Securing Microsoft Windows
Securing Microsoft Windows
Windows
(2000/XP/2003)
INTRODUCTION.................................................................................... 3
CONCLUSION.......................................................................................18
This guide is for the average user or a new user who just bought a computer, and is willing to
secure his Windows Operating System. This guide does not contain complex tips meant for
advanced users, but rather the basis of Windows security for everyday use. There is nothing
incredible or until now unknown in this guide, so if you are looking at this, you can skip it. The
purpose of this paper is to help you configuring securely your OS, and to disable some default
dangerous settings.
Lastly, I have came across badly infected computers, and some of them had at least one
antivirus, and even a firewall. Nowadays malware are more aggressive than ever, and are
more and more using user-mode rootkits to hide their files and processes, while attacking your
main security applications to disable them. Some of these infected systems were not without
any security, but the users have randomly added some security software without
understanding what they were doing. Security is not a setup executable that you can install
and forget, but instead a global process, beginning with the OS (configuring it), and requiring
understanding and awareness from the one who is securing his system.
Usually, when you first get a computer and are asking for advices to secure it, you are often
told to install various security software, such as an antivirus. However, following this way, you
are adding security on the top of something insecure by default, your Operating System.
Windows is your security foundations, if it is weak, then everything on top of it can collapse.
For instance, a malware could exploit a known Windows vulnerability in a service running by
default, to execute, but if this vulnerability is patched, and that this service is disabled, then
the malware is dead in it's track. Thus, you must take care of Windows itself first, this is as
critical as making the foundations of a building.
In what follows, we will see together how to decrease your exposure to various threats, by
disabling unneeded Windows services, configuring few Windows options, setting up updates,
controlling what is starting up, setting strong passwords, and by setting up some critical
programs rights and privileges.
This guide applies to Windows XP Home Edition and Professional Edition, Windows 2000, and
Windows 2003. However, some general advices are true for all OS, so it's still good to read this
guide even if you have Windows 98.
However, I advise to configure the updates to notify you in case of new updates available,
without downloading them. Thus, you will be able to choose when downloading them, and to
uncheck updates you may not want, such as the Windows Genuine Advantage Notification
update, for instance :
There are often some critical flaws discovered in Microsoft Word or PowerPoint, consequently
you should keep en eye on Microsoft Office updates as well.
It goes a little beyond the “Securing Windows”, but since Microsoft Office is often part of the
default installation while buying a new computer, I think it is as important to talk about it than
Windows itself. Moreover, Microsoft Office, once installed, is integrated into the OS, and it's
vulnerabilities can hurt your whole system (e.g. Word will be the default .doc files viewer and
can be automatically triggered from your Internet browser).
While we are at it, there is a free alternative to Microsoft Office, it is OpenOffice.org. It
includes the same components corresponding to Word/Excel/PowerPoint/Access and is
compatible with Microsoft Office. While Microsoft Office 2003 Professional did suffer 15 critical
vulnerabilities in 2006 until now, OpenOffice.org 2.x only had 2 non critical ones. Of course it
could be explained because Microsoft Office is more targeted, anyone is free to interpret these
statistics.
The service names I will give are not the one you can see under the “Name” column, but the
one you can see when you double click on a service line. A new window appears, and in the
first tab there is the “Service name” line. These names are the same for everyone, it will be
easier for you to spot them no matter your Windows language.
You should be aware that some services not listed here may be vital for
your system and that disabling them may break some functionalities. Do
not disable services installed by your security applications. As I said
above, disable them one by one and not all at once, and check that
nothing is broken. If you can, make backups before applying this chapter.
Few services cannot be disabled using the services manager. For these ones, you can use the
tool Windows Worms Doors Cleaner that I have done. It is available there :
http://www.firewallleaktester.com/wwdc.htm
Disabling these services can also break few applications expecting them to be always enabled.
If it causes any problem, WWDC allows you to revert back your modification.
Also, you can set a service to Manual if you are unsure to need it or not.
Obviously do not disable your security applications, everything si unchecked on the screenshot
above, but this is just for the example. Of course the above startup item “kav” (Kaspersky
Antivirus) should stay checked.
If you do not have access to msconfig, there is a free tool called Autoruns from Sysinternals :
http://www.sysinternals.com/Utilities/Autoruns.html
Also check your startup folder, located at “Start -> All programs -> startup”.
Having the bare minimum starting up, and only the needed services, decrease dramatically
your exposure to network and local threats, without talking about the advantage of having
more resources available (CPU and memory).
and add a DWORD value :“Levels” (right click on the right pane, select “New”, then
“DWORD”). Set it's hexadecimal value to 20000 (should appear as 0x20000).
From now on, every time the restricted application will run, either ran manually or
automatically, it will not have the administrator privileges.
Be aware that you may have to revert it's rights to “Unrestricted” in order to update your
application.
Then, and only then, you may think to add security software
Too often, people loads an incredible list of security software without knowing how they work,
how they interact each others, without configuring them, and keeps being infected.
Theoretically, if your computer is well configured and locked, and that you are practising safe
hex (safe habits), you should not need any applications to secure your system. That shows
how important it is to configure your system first. I do not advise to follow this way
nevertheless, as unknown exploits could past your defence anyway. A layered approach is
always safer (securing Windows + adding security software). However, it's pointless to install
an incredible load of security software.
Security must be based on strong foundations, your OS, but also your knowledge of it, and
your safe habits. Then, you can improve it by adding, for instance, one antivirus and one
personal firewall. If you wish to learn or want more control you may think about HIPS software
(Host Intrusion Prevention System). However keep in mind that it comes afterwards. Trying to
build a building by beginning from the roof, without any foundations, will result in the
inevitable outcome of a collapse.