Strengthen Vista service security policy

  
        Here are some new service security enhancement strategies for Vista: 1. SCM is responsible for managing service services, which are programs managed by the Service Control Administrator (SCM), which builds a database containing all installed services while managing each one. The status of the service. Various services usually start automatically when Windows starts, which makes it easy for attackers to attack. 2. Higher privilege equals higher security risk In the previous version of the Windows operating system, most of the services were executed under the local system account with the highest privilege. This means that if the service is compromised, the attacker can cause serious damage to the system because they can manipulate almost all the data in the computer. 3. Vista and Longhorn Server use minimal permissions to perform services To reduce the risk of being attacked, the permissions that are not needed for any service are cleared. In Vista and Longhorn, many of the services that were performed using local system administrative privileges have now been run with accounts with lower privileges, such as NetworkService or LocalService, and all services are run with the least possible privileges. 4. Vista uses "quarantine" technology to protect the service isolation technology. It contains a technology called "0 session isolation", which prevents the user's application from executing in session 0 (this is the first time that Windows was created). Sessions). Only system services and other applications that are not related to the user process can be executed in this session. This prevents system services from being affected by other applications. 5. Vista generates a Security Identifier (SID) for each system service. Providing a security identity for each service allows the services to be differentiated from each other, allowing the operating system to apply the Windows Access Control mode to the service. The so-called Windows access control mode is to restrict the access rights of users and user groups to restrict different access rights for each different service. 6. In Vista, access control lists (ACLs) can be applied to services. ACLs are a set of access control entries (ACEs). Resources on the network contain a security description of the ACL. The ACL specifies which account or device can access this resource. 7. Vista Network Firewall can create a security policy for the service. This policy is associated with the SID of the service, allowing you to control how the service accesses the network, preventing it from using the network in an impermissible manner, such as sending data to the Internet. The Vista firewall is included in the service security hardening strategy. 8. Limit service functions to prevent services from modifying the registry and accessing system files. If a system service requires the above functions to function properly, it can also be set to access only specific areas of the registry or system files. It also limits the ability of the service to perform system settings changes or other features that could lead to an attack. 9. Each service is assigned a service security hardening strategy script in advance. This script specifies the things that the service can and cannot do. Based on the description of this script, SCM only provides the permissions available to these services. These operations are done in the background and do not require additional settings. 10. Service Enhancement Mechanism is not to protect system services from attacks. The security enhancement of services is provided by Windows Firewall and other protection mechanisms. The service security enhancement strategy is designed to reduce the harm caused by the service being compromised. It provides more protection for the inner layers of Vista's multi-layered security protection mechanism.
Copyright © Windows knowledge All Rights Reserved