Will said:
Does Microsoft publish any documents that give an alternative for
hardening
of the Windows 2000 or Windows 2003 registries? There are a lot of
default permissions with "Everyone" and I would like to tighten that up.
I think you're trying to do something that most people do not do. The NSA
hardening guide for Windows 2000 suggests changing permissions on a few
registry values only, and I would agree with their recommendation. The
Windows 2003 defaults are very secure for most purposes. I'm not sure the
Microsoft Windows 2003 Security Guide recommends changing any of the default
registry permissions, and it was vetted by the NSA. Changing lots of
permissions increases your chance of problems, without necessarily
increasing security very much.
You might also want to look at these articles by Jesper Johansson and Steve
Riley, where they argue against the need to make a lot of registry tweaks:
www.microsoft.com/technet/community/columns/secmgmt/sm0305_2.mspx
www.microsoft.com/technet/community/columns/secmgmt/sm0405.mspx
I would assert that removing the "Everyone" group from registry primarily
affects locally logged in users, not remote attackers. On most servers like
Windows 2003 [that are not offering Terminal Services], the only people
logging in locally and/or have any access to the registry are going to be
Administrators already anyways. If you're trying to harden a system against
local privilege escalation by your authenticated users, there are guides out
there to direct you on that. I think it's pretty challenging to
successfully harden Windows 2000 against local privilege escalation,
especially where there are multiple users logging in.
Even though your normal users may be in the "everyone" group, I believe they
will not have remote access to the registry on your servers by default.