Quantcast
Channel: Security forum
Viewing all 12072 articles
Browse latest View live

Unlock Admin accounts by normal use account

$
0
0

Hi All,

We have a very distributed setup where in each region we have atleast one Admin account. We have a Global Service Desk which can Unlock,Reset the password for normal users. But they are unable to reset or unlock the password for Admin account.

So I would like to know is it can be possible. If Global desk can reset the password or Unlock the account for normal users can they do it for Admin account as well.


Thanks HA


Move a certificate from current user to local computer store in 2012

$
0
0

Hi, 

How can I move a certificate from current user to local computer store in Windows 2012 when the certificate's private key is marked as not exportable ?

Drag and drop is possible in Windows 2008 R2 when I open both current user and local computer stores in the same mmc. But in Windows 2012 it is not possible. 

Thanks...

Wrong CA Store for Root Certificate

$
0
0

Hello

i've setup a PKI with offline Root and online intermediate under Windows 2012.

I deployed certificates to Active directory using

dspublish /RootCA

dspublish /NTauth and SubCA for intermediate

When i activate Auto enrollment or MMC Enrollment for Windows 7 Client the two certificates appear under Intermediate Certificate Authorities but the root certificate is not listed under the Root Certificate Authorities store. Client receives User Cert but because of the missing Root Cert it is untrusted.

I tried to put the root cert in my Autoenroll GPO but this has no effect. Pkiview Status is OK for my Root Cert

I already followed this Troubleshooting Guide without any result

http://blogs.technet.com/b/askds/archive/2007/11/06/how-to-troubleshoot-certificate-enrollment-in-the-mmc-certificate-snap-in.aspx

I could provide link with my certs if this would help?

I've seen one question where this appeared due to wrong signature, but I'm using sha1 so this should not be an issue.


Windows Defender trying to scan network files, failing with Security Event ID 4625

$
0
0
I have a Hyper-V host and guest both running Server 2008 R2. The host is stand-alone (not domain-joined); the guest is a domain controller.

I recently changed the guest to do a Full Scan instead of just a Quick Scan.

Now I get over 1000 security errors on the _host_ at the same time that the _guest_ is completing its scan. The errors indicate that the guest's machine account is trying and failing to connect to the host.

I had the same problem with Security Essentials last year, as documented here:

http://answers.microsoft.com/en-us/protect/forum/mse-protect_start/getting-4625-security-errors-on-server-after/628c5c6b-8bc7-4af5-ac69-aca114b821ac

I was able to solve that by adding the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Antimalware\Scan\DisableScanningNetworkFiles = 1

I've tried what I thought would be the analogous key for Defender:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Scan\DisableScanningNetworkFiles = 1

but the 4625 errors continue.

How can I stop Windows Defender from scanning network files on a Full Scan?

Should the OCSP Responder service be running HTTP (80) or HTTPS (443) ?

$
0
0

Hi all,

I'm finishing my High Available setup of OCSP Response servers (Array).
I'm at the point that I have to configure my AIA (Authority Information Access) url.
I've noticed that all configurations in the help files and manuals online at technet are mentioning something like http://yourserver.contoso.com/ocsp, using http but never https. Nowhere it's mentioned that it would be a best practice to use https (instead of http).

I've been doing some research on this, thinking of scenario's where our HA OCSP Responder (only to check our own client certificates) would actually be running on a public IP, or if there would be "man in the middle" attack scenario's to take in consideration. I've found one scenario in which one can tamper with the response message:http://www.thoughtcrime.org/papers/ocsp-attack.pdf

But as an "official" or good answer from an OCSP responder is signed by the CA (responder), I think it's not needed to add SSL in the traffic, as it would not add additional security at all (no benifit).

Note that our OCSP servers would never be running on public address, it would be offered using a reverse proxy + web application firewall. But in large networks like in my company, even for the internal network https is considered as the standard.

Please share your thoughts on this topic :)

Kind Regards,
David

Windows Firewall - COM+ Network Access (DCOM-In)

$
0
0

Hi,

By default the "COM+ Network Access (DCOM-In)" inbound firewall rule from Windows Firewall is enabled. This enables you to enumerate through the DCE services running on port 135. Because this could be a security risk, we are looking for a way to filter all incoming traffic on port 135. Is there a way to this with Windows Firewall?

Thanks,

Ronald

Changing validity period on CA and custom certificate templates

$
0
0

We want to change the validity period on our CA.  We have a root CA that stays turned off.  We have a subordinate CA that issues all the certificates.  We want to issue longer certificates.  So after reading about this we would need to change the subordinate CA's default setting using the following command.

certutil -getreg ca\ValidityPeriod
  (This returns the current value of 2)
certutil -getreg ca\ValidityPeriodUnits
  (This returns the current value of Years)

certutil -setreg ca\validityperiodunits 5
  (This changes the default setting to 5, or something else, and restart certificate services to take effect.

Does the above change affect anything? Like any already issued certificates?

If the above does not affect already issued certificates, we then need to change some certificate's template validity period.  

Example is that before the above change, we created a custom template with a validity date of 2 years and issued some certificates (those had a 2 year expiration).
If we change this template from 2 to 5 for validity period, does this cause already issued certificates from this template to stop working or do they continue to work and any newly issued certificate would get the new validity period?



AD Certificate Service Question

$
0
0

Good day All

I am trying to install the Certificate Services on one of my 2012 DC's in order to create a cert for import into my Sonicwall 3500 NSA firewall. The purpose is to connect my LDAP service to the firewall so that when Remote users use thew VPN they can authenticate to the AD. And I KNOW NOTHING about configuring it, especially when I get to the"Private key Cryptography" option. Can anyone give me a hand in configuring this role properly so That I can get a 'root" cert for my firewall


Scott Cummins


Kerberos not working for some AD users

$
0
0

We have a list of user accounts used for automated testing. These accounts will not authenticate to any web site with kerberos. Any other user account works without issue.Each set if users are in different OU's. If a non working user is moved to the default user OU, still does not work. All users are in one group, domain users.

Troubleshooting is done on the same machine to rule out IE and windows 7 configuration concerns.

Using klist, a pre auth ticket is generated from the attempt to access the site.

Providing username and password at the application works.

No events seen in the logs.

Request does not contain a certificate template extension or the CertificateTaemplate request attribute.

Thumbprint details

$
0
0

I'm having some trouble with our deployment of EFS. I thought I had finished setting this up and some prelim testing was successful. We did make some changes to our GPO to allow auto-enrollment only by a selected group. We didn't do anything with EFS for a while and decided to do another test. Now we're not able to decrypt one another's files.

If I look at two files I'm seeing differences in thumbprint. File A has been encrypted by Person A and they've allowed me to decrypt. File B has been encrypted by me and I've allowed Person A to decrypt. When looking at Properties -> Details I see 4 different cert thumbprints. File A has Person A with cert thumbprint beginning 8FE8 and me 3D4F. File B has Person A with cert thumbprint 8FF4 and me D373. What's going on here?

Windows Server 2008R2 / 2013 (Shares and Permissions)

$
0
0

I have Windows Server 2013 setup for File Sharing.  I created & Shared the folder.  I set the security and share permissions of the folder with Administrators and a group call Internal Workers.   I do not have access from accessing the share from another computer.  If I added Users to the Security and Share permissions, it works.  WHY???? 

Thank you

Ryan

How can I install Certificate Authority on a Windows 2003 server running service pack 2 ?

$
0
0
and when it prompts to put in the Service Pack 2 CD-Rom to install the certsrv.exe which is not on the CD?

Audit failure: Event ID 4771

$
0
0

One of my user keep getting locked out and when I ran the Account Lockout Status (LockoutStatus.exe), I could not find any information related to the lockout.

Log Name:      Security

Source:        Microsoft-Windows-Security-Auditing

Date:          8/15/2013 3:06:07 AM

Event ID:      4771

Task Category: Kerberos Authentication Service

Level:         Information

Keywords:      Audit Failure

User:          N/A

Computer:      DC.domain.org

Description:

Kerberos pre-authentication failed.

Account Information:

               Security ID:                        CBPP\john

               Account Name:                 john

Service Information:

               Service Name:                   krbtgt/domain

Network Information:

               Client Address:                  ::ffff:10.0.0.33

               Client Port:                         50332

Additional Information:

               Ticket Options:                  0x40810010

               Failure Code:                     0x12

               Pre-Authentication Type:               0

Certificate Information:

               Certificate Issuer Name:               

               Certificate Serial Number:            

               Certificate Thumbprint:                 

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options and failure codes are defined in RFC 4120.

If the ticket was malformed or damaged during transit and could not be decrypted, then many fields in this event might not be present.

Event Xml:

<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">

  <System>

    <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" />

    <EventID>4771</EventID>

    <Version>0</Version>

    <Level>0</Level>

    <Task>14339</Task>

    <Opcode>0</Opcode>

    <Keywords>0x8010000000000000</Keywords>

    <TimeCreated SystemTime="2013-08-15T07:06:07.328366400Z" />

    <EventRecordID>34664985</EventRecordID>

    <Correlation />

    <Execution ProcessID="500" ThreadID="1204" />

    <Channel>Security</Channel>

    <Computer>CBPP-DC.cbpp.org</Computer>

    <Security />

  </System>

  <EventData>

    <Data Name="TargetUserName">johnson</Data>

    <Data Name="TargetSid">S-1-5-21-1292428093-1383384898-1417001333-1138</Data>

    <Data Name="ServiceName">krbtgt/cbpp</Data>

    <Data Name="TicketOptions">0x40810010</Data>

    <Data Name="Status">0x12</Data>

    <Data Name="PreAuthType">0</Data>

    <Data Name="IpAddress">::ffff:10.0.0.33</Data>

    <Data Name="IpPort">50332</Data>

    <Data Name="CertIssuerName">

    </Data>

    <Data Name="CertSerialNumber">

    </Data>

    <Data Name="CertThumbprint">

    </Data>

  </EventData>

</Event>

Windows 200 SMB Inbound connections on TCP port 445

$
0
0
Hi guys:) Have issue with SMB on Windows 7 Ultimate (x64). Someone trying to establish connection to TCP 445 port from diffrent ips. My firewall (nis) is blocking but want to stop the service. The logs are:
"Default Block Microsoft Windows 2000 SMB\" blocked (1.175.35.142, Port (445) Inbound TCP connection
Default Block Microsoft Windows 2000 SMB\" blocked (1.175.35.142, Port (445)  Inbound TCP connection
Default Block Microsoft Windows 2000 SMB\" blocked (128.73.148.155, Port (445) Inbound TCP connection
Default Block Microsoft Windows 2000 SMB\" blocked (123.216.223.155, Port (445) Inbound TCP connection - Process name is System or Svchost.exe - diffrent every time
I have tons of these , with different ips. Every two tries the ip is change. I scanned my pc with 2 antivirus software no infection. I stop in services: service - Server, SSPD Discovery, Net BIOS Helper,WMP Sharing, the logs keep coming. Also uninstall printer and filesharing in local area connection properties, also disable Net BIOS over TCP/IP on all my network adapters. Using some crappy router from my isp that i have no admin rights to it (dhcp server). I also blocked TCP & UDP 445 ports in windows firewall but the logs keep coming. I aslo updated my Ethernet card drivers. Now the service process "Server" is turned on/ NetBIOS over TCP/IP is disabled but logs are keep coming. I don't think that it is good idea to stop "Server" because "Computer Browser: also will be stop. Just want to stop these logs. When i type netstat -an the port 445 is not in the list but the logs keep coming.
Please can you tell me what i must exact turn off to stop receiving this logs. 

bat file help

$
0
0
I'm trying to write a bat file that will enable a windows 7 home user to access files they have on the domain (without upgrading them to pro) I'd like a bat file to prompt them for username and password and then theyll be able to access the network folders they need.

Certificate Autoenrollment Errors 17 & 13 The parameter is incorrect

$
0
0

Every 8 hours my Windows 2003 Domain Controllers attempt to Auto Enroll certificates and I get the below two entries in the Application Logs:

Type: Warning

Source: AutoEnrollment

Event ID: 17

Automatic certificate enrollment for local system failed to enroll for one Domain Controller certificate from certificate authority CA.domain.com on Server (0x80070057). The parameter is incorrect.

Another certificate authority will be contacted.

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.

AND

Type: Error

Source: AutoEnrollment

Event ID: 13

Automatic certificate enrollment for local system failed to enroll for one Domain Controller certificate (0x80070057). The parameter is incorrect.

 

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.

I’ve tried adding the Domain Controllers group was added to Certsvc Service Dcom Access.

I’ve also noticed that there is a CA listed in AD that’s been decommissioned with a self-signed root certificate that is now expired.

I am far from an expert with CAs so any advice is welcome.

Stop auditing for Filtering Platform & Detailed File Share

$
0
0
I have Server 2012 DC that I noticed recently as having thousands of 5145 events being logged.  In my research this event is logged for any access to any file share and this audit is not important for our company's police

and this advanced audit item is not configured on any GPO applying to the DC

after a lot of search in the internet i found some command to stop the auditing for both Filtering Platform & File Share :

auditpol /set /subcategory:"Filtering Platform Connection" /success:disable /failure:enable
auditpol /set /subcategory:"Detailed File Share" /success:disable /failure:disable

this 2 command is work fine and all auditing for Filtering Platform & File Share are stopped (I feel good now).

but the problem is after some time one hours or more I'm not sure the auditing for Filtering Platform & File Share is return back and the thousands of 5145 events return back

so can any one help me to stop auditing for Filtering Platform & File Share.

certmgr.msc not exporting all of the selected certificates

$
0
0

Hello-

I'm experiencing a weird issue that I'm hoping someone can shed some light upon.
I have need to export all of the certificates located within the "Trusted Root Authorities" (LocalMachine\AuthRoot) store, into a single file.
I start the certmgr.msc GUI (as Administrator), select the store, "Certificates", and see that there are currently 378 entries.
I change 'focus' to the pane showing the certificate list, and hit ctrl-A to select "all" of them.  Choose the "Export" task,
and save them to a .p7b file.
Same issue happens if I select the first cert., scroll to the bottom of the list and hold shift while selecting the last cert ..instead of using ctrl-A.
All that is straight-forward and looks like it works perfectly.

However, when I process the resulting .p7b file-  only 214 certs. are exported.

When I look into my (WinXP SP3) registry, under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\
all 378 'keys' are present.

I've experienced this issue on both a WinXP SP3 system and a Win7 SP1.
I'm not sure if the problem could be registry corruption (on both systems?!), certmgr.msc itself, or a limitation of the .p7b file format?

Thanks in advance for any thoughts and/or insight into this.

Enterprise root ca migration 2008 Standard -> 2012 Standard

$
0
0

I just want to clarify a step that is listed in the AD CS Migration article.  It says if you're using the Server Manager installation of the role you need to follow these steps:

  1. Start the Certificates snap-in for the local computer account.

  2. In the console tree, double-click Certificates (Local Computer), and click Personal.

  3. On the Action menu, click All Tasks, and then click Import to open the Certificate Import Wizard. Click Next.

  4. Locate the <CAName>.p12 file created by the CA certificate and private key backup on the source CA, and click Open.

  5. Type the password, and click OK.

  6. Click Place all certificates in the following store.

  7. Verify Personal is displayed in Certificate store. If it is not, click Browse, click Personal, and click OK.

    noteNote
    If you are using a network HSM, complete steps 8 through 10 to repair the association between the imported CA certificate and the private key that is stored in the HSM.

  8. In the console tree, double-click Personal Certificates, and click the imported CA certificate.

  9. On the Action menu, click Open. Click the Details tab, copy the serial number to the Clipboard, and then click OK.

  10. Open a Command Prompt window, type certutil –repairstore My  "{Serialnumber}" and then press ENTER.

Now, do I actually need to follow this?  In the 2012 role installation you click "configure" and import the .p12 via the GUI.  Do I need to do step #10?  

Viewing all 12072 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>