum LocalSystem C:\Windows\system32\svchost.exe LocalSystemNetworkRestricted ws2ifsl -k \SystemRoot\system32\drivers\ws2ifsl.sys wuauserv LocalSystem WudfPf C:\Windows\system32\svchost.exe -k netsvcs system32\drivers\WudfPf.sys wudfsvc LocalSystem C:\Windows\system32\svchost.exe LocalSystemNetworkRestricted -k Services and Drivers A service is an executable object that is installed in a registry database maintained by the Service Control Manager. The executable file associated with a service can be started at boot time by a boot program or by the system, or the Service Control Manager can start it on demand. The two types of service are Win32 services and driver services. A Win32 service is a service that conforms to the interface rules of the Service Control Manger. This enables the Service Control Manager to start the service at system start-up or on demand and enables communication between the service and service control programs. A Win32 service can execute in its own process, or it can share a process with other Win32 services. A driver service is a service that follows the device driver protocols for Microsoft Windows rather than using the Service Control Manager interface. Implications Having inappropriate or unnecessary services installed can create security risks and provide potential access paths or tools to intruders. There are a great number of services that can be installed and it would require volumes to document the security implications attached to each one. Some of them will increase security risks if not appropriately configured, controlled and secured. Examples are; Remote Access Services (RAS), Internet related services and network services. Some of the more common services are: Service Function Comments NetDDE, NetDDEdsdm Services for creating a communication Shares (directories, files and printers) should be channel or a trusted share for Windows managed to ensure that sensitive information is applications to share data over a network. not made available unnecessarily via this channel. EventLog, SENS Event Log Service and System Event Notification Service. Ensure these services are started to enable the capturing of event messages to the logs. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 138 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Service Function Comments SNMP, SNMPTRAP Simple Network Management Protocol to Manage access to information via this protocol, manage devices on a network. as it can supply valuable information about your network and network devices. W3SVC, IISADMIN, IAS Internet Information Server, World Wide Web Publishing Service and Internet Authentication Service. Ensure correct configuration of these services as misconfiguration of these can compromise security. RemoteAccess, Rasman, RasAcd, RasAuto, RasArp Remote Access services. Ensure correct configuration of these services as misconfiguration of these can compromise security. NdisTapi, NdisWan, NetBIOS, NwlnkSpx, Tcpip Network Protocol and Transport layer services/drivers. Ensure that these protocols/drivers are configured correctly as incorrect configuration can leave the network open to penetration. Attaching unsecured logon accounts to services can create significant security exposures. Installing service executables in unsecured directories can also create significant security exposures. Risk Rating Medium to High (Depending on the type of services installed, their configuration and security settings). Recommended Action You should ensure that: Only required and appropriate services are installed. Their configuration and security settings are to appropriate standards. Service executables are in secure directories. Logon accounts attached to services have the appropriate security settings to help prevent illegal access. The rights assigned to user accounts and groups are effectively controlled (consult report section titled Rights and Privileges). Effective virus detection and prevention services are installed, running and activated/started automatically at system start-up time. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 139 of 154 Security Analysis: TESTBED System: Analysis Date: 31. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Server Roles and Features Section Summary There are 26 Server roles and features installed on the system. Section Detail Server Roles and Features .NET Framework 4.5 Features --- .NET Framework 4.5 --- WCF Services ------ TCP Port Sharing Active Directory Domain Services DNS Server File And Storage Services --- File and iSCSI Services ------ File Server --- Storage Services Group Policy Management Remote Server Administration Tools --- Role Administration Tools ------ AD DS and AD LDS Tools --------- Active Directory module for Windows PowerShell --------- AD DS Tools ------------ Active Directory Administrative Center ------------ AD DS Snap-Ins and Command-Line Tools ------ DNS Server Tools User Interfaces and Infrastructure --- Graphical Management Tools and Infrastructure --- Server Graphical Shell Windows PowerShell --- Windows PowerShell 3.0 --- Windows PowerShell ISE WoW64 Support Implications All roles and features installed on your Server increase the attack surface of your system and present additional opportunities for intruders to exploit any vulnerabilities that may exist. Your system is particularly vulnerable if Windows features are incorrectly configured. Unnecessary roles and features also consume system resources, such as disk space and CPU cycles. In addition, they increase the frequency of Microsoft updates and associated system restarts. Risk Rating Medium to High (Depending on the role or feature). Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 140 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Recommended Action You should ensure that: All installed roles and features are appropriate and authorised Windows roles and features are appropriately configured You should also consider using a mimimal Server Core installation, rather than versions of Windows Server that installs the full GUI with unnecessary components, such as Windows Explorer, Internet Explorer and the Control Panel. For more information about Server Core see: http://en.wikipedia.org/wiki/Windows_Server_2008#Server_Core. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 141 of 154 Security Analysis: TESTBED System: Analysis Date: 32. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Task Scheduler Section Summary There are 71 scheduled tasks defined in 52 task folders: 33.8% (24) of tasks are hidden 73.2% (52) of tasks are enabled 26.8% (19) of tasks are disabled 39.4% (28) of tasks have never executed 12.7% (9) of tasks returned a non-zero result (may have failed) The registered tasks contain 69 event triggers 17.4% (12) of event triggers are disabled Section Detail For details see worksheet Scheduled_Tasks in the MS-Excel workbook. Implications The Task Scheduler ensures that important system maintenance and diagnostic functions are performed on a regular and consistent basis without the need for manual intervention. Some examples of scheduled tasks are jobs that: Create regular system protection points Download and install anti-virus updates Ensure digital certificates for users and machines are current and valid Consolidate fragmented space on disk drives Synchronise the system time If certain tasks do not execute, or they fail to complete successfully, it could impact on the performance, stability or security of your system. Risk Rating Low to medium (Depending on the task and its status). Recommended Action You should ensure that important scheduled tasks: Are configured in accordance with your requirements Are not accidentally disabled Execute successfully Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 142 of 154 Security Analysis: TESTBED System: Analysis Date: 33. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Security Updates, Patches and Hot-Fixes Section Summary There are 2 Security Updates, Patches and Hot-Fixes installed on this system. Windows Update Settings Windows Update status: OK Important updates: Download updates but let me choose whether to install them Install new updates: Every day at 03:00 Recommended updates: No Allow all users to install: Yes Configuration enforced: No Updates were installed: 23-Sep-2013 10:09:13 Most recent check for updates: 25-Oct-2013 03:52:33 Section Detail Update Install Date Installed By Reference Service Pack Description KB976902 10/14/2013 SNAKE\administrator Update KB976932 10/14/2013 SNAKE\administrator Service Pack Implications This report section lists hot-fixes installed on the system by Microsoft’s hotfix.exe or update.exe utilities. Note that hot-fixes and patches applied to third-party (non-Microsoft) software products are not included because they are typically not installed by these utilities. Examples of other exclusions are entries written by Shavlik (records are in a proprietary format) and records relating to uninstall routines, such as ServicePackUninstall. A software patch or hot-fix is a program file that installs one or more files on your system to correct a software problem. A Windows hot-fix program file is typically named KB (or Q) nnnnnn.exe, where nnnnnn is a six-digit number assigned by Microsoft. You can obtain details of a hot-fix by searching Microsoft’s Knowledge Base (KB) on the unique hot-fix number. Many hot-fixes address security vulnerabilities that are discovered in software components, such as Windows, Exchange, Internet Explorer, IIS and SQL. If you lack a policy to ensure relevant hot-fixes are promptly identified and installed, your system will be exposed to an increased risk of being compromised, damaged or exploited. Some examples of these security exposures are: unauthorised remote access to your system; illegal execution of code; elevation of privileges; and denial of service attacks. Risk Rating Medium to High (Depending on the vulnerability). Recommended Action You should implement policy to ensure you are aware of newly discovered security vulnerabilities. You should also ensure that appropriate hot-fixes are promptly evaluated and installed on your systems. Microsoft offers several advisory services and tools that can assist you with the process. These include Technet, various notification services and security bulletins, and tools such as Hfnetchk, which checks computers for the absence of security patches / hot-fixes. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 143 of 154 Security Analysis: TESTBED System: Analysis Date: 34. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Products Installed Section Summary There are 39 MSI-installed software products on this system. Section Detail Product Name Version Install Date Acrobat.com 1.6.65 2012-01-24 Adobe Systems Incorporated Adobe AIR 1.5.0.7220 2012-01-24 Adobe Systems Inc. Adobe Reader 9.1 9.1.0 2012-01-24 Adobe Systems Incorporated Microsoft Office Access MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Access Setup Metadata MUI 14.0.4763.1000 (English) 2010 2012-01-24 Microsoft Corporation Microsoft Office Excel MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Groove MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office InfoPath MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Office 64-bit Components 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office OneNote MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Outlook MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office PowerPoint MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Professional Plus 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Proof (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Proof (French) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Proof (Spanish) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Proofing (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Publisher MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Shared 64-bit MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Shared 64-bit Setup Metadata MUI 14.0.4763.1000 (English) 2010 2012-01-24 Microsoft Corporation Microsoft Office Shared MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft Office Shared Setup Metadata MUI 14.0.4763.1000 (English) 2010 2012-01-24 Microsoft Corporation Microsoft Office Word MUI (English) 2010 14.0.4763.1000 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Browser 10.1.2531.0 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Common Files 10.0.1600.22 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Common Files 10.1.2531.0 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Database Engine 10.1.2531.0 Services 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Database Engine 10.1.2531.0 Services 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Database Engine 10.1.2531.0 Shared 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Database Engine 10.1.2531.0 Shared 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Native Client 10.1.2531.0 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 RsFx Driver 10.1.2531.0 2012-01-24 Microsoft Corporation Microsoft SQL Server 2008 Setup Support Files 10.1.2531.0 2012-01-24 Microsoft Corporation Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Publisher Page 144 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Product Name Version Install Date Microsoft SQL Server VSS Writer 10.1.2531.0 2012-01-24 Microsoft Corporation Sophos Anti-Virus 9.7.0 2012-01-24 Sophos Limited Sophos AutoUpdate 2.5.8 2012-01-24 Sophos Limited Sophos Enterprise Console 4.5.1 2012-01-24 Sophos Plc Sophos Update Manager 1.1.1.141 2012-01-24 Sophos plc Sql Server Customer Experience Improvement 10.1.2531.0 Program Publisher 2012-01-24 Microsoft Corporation For details of all properties see worksheet Products in the MS-Excel workbook. Implications This report section lists software products that were installed by Windows Installer (MSI). Unauthorised software installations could cause the following risks: Compromised security, if the software does not originate from a reputable vendor or it has not been properly tested prior to implementation. Legal action and penalties due to the use of unlicensed software on your systems. Additional training and maintenance costs due to the need to support multiple versions of similar software. Risk Rating Medium / High (if unauthorised software is installed on your system). Recommended Action You should ensure that software policies define a list of approved software and prevent the installation of unauthorised software products. Policies should be consistently enforced and regularly monitored for compliance. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 145 of 154 Security Analysis: TESTBED System: Analysis Date: 35. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Current Network Connections Section Summary SekChek was unable to analyse active network connections because the required dll was not present on the system. Section Detail ** No data found. ** Process ID The process identification number attached to the Current Network Connection. Local Address The address of the local end of the socket. Local Port The port number of the local end of the socket. Remote Address The address of the remote end of the socket. Remote Port The port number of the remote end of the socket. State Shows the connection state of the socket. This can be one of the following values: CLOSE_WAIT CLOSED CLOSING ESTABLISHED FIN_WAIT1 FIN_WAIT2 IDLE LAST_ACK LISTENING SYN_RECV SYN_SENT TIME_WAIT UNKNOWN The remote end has shut down, waiting for the socket to close The socket is not being used Both sockets are shut down but we still don’t have all our data sent The socket has an established connection The socket is closed and the connection is shutting down The connection is closed and the socket is waiting for a shutdown from the remote end Idle, opened but not bound The remote end has shut down and the socket is closed. Waiting for acknowledgement The socket is listening for incoming connections A connection request has been received from the network The socket is actively attempting to establish a connection The socket is waiting after close to handle packets still in the network The state of the socket is unknown Filename The filename of the process that is attached to the Current Network Connection. Implications This report section lists all active network connections for TCP protocols, including the local and remote addresses, the ports in use and the state of each connection. It does not indicate which services are configured to use these ports. The port numbers used by some of the most common network services are: Port number Service 7 20 21 22 23 25 43 53 69 79 80 110 echo ftp data ftp ssh telnet smtp whois DNS tftp finger http POP3 Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 146 of 154 Security Analysis: TESTBED System: Analysis Date: 119 143 161 443 512 194 PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL nntp IMAP snmp https exec Irc Network services and their associated ports provide several opportunities for intruders to exploit your system. Some examples are: Services such as telnet (port 23) and ftp (port 21) transmit user passwords in clear text format, which makes them vulnerable to access via ‘sniffer’ software; Older versions of services often contain security weaknesses, which can be exploited to gain access to your system using the account under which the service is run; Services such as finger (port 79), provide intruders with useful information about your system, such as details of inactive user accounts, which can be used to gain access to your system. Risk Rating Medium to High. (If inappropriate network services are running) Recommended Action You should determine what services are configured to use these ports and: Disable any unused or redundant services; Limit the number of services that run under the ‘administrator’ account by running them under an account with less privileges; Frequently check with your software vendor for security vulnerabilities in the services you are running and apply any relevant software patches; Consider replacing services that transmit passwords in clear text format with more secure software; Ensure that hosts running open services are located behind properly configured firewall machines; Monitor open ports and connections for signs of unusual activity, particularly from addresses external to your organisation. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 147 of 154 Security Analysis: TESTBED System: Analysis Date: 36. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Logical Drives Section Summary There were a total of 4 logical drives defined to your domain controller when this analysis was run. Section Detail Drive Type Volume Name Serial Number File Disk Size Free Space % Free Comment System (MB) (MB) A:\ Removable C:\ Fixed 7CA7-6D3D NTFS 40857 D:\ CDROM 20120124_1531 C71C-CE20 CDFS 78 Z:\ Remote New Volume NTFS 2996 45BD-987 24409 59.74% 0.00% 2977 99.35% Disk Quotas Note that the free space displayed for a drive may exceed the disk size if disk quotas are used (indicated by **User Quotas** in the Comment field). This is because the Free Space column indicates the total amount of free space on the drive, while the Disk Size column indicates the space available to the user under the disk quota rules. Implications The NTFS file system provides more security features than the FAT system. It should be used whenever security is a concern. With NTFS, you can assign a variety of protections to files and directories. Risk Rating Medium to High (Depending on the sensitivity of files and directories). Recommended Action As a rule, you should ensure that sensitive files and directories are on NTFS partitions. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 148 of 154 Security Analysis: TESTBED System: Analysis Date: 37. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Network Shares Section Summary There were a total of 10 Network Shares defined to your domain controller when this analysis was run. Section Detail Share Name Path Type Max Uses ADMIN$ C:\Windows Special Share *unlimited* Remote Admin BG temp C:\BG temp File Share *unlimited* C$ C:\ Special Share *unlimited* Default share Interprocess communication (IPC) *unlimited* Remote IPC IPC$ Remark NETLOGON C:\Windows\SYSVOL\sysvol\Snake.co m\SCRIPTS File Share *unlimited* Logon server share SophosUpdate C:\ProgramData\Sophos\Update Manager\Update Manager File Share *unlimited* SUMInstallSet C:\Program (x86)\Sophos\Enterprise Console\SUMInstaller SYSVOL C:\Windows\SYSVOL\sysvol File Share *unlimited* Logon server share WolfSpace_2 C:\BG temp File Share *unlimited* WolfSpace1 C:\DfsRoots\WolfSpace1 File Share *unlimited* Files File Share *unlimited* Sophos Update Manager Installer Implications Windows Server enables you to designate resources you want to share with others. For example: When a directory is shared, authorised users can make connections to the directory (and access its files) from their own workstations. When a printer is shared, many users can print from it over the network. Once a resource is shared, you can restrict its availability over the network to certain users. These restrictions, called share permissions, can vary from user to user. With Windows Server, you create the appropriate level of network resources security with a combination of resource sharing and resource permissions. Risk Rating Medium to High (Depending on the sensitivity of the data stored in the shared directories). Recommended Action You should ensure that directories containing sensitive data files are not shared or are adequately secured via resource permissions. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 149 of 154 Security Analysis: TESTBED System: Analysis Date: 38. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Home Directories, Logon Scripts and Profiles Section Summary All Accounts 100.0% (16) of user accounts do not have a home directory. 100.0% (16) of user accounts do not have a logon script. 100.0% (16) of user accounts are not restricted to logging on from specific workstations. 100.0% (16) of user accounts do not have specific logon profiles. Excluding Disabled Accounts 68.8% (11) of user accounts do not have a home directory. 68.8% (11) of user accounts do not have a logon script. 68.8% (11) of user accounts are not restricted to logging on from specific workstations. 68.8% (11) of user accounts do not have specific logon profiles. All Administrator Accounts 100.0% (2) of administrator accounts do not have a home directory. 100.0% (2) of administrator accounts do not have a logon script. 100.0% (2) of administrator accounts are not restricted to logging on from specific workstations. 100.0% (2) of administrator accounts do not have specific logon profiles. Administrator Accounts (Excluding Disabled Accounts) 100.0% (2) of administrator accounts do not have a home directory. 100.0% (2) of administrator accounts do not have a logon script. 100.0% (2) of administrator accounts are not restricted to logging on from specific workstations. 100.0% (2) of administrator accounts do not have specific logon profiles. Industry Average Comparison (All Accounts) Section Detail Account Name Home Logon Workstation Logon State Privilege Directory Script Path Restrictions Profile Administrator No No No No Administrator bradley No No No No User GpLinkTest No No No No Administrator Guest No No No No D Guest krbtgt No No No No D User SophosSAUPUFFADDER0 No No No No User SophosUpdateMgr No No No No User Sun No No No No User SUPPORT_388945a0 No No No No User4 No No No No User User5 No No No No User User6 No No No No User7 No No No No User9 No No No No Virtual1 No No No No User Virtual2 No No No No User D E User User User LE Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) User Page 150 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Implications A home directory is used as the user’s default directory for the “File Open” and “Save As” dialog boxes, for the command prompt, and for all applications that do not have a defined working directory. Home directories make it easier for an administrator to back up user files and delete user accounts because they are grouped in one location. The home directory can be a local directory on a user’s computer or a shared network directory, and can be assigned to a single user or many users. A user’s logon script runs automatically every time the user logs on. It can be used to configure a user’s working environment at every logon, and allows an administrator to affect a user’s environment without managing all its aspects. A logon script can be assigned to one or more user accounts. In Windows 200x* Server, Workstation Restrictions can be used to control the computers from which a user is allowed to log on. The alternative is to allow a user to logon from any computer. Restricting the workstations a user can use to log on to your system can improve security and discourage potential hackers. This is especially true for sensitive accounts. A user profile defines the Windows 200x* configuration for a specific user or group of users. By default, and excepting Guest accounts, each Windows 200x* computer maintains a profile for each user who has logged on to the computer. A profile contains information about a user's Windows 200x* configuration. Much of this information controls options the user can set, such as colour scheme, screen savers, and mouse and keyboard layout. Other information control options that can be set only by a Windows 200x* administrator include access to common program groups or network printers. Risk Rating Medium to Low. Recommended Action To minimise potential loss of data and ease administration, users should have defined home directories, which can be regularly backed up. To ease administration and afford better control over user environments, each user should have a logon script. You should consider the additional benefits in security that workstation restrictions can provide. It is particularly suited to those environments with high security needs or very sensitive systems and information. You should consider the benefits of defining logon profiles for users. This can ease administration and enhance security. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 151 of 154 Security Analysis: TESTBED System: Analysis Date: 39. PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL File Permissions and Auditing Section Summary This report section details the permissions and audit settings for 5 predefined and 0 user selected directories/files on your system. Section Detail For details see worksheet Permissions in the MS-Excel workbook. Implications This report section lists the owner and access permissions (DACL) for selected files and directories. It also lists the audit settings (SACL) for files and directories. More specifically, the report section lists the contents of each Access Control Entry (ACE) in the file or directory’s Discretionary Access Control List (DACL). A DACL contains one or more ACEs that control access to the associated resource. An ACE in a DACL can Allow or Deny access to a resource. A Deny ACE always overrides an Allow ACE. The report section also lists the contents of each Access Control Entry (ACE) in the file or directory’s System Access Control List (SACL). A SACL contains one or more ACEs that define what actions on the object are audited (e.g. deletion of a file and changes to a folder’s permissions). The event types are Success and Failure. Legend: Resource Name The name of the resource being analysed. Resource Type The type of resource being analysed. At present the only resource types analysed by SekChek are files and directories. ACL Type The type of ACL being analysed: a DACL or a SACL. Owner The owner of the resource. Owner Domain The resource owner’s domain. Owner Account Type The owner’s account type. E.g. Alias, User. Ace Nbr The sequential number of the ACE. Window’s reads ACEs in this order until it finds a Deny or Allow ACE that denies or permits access to the resource or an Audit ACE that defines what is audited and the event type. Account The name of the account to which this ACE applies. Domain The account’s domain. Account Type The type of the account. E.g. Alias, User, Group. Ace Type Allow or Deny access to the resource in the case of an ACE in a DACL; Success or Failure events for a SACL. Apply Onto Specifies where permissions or auditing are applied. These values are shown as they appear in the Windows’ property box. E.g.: Inherited This folder / object only This folder, subfolders & files This folder & subfolders This folder & files Subfolders & files only Subfolders only Files only Indicates whether the permissions or audit settings are inherited from a higher level. Special Permissions (ACE in a DACL): Traverse Folder / Execute File For folders: Traverse Folder allows or denies moving through folders to reach other files or folders, even if the user has no permissions for the traversed folders (applies to folders only). Traverse folder takes effect only when the group or user is not granted the Bypass traverse checking user right in the Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 152 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL Group Policy snap-in. (By default, the Everyone group is given the Bypass traverse checking user right.). For files: Execute File allows or denies running program files (applies to files only). Setting the Traverse Folder permission on a folder does not automatically set the Execute File permission on all files within that folder. List Folder / Read Data List Folder allows or denies viewing file names and subfolder names within the folder. List Folder only affects the contents of that folder and does not affect whether the folder you are setting the permission on will be listed. Applies to folders only. Read Data allows or denies viewing data in files (applies to files only). Read Attributes Allows or denies viewing the attributes of a file or folder, such as read-only and hidden. Attributes are defined by NTFS. Read Extended Attributes Allows or denies viewing the extended attributes of a file or folder. Extended attributes are defined by programs and may vary by program. Create Files / Write Data Create Files allows or denies creating files within the folder (applies to folders only). Write Data allows or denies making changes to the file and overwriting existing content (applies to files only). Create Folders / Append Data Create Folders allows or denies creating folders within the folder (applies to folders only). Append Data allows or denies making changes to the end of the file but not changing, deleting, or overwriting existing data (applies to files only). Write Attributes Allows or denies changing the attributes of a file or folder, such as read-only or hidden. Attributes are defined by NTFS. The Write Attributes permission does not imply creating or deleting files or folders, it only includes the permission to make changes to the attributes of a file or folder. In order to allow (or deny) create or delete operations, see Create Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and Delete. Write Extended Attributes Allows or denies changing the extended attributes of a file or folder. Extended attributes are defined by programs and may vary by program. The Write Extended Attributes permission does not imply creating or deleting files or folders, it only includes the permission to make changes to the attributes of a file or folder. In order to allow (or deny) create or delete operations, see Create Files/Write Data, Create Folders/Append Data, Delete Subfolders and Files, and Delete. Delete Subfolders And Files Allows or denies deleting subfolders and files, even if the Delete permission has not been granted on the subfolder or file. (applies to folders) Delete Allows or denies deleting the file or folder. If you don't have Delete permission on a file or folder, you can still delete it if you have been granted Delete Subfolders and Files on the parent folder. Read Permissions Allows or denies reading permissions of the file or folder, such as Full Control, Read, and Write. Change Permissions Allows or denies changing permissions of the file or folder, such as Full Control, Read, and Write. Take Ownership Allows or denies taking ownership of the file or folder. The owner of a file or folder can always change permissions on it, regardless of any existing permissions that protect the file or folder. File Synchronise Allows or denies different threads to wait on the handle for the file or folder and synchronize with another thread that may signal it. This permission applies only to multithreaded, multiprocess programs. Windows’ special permissions are logically grouped to form generic permissions: Full Control, Modify, Read & Execute, List Folder Contents, Read, and Write. Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 153 of 154 Security Analysis: TESTBED System: Analysis Date: PUFFADDER (Snake.com) 08-Nov-2013 CONFIDENTIAL The following table illustrates how special permissions are grouped together into these higher-level generic permissions. Special Permissions Full Control Modify Read & Execute List Folder Contents (folders only) Read Write Traverse Folder/Execute File x x x x List Folder/Read Data x x x x x Read Attributes x x x x x Read Extended Attributes x x x x x Create Files/Write Data x x x Create Folders/Append Data x x x Write Attributes x x x Write Extended Attributes x x x Delete Subfolders and Files x Delete x x Read Permissions x x x x x x Change Permissions x Take Ownership x Synchronize x x x x x x Risk Rating High (if access permissions are inappropriate and allow unintended access to sensitive resources). Recommended Action You should: Periodically check access permissions for sensitive files and directories to ensure they remain appropriate and reflect the requirements of a person’s job function. Ensure that all changes to access permissions are properly authorised by management. Consider logging audit events for sensitive files and directories. Note that large numbers of audit log entries may be generated for frequently accessed files and directories Produced by SekChek® for Windows V1.0.737, 10-Nov-2013 (Ref. 1201250012) Page 154 of 154