Comments on: Windows XP High-Security Configuration https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html Just another WordPress site Sat, 01 Jan 2011 15:20:37 +0000 hourly 1 https://wordpress.org/?v=6.9 By: Anonymous https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-102 Sat, 01 Jan 2011 15:20:37 +0000 https://grey-panther.net/?p=778#comment-102 For Step 3 – Setting up the Software Restriction Policy…You do not need to expressly add entries for C:Program Files and C:Windows as you recommend. It is redundant, as they are already added by Default as part of the first four entries! They look like entries to the Registry, but the words SystemRoot is the Windows directory and ProgramFilesDir is obviously the Program Files directory.

What you should do, is block the following executables from running in a hardened (shared with multiple users) system by creating a New Hash Rule….

* cmd.exe
* regedit.exe AND regedt32.exe
* runas.exe

There's one thing I change in the Registry. So use the Registry Editior…
=> Go to this: HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer
=> Add this DWORD: HideRunAsVerb
=> Set it to the value of 1

This disables Run as… when you right-click or Shift + Right-click on an executable or application file.

By doing the above, we have removed the ability to use runas.

I also recommend with SRP to set all users except local administrators. Then create Limited User Accounts for each person who is going to use the system. This will instill a new habit of not being randomly running things without consideration.

It also means Didier Stevens's bpmtk.exe isn't able to run; as you have cut off the ability to run foreign executables.

Now all you need to do is develop computer security aware policies or rules as to how new programs need to be checked and verified, so they can trusted to be installed onto your system.

]]>
By: Spiders-design https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-245 Tue, 20 Oct 2009 11:41:32 +0000 https://grey-panther.net/?p=778#comment-245 Also you can right click runas following user
domain/user
password

This bypasses it

]]>
By: Anonymous https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-369 Thu, 02 Jul 2009 17:21:09 +0000 https://grey-panther.net/?p=778#comment-369 Elegant, indeed. 🙂

Disallowing runas.exe is necessary to limited account control. I'm not aware of what, if any, conscequence would occur in an environment where the Secondary Logon service were running and runas.exe disallowed. Secondary Logon is disabled in my environment. I do know the trustlevel switch functions without Secondary Logon and the user switch does not.

Thank you for confirming it for your readers. It is good information to have.

]]>
By: Cd-MaN https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-370 Thu, 02 Jul 2009 12:44:34 +0000 https://grey-panther.net/?p=778#comment-370 @Anonymous: thank you for your persistence. I can confirm that it works even on Windows XP (the quotation marks were the key – inconsistent parsing of command line options on Windows, who would have thought?).

The conclusion: there are many ways to circumvent SRP (including the manipulation of the process memory), but using Microsoft's own tools seems the most elegant 🙂

Thank you again for bringing this to my attention.

]]>
By: Anonymous https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-371 Tue, 30 Jun 2009 15:34:14 +0000 https://grey-panther.net/?p=778#comment-371 The switch functions in XP. It does not circumvent admin privilidge/rights. A user needs to imput admin credentials for admin function. It does circumvent SRP. The switch runs the specified command with the specified trustlevel exception rule:

Unrestricted, disallowed, basic user, restriced, or untrusted.

The sintax is precisely:

runas /trustlevel:"Unrestricted" c:example.exe
(Include quotation marks)

And, unfortunately, the switch does not require admin priviligde.

]]>
By: Cd-MaN https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-372 Mon, 29 Jun 2009 14:18:47 +0000 https://grey-panther.net/?p=778#comment-372 @Anonymous: SRP has a lot of holes in it (check out the first link in the post), so MS providing a built-in tool to circumvent it isn't that big of a surprise. However:

– the /trustlevel switch seems to be new in Vista/7 and the article talks about XP (even though many of the things can be applied to newer/older versions of Windows)

– the given command doesn't seem to work (tested it under Windows 7). BTW, I didn't really find any documentation about what the given switch does.

]]>
By: Tweaks 4 Pc https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-375 Mon, 29 Jun 2009 05:52:58 +0000 https://grey-panther.net/?p=778#comment-375 Thanks for the great advice. A computer should be much more secure after following these suggestions.

]]>
By: Anonymous https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-381 Sat, 27 Jun 2009 19:16:41 +0000 https://grey-panther.net/?p=778#comment-381 runas /trustlevel:"Unrestricted" [pathfile] Where pathfile can be ~local settingstemptrojan.exe

While I realize you offer runas.exe as a convenient means of adjusting SRP settings, leaving runas.exe unrestricted leaves everything unrestricted.

]]>
By: Anonymous https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-435 Fri, 03 Apr 2009 18:18:38 +0000 https://grey-panther.net/?p=778#comment-435 This is exactly the type of setup I was looking for. I have always enforced the limited user approach, and a security template inf file I created for a few other permissions/policies etc. Adding the software restriction policy on top, is a great idea. Gives a little more control what can be done in the user profiles.

]]>
By: Anonymous https://grey-panther.net/2008/04/windows-xp-high-security-configuration.html#comment-462 Sun, 22 Mar 2009 08:50:21 +0000 https://grey-panther.net/?p=778#comment-462 Works great, this is a variation of the method i was taught to secure computers but it works even better because no external software is really required. Thanks for the info it’s good people still know how to tweak XP.

]]>