Guest Spin Posted May 12, 2008 Posted May 12, 2008 Gurus, This is a re-post of a message sent solely to the group_policy NG. I'm copying a wider audience here to engage some discussions amongst you IT Security Managers/security consultants out there. Running Windows Server 2003 SP2 in a single Active Directory domain (Lab environment). I am experimenting with the Group Policy Security database, secedit.sdb If you run the Setup Security INF in the Security Configuration and Analysis Snapin against this database, you will bring your system back Windows security default settings and it will remain that way until the next Group Policy Refresh interval. You must be an admin on the machine to do this. My question is, isn't this a security risk in it's own right, bypassing domain and OU GPO settings? A respondent in the Group Policy newsgroup (Marcin) stated that if my sole goal is to prevent use of Security Configuration and Analysis, I have ability to restrict access to arbitrarily selected snap-ins via GPO. In addition I could restrict ability to execute Secedit (which one can do by following http://support.microsoft.com/kb/323525). While I agree this is a major technical challenge, has anyone else in these other NGs I've copied on this message ever worried about this? Or should I just let it pass? -- Spin Quote
Guest Kerry Brown Posted May 12, 2008 Posted May 12, 2008 If you want to keep the wolf out of the henhouse then don't give him the key. There are several ways a local administrator can get around group policy. -- Kerry Brown MS-MVP - Windows Desktop Experience: Systems Administration http://www.vistahelp.ca/phpBB2/ "Spin" <Spin@invalid.com> wrote in message news:68pld0F2u4ee4U1@mid.individual.net...<span style="color:blue"> > Gurus, > > This is a re-post of a message sent solely to the group_policy NG. I'm > copying a wider audience here to engage some discussions amongst you IT > Security Managers/security consultants out there. > > Running Windows Server 2003 SP2 in a single Active Directory domain (Lab > environment). I am experimenting with the Group Policy Security database, > secedit.sdb If you run the Setup Security INF in the Security > Configuration and Analysis Snapin against this database, you will bring > your system back Windows security default settings and it will remain that > way until the next Group Policy Refresh interval. You must be an admin on > the machine to do this. My question is, isn't this a security risk in > it's own right, bypassing domain and OU GPO settings? A respondent in > the Group Policy newsgroup (Marcin) stated that if my sole goal is to > prevent use of Security Configuration and Analysis, I have ability to > restrict access to arbitrarily selected snap-ins via GPO. In addition I > could restrict ability to execute Secedit (which one can do by following > http://support.microsoft.com/kb/323525). While I agree this is a major > technical challenge, has anyone else in these other NGs I've copied on > this message ever worried about this? Or should I just let it pass? > > -- > Spin </span> Quote
Guest Herb Martin Posted May 12, 2008 Posted May 12, 2008 "Spin" <Spin@invalid.com> wrote in message news:68pld0F2u4ee4U1@mid.individual.net...<span style="color:blue"> > Gurus, > > This is a re-post of a message sent solely to the group_policy NG. I'm > copying a wider audience here to engage some discussions amongst you IT > Security Managers/security consultants out there. > > Running Windows Server 2003 SP2 in a single Active Directory domain (Lab > environment). I am experimenting with the Group Policy Security database, > secedit.sdb If you run the Setup Security INF in the Security > Configuration and Analysis Snapin against this database, you will bring > your system back Windows security default settings and it will remain that > way until the next Group Policy Refresh interval. You must be an admin on > the machine to do this. My question is, isn't this a security risk in > it's own right, bypassing domain and OU GPO settings? A respondent in > the Group Policy newsgroup (Marcin) stated that if my sole goal is to > prevent use of Security Configuration and Analysis, I have ability to > restrict access to arbitrarily selected snap-ins via GPO. In addition I > could restrict ability to execute Secedit (which one can do by following > http://support.microsoft.com/kb/323525). While I agree this is a major > technical challenge, has anyone else in these other NGs I've copied on > this message ever worried about this? Or should I just let it pass?</span> Moral is really "Don't make admins" who are not trustworth admins. If you don't trust people to do the right thing, don't give them the privilege. Quote
Guest Anthony [MVP] Posted May 12, 2008 Posted May 12, 2008 Group Policy is a way of setting configurations that the OS exposes. The client side extensions are run in the System context or the User context. All these are available to the administrator of the machine. There is no "third party" controlling the machine. Secedit.sdb is just a template of settings. I don't see a security risk in assuming the administrator has full control of the local machine. Anthony, http://www.airdesk.co.uk "Spin" <Spin@invalid.com> wrote in message news:68pld0F2u4ee4U1@mid.individual.net...<span style="color:blue"> > Gurus, > > This is a re-post of a message sent solely to the group_policy NG. I'm > copying a wider audience here to engage some discussions amongst you IT > Security Managers/security consultants out there. > > Running Windows Server 2003 SP2 in a single Active Directory domain (Lab > environment). I am experimenting with the Group Policy Security database, > secedit.sdb If you run the Setup Security INF in the Security > Configuration and Analysis Snapin against this database, you will bring > your system back Windows security default settings and it will remain that > way until the next Group Policy Refresh interval. You must be an admin on > the machine to do this. My question is, isn't this a security risk in > it's own right, bypassing domain and OU GPO settings? A respondent in > the Group Policy newsgroup (Marcin) stated that if my sole goal is to > prevent use of Security Configuration and Analysis, I have ability to > restrict access to arbitrarily selected snap-ins via GPO. In addition I > could restrict ability to execute Secedit (which one can do by following > http://support.microsoft.com/kb/323525). While I agree this is a major > technical challenge, has anyone else in these other NGs I've copied on > this message ever worried about this? Or should I just let it pass? > > -- > Spin </span> Quote
Guest Roger Abell [MVP] Posted May 13, 2008 Posted May 13, 2008 "Spin" <Spin@invalid.com> wrote in message news:68pld0F2u4ee4U1@mid.individual.net...<span style="color:blue"> > Gurus, > > This is a re-post of a message sent solely to the group_policy NG. I'm > copying a wider audience here to engage some discussions amongst you IT > Security Managers/security consultants out there. > > Running Windows Server 2003 SP2 in a single Active Directory domain (Lab > environment). I am experimenting with the Group Policy Security database, > secedit.sdb If you run the Setup Security INF in the Security > Configuration and Analysis Snapin against this database, you will bring > your system back Windows security default settings and it will remain that > way until the next</span> That setup security.inf will do that is a common belief, one that is almost right, but not fully correct. <span style="color:blue"> > Group Policy Refresh interval. You must be an admin on the machine to do > this. My question is, isn't this a security risk in it's own right, > bypassing domain and OU GPO settings?</span> What you are actually asking is: Isn't it a security risk that people believe that group policy will control settings such that they cannot be altered and/or circumvented? To that I would say yes, anytime someone running a system does not fully understand the operational characteristics of the system, that poses a risk. As others have said, a) it takes an admin to do what you outline, style_emoticons/ it can be made more difficult to do, c) there are many ways to change what group policy has set and those changes will stay until group policy resets, which in some cases can be a very long time. Roger <span style="color:blue"> > A respondent in the Group Policy newsgroup (Marcin) stated that if my sole > goal is to prevent use of Security Configuration and Analysis, I have > ability to restrict access to arbitrarily selected snap-ins via GPO. In > addition I could restrict ability to execute Secedit (which one can do by > following http://support.microsoft.com/kb/323525). While I agree this is > a major technical challenge, has anyone else in these other NGs I've > copied on this message ever worried about this? Or should I just let it > pass? > > -- > Spin </span> Quote
Guest Daniel Petri Posted May 13, 2008 Posted May 13, 2008 Like the others said the moment you give someone enough rights they can do whatever they want. But I wonder why one would go through all the trouble to disable the GPO as you've described it. Isn't it much simpler to download the KillPol tool from my site, and simply enter the right administrative username and password? Running the tool again will bring back the GPO. Quite useful for troubleshooting and management scenarios. www.petri.co.il/killpol.htm Daniel Petri www.petri.co.il "Spin" <Spin@invalid.com> wrote in message news:68pld0F2u4ee4U1@mid.individual.net...<span style="color:blue"> > Gurus, > > This is a re-post of a message sent solely to the group_policy NG. I'm > copying a wider audience here to engage some discussions amongst you IT > Security Managers/security consultants out there. > > Running Windows Server 2003 SP2 in a single Active Directory domain (Lab > environment). I am experimenting with the Group Policy Security database, > secedit.sdb If you run the Setup Security INF in the Security > Configuration and Analysis Snapin against this database, you will bring > your system back Windows security default settings and it will remain that > way until the next Group Policy Refresh interval. You must be an admin on > the machine to do this. My question is, isn't this a security risk in > it's own right, bypassing domain and OU GPO settings? A respondent in > the Group Policy newsgroup (Marcin) stated that if my sole goal is to > prevent use of Security Configuration and Analysis, I have ability to > restrict access to arbitrarily selected snap-ins via GPO. In addition I > could restrict ability to execute Secedit (which one can do by following > http://support.microsoft.com/kb/323525). While I agree this is a major > technical challenge, has anyone else in these other NGs I've copied on > this message ever worried about this? Or should I just let it pass? > > -- > Spin </span> Quote
Guest Spin Posted May 14, 2008 Posted May 14, 2008 "Daniel Petri" <daniel@petri.co.il.removeme> wrote in message news:%23vAz6JPtIHA.2292@TK2MSFTNGP03.phx.gbl...<span style="color:blue"> > Like the others said the moment you give someone enough rights they can do > whatever they want. > > But I wonder why one would go through all the trouble to disable the GPO > as you've described it. Isn't it much simpler to download the KillPol tool > from my site, and simply enter the right administrative username and > password? Running the tool again will bring back the GPO. Quite useful for > troubleshooting and management scenarios. > > www.petri.co.il/killpol.htm</span> Daniel I just tried Kilpol.exe from your web site and while it looked promising, after I executed it, I immediately ran another RSOP.msc and all of the customized domain policies were showing still in place. What am I doing wrong? Quote
Guest Daniel Petri Posted May 14, 2008 Posted May 14, 2008 Because RSOP sees that last applied policy, not what is applied at that given moment. Try disabling something visible, you'll see KillPol works... -- Daniel Petri www.petri.co.il "Spin" <Spin@invalid.com> wrote in message news:690tajF2vak5gU1@mid.individual.net...<span style="color:blue"> > "Daniel Petri" <daniel@petri.co.il.removeme> wrote in message > news:%23vAz6JPtIHA.2292@TK2MSFTNGP03.phx.gbl...<span style="color:green"> >> Like the others said the moment you give someone enough rights they can >> do whatever they want. >> >> But I wonder why one would go through all the trouble to disable the GPO >> as you've described it. Isn't it much simpler to download the KillPol >> tool from my site, and simply enter the right administrative username and >> password? Running the tool again will bring back the GPO. Quite useful >> for troubleshooting and management scenarios. >> >> www.petri.co.il/killpol.htm</span> > > Daniel I just tried Kilpol.exe from your web site and while it looked > promising, after I executed it, I immediately ran another RSOP.msc and all > of the customized domain policies were showing still in place. What am I > doing wrong? > > </span> Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.