[![AppVeyor Build Status](https://ci.appveyor.com/api/projects/status/github/plus3it/ash-windows-formula?branch=master&svg=true)](https://ci.appveyor.com/project/plus3it/ash-windows-formula)
# ash-windows-formula
Automated System Hardening - Windows (*ash-windows*) is a Salt Formula for
applying a security baseline to a Windows system. The *ash-windows* security
baselines are developed from guidance provided by the OS vendor and guidance
derived from [Security Control Automated Protocol (SCAP) content][2] based on
[DISA Secure Technical Implementation Guides (STIGs)][4]. [SCAP][1] is a
program managed by the [National Institute of Standards and Technology
(NIST)][0].
## Supported Windows and Internet Explorer Versions
- Microsoft Windows Server 2008 R2
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2016
- Microsoft Windows 8.1
- Microsoft Windows 10 (SCM Baseline only for now, until DISA STIG is release)
- Microsoft Internet Explorer 8
- Microsoft Internet Explorer 9
- Microsoft Internet Explorer 10
- Microsoft Internet Explorer 11
## Available Baselines
### ash-windows.scm
The **Microsoft SCM Baseline** (`ash-windows.scm`) is based on guidance
provided by Microsoft through the [Microsoft Security Compliance Manager
(SCM)][3]. This baseline includes the following steps:
- Install the [Maximum Segment Size (MSS)][5] extensions for the local group
policy editor
- Install the [Pass the Hash (PtH)][6] extensions for the local group
policy editor
- Apply the OS security policies from the Microsoft SCM baseline
- Apply the IE security policies from the Microsoft SCM baseline
- Apply the audit policies from the Microsoft SCM baseline
### ash-windows.stig
The **DISA STIG Baseline** (`ash-windows.stig`) is derived from a SCAP scan
based on the [DISA STIG][4] benchmark. This baseline includes the following
steps:
- Apply the Microsoft SCM baseline (includes everything listed in
[ash-windows.scm](#ash-windowsscm))
- Apply the OS security policies from the DISA STIG baseline
- The settings configured by the baseline are available from the DISA STIG
website
- Apply the IE security policies from the DISA STIG baseline
- Apply the audit policies from the DISA STIG baseline
### ash-windows.delta
The **Delta baseline** (`ash-windows.delta`) is used both to enforce
additional security settings, or to loosen them where they interfere with
operation of the system. For example, the Microsoft SCM policy will prevent
local accounts from logging on remotely, including the local administrator.
When a system is joined to a domain, this isn't a problem as domain accounts
would still be able to login. However, on a system that is not (or not yet)
joined to a domain, or in environments where there is no local console access
(such as many cloud infrastructures), this setting effectively bricks the
system. As this formula is intended to support both domain-joined and
non-domain-joined systems, as well as infrastructures of all types, the delta
policy loosens this security setting. In a domain, it would be recommended to
use group policy to re-apply this setting.
The **Delta** policy is also used to address inconsistencies across baseline
versions and between different OS versions. For example, the DISA STIG for
Windows 2008 R2 has a requirement to change the name of the local
administrator account. For whatever reason, this requirement is not present in
the STIG for Windows 2012 R2. For the sake of operational consistency, the
**Delta** policy modifies the name of the local administrator account for all
OS versions.
This baseline is not included by any other states. It must be applied using
targeting via top.sls, orchestrate, or an external utility. Below are all the
configuration tasks of the **Delta** policy:
- Rename local guest account to `xGuest`
- Rename local administrator account to `xAdministrator`
- Remove `NT Authority\Local Account` from the deny network logon right and
the deny remote interactive logon right; the **Delta** baseline settings,
listed below, deny only the Guest account:
- `SeDenyRemoteInteractiveLogonRight` = `*S-1-5-32-546`
- `SeDenyNetworkLogonRight` = `*S-1-5-32-546`
- Allow users to ignore certificate errors in IE:
- `HKLM\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\PreventIgnoreCertErrors` = `0`
### ash-windows.custom
The **Custom Baseline** (`ash-windows.custom`) is designed to allow the user to
define and apply their own baseline policy or policies to a system. This can
also be used to override a policy from another baseline. For example, the
`ash-windows.stig` baseline could be applied to a system first, then the
`ash-windows.custom` policy could be applied to change a specific setting from
the DISA STIG that interferred with the purpose of the system.
This baseline works by reading policies from both pillar and grains using the
key `ash-windows:lookup:custom_policies`. If the same policy setting is
defined in both pillar and grains, the policy in grains takes precedence (as
grains are considered more "local"). However, if the pillar policy includes
the flag `no_override: True`, then the pillar policy is always enforced. One
use case for this feature is to allow a central team managing the salt master
to determine whether specific policy settings should never be overridden by a
local administrator.
This baseline is not included by any other states. It must be applied using
targeting via top.sls, orchestrate, or an external utility. See the
[Configuration](#Configuration) section for examples of how to define custom
policies for use with the Custom Baseline.
## Configuration
The *ash-windows* formula supports configuration via pillar. The `role` and
`custom_policies` settings may alternatively be set via grains. All settings
must be namespaced under the `ash-windows:lookup` key. The available settings
include:
- `apply_lgpo_source`: URL to the [Apply_LGPO_Delta][7] utility. This utility
is used to apply policies as Local Group Policy Objects. Defaults to:
- `https://s3.amazonaws.com/watchmaker/repo/microsoft/lgpo/Apply_LGPO_Delta.exe`
- `apply_lgpo_source_hash`: URL to a file containing the hash of the
Apply_LGPO_Delta utility. Defaults to:
- `https://s3.amazonaws.com/watchmaker/repo/microsoft/lgpo/Apply_LGPO_Delta.exe.SHA512`
- `apply_lgpo_filename`: Full path on the local file system (including the
filename) where the Apply_LGPO_Delta utility will be saved. Defaults to:
- `C:\Windows\System32\Apply_LGPO_Delta.exe`
- `logdir`: Path on the local filesystem where the formula will store output
of any command line [tools](#Tools) that apply baseline settings. Defaults to:
- `C:\Ash\logs`
- `role`: Sets the role-type of the server. This setting may be configured via
the pillar or grain system. The grain value will take precedence over the
pillar value. The `role` value may be one of:
- `MemberServer` - this is the default for a Server OS
- `DomainController`
- `Workstation` - this is the default for a Desktop OS
- `custom_policies`: A list of policy dictionaries. This key is used by the
[Custom Baseline](#ash-windowscustom) to apply a user-specified baseline to a
system. Each policy dictionary may either be a 'regpol' policy or a 'secedit'
policy. 'regpol' policies are used to manage registry entries. 'secedit'
policies are used to manage [Privilege Rights][9] and [Systems Access][10]
settings.
Below is an example pillar structure:
```
ash-windows:
lookup:
apply_lgpo_source: https://s3.amazonaws.com/watchmaker/repo/microsoft/lgpo/Apply_LGPO_Delta.exe
apply_lgpo_source_hash: https://s3.amazonaws.com/watchmaker/repo/microsoft/lgpo/Apply_LGPO_Delta.exe.SHA512
apply_lgpo_filename: C:\Windows\System32\Apply_LGPO_Delta.exe
logdir: C:\Ash\logs
role: MemberServer
custom_policies:
- policy_type: regpol
key: HKLM\Software\Salt\Foo
value: 1
vtype: REG_DWORD
- policy_type: regpo
没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
资源分类:Python库 所属语言:Python 资源全名:watchmaker-0.16.7.tar.gz 资源来源:官方 安装方法:https://lanzao.blog.csdn.net/article/details/101784059
资源推荐
资源详情
资源评论
收起资源包目录
Python库 | watchmaker-0.16.7.tar.gz (1980个子文件)
MSS-legacy.adml 16KB
EMET.adml 13KB
NetBanner.adml 4KB
PtH.adml 3KB
EMET.admx 32KB
MSS-legacy.admx 18KB
NetBanner.admx 7KB
PtH.admx 3KB
retry.bat 532B
RemoteAccess_d9d222a9-756c-41f8-b23a-2a596093216b_en-US_HelpContent.cab 6.89MB
DnsServer_46f598e5-9907-42b2-afbb-68e5f7e34604_en-US_HelpContent.cab 6.71MB
Storage_41486f7d-842f-40f1-ace4-8405f9c2ed9b_en-US_HelpContent.cab 5.04MB
NetworkController_05718206-c147-47b6-83f5-92f52af61c6e_en-US_HelpContent.cab 2.56MB
NetAdapter_1042b422-63a8-4016-a6d6-293e19e8f8a6_en-US_HelpContent.cab 1.14MB
NetTCPIP_2d0b6c7f-16a0-4185-843f-ae47b6db4551_en-US_HelpContent.cab 1.13MB
RemoteDesktop_81d5df9c-8fe3-46d7-a9bf-2aedd60d1843_en-US_HelpContent.cab 719KB
Microsoft.PowerShell.Core_00000000-0000-0000-0000-000000000000_en-US_HelpContent.cab 595KB
NFS_108ae179-3094-4223-91e4-b9099069017a_en-US_HelpContent.cab 507KB
SmbShare_3af1699d-cc54-4e54-81cf-28d2df5cce0a_en-US_HelpContent.cab 481KB
NetSecurity_4b26ff51-7aee-4731-9cf7-508b82532cbf_en-US_HelpContent.cab 476KB
ActiveDirectory_43c15630-959c-49e4-a977-758c5cc93408_en-US_HelpContent.cab 364KB
FailoverClusters_cc3e946b-9141-48c2-95d8-d9e56594416a_en-US_HelpContent.cab 350KB
MsDtc_52923875-f2e3-4ad2-8e0c-96c7b10e2e3d_en-US_HelpContent.cab 282KB
PrintManagement_8466ae97-2c03-4385-a501-7e74cf6bb1df_en-US_HelpContent.cab 254KB
VpnClient_3389cc73-daa3-4d25-bd50-b1730925d2df_en-US_HelpContent.cab 246KB
Microsoft.PowerShell.Utility_1da87e53-152b-403e-98dc-74d7b4d63d59_en-US_HelpContent.cab 198KB
NetEventPacketCapture_7e984f2f-35da-48a2-a3c1-40ce59930a7c_en-US_HelpContent.cab 178KB
Microsoft.PowerShell.Management_eefcb906-b326-4e99-9f54-8b4bb6ef3c6d_en-US_HelpContent.cab 154KB
BranchCache_d57aee1e-6fe7-4bbc-8c57-8675a3a83e0d_en-US_HelpContent.cab 128KB
Defender_c46be3dc-30a9-452f-a5fd-4bf9ca87a854_en-US_HelpContent.cab 127KB
Hyper-V_af4bddd0-8583-4ff2-84b2-a33f5c8de8a7_en-US_HelpContent.cab 126KB
DnsClient_5696d5ef-fa2d-4997-94f1-0bc13daa2ac5_en-US_HelpContent.cab 126KB
UserAccessLogging_e507509a-eb81-4af2-a141-b50cb24000f0_en-US_HelpContent.cab 123KB
NetWNV_b47767ec-a4d6-488d-915d-5070791ac6d4_en-US_HelpContent.cab 115KB
DFSN_d94cf4d4-f7f8-4967-8d7c-1c9ffef8da12_en-US_HelpContent.cab 111KB
ScheduledTasks_5378ee8e-e349-49bb-83b9-f3d9c396c0a6_en-US_HelpContent.cab 101KB
DhcpServer_90eaa9df-133a-450c-8728-91055cd946a1_en-US_HelpContent.cab 89KB
StorageReplica_f04004d8-804d-4427-8311-92fa44bce42c_en-US_HelpContent.cab 85KB
IpamServer_69775f93-9317-4234-a558-13b6655fc41b_en-US_HelpContent.cab 84KB
Dism_389c464d-8b8d-48e9-aafe-6d8a590d6798_en-US_HelpContent.cab 80KB
PSDesiredStateConfiguration_ced422f3-86a4-4841-9f80-a713eac9522a_en-US_HelpContent.cab 63KB
AppvClient_596d7b43-928b-44d4-89e7-17d34740ecc2_en-US_HelpContent.cab 57KB
Wdac_78a7a38c-a446-43fe-b643-9abacf843112_en-US_HelpContent.cab 56KB
DFSR_c3f81f5f-6555-43cb-802a-aef7aa5a11cb_en-US_HelpContent.cab 56KB
GroupPolicy_03e49e3a-be77-4422-9d97-8fe355c2284c_en-US_HelpContent.cab 55KB
iSCSI_53e1c251-4283-4b07-ab02-fc492c7ab8c5_en-US_HelpContent.cab 52KB
NetworkSwitchManager_53b60d16-69ad-4453-bf41-83efa5ac35b8_en-US_HelpContent.cab 51KB
PSScheduledJob_50cdb55f-5ab7-489f-9e94-4ec21ff51e59_en-US_HelpContent.cab 48KB
EventTracingManagement_80cb11cf-96b5-4d48-84bd-f85f65de78ae_en-US_HelpContent.cab 46KB
IscsiTarget_a1da990a-4dc2-4f7e-beb4-046a89b9d473_en-US_HelpContent.cab 41KB
IISAdministration_07640789-476a-4713-a091-f5b365129c32_en-US_HelpContent.cab 40KB
Microsoft.WSMan.Management_766204a6-330e-4263-a7ab-46c87afc366c_en-US_HelpContent.cab 40KB
CimCmdlets_fb6cc51d-c096-4b38-b78d-0fed6277096a_en-US_HelpContent.cab 40KB
WDS_95b28fd4-92c3-41e8-b338-2df356ba9eca_en-US_HelpContent.cab 38KB
HgsClient_de3e9b0f-0845-4b05-8cb1-65669405130c_en-US_HelpContent.cab 36KB
Microsoft.PowerShell.Security_a94c8c7e-9810-47c0-b8af-65089c13a35a_en-US_HelpContent.cab 34KB
WindowsServerBackup_d27a5d7a-8b1d-4b0a-809d-65ef33ee2f2d_en-US_HelpContent.cab 33KB
PKI_cf094c6b-63d1-4dda-bf70-15a602c4eb2b_en-US_HelpContent.cab 33KB
StorageQoS_18cd46da-e6a6-47f6-84b3-d4edd6e3eccf_en-US_HelpContent.cab 32KB
ClusterAwareUpdating_4e804861-1dce-46c1-868d-c8f2ab9d220a_en-US_HelpContent.cab 32KB
PowerShellGet_1d73a601-4a6c-43c5-ba3f-619b18bbb404_en-US_HelpContent.cab 31KB
WebAdministration_13c15630-959c-49e4-a977-758c5cc93408_en-US_HelpContent.cab 30KB
NetworkTransition_eff9ccf9-53ed-423d-b0da-23e6772aacaa_en-US_HelpContent.cab 29KB
PSWorkflow_3b6cc51d-c096-4b38-b78d-0fed6277096a_en-US_HelpContent.cab 26KB
ServerManager_d8e0cae9-8e9b-45bc-bfed-0aad50938af0_en-US_HelpContent.cab 25KB
NetworkLoadBalancingClusters_52832d3a-17d8-48ff-a5bc-f5078492ecbe_en-US_HelpContent.cab 25KB
PcsvDevice_576ff287-7d01-46a3-8a88-94df7581a2b0_en-US_HelpContent.cab 24KB
Microsoft.PowerShell.Diagnostics_ca046f10-ca64-4740-8ff9-2565dba61a4f_en-US_HelpContent.cab 23KB
BitsTransfer_8fa5064b-8479-4c5c-86ea-0d311fe48875_en-US_HelpContent.cab 23KB
PackageManagement_4ae9fd46-338a-459c-8186-07f910774cb8_en-US_HelpContent.cab 22KB
Appx_aeef2bef-eba9-4a1d-a3d2-d0b52df76deb_en-US_HelpContent.cab 21KB
NetQos_743692b7-a227-4389-b082-2b47de1d0d2d_en-US_HelpContent.cab 20KB
AppLocker_9dafd409-67de-4108-8ee9-73cd61f5b7bf_en-US_HelpContent.cab 20KB
UpdateServices_1c1d7545-e04a-4b31-9024-f0357c3b935f_en-US_HelpContent.cab 18KB
ConfigCI_28c9a37e-c849-4370-b672-e5563447b0e1_en-US_HelpContent.cab 18KB
BitLocker_0ff02bb8-300a-4262-ac08-e06dd810f1b6_en-US_HelpContent.cab 18KB
UEV_d22e34c9-0a99-47d7-98f3-c0570257deb6_en-US_HelpContent.cab 18KB
NetLbfo_80cf4c6d-30b7-4b0f-a035-dbb23a65ef1d_en-US_HelpContent.cab 18KB
ADRMSAdmin_beb3db13-eed6-4f7b-8420-079e395b58f9_en-US_HelpContent.cab 17KB
DirectAccessClientComponents_244f8fc0-a410-4b87-8237-7496f557e6d4_en-US_HelpContent.cab 17KB
ServerManagerTasks_bf4656ac-2663-4636-8b38-7d78fd587d0b_en-US_HelpContent.cab 15KB
MSMQ_33ca09b1-a7fe-42e0-8aa1-e7203746ca94_en-US_HelpContent.cab 15KB
NetworkControllerDiagnostics_d6df305a-d5c8-4ad6-9161-5ee6ba44b501_en-US_HelpContent.cab 14KB
NetNat_e5439f56-42aa-4fdf-8705-50c782a89345_en-US_HelpContent.cab 14KB
TrustedPlatformModule_17fc1f02-cff3-45fb-ac4f-126594c70b1e_en-US_HelpContent.cab 13KB
SoftwareInventoryLogging_421a5b89-0f16-4df7-b607-fffd66107510_en-US_HelpContent.cab 13KB
DcbQos_b57d41f8-8b6b-4012-912f-b08109101281_en-US_HelpContent.cab 13KB
PSDesiredStateConfiguration_94b905ff-74b5-437e-89ed-7df44386533c_en-US_HelpContent.cab 13KB
International_561544e6-3a83-4d24-b140-78ad771eaf10_en-US_HelpContent.cab 13KB
PnpDevice_ad34bc8b-1cf8-47d8-bd82-f681c5358e1c_en-US_HelpContent.cab 13KB
MPIO_2fbffabe-343d-4db8-ad9e-a8943f50d096_en-US_HelpContent.cab 12KB
PowerShellWebAccess_3fed3f16-4eb3-40fb-8797-e71483b3d832_en-US_HelpContent.cab 12KB
SecureBoot_a5bd98e1-e44c-44fb-b88f-5af9bde66fdf_en-US_HelpContent.cab 12KB
BestPractices_5551ea86-919d-499b-948f-87305e4f2344_en-US_HelpContent.cab 11KB
TLS_1e28c697-2370-42f2-ace1-5ac8777f8053_en-US_HelpContent.cab 11KB
HgsDiagnostics_0d5d372a-6b2c-4c48-9151-1dead3b52fa7_en-US_HelpContent.cab 11KB
StartLayout_c361139b-c043-44a9-b94f-513fbaf1af0d_en-US_HelpContent.cab 11KB
NetworkConnectivityStatus_6c9a449b-b0c6-4386-b139-ee0a55638803_en-US_HelpContent.cab 11KB
NetSwitchTeam_e83097b1-4470-4f37-8ce3-a6b0ac5ed8f5_en-US_HelpContent.cab 10KB
Nps_5ee6f0a2-bfc8-4824-a1e2-f974d39ca886_en-US_HelpContent.cab 10KB
共 1980 条
- 1
- 2
- 3
- 4
- 5
- 6
- 20
资源评论
挣扎的蓝藻
- 粉丝: 14w+
- 资源: 15万+
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 基于Vue+NodeJS的学生社团管理系统(前后端代码)
- 基于SSM+JSP的快递管理系统(前后端代码)
- 全球火点数据-modis-2015-2023年
- YOLOv8完整网络结构图详细visio
- LCD1602电子时钟程序
- 西北太平洋热带气旋【灾害风险统计】及【登陆我国次数评估】数据集-1980-2023
- 全球干旱数据集【自校准帕尔默干旱程度指数scPDSI】-190101-202312-0.5x0.5
- 基于Python实现的VAE(变分自编码器)训练算法源代码+使用说明
- 全球干旱数据集【标准化降水蒸发指数SPEI-12】-190101-202312-0.5x0.5
- C语言小游戏-五子棋-详细代码可运行
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功