Implment Server Hardening Solutions Flashcards
Secure Boot BitLocker EFS Malware/Defender CredGuard DeviceGuard Security Baselines
What is Secure Boot?
SecureBoot is part of UEFI 2.3.1 that ensures a server only boots using trusted hardware.
How does Secure Boot work?
- Secure Boot checks each piece of software used in boot, including ROMs and the OS, against a database containing the signatures of well-known signatures kept in firmware.
- If the software is valid, boot proceeds.
What does Secure Boot protect against?
The execution of unsigned (malicious) code.
What are the requirements of Secure Boot?
UEFI Version 2.3.1
What is the Secure Boot boot sequence?
- PC is powered on. Signature databases are checked against the platform key.
- If the firmware is not trusted, UEFI must initiate OEM-specific recovery to restore trusted firmware.
- If a problem with the Windows Boot Manager, firmeware will boot to a copy.
3a. If this Fails - Firmware initiates firmware recovery. - Once Windows Boot Manager is running, if there are drive issues or kernel issues, WinRE is booted so the image/drivers can be recovered.
- Windows loads AntiMalware
- Windows loads other kernel drivers and initializes user mode.
What are the benefits of UEFI?
- Security: Secure Boot, Device Guard, Credential Guard, Exploit Guard, etc. all require secure boot, which requires UEFI.
- Faster Boot
- Support for larger hard drives (+2TB) and drives with more partitions.
- Support for multicast deployments
- Support for better UEFI drivers, applications, and ROMs
How does AV play into secure boot?
Antivirus is signed by MS verifying it is a trusted boot critical driver and launches early in the boot process. This ensures that no processes are able to get in the middle of AV startup and prevent AV from protecting a system early.
What versions of TPM are supported by Server 2016?
TPM 1.2 and TPM 2.0
Is TPM 2.0 backwards compatible with 1.2?
No
How do you verify whether a system has an available TPM?
- Device Manager \ Security Devices
- UEFI
Is a TPM always a physical piece of hardware?
No. Some TPMs are firmware based. Windows works with either hardware or firmware-based TPMs.
What is required before a TPM can be used?
It must be installed and provisioned.
What is required to manually provision a TPM?
Server 2016+ automatically provisions a TPM, however, if the OS is being reinstalled the TPM may need cleared before utilizing the TPM for the OS to take full advantage.
What are the advantages of TPM 2.0 over TPM 1.2?
- TPM 1.2 only supports RSA and SHA-1. TPM 2.0 supports newer algorithms (e.g. SHA-256)
- TPM 2.0 enables greater crypto agility by being more flexible with the different crypto algorithms.
- TPM 2.0 is more consistent across different implementations.
- TPM 2.0 has a default lockout configured by Windows
- TPM 1.2 always was a discrete component. TPM 2.0 can be implemented as a single package on the board and integrated into other components or run as firmware.
Can TPM 2.0 work with BIOS?
No. TPM 2.0 only supports UEFI
What different implementation options exist for TPMs?
- Discrete TPMs - Separate components on the board
- Integrated TPMs - Use dedicated hardware integrated into other hardware
- Firmware TPM - Runs in Trusted Execution Mode
NOTE: Windows is compatible with all these TPM implementations.
Which versions of Windows support TPM 2.0?
- All versions of Windows 10
- IoT Core (optional)
- Server 2016 +
What different windows features are available with TPM 2.0 over 1.2?
- Windows Defender System Guard
- AutoPilot
- SecureBIO
- DRTM
Which Windows features/components require TPM of any variety?
- Measured Boot
- BitLocker
- Drive Encryption
- Windows Defender System Guard
- Device Health Attestation
- TPM Platform Crypto Provider Key Storage Provider
- Virtual Smart Card
- AutoPilot
- SecureBIO
- DRTM
Which Windows Features/components do not require a TPM of any variety?
- Windows Defender Application Control (Device Guard)
- Credential Guard
- Windows Hello
- UEFI Secure Boot
- Certificate Storage
Which versions of Windows 10 and Server 2016 support BitLocker?
- All editions of Server 2016
- All versions excluding Windows 10 Home support BitLocker
Can you BitLocker Windows 10 Home?
No. It does not support BitLocker. It does support a stripped down version of BitLocker called “Device Encryption.”
What does BitLocker protect against?
- Lost, stolen or inappropriately decommissioned devices
- BitLocker also verifies the boot process integrity
What is required on a system for BitLocker to offer the most protection?
TPM 1.2 or later
Can BitLocker be implemented on a device without TPM 1.2 or newer?
- Yes. However, it will require either a USB key to start or resume from hibernation.
- Windows 8 and Newer may use a password to protect systems without TPMs
- Without a TPM, there are no pre-startup system integrity verification
What is BitLocker Recovery Password Viewer?
- An extension to AD that enables locating and viewing BitLocker Drive Encryption recovery passwords that have been backed up to AD
- Can be used to help recover data that is stored on a drive encrypted with BitLocker
How do you view BitLocker Recovery Passwords stored in AD?
- Right Click the computer object in AD \ Properties
- Right-Click the domain container and search for the recovery password
To view BitLocker recovery passwords, by default, what permission is required?
Domain Administrator. This can be delegated.
What tools are provided with the BitLocker Drive Encryption Tools?
- Command Line: manage-bde and repair-bde
- Powershell Cmdlets for Powershell
What is Repair-BDE used for?
Disaster recovery scenarios where a BitLocker protected drive cannot be unlocked normally using the recovery console.
What are the BitLocker hardware requirements?
- For system integrity check: Use TPM 1.2 or newer
- Without a TPM, BitLocker requires a startup key on a removable drive (e.g. USB)
- TPMs must have a TCG-compliant BIOS or UEFI (not required for non-TPM)
- BIOS must support usb mass storage, inlucidng reading small files in a pre-OS environment.
- Hard disk must be partitioned with at least 2 partitions/volumes
- OS (Boot) Drive must be NTFS
- System drive with files used to load Windows after firmware has prpared the drive. Not BitLocker protected. Must be formatted FAT32 (UEFI) or NTFS (Bios). Recommended size 350MB
- Windows should be able to create these partitions automatically.
- When installing BitLocker on a server OS use the Enhanced Storage Feature for hardware encryption drive support.
What new BitLocker features were introduced in Server 2016?
- XTS-AES Support
- Encrypt and recover device with Azure AD
- DMA Port protection
- GPO for Configuring Pre-Boot Recovery
What are the differences between different encryption version types offered by BitLocker?
- AES-128: Default
- AES-256: Same as 128 but double cipher length
- XTS-AES-128: FIPS Compliant, Incompatible with pre-Server 2016
- XTS-AES-256: Same as XTS-AES-128 but double cipher length
Why is it recommended to not use a kernel debugger while BitLocker is enabled?
- Kernel debugger may be able to access BitLocker keys and other sensitive data
- If a debugger is used, OS will automatically restart after every boot.
With Server 2008 and Windows Vista, how do you configure BitLocker if the computer already has an OS installed?
Utilize the “BitLocker Drive Preparation Tool” to configured required volumes.
What different key protectors are available with BitLocker?
- TPM
- PIN (Numeric)
- Enhanced PIN (Alphanumeric)
- Startup Key
- Recovery Password
- Recovery Key
You have deployed systems that do not have TPM 1.2 or higher and would like to secure them with BitLocker. What key protector/authentication method should be used?
Startup Key
Which BitLocker protection method provides the least amount of data protection and why? How can this be mitigated?
TPM-only. TPM-only protects against attacks to modify the early boot components. It encrypts drives, but, as in the case with a laptop, the TPM would still allow an attacker to boot the system and potentially compromise the storage within. This is mitigated by incorporating other factors to provide multi-factor access to the system.
What is the most transparent BitLocker authentication method that still offers MFA?
TPM + Network Key
To use Windows RE along with BitLocker, what must be done?
The Windows RE boot image must reside on the volume not protected by BitLocker.
Can a system be BitLocker protected before the OS install?
yes. Using WinPE a randomly generated key can be applied to the formatted volume and encrypt it prior to the Windows install.
What different encryption options are available for BitLocker?
(Hint: What portion of the drive can be encrypted)
- Used Space Only - Encrypts only used space. Useful for systems with freshly provisioned drives. Faster
- Full encryption - Encrypts entire drive. Used for repurposed drives.
Which GPO setting will ensure BitLocker data is backed up by AD?
Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ \ Choose how BitLocker protected drives can be recovered?
What data is stored for each computer object with BitLocker recovery information in AD?
- 48-digit recovery password
- Key package data. Can be used to decrypt the drive if it is severely damaged
When was FIPS support for the recovery password protector introduced?
Server 2012 R2/Windows 8.1
What is the FIPS Standard?
- US Federal Information Processing Standard (FIPS) defines security and interoperability requirements for computer systems used by the US Federal Government.
- FIPS 140 defines approved cryptographic algorithms
How did BitLocker behave before FIPS support was introduced when it was placed in FIPS mode?
- BitLocker would prevent the creation or use of recovery passwords and force users to create recovery keys
How do servers running with FIPS support behave when in FIPS mode?
- FIPS compliant recovery passwords can be created
- FIPS compliant recovery passwords can be distinguished from those created with other systems.
- FIPS compliant recovery passwords will unlock a drive and allow read/write access even while in FIPS mode
- FIPS compliant recovery passwords may be exported to and stored in AD
Can you use recovery passwords generated on FIPS mode systems from versions of Windows prior to Server 2012 R2 on servers running Server 2012 R2?
No. These are incompatible with one another
If a computer was configured with a single partition, can BitLocker still be installed and configured?
Yes. BitLocker does require at least two partitions on a drive, however, the drive can be repartitioned without using data using the Bdehdcfg tool.
What different tools can be used to turn on BitLocker Drive Encryption?
- BitLocker Control Panel
- Windows Explorer
- Manage-bde command line
- BitLocker Windows Powershell cmdlets
How do you enable BitLocker from the control panel?
Choose the Manage BitLocker option in the control panel. Select “Turn on BitLocker”
When enabling BitLocker in the control panel, which drives show up?
Only formatted drives with assigned drive letters
How do you utilize hardware encrypted drives as the boot drive with BitLocker?
- Drive must be in an uninitialized state and in the security inactive state
- System must also always boot with UEFI 2.3.1 or higher and the CSM should be disabled.
Where should a BitLocker recovery key be stored?
- Should be printed, saved on removable media, or on a network folder.
- Key cannot be stored in the root-directory of a non-removable drive on on the encrypted drive.
- Ideally the key should be stored separate from the computer.
You have a sensitive system which is being retired. You intend to reuse the hardware from this system in a new system. You need to ensure that even the deleted data is protected by BitLocker on the new system. How would you accomplish this?
Encrypt the whole drive. While encrypting only used space is faster, but in this scenario full encryption ensures even deleted files are encrypted and secured.
You have just installed BitLocker on a system and rebooted to start the initia encrypt. When you go to manage BitLocker, the only options are for the password, recovery key, or for disabling BitLocker. Why aren’t there more options?
Until BitLocker encryption is complete the options for management are limited. Wait until encryption has completed (manage-bde -status) and you will be able to do more after that.
How do you check the status of a BitLocker encryption from the command line?
CMD: manage-bde -status
PS: Get-BitLockerVolume
What unlock drive options are available for securing a data volume with BitLocker?
- Password
- Smart Card
- Automatically unlock this drive on this computer
With a BitLocker protected data volume, how does the “automatically unlock this drive on this computer” unlock option work?
The drive will be unlocked if the system drive is unlocked.
What are the requirements for storing BitLocker recovery keys in OneDrive?
- Computers cannot be domain joined
- User must be using a Microsoft account
When can you utilize BitLocker encryption from Windows Explorer?
This is available on client OSes by default and can be added to Server OSes by installing the BitLocker and Desktop Experience role.
You have an encrypted Disk you’ve swung over from and older system a new system. BitLocker says the dirve is “encrypted on write.” What does this mean?
The drive was encrypted on Windows 8 using “Used Space Only”
Does BitLocker work with cluster-aware disks?
Yes. BitLocker can protect cluster-aware disk by adding protects to the Cluster Name Object that allow the disk to properly failover and be unlocked by any member computer
Can you use a SID-based password protector to protect the OS volume?
Yes. It will require an additional protector (TPM, PIN, RecoveryKey, etc).
What happens if you take a partially encrypted drive from Windows 7 and move it to Windows 10? How will BitLocker handle it?
BitLocker in Windows 8+ will complete the encryption regardless of policy.
What are the limitations of protecting the OS volume with the BitLocker SID-based protector?
An additional protect is required and the SID-based protector does not unlock the OS in the pre-boot environment.
What is a common use case for AD-based protectors with BitLocker?
Unlocking Failover Cluster enabled volumes
What are some methods to check the status of BitLocker for a given volume?
- Control Panel
- Windows Explorer
- Manage-BDE
- WIndows Powershell (Get-BitLockerVolume)
You go into the Control Panel to check the status of the BitLocker volume. You see the status is “Waiting for Activation.” What needs done?
- BitLocker is enabled with a clear protector key and it requires further action to be fully protected.
- Add the keys via Control Panel, Manage-BDE, or WMI and it should start working.
Is decrypting a volume a volume a valid troubleshooting step?
No. Decryption should only be done at the end of a drive’s life or if there is an issue with BitLocker that prevents the volume from being encrypted or unlocked readily.
How do you mark an attribute as confidential in AD?
In the schema, modify the searchFlags on the object and enable bit 7 (128 decimal)
What are the BitLocker Recovery AD attributes?
- msTPM-OwnerInformation
- msFVE-KeyPackage
- msFVE-RecoveryPassword
- msFVE-RecoveryInformation
What does the attribute msTPM-OwnerInformation represent in AD?
This attribute contains the owner information of a computer’s TPM module. This attribute is applied to the computer object.
What does the attribute msFVE-KeyPackage represent in AD?
This attribute contains the BitLocker encryption key secured by the corresponding recovery password. This attribute is applied to the msFVE-RecoveryInformation object.
What does the attribute msFVE-RecoveryPassword represent in AD?
This attribute contains the BitLocker encryption key secured by the corresponding recovery password. This is applied to the msFVE-RecoveryInformation object.
What is the msFVE-RecoveryInformation object?
This object is created for every encrypted volume and is stored as a sub-attribute of the computer’s objec where the volume was encrypted. Contains the recovery attributes associated with a BitLocker recovery.
What permission allows a user to read a confidential attribute?
Control_Access Extended right (viewable/settiable via LDP)
Also grants permission to LAPS passwords
What permission must be granted to the BitLocker recovery information in AD to allow a non-Domain Admin to read the attributes?
- Read
- Control_access (set via LDP or script)
You receive the error “The numerical password was not added. The FIPS Group Policy setting on the compute prevents recovery password creation” when you attempt to add a recovery password a BitLocker volume. How is the error corrected?
Go into Group Policy. Modify the policy that configures “Computer Configuration \ Windows Security \ Security Settings \ Local Policies \ Security Options \ System Cryptography: Use FIPS Compliant Algorithms for encryption, hasing, and signing” and disable the setting.
Note: This error may also present as “Cannot decrypt disk. Policy requires a password which is not allowed with the current security policy about use of FIPS algorithms.”
This error may appear when a drive is encrypted and an recovery key is created but no password is created as its protector or when the recovery password is not archived in AD.
What is the difference between Symmetric and Asymmetric encryption?
Symmetric uses a single key to encrypt and decrypt.
- Often referred to as single-key, secret-key, shared-key, or private-key
- AES, DES, or 3DES are examples
Asymmetric uses two keys: one for encrypting and one for decrypting.
- Often called public key cryptography
- SSL/TLS and PGP are examples of protocols that use asymmetric keys
- Common encryption methods are Diffe-Hellman and RSA
Which version of Windows was BitLocker Drive Encryption (BDE) introduced?
Server 2008 / Windows Vista
In which version of Windows was the ability to use XTS-AES introduced into BitLocker?
Windows 10 version 1511 / Server 2016
What is required before you can enable BitLocker with TPM + Startup Key + Startup Pin?
“Require additional authentication at startup” is required via GPO. Located under “Computer Configuration \ Policies \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Operating System Drives.
What happens if you runt he command ‘manage-bde -on’ on a data drive with no other information?
This will enable BitLocker on the data drive. However, the drive will not be protected as no authenticating protector is installed. You’ll need to enable a protector after the fact to fully protect the drive. The drive is encrypted, just not protected.
You ran the command “manage-bde -on C:” what will happen after this command?
Assuming C: is the OS volume and a TPM is installed, the OS volume will be encrypted with TPM-only and no recovery key.
What command will allow you to determine the encryption status on a target system?
manage-bde -status
What command will enable BitLocker on C and utilize a USB drive (E:) as the startup key?
manage-bde -Protectors -add C: -StartupKey E:
manage-bde -on C:
What command will list the protectors configured for a volume?
manage-bde -protectors -get $VolumeLetter
How would you enable encryption on a volume without TPM available that uses password and SID-based protectors?
manage-bde -protectors -add $VolLetter -pw -sid $UserOrGroupSid
Using the command line, how would you ensure a data volume is encrypted using a password protector?
manage-bde -protectors -add -pw C:
manage-bde -on C:
How do you decrypt a BitLocker drive using the command line?
manage-bde -off C:
What Powershell cmdlet will remove an existing protector from a BitLocker volume?
Remove-BitLockerKeyProtector
What is the process to remove a BitLocker protector using Powershell?
- First identify the key protector ID
$Volume = Get-BitLockerVolume
$KeyProtectors = $Volume.KeyProtector - Identify the KeyProtectorID that needs removed and remove it.
Remove-BitLockerKeyProtector $VolumeLetter -KeyProtectorId $KeyProtectorID
How do you enable BitLocker using just a TPM protector with Powershell?
Enable-BitLocker $VolumeLetter
Which switch should be used with Enable-BitLocker to skip any hardware checks so the system doesn’t require a reboot before starting encryption?
-SkipHardwareTest
How would you enable the password/SID-based BitLocker protection using Powershell?
Enable-BitLocker $DriveLetter -AdAccountOrGroupProtector -AdAccountOrGroup $GroupOrUserOrSid
How would you check the status of a BitLocker Volume using Powershell?
Get-BitLockerVolume $VolumeLetter
How do you decrypt a BitLocker volume with Powershell?
Disable-BitLocker $VolumeLetter
What is an easy way to better ensure that ASLR (Address Space Layout Randomization) is supported by the CPU?
Select a 64-bit CPU
What versions of Windows include protections against DMA-enabled devices when the computer is locked or no one has logged in?
Windows 10 Pro, Enterprise, or Education
What different devices are vulnerable to DMA attacks?
FireWire ThunderBolt ExpressCard PCI Express PCMCIA PCI PCI-X
What are some countermeasures for DMA-Attacks?
Block DMA via Policy
WIndows 10 - Automatically blocks DMA from being installed until the computer is unlocked
“Instant Go” devices do not have DMA ports
IO-MMU prevents DMA attacks when running a Hypervisor
Is USB susceptible to DMA attacks?
No
What can prevent “cold boot” attacks?
Secure Boot
Where are TPM Settings stored in Group Policy?
Computer Configuration \ Policies \ Administrative Templates \ System \ Trusted Platform Module Services
What different TPM Settings can be set via GPO?
Turn on TPM backup to Active Directory Domain Services
Configure the list of blocked TPM commands
Configure the level of TPM owner authorization information available to the OS
Configure standard user lockout duration
Standard User individual lockout threshold
In which versions of Windows is Secure Boot supported?
Windows 8 / Server 2012 +
Which versions of Linux support Secure Boot?
Fedora 18+ openSUSE 12.3+ RHEL 7+ CentOS 7+ Unbuntu 12.04.2+
How do you enable Secure Boot for platform and BCD integrity validation?
GPO: Computer Configuration \ Policies \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Operating System Drives
- Configure “Allow Secure Boot for integrity validation”
You decide no to turn on Secure Boot-based integrity validation via GPO yet you notice it is still being used. Why is this?
By default, BitLocker will use Secure Boot-based integrity validation unless policy is set to disabled via GPO.
What generation VMs support Secure Boot?
Generation 2
How do you enable Secure Boot on a VM in Hyper-V?
VM Settings \ Security node \ select “Enable Secure Boot”
This feature is enabled by default
Can you enable TPMs on Hyper-V VMs if the hardware doesn’t have a physical TPM?
Yes. By enabling TPMs on the Hyper-V VMs without a physical TPM, you utilize a virtual TPM.
How do you gather information about the TPM from Powershell?
Get-TPM
Can MBR disks be used as boot disks with UEFI?
No. Only GPT disks are supported with UEFI.
How can you see the number of bad attempts a TPM will allow before locking someone out?
Get-TPM | Select-Object LockoutMax
Note: LockoutCount shows how many attempts have been made and LockedOUt will show if the TPM is locked out.
How do you adjust the lockout threshold on a TPM 1.2 device?
You do not, this can only be adjusted with a TPM 2.0.
How do you view if the TPM is 1.2 or 2.0?
Get-WmiObject -Class Win32_TPM -Namespace root\cimv2\Security\MicrosoftTPM | Select-Object SpecVersion
What kind of protectors may be used in BitLocker protected drives that are not OS drives?
Password
Smart Card
Automatic Unlock
How do you enable BitLocker to utilize Secure Boot for integrity validation?
GPO: Computer Configuration \ Policies \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Operating System Drives
- Enable the setting “Allow Secure Boot for integrity validation”
- Note: This feature is enabled by default. Use this policy to enforce the setting.
What is the benefit of using Secure Boot-based integrity validation?
BCD Settings can be repaired during boot without triggering a recovery event
You have a company that utilizes both Windows 8.1 and Windows 10. You have a BitLocker encrypted drive that gets moved from system to system. Which BitLocker encryption method should be used?
AES-128 or AES-256
Support for XTS-AES came later in Windows 10 and drives equipped with the newer protocols do not work on older systems.
What options are available for BitLocker in the control panel after a drive is encrypted?
Backup your recovery key Change password Remove password Add smart card Turn on auto-unlock Turn off BitLocker
Who can change the PIN for passwords for an encrypted volume?
Users have the ability to do this, however, they must first know the existing PIN.
What happens if a user enters a BitLocker PIN/Password too many times incorrectly in an attempt to reset the the PIN/Password of a BitLocker volume?
A user has five tries before BitLocker locks out the account and an administrator must reset the PIN or password.
The system can be rebooted to reset the counter.
How do you set the complexity of BitLocker PINs/Passwords?
Group Policy: Computer Configuration \ Policies \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption
Modify “Configure use of passwords for fixed drives”
What is BitLocker To Go?
Enables users to encrypt removable USB drives without requiring the device go through recovery on the other systems.
What are the requirements for BitLocker To Go?
Server 2008 R2 / Windows 7
Insert USB and configure encryption
No TPM Required
How do you control which drive encryption options are available to users for BitLocker?
Group Policy: Computer Configuration \ Policies \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption
What are some different settings that can be configured for BitLocker using Group Policy? (General, not actual settings)
- Require all removable drives to be BitLocker-protected before data can be saved to them
- Require or disallow specific methods for unlocking BitLocker-Protected Drives
- Configure methods to recover data from BitLocker-protected drives
- Configure the BitLocker recovery passwords that is stored in ADDS
- Require or disallow different types of recovery password storage or make them optional.
- Prevent BitLocker from activating if it is not able to backup keys to AD DS.
- Choose drive encryption method and cipher strength.