NIST Issues Windows XP Security Guide 253
routerwhore writes "NIST Special Publication 800-68 (zip file) has been created to assist IT professionals, in particularly Windows XP system administrators and information security personnel, in effectively securing Windows XP systems. It discusses Windows XP and various application security settings in technical detail."
isolate (Score:4, Funny)
Re:isolate (Score:2, Interesting)
step one is to get a competent admin that will install from a slipstreamed install CD. all of mine are slipstreamed with SP2 so all patches up ot now are included and the machine is not instantly owned on the corperate network. ANYONE installing XP or W2K from origional CD's is nuts. slipstream the patches. My W2K disks are up to the SP4 rev and have all hotfixes on the disk ready for the scripted install after first reboot. and the XP disks are ready to go as well..
Yes, it's a pain in th
Re:isolate (Score:5, Informative)
I think its worth picking up a cheap network router or wireless router so you can have NAT firewall to filter your PC. 802.11b routers are on sale for 20 bux that have NAT built in. Pretty cheap, and then you can update your PC before it gets infected.
I have all service packs merged into my Win2k on CD, but WinXP only has the default SP1 without the updates for a year. So, the unplug or firewall your Internet connection is pretty important.
Quick way to get the post-SP1 pre-SP2 updates (Score:5, Informative)
AutoPatcher [autopatcher.com]
This is a good thing if you need to reinstall Windows soon before SP2 comes out.
Even after SP2 comes out and it shrinks in size, the features it allows you to change are great.
Re:Quick way to get the post-SP1 pre-SP2 updates (Score:2)
Let me get this straight; you trust security updates from a site that chooses to use warez (!) newsgroups as one of its distribution systems?
Re:Quick way to get the post-SP1 pre-SP2 updates (Score:4, Informative)
Re:isolate (Score:4, Insightful)
Firewalls assume they're aren't malicious things happening on your side of it.
Re:isolate (Score:2)
Might I suggest that you preprend the words "Poorly configured" to that sentence? A well-administered firewall assumes *anything* going through it is potentially malicious.
Re:isolate (Score:2)
Re:isolate (Score:3, Insightful)
Making a campus LAN not a dangerous one is impossible. You have to assume worms are going to get in.
Re:isolate (Score:2)
Re:isolate (Score:2)
Re:isolate (Score:3, Insightful)
No, I understand perfectly, but protecting an internal network is not the firewall's job. The firewall's job is to act as a gatekeeper to traffic passing through it wherever it's placed in the network. What you are proposing is a fundamental change in network design, of which the firewall is only a very small part. VLAN's, proxy servers, etc. all play a part in securing an internal network. It doesn't make sense to place the blame for an insecure internal network at the feet of a sin
Re:isolate (Score:2)
Which unfortunately does you little good with our wonderful wireless routers having backdoors in them. I don't use Linux regularly, but where I do use it, is as my firewall. I've never trusted a Windows box to be on the net and these days, I don't trust the wireless routers. I'm sticking with my old Linux box. It's just an old cheap PII, and the power consumption is probably a bit high for a router, but it w
Re:isolate (Score:2)
A NAT with a backdoor will still help you quite a bit. Sure, someone can get in your box with some effort...but any old worm trying to infect your machine will be effectively stopped.
Depending on your situation, the chances of someone try to manually hack your box are zilch. Not a good excuse for bad security...but still.
Re:isolate (Score:2)
So, I set the system up (quick'n'dirty install since I was in a rush) and hook her 56k modem up to at least install a decent, up-to-date virus scanner, SP1 and some critical updates. The computer was supp
Re:isolate (Score:2)
Re:isolate (Score:2)
I think you need to have a frank discussion with whomever manages your firewall.
Re:isolate (Score:2, Funny)
Step 2: install 3 popup blockers, 4 spyware utilities, and 5 Antivirus programs, 3 firewalls, and make sure it's behind a good external firewall, get all windows updates on a CD to install them offline.
Step 3: Keep off network
Re:Step two (Score:3, Funny)
Looks very usefull at first glance (Score:5, Informative)
Re:Looks very usefull at first glance (Score:5, Informative)
Re:Looks very usefull at first glance (Score:2)
That's one of two problems I have with google- not knowing the terms I want to learn about and information overload once I do have the terms. Which only makes it moderately usefull for protecting against security holes that I don't know about to begin with. I had only heard about 445 last week, thus this article is usefull to me. I'm sorry if it's not usefull to you to have this much inform
Re:Looks very usefull at first glance (Score:2, Informative)
Or maybe I'm just a freak.....
But yea info and lots of it in one place is a *very* good thing. But it sounded like the grandparent knew it was there did not like it and had done nothing and was all out of ideas.
Or like I said maybe I'm just a freak...
Re:Looks very usefull at first glance (Score:2)
Re:Looks very usefull at first glance (Score:2)
Re:Looks very usefull at first glance (Score:2)
What's wrong with using a firewall? Or a NAT?
Re:Looks very usefull at first glance (Score:5, Interesting)
Just seems weird to me, but I guess it happens in other industries as well...
Re:Looks very usefull at first glance (Score:4, Interesting)
Seems normal to me, and a necessary function of government in a corporatist economy. Otherwise, Caveat Emptor is the only real law left.
Re:Looks very usefull at first glance (Score:2)
147 pages! (Score:4, Funny)
Re:147 pages! (Score:2)
" Easy broken down into 9 littler chapters for those MCSE's still out there."
Or, nine PowerPoint bullets for the pointy-haired bosses still out there.
Linux is complex? (Score:4, Funny)
Only 147 pages of reading to secure your Windows XP?!? And they say Linux requires an in-depth knowledge of the OS...
Re:Linux is complex? (Score:2, Informative)
Actually has some good points (Score:5, Informative)
Total Cost of Ownership thru the roof (Score:5, Funny)
Re:Total Cost of Ownership thru the roof (Score:3, Informative)
I only use xp for games lately (Score:2, Insightful)
Reminds me of Bastille linux (Score:5, Insightful)
There is a huge advantage to have predefined profiles you can apply. I imagine myself using these security profiles to harden family member's PCs. I usually have neither the time nor the inclination to lock down my mother's computer.... so having some defaults and a quick checklist will save me a TON of time in the long run.
It's also nice to be able to send someone a link and tell them "Do this stuff" rather than walk them thru all the things they need to do to be safe. As I am sure most Slashdot readers have experienced, the unending number of tech calls from friends and family gets old after a little while. I think this document will help restore the free time that Uncle Bill has taken from me.
Re:Reminds me of Bastille linux (Score:4, Interesting)
Re:Reminds me of Bastille linux (Score:2)
What you're asking for isn't all that reasonable. Linux can be used for a myriad of purposes so all that stuff wouldn't necessarily be installed. It is possible to automate quite a bit of security for say h
Re:Reminds me of Bastille linux (Score:4, Informative)
Bastille was a script that tweaked things for you last time I checked. It does nothing you can't do by editing config files and using chmod if you know how.
ACLs are approximately a WinNT-like permission system for Linux.
selinux goes MUCH further, adding capabilities that didn't exist before, making it possible to precisely specify what a process is supposed to do and what not. While quite complicated, it allows doing nifty things.
PAM has an unique purpose - handling authentication. If you want your users to use a smartcard or a fingerprint reader, that's what you need.
ssh is an encrypted telnet (simplifying things a bit)
sasl is an encryption library, beecrypt is another.
kerberos is an authentication method - which has absolutely nothing to do with things like filesystem permissions.
So, where are those interactions you talk about? SeLinux with all its power has nothing to do with encryption and doesn't replace it. Different encryption libraries don't conflict with each other and in most cases users don't even need to deal with them. PAM could be said to be related to SeLinux a tiny bit, but they do very different things. SeLinux handles permissions, while PAM defines how users are authenticated to the OS. Kerberos is just a protocol.
I'd read through that.... (Score:5, Funny)
"in effectively securing Windows XP systems" (Score:4, Funny)
S.U.S. (Score:2)
Too bad version 2 which will support Office, IIS and SQL patches keeps getting delayed..
"effectively securing Windows XP systems" (Score:3, Funny)
effectively securing Windows XP systems
That's the great thing about Slashdot -- timely reviews of only the very best science-fiction literature.
Free Windows Security Update CD (Score:4, Informative)
See? Wasn't that easy?
Re:Free Windows Security Update CD (Score:2)
I'm being double charged (Score:3, Insightful)
No wonder there's so many pencils stuck in the ceiling.
How to install Windows XP in 5 hours or less (Score:5, Insightful)
Re:How to install Windows XP in 5 hours or less (Score:2, Funny)
148. System continually bluescreens on boot.
149. Go to step 1
Re:How to install Windows XP in 5 hours or less (Score:3, Insightful)
Missing step 148. (Score:4, Insightful)
148. GHOST MACHINE. Never have to reinstall again.
Re:Missing step 148. (Score:2, Insightful)
Then once you have installed that, go ahead, ghost it again, but it's an viscious circle if you ask me.
This'll be really wortless if you ghost the image to a DVD/CD, waist of DVD/CD in my opinion.
Then again, I don't u
Re:Missing step 148. (Score:5, Informative)
I finished new OS 9 images for some Macs I maintain (I know, I know but it has to be this way.) I didn't start from an OS 9.0 cd and patch it up to 9.2.2 + add a boatload of apps. I installed last year's image, made changes and then created a new image. I still saved a considerable amount of work and thumb twiddling watching progess bars.
Re:Missing step 148. (Score:2)
Insightful? Jeez, moderators need to get a clue.
How long does it take to install 40 some apps? How long to customize each app the way you like? About four days worth of customization; I know, as a systems integrato
Re:How to install Windows XP in 5 hours or less (Score:2)
Re:How to install Windows XP in 5 hours or less (Score:2)
Re:How to install Windows XP in 5 hours or less (Score:2)
Oh and you can slipstream the disk with SP1 to save a LOT of time downloading too. I'm typing this from a clean install wh
Spend an extra hour reading the EULA (Score:2)
Link to summary... (Score:2)
... before it's too old for the front page. Probably a good idea to read before heading straight to the zip file.
guidance_WinXP.html [nist.gov]
Great document (Score:2, Interesting)
(http://slashdot.org/article.pl?sid=04/07/
I wish my college prof threw out the books for class and asked us to use stuff like this, it has everything the books had in it, and it covers it so much better.
Haha, this is great! (Score:2)
147 Pages... (Score:2)
NSA's guide or NIST's? (Score:4, Insightful)
Here is the link to the page for NSA's Windows XP security Guide (And others)
http://www.nsa.gov/snac/downloads_winxp.cfm?Men
zerg (Score:3, Informative)
Format, install Linux... (Score:2, Informative)
Re:50% (Score:4, Insightful)
Does this get filed the same as "90% of all statistics are made up"?
Re:50% (Score:3, Funny)
Where did you hear that? I thought it was only 60%.
Re:50% (Score:2, Funny)
Phibz
Re:50% (Score:2)
And, in an earth shattering coincidence, it's also the main app that actually goes out to the net and pulls data down. Other browsers need be very wary of this issue as well. Just ask the Mac users out there that thought they were downloading Word 04.
Re:50% (Score:2, Funny)
Especially the one quoted in the article [slashdot.org]: "I downloaded the file in the hope that perhaps Microsoft had released some sort of public beta."
Strike Three! You're OUT!
Re:50% (Score:5, Insightful)
IT departments are the problem and Windows will be the dominant OS for decades to come until more IT "men" grow some balls.
HA! Just ask the boss for money and he gives it to you? Thats rich. So, if windows allows an email client to arbitrarily execute code in an email, its the IT depts fault? If Windows IIS allows you to run code by simply sending a malformed URL, its the IT depts fault? So, the solution is buy yet more software, that will not know about these exploits until they are exposed anyway, so is useless for unknown (but will be discovered) vulnerabilities?
And MS is the good guy and the IT guys are the bad guys, because all they have to do is go spend a bunch of money to secure an operating system they already paid alot of money for? And if the company is dependent on software that will only run on Windows for a year or two, its the IT depts fault if the boss won't change to Linux?
I gotta admit, I did enjoy the "grow some balls", coming from an AC. You sound more like a pissed off 20 year old who just finished a program at Devry and can't believe someone won't hire him for $80k.
Re:50% (Score:2)
Re:50% (Score:2, Insightful)
I'll have you know that I ha
Re:50% (Score:2)
What about it? (Score:2)
Oh right, also, KDE is open source, so you could potentially disable konqueror if you *really* wanted to, so it seems that your point is invalid...
Re:50% (Score:2)
Might want to delete mshtml.dll and possibly browseui.dll and shdocvw.dll and that should get rid of a majority of IE security holes. I won't vouch for how many applications you totally nuke by doing that though.
BTW I found the list by running the dependancy walker on iexplore.exe and checking html/browser specific looking things in the list.
Re:50% (Score:2)
Seriously, just go ahead and delete whatever you want. If something breaks, you needed it. Just go to a recovery console and get it back if you have to. If not, cool, your system is likely better without it.
This rule of thumb does not hold true for your firewall or antivirus software...
BTW, Sysinternals (http://www.sysinternals.com [sysinternals.com]) has some really great free products that could really help in determining what f
Re:Step one (Score:4, Insightful)
Re:Step one (Score:5, Insightful)
Yes, you and I have a clue and use something else for mail and web, but most home users are not savy enough to switch away from the vulnerable products, and worms and viruses will continue to spread through these channels for some time to come.
-paul
Re:Step one (Score:3, Interesting)
I'm also strongly of the opinion that home users that don't take precautions in this day and age deserve to have their boxen 0wn3d. And then have their ISP shut them down and isolate those boxen.
Re:Step one (Score:2)
Don't blame me, I don't use it, and neither does my Mom or my niece and nephew.
Re:Step one (Score:2)
Step Two (Score:2)
Re:Step Two (Score:2)
Re:Step one (Score:3, Informative)
Re:Page 1: For best security... (Score:4, Insightful)
Re:Redunancy (Score:2, Funny)
Re:Redunancy (Score:2)
Maybe most or half, but certainly not 99%. We had a box setup as a router using a modem in the 28.8 days, for around 8 people, all running Windows 3.11, well before 95 came out. And we are not in the tech industry.
Then again, my first internet account was a shell account I accessed from a DOS dialup terminal. Lots of people had internet access with 3.1 and 3.11. I still
Re:Redunancy (Score:2)
Re:Obvious? (Score:2, Insightful)
And Linux is better? It's not secure. You still have to install patches and updates and the like. You have to put the work in either way, might as well go with the OS that does the things you wanna do. In other words, us gamers are not swayed by your argument.
Re:Obvious? (Score:2)
https://www.unc.edu/security/sans.html
Re:Obvious (Score:2)
We put up with it so we don't have to go search Google for obscure things like the setting up of dual monitors.
Re:Obvious (Score:4, Informative)
How have I gone literally YEARS without a virus, worm, or peice of spyware? Quite simple.
1. I don't steal other peoples work. This has two implications. I don't install file sharing software which is most always loaded with spyware. The other is that I don't download software of dubious origin.
2. I don't run executable content I get through email unless I know the source and am expecting the file. Outlook has not auto run scripts in years now.
3. I limit the items that I do download to execute to those that are well known and from sites that I trust. I DO NOT go and download every screen saver I can find on the internet like a LOT of other idiots do. You'd be surprised at the amount of shit that creeps in through the installs of these whores.
4. When the little popup says that updates are availible I install them. That simple. For software that I use which is not included in the windows update I check the sites regularly (if they are software that is susceptable to this sort of thing).
No cost, save the router. All common sense and situational awareness when I surf. The people who have computers loaded with spyware lack this. And Linux/OSX/FreeBSD are NOT going to save them from themselves.
Re:Obvious (Score:5, Insightful)
Last I checked, IE ran executable code automagically due to a buffer overflow late last year, not sure if there are any such bugs this year.
Anyway, I realize what you're trying to say but it is still a poor situation. It's like saying "Yeah, I drive a crappy and hazardous car with poor brakes, but I'm a good driver and drive defensively so I don't get into any accidents anyway."
And regardless of how obvious it may seem to you, it is not common sense. It's your computer knowledge. Don't confuse common sense with logic. It is logical to you because you know how a computer works. It is not logical to a person that doesn't know what's ihside that beige box, and has no idea what an OS is or does. And that really have no idea what is nor should be happening when they open a file.
People have no clue what makes up a "dubious" origin. Hell, RealPlayer counts as dubious in my book (once a villain, always a villain), while an OSS project who has no corporate backing, not knowing any of the coders, is usually less dubious. How do you know which are reputable companies? Knowledge, which implies that it is not common sense.
Kjella
Re:Obvious (Score:2)
I patch. Sooner or later I guess my luck could run out, but I expect Firefox (even though it, the most popular open source browser, cannot properly render the most popular open source advocacy site) to start stealing marketshare. When this happens MS will either get off its ass and fix/improve IE or I'll end up switching to Firefox for the added features. Firefox
Re:Obvious (Score:2)
Re:Ho-hum... let the MS-bashing begin. (Score:2)
Re:Did anyone actually read the documented guide? (Score:2)