We are by no means masters of security for our SMB and SME clients. Since we have to wear many hats we sometimes need to bring folks in that can help us to fine tune the security layers in our client’s networks.
Layering is important.
Some examples follow.
- Windows Firewall is managed by Group Policy
- All Profiles: ON
- All Profiles: Block ON
- All Profiles: Logging ON
- All Profiles: Pop-Up for new services ON
- DOMAIN Profile: Custom Inbound rule sets for required services beyond the default.
- Private and Public Profile: INBOUND BLOCK ALL
- If data sharing is required then a small and inexpensive NAS should be set up
Mail Sanitation and Continuity
ExchangeDefender (xD), for us, is one of the principle ways we keep bad stuff outside of the network.
Why allow it to hit the edge in the first place? Plus, it eliminates SMTP Auth attacks as the WAN IP is not published via MX among other attacks. Interested? Ping us and we’ll set you up.
A solid edge device, we use SonicWALL, with a BLOCK ALWAYS rule for ALL outbound traffic is a key element. Rule sets for outbound traffic are very specific and tailored to a client’s needs.
- DNS queries to non on-premises DNS servers are blocked. All DNS queries must go through the on-premises DCs.
- On-Premises edge only or DCs can have the DNS Forwarders set to DNS filtering services.
- SMTP traffic outbound only from the on-premises Exchange server. Or, local copiers/MFPs to ISP SMTP server IP only
- Inbound is HTTPS via ANY
- SMTP via xD subnets only.
- RDP on ANY port should NEVER be published to the Internet.
- RD Gateway with Network Level Authentication is a must today.
- Any exceptions require a static IP on the source end to allow inbound rule filtering based on IP.
- Look up TSGrinder if not sure why…
Third Tier’s Ransomware Protection Kit is another layer of protection. Everything is contained in this kit to deploy a very tight layer of protection against today’s Ransomware.
Microsoft Office Group Policy Security
Office Group Policy structures with Macros disabled by default, non-local sources blocked, and other security settings for Office files provide another layer.
- This one gives users grief because they need a few extra steps to get to the documents.
- We’ve started requesting that clients have a PDF only policy on their Jobs listing pages and such.
A User Focused Effort
IMNSHO, A/V at the endpoint has become virtually useless today. Things seem to be a lot more targeted on the virus side with ransomware taking over as the big cash cow. We still install A/V on all endpoints. :)
What we are saying, is that the principle portion of the risk of infection comes via the user.
A well trained user means the risk of infection drops substantially.
A user’s browsing habits and link clicking are the two key areas of training we focus on. Sites visited are another.
We suggest to clients that a company policy of allowing browsing for business related tasks only while connected to the company’s network resources. This policy can further reduce exposure.
Part of our training regimen is a somewhat regular e-mail from an outside account to users to test them and challenge them is a good idea every once in a while.
- Link hovering to discover the true destination
- Attached Word doc with *BUZZ WRONG* when opened
- Just because it SAYS it’s “FROM” someone we know doesn’t mean it is!
Oh, and protect the backup loop (blog post on closing the backup loop)!
BTW, we just heard about another NAS based backup that was ransomware encrypted as a result of the destination folder being open to users.
Anyone, and I mean ANYONE, that has a backup structure, whether NAS or HDD based, that allows users and admins access outside of the backup software username and password setup needs to close that loop NOW. Not on the To Do List, not for tomorrow, not next week, but NOW.
Just in case: Close that Backup Loop Now.
Hyper-V Standalone Setups
One more point of order: In standalone Hyper-V settings leave the host in workgroup mode.
No one on the network should have the admin username and password to that host. No. One. It should be documented somewhere but not public knowledge.
Please feel free to add the layers you use to this post via comments.
Thanks for reading!
Microsoft High Availability MVP
Co-Author: SBS 2008 Blueprint Book