Windows XP Service Pack 2
Download
Report
Transcript Windows XP Service Pack 2
Windows XP Service Pack 2
Alex Balcanquall
Senior Consultant
Microsoft Services Organisation
Agenda for Workshop
Introduction
Protection Technologies
Network
Web & Email
Memory Protection
Manageability
But that’s not all…
Deployment & Troubleshooting
Round-up
Exploit Timeline
exploit
patch code
Why does this
gap exist?
Days between patch and exploit
331
Days From Patch to Exploit
180
151
25
Nimda
SQL
Slammer
Welchia/
Nachi
Blaster
The average is now nine days
for a patch to be reverseengineered
As this cycle keeps getting
shorter, patching is a less
effective defense in large
organizations
Goals of XP SP2
Network
Help protect the system from directed
attacks from the network
Email/Web
Enable safer Internet experience for
most common Internet tasks
Memory
Provide system-level protection for
the base operating system
Maintenance
Ensure that when updates are necessary,
they are easier to deploy quickly
Windows Firewall
Goal in XP SP2
Network (1)
Provide better protection from network attacks
Provide administration tools suitable for the enterprise
Changes in XP SP2
Email & Web
Windows Firewall on by default
Boot time protection
Multiple configuration mechanisms
Better user interface
Boot time protection
Multiple profile support
Restrict anonymous connections to DCOM/RPC interfaces
Memory
Impact
Maintenance
Applications that initiate outbound connections will work out of the box
Only applications that accept unsolicited inbound communications will
be affected by the firewall
Firewall should be deployed in all organisations
Develop organisation wide firewall exceptions & deploy as needed
Consider IPSEC bypass for administrative tasks
Windows Firewall
Windows Firewall Group Policy
DCOM / RPC
Goal in XP SP2
Network (2)
Reduce DCOM / RPC attack surface exposed on the network
Changes in XP SP2
Email & Web
Require authentication on default interfaces
Enable ability to restrict RPC interfaces to local machine only
Granular configuration of launch permissions for DCOM
Moved most RPCSS code into reduced privilege process
Disable RPC over UDP by default
Impact
Memory
Maintenance
•Application using anonymous authentication will break
•Significantly reduces ability of unauthenticated processes or users to
attack RPC
•May require applications and COM components to be recoded.
Email Attachments
Goal in XP SP2
Network
Consistent system-provided mechanism for applications to determine
unsafe attachments
Consistent user experience for attachment “trust” decisions
Changes in XP SP2
Email & Web (1)
Memory
Create new public API for handling safe attachments (Attachment
Execution Services)
Default to not trust unsafe attachments
Outlook Express, Windows Messenger, Internet Explorer changed to
use new API
Open / execute attachments with least privilege possible
Safer message “preview”
Impact
Maintenance
Select applications that use the new API for better user experience,
and better determination of safe content
Applications which depend on email attachments may be impacted
Web Browsing
Goal in XP SP2
Network
Ensure a safer web browsing experience
Changes in XP SP2
Email & Web (2)
Memory
Locking down local machine and local intranet zones
Improved notifications for running or installing applications and
ActiveX Controls
Pop-Up Blocker for Internet Explorer
New Internet Explorer add-on manager
Limit UI spoofing
Change to IE zones
Improved download and security related dialog boxes
Impact
Maintenance
Check for Web application compatibility with newer, safer browsing
defaults
Line of Buisness applications that use pop-ups may need to change
or be added to exception list
Pop-up Blocker
Download Prompts Old vs. New
Data Execution Protection (NX)
Goal in XP SP2
Network
Reduce exposure of common buffer overruns
Changes in XP SP2
Email & Web
Memory
Leverage hardware support in 64-bit and newer 32-bit processors to
only permit execution of code in memory regions specifically marked as
execute
Binaries Compiled with /GS Flag (Not Dependent on DEP)
Reduces exploitability of buffer overruns
Enabled by default on all capable machines
for Windows binaries
Application Compatibility Toolkit setting to exclude incompatible
applications
Impact
Maintenance
System runs in PAE mode. All drivers and application will need to be
compatible with PAE
Currently needs 64bit Extended Systems (e.g. Intel Itanium Family,
AMD Opteron, AMD Athlon 64)
DEP End-user Experience
Application termination dialogs
DEP End-user Experience
Configuration
experience
Accessible through
System Properties
control panel
Manageability
Goal
Network
Reduce management overhead of securing Windows XP
What we’re doing
Email & Web
Memory
Windows Security Center
Anti-Virus Checking
Firewall
Automatic Updates
Automatic Update enhancements
Centralised & granular management of the Windows Firewall
New Wireless LAN client
Bluetooth update
SmartKey Wireless Setup
Impact
Use group policy or any software distribution mechanism to easily
configure firewall
Maintenance
Internet Explorer Add-on Manager
But that’s not all….
Tablet PC NEW V2 “Lonestar”.
In Place Tablet Input Panel (TIP)& Handwriting to text
on the fly
Better office 2003 + OneNote integration
Windows Media 9 Series
Bluetooth Update
Movie Maker 2.1
New Wireless LAN Client
Direct X9.0b
XP SP2 Deployment
Planning and Testing
Why Plan & Test?
New security features will make the system
secure but may break some applications
In common test scenarios expect >=90% of
applications to work
In RC1 these issues have been found to break
down as follows:
30% Firewall
22% DEP / PAE
14% IE
8% DCOM / RPC
6% RTF Converters
NB These figures are for consumer and corporate scenarios & fixes will be
incorporated in the final XP SP2 Release to mitigate many scenarios
Deployment Planning
Review XP SP 2 Changes Document
Test XP SP 2 on limited ‘real systems’
Deploy with firewall on
Determine commonly needed open ports
Deploy settings with AD, INF files, WMI, Unattend.txt
Deploy with XP SP2 DCOM and IE defaults
Use custom OU if you have Active Directory
Don’t forget to test all Intranet applications
Deploy to test community to catch final 5% of
issues
START TESTING NOW!
Troubleshooting 32-Bit Applications
1.
Test application on XP SP1
2.
If 64bit Extended use Application Compatibility
Toolkit to disable DEP on a per app basis
3.
Disable Firewall
NOT RECOMMENDED FOR PRODUCTION MACHINES (deploy
exceptions and keep firewall enabled)
Disable DCOM / RPC authentication
4.
NOT RECOMMENDED FOR PRODUCTION MACHINES
5.
Ask software vendor for any needed updates or
patches
6.
Consider risks of disabling protection vs.
selection of alternate application
Troubleshooting Web Applications
Test on XP SP1
Add trusted intranet applications to trusted sites
list
Sign all custom Active X objects
Review application to remove all cross zone
scripting
Disable new IE protection measures to verify
which protection is stopping application
1.
2.
3.
4.
5.
6.
NOT RECOMMENDED FOR PRODUCTION MACHINES
Consider re-writing application vs. risk of
disabling new protection mechanisms
Other troubleshooting tools
Application Compatibility Toolkit
V3 Now
V4 End of 2004 - Dedicated to SP2 features etc.
NB New ‘shims’ like the NX can be used with V3
toolkit
Reporting RC 1 Bugs
NEW desktop icon in RC1
Click on the “Report a XP SP2 Bug”
Corporate Error Reporting
If you have a Premier Agreement and Enterprise Agreement
talk to your TAM about CER
Round-up
XP SP2 has additional protection for:
Network
Email
Web Browsing
Memory Protection (64 bit only)
XP SP2 Includes tools for improved
manageability
Adequate testing is key to successful deployment
of XP SP2
Aim to deploy with Firewall Turned On
Attend Infosec patch management session /
review Microsoft recommendation on patching
Further Information
XP SP2
http://www.microsoft.com/technet/prodtechnol
/winxppro/maintain/winxpsp2.mspx
General Security:
http://www.microsoft.com/security
Windows Application Compatibility Toolkit:
http://www.microsoft.com/windows/appexperience/
© 2004 Microsoft Corporation. All rights reserved.
This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.