Introduccion a la seguridad Windows 7

171
MODULE 1. Windows Logon and Authentication Operating System Security By José Fernández Tamames

Transcript of Introduccion a la seguridad Windows 7

Page 1: Introduccion a la seguridad Windows 7

MODULE 1. Windows

Logon and Authentication

Operating System Security

By José Fernández Tamames

Page 2: Introduccion a la seguridad Windows 7

Objetives

•Lesson 1. Windows AuthenticationConcepts

•Lesson 2. Windows Logon Scenarios

•Lesson 3. Windows AuthenticationArchitecture

•Lesson 4. Troubleshooting Logon and Resource Access Issues

Page 3: Introduccion a la seguridad Windows 7

Less. 1.

Windows AuthenticationConcepts

Page 4: Introduccion a la seguridad Windows 7

Authentication is a process

for verifying the identity

of an object (genuine) or person (no imposter)

Page 5: Introduccion a la seguridad Windows 7

In a networking context,

authentication is the act of

proving identity to a

network application or

resource

Page 6: Introduccion a la seguridad Windows 7
Page 7: Introduccion a la seguridad Windows 7

any user, service, group, or

computer that can initiate action

is a security principal

Security principals have

accounts, which can be local to a

computer or domain-based

Page 8: Introduccion a la seguridad Windows 7

accounts

Page 9: Introduccion a la seguridad Windows 7

is a means to identify a claimant —the

human user or service —requesting access or

resources

Page 10: Introduccion a la seguridad Windows 7

Users, groups of users, objects and services can all have individual

accounts or share accounts

Page 11: Introduccion a la seguridad Windows 7

Accounts can be member of

groups and can be assigned

specific rights and

permissions

Page 12: Introduccion a la seguridad Windows 7

Accounts can be restricted to the

local computer, workgroup,

network, or be assigned

membership to a domain

Page 13: Introduccion a la seguridad Windows 7

Account/group name Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Administrator account Available Available Available

Guest account Available Available Available

Administrators group Available Available Available

Backup Operators group Available Available Available

Cryptographic Operators group No No Available

Distributed COM Users group No No Available

Event Log Readers group No No Available

Guests group Available Available Available

HelpServicesGroup group Available Available No

IIS_IUSERS group No No Available

Network Configuration Operators group Available Available Available

Performance Log Users group Available No Available

Performance Monitor Users group Available No Available

Print Operators Available No No

Power Users group Available Available Available

Remote Desktop Users group Available Available Available

Replicator group Available Available Available

Terminal Server Users Available No No

Users group Available Available Available

Offer Remote Assistance Helpers group No Available Available

RS_Query group No Available No

Page 14: Introduccion a la seguridad Windows 7

Managed service accounts Managed service accounts and virtual accounts were

introduced in Windows Server 2008 R2 and Windows 7 to

provide crucial applications, such as Exchange Server and

Internet Information Services (IIS), with the isolation of their

own domain accounts, while eliminating the need for an

administrator to manually administer the service principal

name (SPN) and credentials for these accounts.

Page 15: Introduccion a la seguridad Windows 7

password

Page 16: Introduccion a la seguridad Windows 7

is a form of secret authentication

data that is used to control access to a resource.

Page 17: Introduccion a la seguridad Windows 7

In Windows, passwords are

encrypted by whatever the

authentication protocol is chosen and packaged with other authentication information

Page 18: Introduccion a la seguridad Windows 7

The outcome of the encryption is a hashed password transformed

into ciphertext, a string of numbers and letters that appears

meaningless.

The hashing process occurs by means of a hashing algorithm.

Windows uses the same algorithm (used by the authentication

protocol) to encrypt and decrypt a user’s password. This authenticated packet is stored by Windows so that, as with

Interactive Logon, credentials do not require re-authentication when logging on with a domain account.

Page 19: Introduccion a la seguridad Windows 7

Restriction/characteristic Windows Server 2003 Windows Server 2008 Windows Server 2008 R2

Password length Up to 127 characters Up to 127 charactersUp to 127 Unicode characters

Complex password requirement

Not by default but system checked; set by policy

No No

Blank password permitted

Yes, but warning is issuedYes, for local accounts only from the console’s logon screen

Yes, for local accounts only from the console’s logon screen

Supports the extended ASCII character set

Yes Yes Yes

Spaces allowed Yes Yes Yes

Page 20: Introduccion a la seguridad Windows 7

Personal identification numbers (PIN), certificates, and smart cards

Page 21: Introduccion a la seguridad Windows 7

A personal identification number (PIN) is a secret shared between a user and a system that can be used to authenticate the user to the system.

Smart card use for Windows authentication requires a non-confidential user

identifier or token, specifically a certificate issued for a user by a certification

authority (CA) from the organization granting the authentication.

In addition, the user is required to provide a confidential PIN to gain access to the system.

Upon receiving the certificate and PIN, the system looks up the PIN based upon the user’s identification encrypted in the certificate and compares the looked-up PIN with the received PIN.If they match, the user is granted access. If they do not match, the user is not granted access.

Page 22: Introduccion a la seguridad Windows 7

Authorization and Windows authentication architecture

Page 23: Introduccion a la seguridad Windows 7

Security identifiers

SID is a unique value that identifies a user, group, or computer account within an enterprise

Page 24: Introduccion a la seguridad Windows 7

The rights and permissions for a

user, group, or computer accountare determined by access control

lists (ACLs) and contain security

identifiers (SIDs) for a user, group,

or computer.

Page 25: Introduccion a la seguridad Windows 7

access token

Page 26: Introduccion a la seguridad Windows 7

is re-created every time a

security principal is

authenticated (logs on)

Page 27: Introduccion a la seguridad Windows 7

and it contains the following information used for

accessing resources:

•The SID for the user’s account.•A list of SIDs for security groups that include the user and the privileges held on the local computer by the user and the user’s security groups. This list includes SIDs both for domain-based security groups, if the user is a member of a domain, and for local security groups.•The SID of the user or security group that becomes the default owner of any object that the user creates or takes ownership of.

Page 28: Introduccion a la seguridad Windows 7

•The SID for the user’s primary group.•The default discretionary access control lists (DACLs) that the operating system applies to

objects created by the user if no other access control information is available.

•A list of privileges associated with the user’s account.

•The source, such as the Session Manager or LAN Manager, that caused the access token to be created.

•A value indicating whether the access token is a primary token, which represents the security context of a process, or an impersonation token, which is an access token that a thread within a service process can use to temporarily adopt a different security context, such as the security context for a client of the service.•A value that indicates to what extent a service can adopt the security context of a client represented by this access token.

•Statistics about the access token that are used internally by the operating system.

•An optional list of SIDs added to an access token by a process to restrict use of the token.

•A session ID that indicates whether the token is associated with a Terminal Services client session. (The session ID also makes fast user switching possible because it contains a list of privileges.)

Page 29: Introduccion a la seguridad Windows 7

Security Groups and Windows Authentication

Implementation of security groups for authentication purposes is useful in deployment scenarios across forests.

Security groups are set at the domain level in Active Directory.

By using security groups, you can assign the same security permissions to many users who successfully authenticate, which simplifies access administration

Page 30: Introduccion a la seguridad Windows 7

Delegated Authentication and Trust Relationships

Page 31: Introduccion a la seguridad Windows 7

Delegated authentication occurs when a

network service accepts a request from a

user and assumes that user’s identity in

order to initiate a new connection to a

second network service.

Page 32: Introduccion a la seguridad Windows 7

To enable delegated authentication, you must

establish front-end or first-tier servers, such

as web servers, that are responsible for handling client requests, and back-end or n-tier servers, such as large databases, that are

responsible for storing information.

Page 33: Introduccion a la seguridad Windows 7

Authentication in

trust relationships

Page 34: Introduccion a la seguridad Windows 7

To provide authentication and authorization capabilities between clients and servers in different

domains, there must be a trust between the two domains.

Trusts are the underlying technology by which

secured Active Directory communications occur and are an integral security component of the Windows Server network architecture

Page 35: Introduccion a la seguridad Windows 7

Group Policy Settings Used in Windows Authentication

Page 36: Introduccion a la seguridad Windows 7

You can manage authentication in Windows by adding user,

computer, and service accounts to groups and then applying

authentication policies to those groups. Authentication policies

consist of:

•Account policies, which include password, account

lockout, and Kerberos policies.

•Local policies, which are enforced through local security

settings, include security options, user rights assignment,

and audit policies.

Page 37: Introduccion a la seguridad Windows 7

Account policies affect computers running Windows in two ways.

When applied to a local computer, account policies apply to the local account database that is stored on that computer.

When applied to domain controllers, the account policies affect domain accounts for users logging on from Windows computers that are joined to that domain.

Account policy

Account policies contain three subsets:•Password policy•Account lockout policy•Kerberos policy

Page 38: Introduccion a la seguridad Windows 7

Password policy

Password policies affect the characteristics and behavior of passwords. Password policies are used for domain accounts or local user accounts. They determine settings for passwords, such as enforcement and lifetimes.

Page 39: Introduccion a la seguridad Windows 7

Account lockout policy

Account lockout policy options disable accounts after a set number of failed logon attempts.

Using these options can help you detect and block attempts to break passwords.

Page 40: Introduccion a la seguridad Windows 7

Kerberos policy

Kerberos-related settings include ticket lifetimes and

enforcement rules.

Kerberos policy does not apply to local account

databases because the Kerberos authentication protocol is

not used to authenticate local accounts.

Therefore, the Kerberos policy settings can be configured only

by means of the default domain GPO, where it affects domain

logons.

Page 41: Introduccion a la seguridad Windows 7

Local security policy

A security policy is a combination of security settings that

affect the security on a computer.

You can use the local security policy to control the following

local policies:

• Security Options - Who accesses the computer.

• User Rights Assignment - What resources users are

authorized to use on your computer.

• Audit Policy - Whether or not a user’s or group's actions are

recorded in the event log.

Page 42: Introduccion a la seguridad Windows 7

User rights assignment

User rights are typically assigned on the basis

of the security groups to which a user belongs,

such as Administrators, Power Users, or Users.

The policy settings in this category are typically used to

allow or deny users’ permission to access their computer

based on the method of access and their security group

memberships.

Page 43: Introduccion a la seguridad Windows 7

Auditing policy

Auditing policy allows you to control and understand access

to objects, such as files and folders, and to manage user and

group accounts and user logons and logoffs.

Auditing policies can specify the categories of events that

you want to audit, set the size and behavior of the security

log, and determine which objects you want to monitor

access of and what type of access you want to monitor.

Page 44: Introduccion a la seguridad Windows 7

Credentials Management

in Windows

Authentication

Page 45: Introduccion a la seguridad Windows 7

Windows credentials management is

the process by which the operating system

receives the credentials from the service or

user and secures that information for future presentation to the authenticating target

Page 46: Introduccion a la seguridad Windows 7

Windows Logon Scenarios

Less. 2

Page 47: Introduccion a la seguridad Windows 7

Logon

Validar al

usuario

• Autenticación

• Autorización

Control de

recursos

Page 48: Introduccion a la seguridad Windows 7

Windows requires that all users must

validate their identities to successfully log

on to the computer.

The process of validating a user’s identity

is called authentication

Page 49: Introduccion a la seguridad Windows 7

LogonsUser Logon

Application logon

User logon

user mode by using Secur32.dll

Application logon

processes initiated at start up, such as services, run in kernel mode by using Ksecdd.sys.

Page 50: Introduccion a la seguridad Windows 7

Combined with supporting hardware, credential

providers can extend Windows to enable users to log on

through biometric (fingerprint, retinal, or voice

recognition), password, PIN and smart card

certificate, or any custom authentication package

and schema that a third-party developer creates

Credential provider architecture

Page 51: Introduccion a la seguridad Windows 7

Credential providers are registered on the

computer and are responsible for the following:•Describing the credential information required for authentication.•Handling communication and logic with external authentication authorities. •Packaging credentials for interactive and network logon.

Page 52: Introduccion a la seguridad Windows 7
Page 53: Introduccion a la seguridad Windows 7

Logon UIThe credential provider enumerates the tiles for workstation logon.

he credential provider will typically serialize credentials for authentication to the local security authority.

This displays tiles specific for each user and specific to each user's target systems.

Page 54: Introduccion a la seguridad Windows 7

Unlock WorkstationThe logon and authentication architecture allows a user to use tiles enumerated by the credential provider to unlock a workstation. Typically, the currently logged on user is the default tile; however, if more than one user is logged on, numerous tiles will be displayed.

Page 55: Introduccion a la seguridad Windows 7

Change PasswordThe credential provider enumerates tiles in response to a user request to change their password (or other private information, such as a PIN). Typically, the currently logged on user is the default tile; however, if more than one user is logged on, numerous tiles will be displayed.

Page 56: Introduccion a la seguridad Windows 7

Applications and user mode User mode in Windows is composed of two systems capable of passing I/O

requests to the appropriate kernel mode software drivers: the environment

system, which runs applications written for many different types of operating

systems, and the integral system, which operates system-specific functions on

behalf of the environment system.

Applications can run in user mode where it can run as any principal, including in the security context of Local System (SYSTEM).

Applications can also run in kernel mode where it would run in the security context of Local System (SYSTEM).

Page 57: Introduccion a la seguridad Windows 7

SSPI is available through the Secur32.dll module, which is

an API used for obtaining integrated security services for authentication, message integrity, and message privacy.

It provides an abstraction layer between application-level protocols and security protocols. Because different applications require different ways of identifying or authenticating users and different ways of encrypting data as it travels across a network, SSPI provides a way to access dynamic-link libraries (DLLs) containing different authentication and cryptographic functions. These DLLs are called Security Support Providers (SSPs).

Page 58: Introduccion a la seguridad Windows 7

Managed service accounts and virtual accounts were introduced in Windows

Server 2008 R2 and Windows 7 to provide crucial applications,

such as SQL Server and IIS, with the isolation of their own

domain accounts, while eliminating the need for an

administrator to manually administer the service principal name (SPN) and credentials for these accounts

Page 59: Introduccion a la seguridad Windows 7

Services and kernel mode Even though most Windows applications run in the security context of the user who starts them, this is not true of services. Many Windows services, such as network and printing services, are launched by the service controller when the user starts the computer. These services might run as Local Service or Local System and might continue to run after the last human user logs off.

Page 60: Introduccion a la seguridad Windows 7

Before starting a service, the service controller logs on by using the

account designated for the service and presents the service’s credentials

for authentication by the LSA.

(The Windows service implements a programmatic interface that the

service controller manager can use to control the service. A Windows

service can be started automatically when the system is started or

manually with a service control program.)

For example, when a Windows client computer joins a domain, the messenger service on the

computer connects to a domain controller and opens a secure channel to it. To obtain an

authenticated connection, the service must have credentials that the remote computer’s Local

Security Authority (LSA) trusts.

When communicating with other computers in the network, LSA uses the credentials for the

local computer’s domain account, as do all other services running in the security context of the

Local System and Network Service.

Services on the local computer run as SYSTEM so credentials do not need to be presented to

LSA.

Page 61: Introduccion a la seguridad Windows 7

The file Ksecdd.sys manages and encrypts these credentials and

uses a local procedure call into the LSA.

The file type is DRV (driver) and is known as the kernel-mode Security Support Provider (SSP) and, in Windows Server 2008 R2, Windows

Server 2008, Windows 7, and Windows Vista, is FIPS 140-2 Level 1 compliant.Kernel mode has full access to the hardware and system resources of the computer.

The kernel mode stops user mode services and applications from accessing critical areas of the operating system that they should not have access to.

Page 62: Introduccion a la seguridad Windows 7

Interactive Logon (USER LOGON)

Page 63: Introduccion a la seguridad Windows 7

Winlogon.exe is the executable file responsible for managing secure user interactions. The Winlogon service initiates the logon process for Windows operating systems by passing the credentials collected by user action

on the secure desktop (Logon UI) to the Local

Security Authority (LSA) through Secur32.dll.

Logon UI Winlogon.exe LSA

Page 64: Introduccion a la seguridad Windows 7
Page 65: Introduccion a la seguridad Windows 7

The interactive logon

process is the first step in user authentication and authorization

Page 66: Introduccion a la seguridad Windows 7

Interactive logon provides a way

to identify authorized users and

determine whether they are allowed to log on and access the system

Page 67: Introduccion a la seguridad Windows 7

Tipos de Interactive LogonLocal

Dominio

Page 68: Introduccion a la seguridad Windows 7
Page 69: Introduccion a la seguridad Windows 7

Local LogonA local logon requires that the user have a user account

in the SAM on the local computer.

The SAM protects and manages user and group

information in the form of security accounts stored in

the local computer registry (HKEY_LOCAL_MACHINE\SECURITY).

The computer can have network access, but it is not

required.

Local user account and group membership information

is used to manage access to local resources.

Page 70: Introduccion a la seguridad Windows 7

A local logon grants a user access to Windows resources on the local

computer (or resources on networked computers).

Page 71: Introduccion a la seguridad Windows 7

Logon local

• Usuario

• Grupo

SAM

• Acceso a los recursos locales

• Almacena en el Registro

Page 72: Introduccion a la seguridad Windows 7

Domain Logon

Page 73: Introduccion a la seguridad Windows 7

A domain logon requires that the user have a user account in the

domain’s Active Directory.

The computer must be joined to the domain and have a network connection to the domain.

Users must also have rights to log on to a local computer or a domain.

Domain user account and group membership information

is used to manage access to domain and local resources.

Page 74: Introduccion a la seguridad Windows 7

Application logonApplication or service logons not requiring interactive logon.

Processes initiated at start up, such as services, run in kernel mode by using Ksecdd.sys.

Page 75: Introduccion a la seguridad Windows 7

Windows authenticationprotocolsThe authentication protocols are security support providers (SSPs) that are installed in the form of dynamic-link libraries (DLLs).

()

()

Page 76: Introduccion a la seguridad Windows 7

The Windows operating systems implements a default set of authentication protocols —Kerberos, NTLM, TLS/SSL,

Digest, and PKU2U —as part of an extensible architecture

Page 77: Introduccion a la seguridad Windows 7

These protocols and packages

enable authentication of

users,

computers,

and services

Page 78: Introduccion a la seguridad Windows 7

()

Security support provider(SSP) A dynamic-link library (DLL) that implements the SSPI by

making one or more security packages available to applications. Each security package provides mappings between an application's SSPI function calls and an actual security model's functions. Security packages support security protocols such as Kerberos authentication and the Microsoft LAN Manager

Page 79: Introduccion a la seguridad Windows 7

()

SSPIA common interface between transport-level applications, such as Microsoft Remote Procedure Call (RPC), and security providers, such as Windows Distributed Security. SSPI allows a transport application to call one of several security providers to obtain an authenticated connection. These calls do not require extensive knowledge of the security protocol's details.

Page 80: Introduccion a la seguridad Windows 7

Conventions that control or enable the connection, communication, and data transfer between computers in a

Windows environment by verifying the identity of the credentials of a user, computer, or process

authentication protocols ()

Page 81: Introduccion a la seguridad Windows 7

NegotiateKerberos

NTLM

Page 82: Introduccion a la seguridad Windows 7

Microsoft Negotiate is an

SSP that acts as an application layer

between the Security Support Provider Interface (SSPI) and the

other SSPs

Provides authentication and

encryption

Page 83: Introduccion a la seguridad Windows 7

When an application calls into SSPI to log

on to a network, it can specify an SSP to process the request.

If the application specifies Negotiate, Negotiate analyzes the request and selects the best SSP to handle the request based on the configured security policy.

Page 84: Introduccion a la seguridad Windows 7

Negotiate SSP selecciona Kerberos o NTLM.

No lo hace por Kerberos si: 1. Unos de los componentes del proceso no habla con esos protocolos.2. O no se ha proporcionado un nombre para el destino:¨

1. Un SPN, un nombre principal de destino2. Un UPN, un nombre principal de Usuario3. Un nombre NetBios de la maquina

En caso de que no hable por Kerberos pasa a NTLM.Si es a un servidor al que llama el cliente, primero el cliente pregunta si es capaz el servidor de hablar en Negotiate SSP.A partir de Windows 2003 y XP los servidores hablan Negotiate SSP.

Page 85: Introduccion a la seguridad Windows 7

Reasons to Use the Negotiate Package•Allows the system to use the strongest (most secure)

available protocol.

•Ensures forward compatibility for your application.

•Ensures that your application exhibits behavior that is

in accordance with the security policy set by the

customer.

Page 86: Introduccion a la seguridad Windows 7

Kerberos

The Kerberos version 5 (v5) authentication protocol provides a mechanism for

authentication —and mutual authentication— between a client and a server, or

between one server and another server.

Beginning with Windows Server 2003, Microsoft implements the Kerberos v5 protocol as an SSP,

which can be accessed through the SSPI.

In addition, Windows Server implements extensions to the protocol that permit initial

authentication by using public key certificates on smart cards.

Active Directory Domain Services (AD DS) is required for default NTLM and Kerberos implementations.

Page 87: Introduccion a la seguridad Windows 7

NTLM

The NTLM version 2 (NTLMv2) authentication protocol is a

challenge/response authentication protocol.

NTLM is used when exchanging communications with a computer running

Windows NT Server 4.0 or earlier. Networks with this configuration are

referred to as mixed-mode.

NTLM is also the authentication protocol for computers that are not

participating in a domain, such as stand-alone servers and

workgroups.

Page 88: Introduccion a la seguridad Windows 7

Negotiate Extensions

Page 89: Introduccion a la seguridad Windows 7

NegoExts (NegoExts.dll)is an authentication package that negotiates the use of SSPs for applications and scenarios implemented by Microsoft and other software companies

Page 90: Introduccion a la seguridad Windows 7

The Windows Negotiate package treats the NegoExts SSP in the same manner as it does for Kerberos and NTLM.NegoExts.dll is loaded into the Local System Authority (LSA) at startup.

When an authentication request is received, based on the request's source, NegoExts negotiates between the supported SSPs.

It gathers the credentials and policies, encrypts them, and sends that

information to the appropriate SSP, where the security token is then created.

The SSPs supported by NegoExts are not stand-alone SSPs such as Kerberos and NTLM. Therefore, within the NegoExts SSP, when the authentication method fails for any reason, an authentication failure message will be displayed or logged. No renegotiation or fallback authentication methods are possible.

Page 91: Introduccion a la seguridad Windows 7

PKU2U

Page 92: Introduccion a la seguridad Windows 7

The PKU2U protocol in Windows 7 and Windows

Server 2008 R2 is implemented as an SSP.

The SSP enables peer-to-peer authentication,

particularly through the Windows 7 media and file sharing feature called Homegroup, which permits

sharing between computers that are not members of a domain

Page 93: Introduccion a la seguridad Windows 7

Credential Security Support Provider (CredSSP)

Page 94: Introduccion a la seguridad Windows 7

Provides a single sign-on (SSO) user

experience when starting new Terminal Services sessions.

CredSSP enables applications to delegate users' credentials from the client computer (by using the

client-side SSP) to the target server (through the

server-side SSP) based on client policies

Page 95: Introduccion a la seguridad Windows 7

TLS/SSL

Page 96: Introduccion a la seguridad Windows 7

The TLS/SSL protocols are used to authenticate servers and clients, and to encrypt messages between the authenticated parties. The TLS/SSL protocols, versions 2.0 and 3.0, and the Private Communications Transport (PCT) protocol are based on public key cryptography. The secure channel (Schannel) authentication protocol suite provides these protocols. All Schannel protocols use a client/server model and are primarily used for Internet applications that require secure Hypertext Transfer Protocol (HTTP) communications.

Page 97: Introduccion a la seguridad Windows 7

Digest

Page 98: Introduccion a la seguridad Windows 7

The Digest authentication protocol is a

challenge/response protocol that is designed

for use with HTTP and Simple Authentication Security Layer (SASL) exchanges.

These exchanges require that parties requesting authentication must provide secret keys.

Page 99: Introduccion a la seguridad Windows 7

Less. 3

Windows

Authentication

Architecture

Page 100: Introduccion a la seguridad Windows 7

(A) Security subsystem

architecture

(B) Security Support

Provider Interface

(SSPI)

Page 101: Introduccion a la seguridad Windows 7

(A) Security subsystemarchitecture

Page 102: Introduccion a la seguridad Windows 7

the logon screen to Winlogon.exe

which interacts with LSAto the local or remote

computer

Security subsystem architecture

Standard logon or custom logon

Page 103: Introduccion a la seguridad Windows 7

Winlogon.exe, which interacts with

LSA to communicate with a

remote authentication source, such as a domain controller,

and the protocol layer within the

LSA architecture.

Page 104: Introduccion a la seguridad Windows 7

(B) Security Support Provider Interface (SSPI)

Page 105: Introduccion a la seguridad Windows 7

Abstract calls to authentication protocols

If the preferred protocol is not in this version

of Windows, developers can use a

custom Security Support Provider if it

meets interoperability requirements.

Page 106: Introduccion a la seguridad Windows 7

(A) Local Security Authority (LSA) is a (A.1) protected subsystem that authenticates and logs users on to the local computer

In addition

(A.2) LSA maintains information about all aspects of local security on a computer (these aspects are collectively known as the local security policy).(A.3) provides various services for translation between names and security identifiers (SIDs).

Page 107: Introduccion a la seguridad Windows 7

(A3) The local security policy identifies the following:• Who can have access to the system and in what

way (for example, interactively, over the

network, or as a service).

• Who is assigned what rights.

• What security auditing is performed.

• What the default memory quotas are for paged

and non-paged memory pool usage.

Page 108: Introduccion a la seguridad Windows 7

LSA LSP

Page 109: Introduccion a la seguridad Windows 7

LSA architecture

Page 110: Introduccion a la seguridad Windows 7

LSA

Provider

validating accessto objects

checking userrights

generating auditMessages

Procedure calls

local procedurecall (LPC)

occurs between components on

the same system

A remote procedure call

(RPC)

occur between components on

different systems

between components on

the same system

Page 111: Introduccion a la seguridad Windows 7

LSA (local)

In general, the LSA performs the following functions:• Manages local security policy.• Provides interactive user authentication services.• Generates access tokens.• Manages the audit policy and settings

Page 112: Introduccion a la seguridad Windows 7
Page 113: Introduccion a la seguridad Windows 7

The components on the domain controller

Page 114: Introduccion a la seguridad Windows 7
Page 115: Introduccion a la seguridad Windows 7

LSA components for all systems

Page 116: Introduccion a la seguridad Windows 7
Page 117: Introduccion a la seguridad Windows 7

Lsasrv.dllThe LSA Server service, which

both enforces security policiesand acts as

the security package manager for the LSA.

Page 118: Introduccion a la seguridad Windows 7

Credssp.dllThe default dynamic-link library (DLL) module that operates in the security context of Winlogon.

Wdigest.dllSimple challenge-and-response protocol that provides increased security over

.

Extended Protection for Authentication is enabled using the channel binding token.

Schannel.dllThe Secure Sockets Layer (SSL) and Transport Layer Security (TLS) authentication protocol.

This protocol provides authentication over an encrypted channel instead of a less-secure clear channel.

Page 119: Introduccion a la seguridad Windows 7

Kerberos.dllThe Kerberos V5 authentication protocol. This protocol provides authentication using Kerberos protocol

instead of plaintext, NTLM, or digest method.

Extended Protection for Authentication is enabled using the channel binding token.

Pku2u.dllThe SSP enables peer-to-peer authentication, particularly through the Windows 7 media and file sharing

feature called Homegroup, which permits sharing between computers that are not members of a domain.

Negoexts.dllAn authentication package that negotiates the use of SSPs for applications and scenarios implemented by Microsoft

and other software companies.

Page 120: Introduccion a la seguridad Windows 7

Secur32.dllThe authentication provider that exposes the SSP interfaces to applications

Page 121: Introduccion a la seguridad Windows 7

Components on the domain controller

Page 122: Introduccion a la seguridad Windows 7

Kdcsvc.dllThe Kerberos Key Distribution Center (KDC) service, which is responsible for the Kerberos authentication service and the ticket granting service.

Ntdsa.dllThe directory service module, which supports the Windows replication protocol and LDAP, and manages partitions of data

Ntdsapi.dllA directory service module which can communicate over RPC through a set of COM interfaces used for accessing directory services to manage network resources.

Page 123: Introduccion a la seguridad Windows 7

Cached credentials and validation

Validation mechanisms rely on the presentation of credentials at the time of logon.

However, when the computer is disconnected from a domain controller, and

the user is presenting domain credentials, then Windows uses the process of cached credentials in the validation mechanism.

Each time a user logs on to a domain, Windows caches the credentials supplied and stores

them in the security hive of the operation system. The cached credentials is a function of the NT hash in that the hashed credentials are salted by using the user name and hashed again.

With cached credentials, the user can log on to a domain member without being connected to a domain controller within that domain.

Page 124: Introduccion a la seguridad Windows 7

Credential storage and validation

Page 125: Introduccion a la seguridad Windows 7

Credential storage and validationIt is not always desirable to use one set of credentials for

access to different resources.

For example, an administrator might want to use

administrative rather than user credentials when accessing

a remote server.

Similarly, if a user will be accessing external resources, such

as a bank account, he or she can only use credentials that

are different than their domain credentials

Page 126: Introduccion a la seguridad Windows 7

Windows Vault and Credential Manager

in Windows 7

In Windows Server 2008 R2 and Windows 7, the storage and

management of user names and passwords were integrated into

Credential Manager —a Control Panel feature.

Credential Manager allows users to store credentials to other

systems and websites in the secure Windows Vault. Some versions

of Internet Explorer use this feature for authentication to websites.

Page 127: Introduccion a la seguridad Windows 7

Credential management by using Credential Manager is controlled by

the user on the local computer.

Users can save and store credentials from supported browsers and

Windows applications to make it convenient when they need to sign

in to these resources.

Credentials are saved in special encrypted folders on the computer

under the user’s profile.

Applications that support this feature (through the use of the

Credential Manager APIs), such as web browsers and apps, can

present the correct credentials to other computers and websites

during the log on process.

Page 128: Introduccion a la seguridad Windows 7

When a website, an application, or another computer

requests authentication through NTLM or the Kerberos

protocol, an Update Default Credentials or Save Password

check box is presented to the user.

This dialog to request the saving of credentials locally is

generated by an application that supports the Credential

Manager APIs.

If the user selects the Save Password check box, Credential

Manager keeps track of the user's name, password, and

related information for the authentication service that is in

use.

Page 129: Introduccion a la seguridad Windows 7

The next time the service is used, Credential

Manager automatically supplies the credential

that is stored in the Windows Vault. If it is not accepted, the user is prompted for the

correct access information.

If access is granted with the new credentials,

Credential Manager overwrites the previous

credential with the new one and then stores the

new credential in the Windows Vault.

Page 130: Introduccion a la seguridad Windows 7
Page 131: Introduccion a la seguridad Windows 7
Page 132: Introduccion a la seguridad Windows 7

Less. 4

Troubleshooting Logon and Resource Access Issues

Page 133: Introduccion a la seguridad Windows 7
Page 134: Introduccion a la seguridad Windows 7

The logon process authenticates both computer and

user accounts. Domain controllers perform the

authentication:

(1) During the startup process for computer

accounts.

(2) When the user logs on for user accounts.

Page 135: Introduccion a la seguridad Windows 7
Page 136: Introduccion a la seguridad Windows 7

Windows 7 caches the credentials of the last 10 user accounts

to log onto a specific computer,

and you can modify this number either by editing the registry

(HKEY_LOCAL_MACHINE\SOFTWARE

\Microsoft\Windows

NT\CurrentVersion\Winlogon\cachedlogonscount)

Page 137: Introduccion a la seguridad Windows 7

by using Group Policy

(Computer Configuration\Policies\Windows

Settings\Security Settings\Local

Policies\Security

Options\Interactive Logon: Number of

previous logons to cache).

Page 138: Introduccion a la seguridad Windows 7

(a) maximum of 50

(b) credentials to zero

Win7 must contact a domain

controller before users can obtain

access to the local computer

Page 139: Introduccion a la seguridad Windows 7
Page 140: Introduccion a la seguridad Windows 7

On-screen errors. Most user logon

errors provide an accurate description on

the screen.

Page 141: Introduccion a la seguridad Windows 7

Active Directory Users and

Computers. You can use this tool to verify the

user’s logon name and if the

account is disabled. You also can use this tool to

unlock the account and reset the password, if

necessary.

Page 142: Introduccion a la seguridad Windows 7

Event logs.

You can use Event Viewer to view event logs that may give

some indication why a logon error is occurring. The

Security logs on a computer or on a domain controller that

indicates if authentication errors are occurring.

The System log of a computer indicates if the computer

account is not authenticating correctly.

Page 143: Introduccion a la seguridad Windows 7

Arranque equipo

Page 144: Introduccion a la seguridad Windows 7

Boot Process Overview

Page 145: Introduccion a la seguridad Windows 7

During the BIOS Initialization phase, the

platform firmware identifies and

initializes hardware devices, and then

runs a power-on self-test (POST)

Page 146: Introduccion a la seguridad Windows 7

The POST process ends when the BIOS

detects a valid system disk, reads the

master boot record (MBR), and starts

Bootmgr.exe.

Bootmgr.exe finds and starts Winload.exeon the Windows boot partition, which begins

the OSLoader phase

Page 147: Introduccion a la seguridad Windows 7

BIOS version and firmware of all hardware components to the latest versions.

In addition check the BIOS configuration (device boot order, PXE boot-enabled, Quick/Fast boot (POST check) enabled, AHCI settings, and so on).

optimize or troubleshoot

Page 148: Introduccion a la seguridad Windows 7

Windows Performance Toolkit

(included in the Windows 7.1 SDK )

optimize or troubleshoot

The Windows® Performance Toolkit consists of two independent tools:

Windows® Performance Recorder (WPR) and Windows® Performance Analyzer (WPA). In addition, support is maintained for the previous command-line tool, Xperf. However, Xperfviewis no longer supported. All recordings must be opened and analyzed by using WPA.

Page 149: Introduccion a la seguridad Windows 7
Page 150: Introduccion a la seguridad Windows 7

Controllers

Controllers are applications that define the size and location of the log file,

start and stop event tracing sessions, enable providers so they can log events

to the session, manage the size of the buffer pool, and obtain execution

statistics for sessions.

Session statistics include the number of buffers used, the number of buffers

delivered, and the number of events and buffers lost. For more information, see

Controlling Event Tracing Sessions.

Page 151: Introduccion a la seguridad Windows 7

ProvidersProviders are applications that contain event tracing instrumentation.

After a provider registers itself, a controller can then enable or disable event tracing

in the provider.

The provider defines its interpretation of being enabled or disabled. Generally, an

enabled provider generates events, while a disabled provider does not. This lets

you add event tracing to your application without requiring that it generate events

all the time.

Page 152: Introduccion a la seguridad Windows 7

ConsumersConsumers are applications that select one or more event tracing sessions as

a source of events.

A consumer can request events from multiple event tracing sessions

simultaneously; the system delivers the events in chronological order.

Consumers can receive events stored in log files, or from sessions that

deliver events in real time. When processing events, a consumer can specify

start and end times, and only events that occur in the specified time frame

will be delivered.

Missing Events

Perfmon, System Diagnostics, and other system tools may report on missing events in the Event Log and indicate that the settings for Event Tracing for Windows (ETW) may not be optimal.

Page 153: Introduccion a la seguridad Windows 7

OS Loader

Page 154: Introduccion a la seguridad Windows 7

During the OS Initialization phase, most of the

operating system work occurs.

This phase involves kernel initialization, Plug and

Play activity, service start, logon, and Explorer

(desktop) initialization.

Page 155: Introduccion a la seguridad Windows 7
Page 156: Introduccion a la seguridad Windows 7

Sub phase 1 - PreSMSS: Kernel InitializationThe PreSMSS subphase begins when the kernel is invoked. During this subphase, the kernel initializes data structures and components. It also starts the PnP manager, which initializes the BOOT_START drivers that were loaded during the OSLoader phase.

Sub phase 2 - SMSSInit : Session InitializationThe SMSSInit subphase begins when the kernel passes control to the session manager process (Smss.exe). During this subphase, the system initializes the registry, loads and starts the devices and drivers that are not marked BOOT_START, and starts the subsystem processes. SMSSInit ends when control is passed to Winlogon.exe. [1]

Sub phase 3 - WinLogonInit: Winlogon InitializationThe WinLogonInit subphase begins when SMSSInit completes and starts Winlogon.exe. During WinLogonInit, the

user logon screen appears, the service control manager starts services, and Group Policy scripts run. WinLogonInit ends when the Explorer process starts. [1]

Sub phase 4 – ExplorerInit: Explorer InitializationThe ExplorerInit subphase begins when Explorer.exe starts. During ExplorerInit, the system creates the desktop

window manager (DWM) process, which initializes the desktop and displays it for the first time.

Page 157: Introduccion a la seguridad Windows 7

Group Policy processing

took around 160 seconds to complete

Page 158: Introduccion a la seguridad Windows 7

The PostBoot phase

Page 159: Introduccion a la seguridad Windows 7

The PostBoot phase includes

all background activity that

occurs after the desktop is

readyThe user can interact with the desktop, but the system might still be starting services, tray icons, and application code in the background, potentially having an impact on how the user perceives system responsiveness

Page 160: Introduccion a la seguridad Windows 7

The ReadyBootPrefetcher

The Windows prefetcher (or ReadyBoot) helps to read data into

memory before Windows needs it. In addition each reboot will

allow the prefetcher to better predict what data is needed

During the Windows boot process a lot of data is read from disk

and I/O pressure is one of the determining factors for boot

performance

One way to analyze the prefetcher activities is to run

xperf.exe from the Windows Performance Toolkit

Xperf –i <boottrace.etl> - o prefetcher.txt –a bootprefetch – summary

Page 161: Introduccion a la seguridad Windows 7

(1) Windows Hardware Dev Center Archive

(2) Performance Analysis Whitepapers

On/Off Transition Trace Capture tool

CPU Power Management

Exploring Process Heaps Using Windows Performance Analyzer

(3) Root Causes for Slow Boots and Logons (sbsl)

(4) Tools for Troubleshooting Slow Boots and Slow Logons (sbsl)

Page 162: Introduccion a la seguridad Windows 7

Installing XPERF to capture a slow boot or logon trace

1.Install XPERF from the Windows SDK for Windows 7 and .NET Framework on the slow boot or logon computer.

Hint 1: It is possible to install only the Windows Performance Toolkit from the Windows SDK.Hint 2: We suggest installing the WPT in an X:\XPERF directory rather than the default directory recommended by setup. It's easier to access and copy files in and out of, and change paths, to the short-labeled directory.Hint 3: Once installed on a computer, the XPERF installation directory can be copied to other computers that you want to capture ETL traces from or view ETL traces on. There are no external files, DLL registration or registry changes required to make or view a capture. Make a copy of the X:\XPERF directory and copy at will.

2.If taking a network trace on a 64-bit computer, enable the following registry key and reboot before capturing ETL data. This prevents kernel mode data from being paged out of memory.

Page 163: Introduccion a la seguridad Windows 7

Registry Path HKLM\System\CurrentControlSet\Control\Session Manager\Memory Management

Setting DisablePagingExecutiveData Type: REG_DWORD Value: 1

Page 164: Introduccion a la seguridad Windows 7

Using XBOOTMGR to capture slow boots, or slow logons caused by slow boots1.Logon as an Administrator of the computer you want to trace (either a local Administrator or Domain Admin account that is a member of the local machine's Administrators group). 2.Open an elevated command prompt. 3.Run the following command in the WPT directory (default path is C:\Program Files\Microsoft Windows Performance Toolkit). This syntax is useful to capture slow boots as well as slow logons thought to be caused by a delay in OS startup:

xbootmgr -trace boot -traceflags base+latency+dispatcher -stackwalkprofile+cswitch+readythread -notraceflagsinfilename -postbootdelay 10

This command will:•Reboot the local computer •Capture ETL tracing during the boot and logon operation (you provide user name, domain name, and password for the slow logon account) •Stop tracing at 10 seconds after disk and CPU utilization fall below a certain threshold after user logon. Increase the value for "-postbootdelay" as required to troubleshoot user desktops that are unresponsive to mouse and keyboard input post boot.

Page 165: Introduccion a la seguridad Windows 7

Using XPERF to capture slow logons1.Logon as an Administrator of the computer you want to trace (either a local Administrator or Domain Adminaccount that is a member of the local machine's Administrators group).

2.Open an elevated command prompt and run this command from WPT Install directory (default path is C:\Program Files\Microsoft Windows Performance Toolkit.

xperf -on base+latency+dispatcher+NetworkTrace+Registry+FileIO -stackWalkCSwitch+ReadyThread+ThreadCreate+Profile -BufferSize 128 -start UserTrace -on "Microsoft-Windows-Shell-Core+Microsoft-Windows-Wininit+Microsoft-Windows-Folder Redirection+Microsoft-Windows-User ProfilesService+Microsoft-Windows-GroupPolicy+Microsoft-Windows-Winlogon+Microsoft-Windows-Security-Kerberos+Microsoft-Windows-User Profiles General+e5ba83f6-07d0-46b1-8bc7-7e669a1d31dc+63b530f8-29c9-4880-a5b4-b8179096e7b8+2f07e2ee-15db-40f1-90ef-9d7ba282188a" -BufferSize 1024 -MinBuffers 64 -MaxBuffers128 -MaxFile 1024

Note: This syntax works on Windows Vista (Windows Server 2008) and Windows 7 (Windows Server 2008 R2) computers

3.Press CTRL+ALT+DEL and then Switch User.

4.Logon with the user account experiencing the slow user logon to reproduce the issue.

5.Stop the trace. While logged on with the slow user account, open an elevated CMD prompt and type:xperf -stop -stop UserTrace -d merged.etlClose the slow logon user session and the admin logon session opened in step 2 as required.

Page 166: Introduccion a la seguridad Windows 7

Events and Errors

Page 167: Introduccion a la seguridad Windows 7

Core Security includes system security

functionality, such as authentication,

authorization, and access control features, built into the Windows operating

system

Page 168: Introduccion a la seguridad Windows 7
Page 169: Introduccion a la seguridad Windows 7

Windows Logon

Windows License VerificationEvent ID 4102

Event ID 4103

Windows Logon Availability(I) Event ID 1002: Windows logon process is able to be completed successfully

(I) Event ID 4002: Windows logon process is able to be completed successfully

(E) Event ID 4003: EVENT_DESKTOP_SWITCH_FAILURE

(E) Event ID 4005: EVENT_WINLOGON_FATAL_FAILURE

(W) Event ID 4006: EVENT_CREATE_PROCESS_FAILURE

(I) Event ID 4101: EVENT_LICENSE_VALIDATED

(W) Event ID 6000: EVENT_SUBSCRIBER_UNAVAILABLE

(E) Event ID 6001: EVENT_SUBSCRIBER_FAILURE

(E) Event ID 6002: EVENT_REG_DB_FAILURE

(E) Event ID 6003: EVENT_SUBSCRIBER_UNAVAILABLE_FATAL

(E) Event ID 6004: EVENT_SUBSCRIBER_FAILURE_FATAL

Windows Logon Switching(E) Event ID 4004: EVENT_SHUTDOWN_WINDOWS_FAILURE

(W) Event ID 4007: EVENT_DISCONNECT_FAILURE

Page 170: Introduccion a la seguridad Windows 7

Windows Initialization

Windows Shutdown(W) Event ID 3003: EVENT_REMOTE_SHUTDOWN_INIT_FAILED

(E) Event ID 3005: EVENT_SHUTDOWN_WINDOWS_FAILURE

Windows Startup Availability(I) Event ID 1000: EVENT_SESSION0_NOTIFICATION_DETECTED

(I) Event ID 1001: EVENT_AUTOCHK_DATA

(E) Event ID 1015: EVENT_.SYSTEM_PROCESS_FAILED

(E) Event ID 3002: EVENT_WININIT_EXIT

(W) Event ID 3004: EVENT_SETUP_LSA_STALL

Page 171: Introduccion a la seguridad Windows 7

Consultor y arquitecto de sistemas Office 365, SharePoint, Project Server y CRM

Dynamics CRM, Dynamics AX en los módulos Financials, Project Management y Supply Chain.

Docente en la Escuela de Negocios EAE

MBA por el Instituto de Empresa

MCT de Microsoft

Consultor y docente de ITIL

Consultor y docente de PMI

móvil: 685106684

@ : [email protected]

tw : @jftamames

in : es.linkedin.com/in/jftamames

blogs: http://jftamames.wordpress.com/

PublicacionesCloud Spain Club | ITIL | Gestión de Proyectos |SharePoint

Amazón Author

Jo s é Fe r n á nde z Ta m a me s