Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Local W2K Workstation Registry Changes

Posted on 2003-11-10
3
Medium Priority
?
362 Views
Last Modified: 2013-12-04
Off the top of anyones head, is there any blatant registry changes that need to be made at the local workstation in the registry.  I have already changed the Hash value for Local login to only keep up with 1 instead of 10.  I am really looking for the biggies here.  

There is probably going to be numerous suggestions, so points will be split according to severity.

Thanks
0
Comment
Question by:neowolf219
  • 2
3 Comments
 
LVL 5

Accepted Solution

by:
juliancrawford earned 2000 total points
ID: 9720995
Most of them are intended to defend against Denial of Service attacks, while the others help prevent such things as the enumeration of accounts by unauthenticated users.
Under HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Services add or modify the following values:
Key: Tcpip\Parameters
Value: SynAttackProtect
Value Type: REG_DWORD
Parameter: 2
Key: Tcpip\Parameters
Value: TcpMaxHalfOpen
Value Type: REG_DWORD
Parameter: 100
Key: Tcpip\Parameters
Value: TcpMaxHalfOpenRetried
Value Type: REG_DWORD
Parameter: 80
Key: Tcpip\Parameters
Value: EnablePMTUDiscovery
Value Type: REG_DWORD
Parameter: 0
Key: Tcpip\Parameters
Value: EnableDeadGWDetect
Value Type: REG_DWORD
Parameter: 0
Key: Tcpip\Parameters
Value: KeepAliveTime
Value Type: REG_DWORD
Parameter: 300000
Key: Tcpip\Parameters
Value: EnableICMPRedirect
Value Type: REG_DWORD
Parameter: 0
Key: Tcpip\Parameters\Interfaces\
Value: PerformRouterDiscovery
Value Type: REG_DWORD
Parameter: 0
Key: Netbt\Parameters
Value: NoNameReleaseOnDemand
Value Type: REG_DWORD
Parameter: 1
Under HKEY_LOCAL_MACHINE \SYSTEM \CurrentControlSet \Control add or modify the following value:
Key: Lsa
Value: RestrictAnonymous
Value Type: REG_DWORD
Parameter: 1
another neat trick is changing the file association for the .REG extension to something like NOTEPAD.EXE. This will prevent malicious web sites from adding registry keys without your knowledge.
0
 
LVL 3

Author Comment

by:neowolf219
ID: 9722234
juliancrawford,

Thank, that's what I need.  Do you have any links that could maybe tell me a bit more about what each one of the Value Type and Parameters are and how they effect the workstation.  I'll wait for your reply, and if it is sufficient I'll reward you all the points (barring no one else chimes in)
0
 
LVL 5

Expert Comment

by:juliancrawford
ID: 9725458
Here are a few links I use that covers some registry settings - but I think your after more detail - I would do a google search on individual keys and you should get more detailed info.

http://www.windowsecurity.com/articles/Securing_the_Windows_2000_Registry.html
http://www.astalavista.com/library/hardening/windows2000/hardenwin2kinstall.shtml
http://www.sans.org/rr/papers/66/180.pdf
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Loops Section Overview
Whether it be Exchange Server Crash Issues, Dirty Shutdown Errors or Failed to mount error, Stellar Phoenix Mailbox Exchange Recovery has always got your back. With the help of its easy to understand user interface and 3 simple steps recovery proced…
Suggested Courses
Course of the Month7 days, 17 hours left to enroll

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question