Microsoft Security Compliance Manager enhances desktop security

Security baselines in the free Microsoft Security Compliance Manager tool can enhance desktop security by standardizing configurations, as well as help with the IT audit process.

Microsoft Security Compliance Manager isn't a tool you hear much about, but it deserves due credit. It can boost security standardization and overall configuration management to get enterprise desktops (among other systems) under control.

Currently at version 2 -- with v2.5 in beta -- the SQL Server-driven Security Compliance Manager should be familiar to IT administrators concerned with desktop security policies and standards. The tool consists of numerous "security baselines," each of which contains the following items:

  1. Security Guide: A lengthy and detailed Word document that outlines various considerations, tips and best practices for locking down enterprise desktops.
  2. Setting Pack: A set of specific Windows settings/countermeasures that admins can enable or otherwise tweak to enhance the security of Windows desktops.

If you're setting out to harden a Windows desktop environment, it's not simply a matter of downloading the security baselines and accessing the configuration settings. You'll also need to download and install Microsoft Security Compliance Manager to access and interact with the security baselines through the interface.

The process isn't as simple as, say, downloading a checklist document of Windows-hardening best practices. I think the slight complexity is OK because admins often set aside long lists of seemingly insurmountable security recommendations or ignore them altogether.

Figure 1: Default, Microsoft-recommended and current (customized) security baselines for Windows 7. (Click here to enlarge)

The Windows 7 Security Baseline not only contains recommendations and specific settings for the general operating system, but it also provides specific controls for the various components and OS roles for BitLocker, desktop, domain, laptop and user. There are also security baselines for Windows Vista and Windows XP. The general Microsoft Security Compliance Manager interface is shown in Figure 1.

As you can see in Figure 1, baseline settings exist for various areas you're likely already familiar with, such as Account Logon and Account Management.

Within Security Compliance Manager, you have an interface that provides steps for deploying specific settings. You have the visibility and control you need to make appropriate desktop-related configuration management and security decisions.

More on desktop security:

Supercookies take a bite out of enterprise desktop security

Using Group Policy settings to lock down enterprise desktop security

How VDI can make you desktop security worse

One Windows management console to rule them all: Will it ever happen?

Free open source security tools for finding and fixing Windows flaws

Since Microsoft's recommendations are pretty reliable, you shouldn't expect any problems with standard applications. Security baselines also work with Windows Group Policy Objects to ensure that everything is covered.

At first, I didn't understand the purpose or value of these tools until I spent some time playing around with them. Once you install Security Compliance Manager and get a feel for what it can do, you'll start to understand, too. Microsoft provides some introductory videos on Security Compliance Manager that can help get you up to speed.

Microsoft's security baselines are not only good for enterprise desktop security, but they could also enhance your IT audit process and overall compliance program. If anything, check them out for your own sanity. One of the greatest sources of stress in IT is things left undone.

Most people in IT understand the value -- and pressures -- associated with desktop security standardization and hardening. Unfortunately, these keep getting placed on the back burner. Take advantage of these free resources from Microsoft, and make desktop configuration management and security a reality once and for all.

ABOUT THE AUTHOR:
Kevin Beaver
is an information security consultant, expert witness, author and professional speaker at Atlanta-based Principle Logic, LLC. With over 23 years of experience in the industry, he specializes in performing independent security assessments revolving around minimizing information risks. Beaver has authored/co-authored 10 books on information security, including The Practical Guide to HIPAA Privacy and Security Complianceand Hacking For Dummies. In addition, he's the creator of the Security On Wheels information security audio books and blog, providing security learning for IT professionals on the go.

This was first published in May 2012

Dig deeper on Endpoint security management tools

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close