Hardening Windows Server Flashcards
(10 cards)
How can a security baseline be implemented?
- Open Group Policy Management Editor. Create a GPO that is linked to an OU
that contains member servers. Give it a friendly name - Click on the Group Policy Objects folder, find the GPO, then right-click and
choose Import Settings. - Select the GPO you’ve downloaded from CIS or MSFT Compliance Tool
- Force a policy update and restart a target
server before running the analysis with policy analyzer
What are best practices for hardening domain controllers?
- DCs should only run Active Directory Domain Services (AD DS) and DNS
server roles. - Use a Server Core installation for DCs and purchase hardware that supports
Secure-Core if you’re hosting physical servers on-premises. - Block the DC from connecting directly to the internet. Only allow exclusions for
WSUS or Windows Update services if possible. - Admins should only interact with DCs from known workstations, jump servers, or
Bastion environments. This includes remoting tools such as PowerShell, Windows
Admin Center, and MMCs.
What is best practice for hardening other non-DC member servers?
- Only allow signed scripts to be executed.
- Restrict hosts that are allowed to perform administrative actions. Use safelists by IPs
and only allow access from a PAW or other trusted device. - Use PowerShell Just Enough Administration for remote administration with PowerShell.
- For remote management overWinRM, enableWinRMover HTTPS to encrypt data
in transit using certificates. - Avoid creating privileged accounts that have permission to perform multiple
administrative functions when possible.
What is the purpose of a “fine-grained password policy”
Some use cases include setting stronger password requirements for
administrator and service accounts or changing the account lockout thresholds for
DoS mitigations.
Where are fine-grained password policies configured?
In Active Directory Administrative Center
What can fine-grained password policies be applied to?
Can be applied directly to specific users or security groups.
What are “user rights assignment”
Policies that define the ways a user or service can log on and interact
with a host locally.
Where are user rights assignments configured?
Group policy
Computer Configuration > Windows Settings > Security Settings
> Local Policies > User Rights Assignment.
What is best practice for securing/administering user rights assignments?
Refer to CIS benchmark
How should PowerShell be secured?
Configure PowerShell logging; enable PowerShell constrained language mode; set PowerShell script execution to restricted/RemoteSigned/AllSigned; Enable JEA