Skip to content Skip to site navigation

SNRT Security Settings

Overview

The Stanford Network Registration Tool (SNRT) ensures that your computer is up-to-date and secure before you can be assigned a Stanford network address.

Version

The Windows configuration set version number is: 1.2.

The Macintosh configuration set version number is: N/A.

Microsoft Windows settings details

1. File system settings

1.1 Disable ADODB.Stream (Min OS: Windows 2000)

An ADO stream represents a file in memory. The stream object contains several methods for reading and writing binary files and text files. When this by-design functionality is combinnedd with known security vulnerabilities in Microsoft Internet Explorer, an Internet Web site could possibly execute scripts from the Local Machine zone. Using the ADODB Stream is not safe and shall be disabled.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{00000566-0000-0010-8000-00AA006D2EA4}

Registry Item: Compatibility Flags

Compliant Values: 1024

1.2 Disable ADODB.Stream (Min OS: Windows 2000) (x64)

An ADO stream represents a file in memory. The stream object contains several methods for reading and writing binary files and text files. When this by-design functionality is combinnedd with known security vulnerabilities in Microsoft Internet Explorer, an Internet Web site could possibly execute scripts from the Local Machine zone. Using the ADODB Stream is not safe and shall be disabled.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{00000566-0000-0010-8000-00AA006D2EA4}

Registry Item: Compatibility Flags

Compliant Values: 1024

2. Network security settings

2.1 Alternate gateway detection disabled (Min OS: Windows 2000)

This setting specifies whether Windows shall automatically detect and use an alternate gateway in the event of transmitting a segment several times without receiving a response. This is a denial of service attack vulnerability. For more info

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: EnableDeadGWDetect

Compliant Values: 0

2.2 Blank passwords allowed for console logon only (Min OS: Windows 2000)

This setting controls whether or not local accounts with blank passwords can log on from the network. After this setting is applied, local accounts with blank passwords cannot be used to connect to the machine from across the network, via Windows Networking or Terminal Services.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Control\Lsa

Registry Item: limitblankpassworduse

Compliant Values: 1

2.3 DoS attack settings (Min OS: Windows 2000)

Denial of Service attacks are network attacks aimed at making a computer or a particular network-based service unavailable to users. These configuration settings can be used to improve Windows' ability to defend against such attacks. 

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: EnableICMPRedirect

Compliant Values: 0

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: KeepAliveTime

Compliant Values: 300000

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: PerformRouterDiscovery

Compliant Values: 0

2.4 IP source routing disabled (Min OS: Windows 2000)

The IP stack on any host (router or not) will drop packets with the source route option set if DisableIPSourceRouting is turned on. In most cases you do not want a source-routed packet to hit your computer.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: DisableIPSourceRouting

Compliant Values: 2

2.5 No name release on demand (Min OS: Windows 2000)

The NetBIOS over TCP/IP (NBT) protocols are, by design, unauthenticated and therefore vulnerable to spoofing. A malicious user could possibly misuse the unauthenticated nature of the protocol to send a name-conflict datagram to a target computer to cause it to relinquish its name and stop responding to queries. 

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: NoNameReleaseOnDemand

Compliant Values: 1

2.6 Path MTU discovery enabled (Min OS: Windows 2000)

Enabling the setting causes TCP to attempt to discover the Maximum Transmission Unit (MTU or largest packet size) over the path to a remote host. By discovering the path MTU and limiting TCP segments to this size, TCP can eliminate fragmentation at routers along the path that connect networks with different MTUs. This setting can improve network connectivity performance. 

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: EnablePMTUDiscovery

Compliant Values: 1

2.7 Protect against SYN flood attacks (Min OS: Windows 2000)

Windows includes protection that allows it to detect and adjust when the system is being targeted with a SYN flood attack (a type of denial of service attack that takes advantage of incomplete TCP handshake requests).

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: SynAttackProtect

Compliant Values: 1

2.8 TcpMaxHalfOpen configured (Min OS: Windows 2000)

SYN attack protection involves reducing the number of retransmissions for the SYN-ACKs, which reduces the amount of time that resources have to remain allocated. The allocation of route cache entry resources is delayed until a connection is made. If synattackprotect = 1, then the connection indication to AFD is delayed until the three-way handshake is completed. Also note that the actions taken by the protection mechanism only occur if TcpMaxHalfOpen and TcpMaxHalfOpenRetried settings are exceeded. 

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: TcpMaxHalfOpen

Compliant Values: 100

2.9 TcpMaxHalfOpenRetried configured (Min OS: Windows 2000)

SYN attack protection involves reducing the number of re-transmissions for the SYN-ACKs, which reduces the amount of time that resources have to remain allocated. The allocation of route cache entry resources is delayed until a connection is made. If synattackprotect = 1, then the connection indication to AFD is delayed until the three-way handshake is completed. Also note that the actions taken by the protection mechanism only occur if TcpMaxHalfOpen and TcpMaxHalfOpenRetried settings are exceeded. 

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

Registry Item: TcpMaxHalfOpenRetried

Compliant Values: 80

3. System settings

3.1 AEDebug disabled (Min OS: Windows 2000)

This setting is intended to allow an administrator to specify a remote debugger that will be invoked in the event of a system crash. The debugger runs in a highly privileged state and, unless specifically required by the user, shall be disabled.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SOFTWARE\Microsoft\Windows NT\CurrentVersion\AEDebug

Registry Item: Auto

Compliant Values: 0

3.2 AEDebug disabled (Min OS: Windows 2000) (x64)

This setting is intended to allow an administrator to specify a remote debugger that will be invoked in the event of a system crash. The debugger runs in a highly privileged state and, unless specifically required by the user, shall be disabled.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SOFTWARE\Microsoft\Windows NT\CurrentVersion\AEDebug

Registry Item: Auto

Compliant Values: 0

3.3 Automatic Update enabled and run daily (Min OS: Windows 2000) (x64)

Enables Windows Automatic Update, so that critical security patches may be automatically acquired from the Windows Update service.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU

Registry Item: NoAutoUpdate

Compliant Values: 0

3.4 Automatic Update enabled and run daily (Min OS: Windows 2000)

Enables Windows Automatic Update, so that critical security patches may be automatically acquired from the Windows Update service.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU

Registry Item: NoAutoUpdate

Compliant Values: 0

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update

Registry Item: ScheduledInstallDay

Compliant Values: 0

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update

Registry Item: ScheduledInstallDay

Compliant Values: 0

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update

Registry Item: AUOptions

Compliant Values: 4

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update

Registry Item: AUOptions

Compliant Values: 4

3.5 DLL search order optimized (Min OS: Windows 2000)

This setting controls the order in which directories are searched for DLL (Dynamic Link Library) files. It ensures that a local DLL is used when a program is being run over the network, and it resolves issues where incompatible system DLL files are being loaded first.

Setting properties:

Registry change

Registry Hive: HKEY_LOCAL_MACHINE

Registry Key: SYSTEM\CurrentControlSet\Control\Session Manager

Registry Item: SafeDllSearchMode

Compliant Values: 1

Last modified February 1, 2018