Hardening Windows Server Flashcards

(10 cards)

1
Q

How can a security baseline be implemented?

A
  1. Open Group Policy Management Editor. Create a GPO that is linked to an OU
    that contains member servers. Give it a friendly name
  2. Click on the Group Policy Objects folder, find the GPO, then right-click and
    choose Import Settings.
  3. Select the GPO you’ve downloaded from CIS or MSFT Compliance Tool
  4. Force a policy update and restart a target
    server before running the analysis with policy analyzer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are best practices for hardening domain controllers?

A
  • DCs should only run Active Directory Domain Services (AD DS) and DNS
    server roles.
  • Use a Server Core installation for DCs and purchase hardware that supports
    Secure-Core if you’re hosting physical servers on-premises.
  • Block the DC from connecting directly to the internet. Only allow exclusions for
    WSUS or Windows Update services if possible.
  • Admins should only interact with DCs from known workstations, jump servers, or
    Bastion environments. This includes remoting tools such as PowerShell, Windows
    Admin Center, and MMCs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is best practice for hardening other non-DC member servers?

A
  • Only allow signed scripts to be executed.
  • Restrict hosts that are allowed to perform administrative actions. Use safelists by IPs
    and only allow access from a PAW or other trusted device.
  • Use PowerShell Just Enough Administration for remote administration with PowerShell.
  • For remote management overWinRM, enableWinRMover HTTPS to encrypt data
    in transit using certificates.
  • Avoid creating privileged accounts that have permission to perform multiple
    administrative functions when possible.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a “fine-grained password policy”

A

Some use cases include setting stronger password requirements for
administrator and service accounts or changing the account lockout thresholds for
DoS mitigations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where are fine-grained password policies configured?

A

In Active Directory Administrative Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can fine-grained password policies be applied to?

A

Can be applied directly to specific users or security groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are “user rights assignment”

A

Policies that define the ways a user or service can log on and interact
with a host locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where are user rights assignments configured?

A

Group policy

Computer Configuration > Windows Settings > Security Settings
> Local Policies > User Rights Assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is best practice for securing/administering user rights assignments?

A

Refer to CIS benchmark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How should PowerShell be secured?

A

Configure PowerShell logging; enable PowerShell constrained language mode; set PowerShell script execution to restricted/RemoteSigned/AllSigned; Enable JEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly