Intrusion software now detects NT security holes (5/6/96)
by David Strom
There is no worse nightmare for an enterprise manager than the thought that one of his servers is
running with unsuspected security loopholes. And given the rate of growth of NT servers on
corporate networks, the NT version of Kane Security Analyst (KSA) is one way for these
managers to get some needed sleep.
KSA has long been available for the NetWare world, and the NT version is a good effort (although
there is no interoperability between the two versions). I examined a pre-release version that had
some small bugs in the report manager, but otherwise was useful.
Indeed, I was chagrined to see that my first audit was a complete failure: actually, not the audit but
my "report card." My NT server received a lousy 55% grade when its security practices were
compared to an industry standard. Why did I get such a grade? I had neglected to make use of
password expirations, account lockouts and user auditing, for example: three common practices that
help go a long way towards improving security. Without auditing turned on, for example, there is no
way to know if unauthorized users are getting access to your server. My server was an accident
waiting to happen.
The software has a simple graphical interface that will lead you through performing a security
analysis: first, you set your security practice guidelines -- or you can just use the default settings that
come with the product (which I found to be close to what I'd desire on my network). Next you run
the audit on your domain controller and or workstations -- which is an automatic data gathering
process that examines your registry and accounts, along with other data. Finally, you prepare a
series of reports that can be printed to paper or viewed on screen.
KSA's reports are clear and something you can give to your manager to motivate action. They tell
you what trusted domains are setup and which domains can't be administered but should be. Within
minutes you can determine the top ten risks of your machine and zero in on security problems. Like
the NetWare version, it shows you how many of your users have administrator equivalency rights,
what resources users with Guest accounts have access to, what services are currently running on
your server, and login violations. All of this is grist for the security mill, and should bear careful
study.
I learned a great deal about NT security, given my initial failing grade. For example, NT can
automatically log a user onto a network, storing the password in its registry in clear text. And that
Windows for Workgroups machines have logins that can be replayed by network analyzers. It
shows you the practices that you'll need if you want to obtain C2 security (a government standard)
and whether your machine follows these. Indeed, you can change its pre-set "best practices"
configuration if you so desire.
There are a few improvements I'd like to see with the product: first, it just lists whether the machine
is running Remote Access Server or FTP services. Ideally, it should identify how these services are
setup and what their weaknesses are. Getting a report exported from one machine and imported
into another is a bit cumbersome. And KSA just takes a snapshot of your security: you'll have to
rerun the analysis frequently, as there is no real-time monitoring of changes. It would be nice to have
a report that just shows the changes implemented since the last report. (You can make comparisons
for different security practices standards, but that's not the same thing.) Finally, while I understand
the need for copy protected software, I don't agree with its use here.
© Infoworld Publishing Co.