
93
NoNameReleaseOnDemand = "MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release
requests except from WINS servers"
NtfsDisable8dot3NameCreation = "MSS: Enable the computer to stop generating 8.3 style filenames"
NoDriveTypeAutoRun = "MSS: Disable Autorun for all drives"
NoDriveTypeAutoRun0 = "Null, allow Autorun"
NoDriveTypeAutoRun1 = "255, disable Autorun for all drives"
WarningLevel = "MSS: Percentage threshold for the security event log at which the system will generate a warning"
WarningLevel0 = "50%"
WarningLevel1 = "60%"
WarningLevel2 = "70%"
WarningLevel3 = "80%"
WarningLevel4 = "90%"
ScreenSaverGracePeriod = "MSS: The time in seconds before the screen saver grace period expires (0 recommended)"
DynamicBacklogGrowthDelta = "MSS: (AFD DynamicBacklogGrowthDelta) Number of connections to create when additional
connections are necessary for Winsock applications (10 recommended)"
EnableDynamicBacklog = "MSS: (AFD EnableDynamicBacklog) Enable dynamic backlog for Winsock applications
(recommended)"
MinimumDynamicBacklog = "MSS: (AFD MinimumDynamicBacklog) Minimum number of free connections for Winsock
applications (20 recommended for systems under attack, 10 otherwise)"
MaximumDynamicBacklog = "MSS: (AFD MaximumDynamicBacklog) Maximum number of 'quasi-free' connections for
Winsock applications"
MaximumDynamicBacklog0 = "10000"
MaximumDynamicBacklog1 = "15000"
MaximumDynamicBacklog2 = "20000 (recommended)"
MaximumDynamicBacklog3 = "40000"
MaximumDynamicBacklog4 = "80000"
MaximumDynamicBacklog5 = "160000"
SafeDllSearchMode = "MSS: Enable Safe DLL search mode (recommended)"
4.
Save the file and close the text editor.
5.
Open a command prompt window and type the command
regsvr32 scecli.dll
to re-register the
SCE DLL.
6.
Subsequent launches of the SCE will display these custom registry values.
Important
: All modifications within this section apply to all three environments defined within this
guide for MSBP.
2.8.6.1
Security Consideration for Network Attacks
To help prevent denial of service (DoS) attacks, administrators should keep their computer updated
with the latest security fixes and harden the Transmission Control Protocol/Internet Protocol (TCP/IP)
protocol stack on Windows Server 2003 computer systems that are exposed to potential attackers.
The default TCP/IP stack configuration is tuned to handle standard Intranet traffic. If administrators
connect a computer directly to the Internet, Microsoft recommends that they harden the TCP/IP stack
to protect against DoS attacks. DoS attacks directed at the TCP/IP stack tend to be of two classes:
attacks that use an excessive number of system resources, for example, by opening numerous TCP
connections; or attacks that send specially crafted packets that cause the network stack or the entire
operating system to fail. These registry settings help to protect against the attacks directed at the
TCP/IP stack. DoS attacks include those that flood a Web server with communication to keep it busy,
and others that flood a remote network with an enormous amount of packets. Routers and servers
become overloaded by attempting to route or handle each packet. DoS attacks can be difficult to
defend against. To help prevent them, the TCP/IP protocol stack can be hardened. The following
registry value entries have been added to the template file in the following registry key location:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\