#Security

Описание к видео #Security

Urgent advice needed to disable 3DES, RC4 and TLS1 on Exchange Server.
How to disable RC4 and 3DES on Windows Server
How to disable 3DES and RC4 on Windows Server 2003
Disable Weak Ciphers (RC4 & TripleDES) Windows Server 2008
Disable Weak Ciphers (RC4 & TripleDES) Windows Server 2012
Disable Weak Ciphers (RC4 & TripleDES) Windows Server 2012R
Disable Weak Ciphers (RC4 & TripleDES) Windows Server 2016
Disable Weak Ciphers (RC4 & TripleDES) Windows Server 2019
Disable Weak Ciphers (RC4 & TripleDES) Windows Server 2022
Disable Weak Ciphers (RC4 & TripleDES) Using GPO

How to Disable Weak Ciphers in Dell Security Management Server and Virtual Server / Dell Data Protection Enterprise Edition and Virtual Edition

Dell Security Management Server
Disable RC4/DES/3DES cipher suites in Windows using registry, GPO, or local security settings.

You can do this using GPO or Local security policy under Computer configuration Administrative Templates Network SSL Configuration Settings SSL Cipher Suite Order.

Set this policy to enable. Each cipher suite should be separated with a comma. Remove as needed based on the list below.

To disable based on registry, reference this article:

https://support.microsoft.com/en-us/k...

Remediate SWEET32 — Disable TLS_RSA_WITH_3DES_EDE_CBC_SHA For Windows Server 2012 R2

This Video is specific to the issues around 3DES and SWEET32 which is CVE-2016-2183.

This attack leverages birthday attack probability theory to abuse the higher number of collisions. As noted in the NVD:
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode

Security Audit Findings
The below are some examples of what may be provided by the security auditor. The exact text and description will depend on the security scan tool.

SSL Medium Strength Cipher Suites Supported (SWEET32)
Medium Strength Ciphers (64-bit and 112-bit key, or 3DES)
Reconfigure the affected application if possible to avoid use of medium strength ciphers.

Windows Server 2012 R2 Remediation
Docs outlines all of the relevant information for channel protocols and algorithms.

Protocols, cipher suites and hashing algorithms and the negotiation order to use
For the purpose of this blogpost, I’ll stick with the following protocols, cipher suites and hashing algorithms, in the following negotiation order:

How to disable weak protocols
As the systems in scope may or may not be of Active Directory Domain Services, may or may not run Server Core and may or may not allow downloading 3rd party tools, but in all cases you can disable weak protocols using Windows PowerShell with the following scripts:

Note:
As SSL v2 is disabled and removed from Windows Server 2016, and up, and SSL v3 is disabled by default in Windows Server 2016, and up, these protocols do not need to be disabled on Windows Server 2016, and newer versions of Windows Server.

Note:
The Disabled By Default registry value doesn't mean that the protocol is disabled by default. It means the protocol isn’t advertised as available by default during negotiations, but is available if specifically requested.

Note:
The registry changes are step 2 of two steps to harden protocols, cipher suites and hashing algorithms of the Hybrid Identity implementation. Make sure to Enforce Azure AD Connect to use TLS 1.2 only on the Windows Servers running Azure AD Connect, before testing.

Concluding
Get rid of old protocols, cipher suites and hashing algorithms in your Hybrid Identity implementation, so they cannot be used to negotiate the security of the connections.
#knowhow #channel #itsupport #informationtechnology #informationsecurity #cybersecurity #technology #techsupport #technical #technicalissue #technicalissues #windows #windows #system #microsoft #sysprep #msexcel #google #aws #amazing #windows11newupdate #windows10 #windows11 #windows7 #windowstutorials #officetraining #officetour #Top10Technologies2022 #TrendingTechnology2022 #GoogleTrends #adobe #adobeacrobat #password #protection #protect #word #msword #pdf #fast #internet #fast.com
#tutorial# computers #laptops #desktops #tablets #operatingsystems #Dell #HP #Acer #Asus #Toshiba #Lenovo #Samsung #windowsserver #activedirectory #dns #dhcp #security #securityawareness #phishing #phishingattack #windowserror #bestperformance

Комментарии

Информация по комментариям в разработке