• Wiping the System Page File during clean system shutdown
  • Protecting the Registry
  • Disabling LanManager Password Hash Support




    Download 91 Kb.
    bet5/10
    Sana22.03.2020
    Hajmi91 Kb.
    #8500
    1   2   3   4   5   6   7   8   9   10

    Disabling LanManager Password Hash Support





    Completed

    Not implemented

    Not applicable

    STATUS









    Windows NT supports the following two types of challenge/response authentication:



    • LanManager (LM) challenge/response

    • Windows NT challenge/response

      To allow access to servers that only support LM authentication, Windows NT clients currently send both authentication types. Microsoft developed a patch that allows clients to be configured to send only Windows NT authentication. This removes the use of LM challenge/response messages from the network.

      Applying this hot fix, configures the following registry key:



    Hive:

    HKEY_LOCAL_MACHINE\SYSTEM

    Key:

    System\CurrentControlSet\Control\LSA

    Name:

    LMCompatibilityLevel

    Type:

    REG_DWORD

    Value:

    0,1,2 (Default 0)

    Setting the value to:



    • 0 – Send both Windows NT and LM password forms.

    • 1 – Send Windows NT and LM password forms only if the server requests it.

    • 2 – Never send LM password form.

      If a Windows NT client selects level 2, it cannot connect to servers that support only LM authentication, such as Windows 95 and Windows for Workgroups.

      For more complete information on this hot fix, please refer to Knowledge Base article number Q147706.

      Wiping the System Page File during clean system shutdown





    Completed

    Not implemented

    Not applicable

    STATUS









    Virtual Memory support of Windows NT uses a system page file to swap pages from memory of different processes onto disk when they are not being actively used. On a running system, this page file is opened exclusively by the operating system and hence is well-protected. However, systems that are configured to allow booting to other operating systems, may want to ensure that system page file is wiped clean when Windows NT shuts down. This ensures that sensitive information from process memory that may have made into the page file is not available to a snooping user. This can be achieved by setting up the following key:




    Hive:

    HKEY_LOCAL_MACHINE\SYSTEM

    Key:

    System\CurrentControlSet\Control\SessionManager\Memory Management

    Name:

    ClearPageFileAtShutdown

    Type:

    REG_DWORD

    Value:

    1

    Note that, this protection works only during a clean shutdown, therefore it is important that untrusted users do not have ability to power off or reset the system manually.


    Protecting the Registry





    Completed

    Not implemented

    Not applicable

    STATUS









    All the initialization and configuration information used by Windows NT is stored in the registry. Normally, the keys in the registry are changed indirectly, through the administrative tools such as the Control Panel. This method is recommended. The registry can also be altered directly, with the Registry Editor; some keys can be altered in no other way.


    The Registry Editor supports remote access to the Windows NT registry. To restrict network access to the registry, use the Registry Editor to create the following registry key:


    Hive:

    HKEY_LOCAL_MACHINE

    Key:

    \CurrentcontrolSet\Control\SecurePipeServers

    Name:

    \winreg

    The security permissions set on this key define which users or groups can connect to the system for remote registry access. The default Windows NT Workstation installation does not define this key and does not restrict remote access to the registry. Windows NT Server permits only administrators remote access to the registry.





    Download 91 Kb.
    1   2   3   4   5   6   7   8   9   10




    Download 91 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Disabling LanManager Password Hash Support

    Download 91 Kb.