-1 said:
Thanks Andrew....I've got auditing enabled. It's quite an eye opener to
see all the events that take place in the background. I see that no one
has tried my user id to log onto the pc, but there is an anonymous logon
that did concern me. Have you seen this before (listed below). This is
the only anon logon, but there are network, local and system events in the
audit.
There are lots of connections via advapi. A search for this says it is a
Yes. Windows NT (inluding under this heading NT, 2000, XP, Server 2003 and
Vista) is designed to be a platform for distributed processing. Unlike the
classical single-user, non-networked Windows 3.1 PC, or a minicomputer from
the 1980s, machines running current versions of Windows communicate with
other Windows machines, and with other network devices (such as UPnP
routers), all the time. This is normal behaviour; it's what makes Windows
good as a connected, network-aware platform. The downside is that a
security-conscious user will want to know what all these mysterious packets
are, flying across their network.
There are 2 ways to tackle this problem:
1) for the IT specialist working in a corporate IT department, Microsoft now
documents most of the "phone home" and peer-to-peer protocols. You can track
down details via the TechNet Security portal:
http://www.microsoft.com/technet/security/default.mspx
The "Windows Vista Security Guide" contains nerly everything you would want
to know about securing Vista:
http://www.microsoft.com/downloads/...ED-7F35-4E72-BFB5-B84A526C1565&displaylang=en
However, keeping up-to-date with network security is almost a full-time job.
And security poorly executed, can be as bad or worse than no security at
all. So ...
2) for the home user, and/or folks who are not full-time CISSP-certified
network engineers, you can "outsource" all the complexity of security to
trusted experts. For Windows, the best tool here is the Microsoft Baseline
Security Analyser:
http://www.microsoft.com/technet/security/tools/mbsahome.mspx
MBSA is a free download. MBSA Version 2.1 is Vista-compatible. MBSA looks
over the configuration of your PC and highlights possible security
vulnerabilities. It does this using an XML config file which is regularly
updated by Microsoft. So as new vulnerabilities are discovered "in the
wild", MBSA becomes aware of them, and will check for these new
vulnerabilities on your PC.
MBSA is closley allied to Shavlik NetChk (actually, Microsoft OEM'ed a
version of NetChk from Shavlik, to create MBSA). You can get a free verison
of the Shavlik tool, which is similar to MBSA but analyses more products; or
you can purchase the full Shavlik NetChk tool, which would give you an
industrial strenth security analysis of your network (see
http://www.shavlik.com/products/netchk-limited.aspx). The free NetChk
Limited is suitable for home users; the full NetChk would probably be
extreme overkill.
The other tools you need to run on a regular basis are an antivirus (which
you already have) and a spyware tool, such as Windows Defender or Lavasoft
Ad-aware. Some anti-virus products have anti-spyware ability built-in - I'm
not sure about McAfee, maybe it does.
If you :
- run MBSA or an equivalant tool regularly, eg every week or month.
- keep your antivirus software current, and download the signature updates
reularly eg weekly;
- run a an antispyware tool such as Defender or Ad-aware;
.... then you can have a high degree of confidence you are protected against
most vulnerabilities, without making it a full-time job for yourself.
Regarding the specific Event 540 - yes, this looks like some Windows service
communicating via a Named Pipe, or similar inter-process communication.
People sometimes advise that you can totally disable anonymous logon, to
prevent these events. That's true, but this advice is usually not based on
any real, practical experience. It can cause many things to suddenly stop
working on your network. Unlike Windows NT 4.0, etc, Windows Vista is
"secure by default": by and large you do not need to tweak a large number of
settings to make an out-of-the-box installation of Vista, secure; it already
*is* secure! The main thing you need to tweak is selective, controlled
weakening of security, to allow file-and-print sharing etc.
I was also wondering if you have any documentation on setting up Remote
Desktop via VPN? Although the pc that I remote into is in a secure
location and I have no worries, you can't be so sure about the network
where I use my laptop from which I start the remote desktop. I take it a
VPN connection would secure me against any potential sniffers on the
network.
Yes, a VPN will provide an encrypted tunnel between the two end-points;
secured by SSL, TLS or similar high-grade encryption. So there is little
opportunity for man-in-the-middle attacks. A VPN is at a lower level than
application layer connections like RDP - you can think of the VPN as a
highly secure "virtual" network cable, which you run from your laptop to the
destination network. If you made a VPN connection to your home LAN, you
could then run normal network operations over the network - Remote Desktop,
File Sharing , Printing etc, just as if it was on your local network (a bit
slower, of course). Windows has a built-in software VPN capability. Many
routers also offer VPN facilities. You'd use one or the other, not both.
VPNs is a huge topic ... I don't really have any good, specific references
for you, apart from a generic Google search:
http://support.microsoft.com/kb/929490
http://windowshelp.microsoft.com/Windows/en-US/Help/8bcd8c4c-7c00-451b-91db-465cfd7484a51033.mspx
http://windowshelp.microsoft.com/Windows/en-US/Help/f22a374f-929e-43bf-9583-de62942490e81033.mspx
If you need more information (quite likely) I'd suggest you start a new
thread in this newsgroup. Probably plenty other folks here have practical
advice on VPNs and Vista, and will be happy to contribute.
Hope it helps!