Posts

HP Workstation Restoration Process

Image
HP workstation restore Procedure To  restore  a  HP workstation,  we require  HP Restore Plus, Windows 7 Recovery  media which consists of  3 DVDs . This restoration DVD is for HP workstations of following series: ·        HP Z400 Workstation ·        HP Z600 Workstation ·        HP Z800 Workstation Note: Take a backup before doing this restoration process , all the content in the hard disk will be formatted. Insert the HP System Recovery Disc in your CD/DVD drive and restart your computer. Press any key on your keyboard when you see the message "Press any key to boot from CD or DVD" The recovery disk will run and display the recovery interface after a few minutes. Click "System recovery" and then "Next." On some recovery disks, "System recovery" is found after clicking "Advanced options." Click...

Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness

Vulnerability: Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness Risk Level = Medium Remediation: To configure Network Level Authentication for a connection 1. On the RD Session Host server, open Remote Desktop Session Host Configuration. To open Remote Desktop Session Host Configuration, click Start, point to Administrative Tools, point to Remote Desktop Services, and then click Remote Desktop Session Host Configuration. 2. Under Connections, right-click the name of the connection, and then click Properties. 3. On the General tab, select the Allow connections only from computers running Remote Desktop with Network Level Authentication check box.

SMB Signing Disabled Vulnerability

Vulnerability: SMB Signing Disabled Risk Level = Medium Remediation : Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options > Configure the following security policy settings as follows: o Disable Microsoft Network Client: Digitally Sign Communications (Always). o Disable Microsoft Network Server: Digitally Sign Communications (Always). o Enable Microsoft Network Client: Digitally Sign Communications (If Server Agrees). o Enable Microsoft Network Server: Digitally Sign Communications (If Client Agrees).

Terminal Services Encryption Level is not FIPS-140 Compliant Vulnerability

Vulnerability: Terminal Services Encryption Level is not FIPS-140 Compliant Risk Level = Medium Remediation: FIPS Use FIPS compliant algorithms for encryption, hashing, and signing Group Policy setting. This Group Policy setting is located in Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options and can be configured by using either the Local Group Policy Editor or the Group Policy Management Console (GPMC).

SSL 64-bit Block Size Cipher Suites Supported (SWEET32) Vulnerability

Vulnerability: SSL 64-bit Block Size Cipher Suites Supported (SWEET32) Risk Level = Medium Remediation: Browse to Computer\windows settings\Security settings\local policies\security options. System Cryptography: Use FIPS Algorithms - select Enabled 1. Browse to Computer\Adminstrative templates\WindowsComponents\Remote Desktop Services\Remote Desktop Session Host\Security Require use of specific security layer for remote rdp connections – Choose TLS 1.0 Only

Terminal Services Doesn't Use Network Level Authentication (NLA) Only

Vulnerability: Terminal Services Doesn't Use Network Level Authentication (NLA) Only Risk Level: Medium Remediation : To configure Network Level Authentication for a connection 1. On the RD Session Host server, open Remote Desktop Session Host Configuration. To open Remote Desktop Session Host Configuration, click Start, point to Administrative Tools, point to Remote Desktop Services, and then click Remote Desktop Session Host Configuration. 2. Under Connections, right-click the name of the connection, and then click Properties. 3. On the General tab, select the Allow connections only from computers running Remote Desktop with Network Level Authentication check box.

Terminal Services Encryption Level Vulnerability

Vulnerability: Terminal Services Encryption Level is Medium or Low Risk Level = Medium Remediation: Set Encryption Level to High Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security and can be configured by using either the Local Group Policy Editor or the Group Policy Management Console (GPMC) FIPS Use FIPS compliant algorithms for encryption, hashing, and signing Group Policy setting. This Group Policy setting is located in Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options and can be configured by using either the Local Group Policy Editor or the Group Policy Management Console (GPMC).