Security Basics mailing list archives
Re: Oh Dear, Where to start?!
From: Paul Hawkinson <phawkinson () montreat edu>
Date: 26 Jun 2003 20:31:15 -0000
In-Reply-To: <Law15-F77qVDokSUIwM000039a6 () hotmail com> Chris, What do you mean when you say ; "There are a number of free scanners, but nearly all of them (including AVG) are not legal to run in a networked environment" I wasn't aware that it was "Illegal" to run AVG in a networked environment. What do you mean by this. Thanks for the post, Paul
Received: (qmail 23917 invoked from network); 26 Jun 2003 16:27:17 -0000 Received: from outgoing2.securityfocus.com (205.206.231.26) by mail.securityfocus.com with SMTP; 26 Jun 2003 16:27:17 -0000 Received: from lists.securityfocus.com (lists.securityfocus.com
[205.206.231.19])
by outgoing2.securityfocus.com (Postfix) with QMQP id ECEC88F524; Thu, 26 Jun 2003 10:01:59 -0600 (MDT) Mailing-List: contact security-basics-help () securityfocus com; run by
ezmlm
Precedence: bulk List-Id: <security-basics.list-id.securityfocus.com> List-Post: <mailto:security-basics () securityfocus com> List-Help: <mailto:security-basics-help () securityfocus com> List-Unsubscribe: <mailto:security-basics-unsubscribe () securityfocus com> List-Subscribe: <mailto:security-basics-subscribe () securityfocus com> Delivered-To: mailing list security-basics () securityfocus com Delivered-To: moderator for security-basics () securityfocus com Received: (qmail 11224 invoked from network); 25 Jun 2003 19:43:35 -0000 X-Originating-IP: [64.60.95.218] X-Originating-Email: [compjma () hotmail com] From: "Chris Berry" <compjma () hotmail com> To: security-basics () securityfocus com Subject: Re: Oh Dear, Where to start?! Date: Wed, 25 Jun 2003 12:47:36 -0700 Mime-Version: 1.0 Content-Type: text/plain; format=flowed Message-ID: <Law15-F77qVDokSUIwM000039a6 () hotmail com> X-OriginalArrivalTime: 25 Jun 2003 19:47:36.0561 (UTC) FILETIME=
[A0ADD610:01C33B52]
From: Steve Frank <stevefrankrit () yahoo com> Hey everyone, Ok... I am in a bit of a jam here and I was hoping to get some feedback from some of you with appropriate experience in the field of network security and policy development. I am an senior at RIT studying (essentially) systems administration. My main focus and priority has been computer security and policy development. I recently took a internship with a small government office helping out with computer administration tasks. Upon arrival, I decided it would be fun to do a windows update to see what sort of things would come up for my PC. Low and behold, there were over 40 critical updates, driver updates, and recommended updates. Right off the bat this triggered the feeling that there was absolutely no security or update plans in place at this particular organization. I quickly addressed the issue, and have been working to draft a comprehensive security policy and implement technical controls. What I need advice on is the following: If you were introduced to a mixed network (literally all versions of windows since 3.1 and mac systems) that have no updates, backups, or patches installed... connected to a network with only a basic NAT table and no other security... with not even anti-virus software enabled... with no user policies or disaster plans in place... with unprotected netbios shares everywhere... where would you start the process of building some sort of security solution? I mean, I've seen passwords on monitors, shared accounts, open public ports (even the wiring cabinet was unlocked in plain view of passbys to the building). I've been tasked with creating the security policies relating to internet use, network and phone use, passwords, physical security, backup/disaster plans, antivirus, incident response, email use/protection, and whatever else needs done. This wouldnt be so bad normally I guess, but there is virtually no budget allocated to help for this project and I have approximately 3 months to do it. To make matters worse, I am also responsible for systems admin, network admin, tech support, programming, and whatever other tasks may need to be done in the meantime. So basically, if you had to start from nothing, where would you start first? What would you consider to be the most important things to be implemented? I am literally working from ground zero here... heh!(I don't know much about macs so I'm leaving them out) This was pretty much my exact situation when I started here. First you
have
to acknowlege the fact that your three month time limit means this is an emergency, and deal with things on that footing. Forget trying to write
up
all the policies first, you're the only one dealing with this, so you
need
to DO SOMETHING, you can write about it once things calm down a bit.
Here
is the first things I would do, in order: 1) Setup a firewall, since you have a low budget and are pressed for
time, I
recommend IPCOP, you should be able to have it up an running on an older
box
in less than 30 minutes even if you're not big on Linux knowledge. 2) Install anti-virus software. If you have any budget at all this is
where
I'd spend it, get Norton corporate and install it everywhere then run a virus sweep. There are a number of free scanners, but nearly all of
them
(including AVG) are not legal to run in a networked environment. 3) Use Active Directory to deploy SP3 to all of your machines
automatically,
then go around and configure the automatic updates feature to run
nightly
and auto-install critical updates. (Later on you'll want to switch over
to
using an SUS server, but for now this is good enough) 4) Configure the security policy for passwords with min length,
complexity
requirements, history, etc. then force a password change on everyone on
the
system. 5) Set up groups and assign users to them (don't worry about getting
them
perfect, you'll have to tune this later) then start restricting access
based
on membership. Especially check the membership of all admin groups,
often
times they'll have like 22 domain admins or some other silly thing. 6) Download a copy of spybotsd, deploy it, update it, and scan all of
your
machines. 7) Get some locks installed for physical security of the server room and wiring closets. 8) Get a policy established that prohibits having your password on a
sticky
note, in your desk etc., then do a sweep through the office looking for them. (get management approval first) 9) Do a hardware and software inventory to see what you've got, and get started on making sure you're license compliant. 10) Audit your servers and turn off unneccessary services. Ok, that's the worst stuff, once you've finished all that you can slow
down
and start working on a more formal implementation and tightening things
up
further. Chris Berry compjma () hotmail com Systems Administrator JM Associates "Within every man beats a heart of darkness." --The Shadow _________________________________________________________________ Add photos to your e-mail with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail -------------------------------------------------------------------------
--
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare. Find out why, and see how you can get plug-n-play secure remote access in about an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm -------------------------------------------------------------------------
---
--------------------------------------------------------------------------- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare. Find out why, and see how you can get plug-n-play secure remote access in about an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm ----------------------------------------------------------------------------
Current thread:
- Re: Oh Dear, Where to start?!, (continued)
- Re: Oh Dear, Where to start?! Nicholas Diotte (Jun 26)
- RE: Oh Dear, Where to start?! sharon_joyner (Jun 26)
- RE: Oh Dear, Where to start?! Drew Hunt (Jun 26)
- Re: Oh Dear, Where to start?! Chris Berry (Jun 26)
- RE: Oh Dear, Where to start?! AKaasjager (Jun 26)
- RE: Oh Dear, Where to start?! tony tony (Jun 27)
- RE: Oh Dear, Where to start?! Mitchell Rowton (Jun 26)
- Fwd: Oh Dear, Where to start?! Rick Jones (Jun 26)
- Re: Oh Dear, Where to start?! Bill Hardstone (Jun 26)
- RE: Oh Dear, Where to start?! AKaasjager (Jun 27)
- Re: Oh Dear, Where to start?! Paul Hawkinson (Jun 27)
- RE: Oh Dear, Where to start?! alex.mole@realtimeworlds (Jun 30)
- Re: Oh Dear, Where to start?! Chris Berry (Jun 30)
- RE: Oh Dear, Where to start?! James Baumgardner (Jun 30)
- RE: Oh Dear, Where to start?! Brad Griffin (Jun 30)