Skip to content

Latest commit

 

History

History
122 lines (94 loc) · 13.1 KB

README.md

File metadata and controls

122 lines (94 loc) · 13.1 KB

alt text

Harden Windows Server 2022 (CIS)

This repository contains a powershell script and excel file that can be used to implement recommendations provided by the Center for Information Security (www.cisecurity.org). Both L1 and L2 configurations have been included. The script is based off the following benchmark: https://workbench.cisecurity.org/benchmarks/8932 (login required, but free)

Spreadsheet

Spreadsheet contains all CIS Recommendations without modifications. Some items require further admin setup (EG: LAPS) and have been noted.

Powershell Script

Script is provided that implements all configurations (L1 and L2). Each configuration can be easily commented out if not required. Please review the spreadsheet to see if any additional setup is required for any particular configuration.

Please note that you do NOT have to configure anything and you can simply run as is if you're just looking to quickly harden your machine. I have provided hardened defaults. However, you should at least review the compatibility assurance options to make sure you don't break anything.

Basic Configuration Variables

  • $LogonLegalNoticeMessageTitle (Optional)
  • $LogonLegalNoticeMessage (Optional)
  • $WindowsFirewallLogSize (defaults to 4gb)
  • $EventLogMaxFileSize (defaults to 4gb)
  • $WindowsDefenderLogSize (defaults to 1gb)18.3.1

Admin and Guest User Name Prefixes

  • $AdminAccountPrefix
    • This is the built-in admin account username that will be disabled after running. To randomize the username, a random number will be added to the specified prefix (EG: MyAdminPrefix1234).
    • NOTE: If you have already run the script once, it will not rename again unless you change the prefix to avoid continuously changing the admin name.
  • $GuestAccountName
    • This is the built-in guest account which will be renamed. Similarly, it will not be renamed if it has already been renamed by the script once before.

Compatibility Assurance

To reduce the risk of breaking any functionality on your server, compatibility assurance variables have been created to guide you. These options will oppose CIS settings that may affect a certain functionality. Setting the value to true will alter your policy settings to maintain compatibility.

  • $AllowRDPFromLocalAccount

    • This option enables you to remote desktop into the server using a local account. If you are using ActiveDirectory, you probably want to set this to $false. If you are not using ActiveDirectory, you will likely want this to be $true or you won't be able to RDP into the server.
  • $AllowRDPClipboard

    • This option allows you to copy/paste into a remote desktop session. Recommend to leave it $true if you need to copy/paste in an RDP session.
  • $AllowDefenderMAPS

    • This enables joining Microsoft MAPS (Spynet). CIS recommends disabling this for privacy reasons, but certain features of Microsoft Defender require this to be enabled to work. Recommend this to $true if you prefer greater AV protection. Set to $false if you prefer better privacy with the con of losing some of the cloud protection features of Defender.
  • $AllowStoringPasswordsForTasks

    • This option allows you to save passwords in the Windows Task Scheduler. If you need to run automated tasks using the Windows Task Scheduler under an account that has a password, this must be set to $true. If you use a dedicated service account to run automated tasks (NetworkService, etc), you can probably set this to $false and increase your hardening.
  • $AllowAccessToSMBWithDifferentSPN

    • This allows connecting to an SMB share using an SPN the server does not recognize. This may be common in a non-ActiveDirectory environment when the server does not know it can be accessed through alternate hostnames. Without this, you will receive access denied when attempting to connect to the server using an alternate dns name. If you only access via IP address, you can safely set this to false.
  • $DontSetEnableLUAForVeeamBackup

    • This disables the Admin Approval Mode. Mainly here because Veeam requires this setting. See https://www.veeam.com/kb4185
    • The EnableLUA hardening option causes UAC popups for every app that runs as admin, including the Sever Manager which could be quite annoying, but it does increase your hardening.
  • $DontSetTokenFilterPolicyForPSExec

    • This alters the LocalAccountTokenFilterPolicy so that PSExec can run on the machine
    • Leave this set to $false unless you use PSExec. PSExec is often times used illegitimately and leaving this enabled increases risk.

Extra Hardening Options

  • $AdditionalUsersToDenyNetworkAccess

    • By default, the script denies CIS recommend users from accessing the server over the network. If you would like to restrict even more users, you can provide them here.
  • $AdditionalUsersToDenyRemoteDesktopServiceLogon

    • Similar to the above option, deny additional users who should not be able to RDP into the server.
  • $AdditionalUsersToDenyLocalLogon

    • Similar to above, deny users who can log on locally. Good idea to include users that are used for only batch jobs who do not need to login to the machine directly.

Attack Surface Reduction Exclusions

This script enables all Attack Surface Reduction rules - even those that CIS has not included in their recommendation, yet. For example, the "Block software that does not meet a prevalence". This greatly increases the hardening of the system, but it also greatly increases the risk of false positives. Simply updating php to a new version could potentially cause a web server to no longer work due to the latest version of PHP not being known by Microsoft, yet. (This happened to me). You can specify known software here to ensure ASR does not block them. $AttackSurfaceReductionExclusions

  • Simply enter the path to a folder OR an executable to exclude from ASR detection.
  • Caution: Highly recommend you only enter folders and executables that have been installed into a path that can't be altered by a non-admin.
    • EG: C:\Program Files\Some Software"
    • If you enter a path that's easily manipulated by a user, malware could easily overwrite that executable and then bypass your ASR rules.

Add/Remove Specific CIS Configurations

If a compatibility assurance option is not available for your particular need, you can comment out any policy called by the $ExecutionList by placing a # in front of the policy option.

Run It - First Time

After configuring the above options, open an admin powershell (64-bit) window and run the script. On the first run, the script will require you to enter a new admin password. Successive runs will not require this interaction.

Run It - Recurring

The script can be run on a recurring basis. This allows you to enforce the configurations on a interval. On recurring runs, the script skips creating an admin user and does not prompt for a password. This allows it to run without any interaction. The script can be set up as a scheduled task or you can configure your RMM software to kick off the process at an interval of your choosing.

Logging

The script produces the following logs. The logs are written to the location the script is run from.

  • CommandsReport.txt - This records the output of running Windows commands to import the local security policy
  • PoliciesApplied.txt - This records the policies that were specified in the $ExecutionList
  • PolicyChangesMade.txt - This records all of the changes that the script applied. It only records what changed and not what the script was configured to change. IE: If you already had a CIS setting in place, it will not record that change - only the CIS settings this script altered.
  • PolicyResults.txt - This records the entire results of each CIS setting with each having a "Before" and "After" so that you can see how the script affected your configuration. If a setting was changed "Value changed" will be reported in the output so that you can easily search through the log to locate any settings that changed. The same changes are also reported in PolicyChangesMade.txt.

Validation

2023.03.11 The following are the results after a single run of the script in its default, untouched configuration. The results of any failures are below with notes. All other settings passed.

Audits Failed

CIS Section CIS Description Notes
2.2.21 Ensure 'Deny access to this computer from the network' to include 'Guests, Local account and member of Administrators group' (MS only) - Guests, Local account and member of Administrators group Opposed: The default configuration does not include "Local account and member of Administrators group" by default. This script was initially written for a non-domain joined computer. If you include this configuration, access to the server would be impossible over the network.
2.2.26 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS only) - Guests,Local account Opposed: By default, the compatibility assurance option $AllowRDPFromLocalAccount is set to true. This prevents this setting from being applied. In a non-domain environment, if this setting was applied, you would not be able to access the server.
2.3.10.4 Ensure 'Network access: Do not allow storage of passwords and credentials for network authentication' is set to 'Enabled' Opposed: By default, the compatibility assurance option $AllowStoringPasswordsForTasks is set to true. This allows saving passwords in a scheduled task. In a non-domain environment, access to the server's saved passwords should be restricted to a local admin account.
2.3.7.4 Configure 'Interactive logon: Message text for users attempting to log on' There is no interactive logon text set by default by the script. Set one to pass this audit.
2.3.7.5 Configure 'Interactive logon: Message title for users attempting to log on' There is no interactive logon title set by default by the script. Set one to pass this audit.
2.3.9.5 Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (MS only) - Accept if provided by client or higher Opposed: By default, the compatibility assurance option $AllowAccessToSMBWithDifferentSPN is set to true. In a non-domain environment accessing via an alternative SPN is a likely scenario.
9.3.5 Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No' Opposed: There is no other source of firewall rules on a non-domain joined server.
9.3.6 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' Opposed: There is no other source of firewall rules on a non-domain joined server.
18.2.1 Ensure LAPS AdmPwd GPO Extension / CSE is installed (MS only) As noted, LAPs can not be implemented by the script automatically, since it requires additional configuration. There are alternative solutions to LAPs, such as https://github.com/eneerge/NAble-LAPS-LocalAdmin-Password-Rotation
18.2.2 Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only) - Enabled LAPS Related
18.2.3 Ensure 'Enable Local Admin Password Management' is set to 'Enabled' (MS only) - Enabled LAPS Related
18.2.4 Ensure 'Password Settings: Password Complexity' is set to 'Enabled: Large letters + small letters + numbers + special characters' (MS only) - Enabled: Large letters + small letters + numbers + special characters LAPS Related
18.2.5 Ensure 'Password Settings: Password Length' is set to 'Enabled: 15 or more' (MS only) - Enabled: 15 or more LAPS Related
18.2.6 Ensure 'Password Settings: Password Age (Days)' is set to 'Enabled: 30 or fewer' (MS only) - Enabled: 30 or fewer LAPS Related
18.9.47.4.2 Ensure 'Join Microsoft MAPS' is set to 'Disabled' Opposed: By default, the compatibility assurance option $AllowDefenderMAPS is set to true. The script joins MAPS so that additional security features can be enabled.
18.9.65.3.3.3 Ensure 'Do not allow drive redirection' is set to 'Enabled' Opposed: By default, the compatibility assurance option $AllowRDPClipboard is set to true. This allows copying and pasting in an RDP session.
18.9.108.4.1 Ensure 'Manage preview builds' is set to 'Disabled' - ManagePreviewBuilds False positive. The setting is applied as detailed in the CIS benchmark. Additionally, the default setting in Windows has this disabled by default.
18.9.108.4.1 Ensure 'Manage preview builds' is set to 'Disabled' - ManagePreviewBuildsPolicyValue False positive. The setting is applied as detailed in the CIS benchmark. Additionally, the default setting in Windows has this disabled by default.

Notes

Windows Server on-premise machines can not currently be managed by Intune. If you have removed all Active Directory components from your environment as I have, one solution to ensure servers adhere to a baseline is to run a script to apply all of the configurations.

Credits

The prelimb of this script was Windows Server 2019 CIS script that I originally downloaded from @viniciusmiguel repository at https://github.com/viniciusmiguel . The original script is no longer available.