Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Interview the ISA Server Administrator. Access the server and verify that the ISA server is not configured in the single network adapter template model. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Configuration >> Networks >> Network tab Note the firewall template model in effect, as displayed with the diagram and text name of the template type. Verify that the “Single Network Adapter” is not the displayed type. Criteria: If any interface model other than “Single Network Adapter” is displayed, this is not a finding.
Reconfigure ISA server to use a network model other than the “Single Network Adapter” template. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Configuration >> Networks >> Templates tab Select a template from the list other than the "Single Network Adapter" template.
Interview the ISA Server Administrator. Access the ISA server and firewall rule set defined there. Ensure that each ISA Rule has logging enabled. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Firewall Policy >> Firewall Policy Rules Identify and select each firewall rule. Right Click >> Properties >> Action tab Verify that the “Log requests matching this rule” checkbox is checked. Criteria: If the “Log requests matching this rule” checkbox is checked, this is not a finding.
Enable Logging on firewall rules. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Firewall Policy >> Firewall Policy Rules Identify and select each firewall rule. Right Click >> Properties >> Action tab Select the “Log requests matching this rule” checkbox.
Interview the ISA Server Administrator. Access the ISA server firewall rule set. Ensure that ISA Rules use IP addresses for published applications. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Firewall Policy >> Firewall Policy Rules Identify and select the OWA firewall rule for CAC enabled access. Right Click >> Properties >> “To” tab Verify that the “Computer Name or IP Address….” Field is using the IP address of the OWA computer, instead of the computer name. Criteria: If the “Computer Name or IP Address….” Field uses the IP address of the OWA computer instead of the computer name, this is not a finding.
Ensure that ISA Rule uses IP addresses for published applications. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Firewall Policy >> Firewall Policy Rules Identify and select the OWA firewall rule for CAC enabled access. Right Click >> Properties >> “To” tab Enter the application server address for the OWA Web server address, in the “Computer Name or IP Address….” field.
Interview the ISA Server Administrator. Access the ISA server filter set. Ensure that filters for the OWA published application are enabled as follows: Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Configuration >> Add-ins On the Application Filters tab, filters for published OWA applications must be enabled. For each filter, observe the filter icon. Disabled filters are tagged with a red down-arrow icon. The following filters should list without a red down-arrow icon: DNS – Domain Name Service RPC Filter – Enables publishing of RPC Servers Web Proxy Filter – enables HTTP Proxy and CACHE All other application filters must be disabled, appearing with a red down-arrow icon, unless approved by the IAO and documented in the System Security Plan. Criteria: If the DNS, RPC, and Web Proxy filters list without a red down-arrow icon (enabled), with all others tagged with a red down-arrow icon (disabled), this is not a finding.
Disable unneeded application filters. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Configuration >> Add-ins For the following filters, right-click to enable the context sensitive menu, and select ENABLE for the following: DNS – Domain Name Service RPC Filter – Enables publishing of RPC Servers Web Proxy Filter – enables HTTP Proxy and CACHE For all other application filters, right-click to enable the context sensitive menu, select DISABLE.
Ensure that Automated Microsoft Error Reporting is disabled. Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Diagnostic Services, and select Microsoft Error Reporting. On the “General” tab, the “Enable this configuration group” checkbox should be cleared. Criteria: If the “Enable this configuration group” checkbox is cleared, this is not a finding.
Disable Microsoft Error Reporting in the system policy. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Diagnostic Services, and select Microsoft Error Reporting. On the “General” tab, clear the “Enable this configuration group” checkbox.
Ensure that DHCP protocol handling is disabled. Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Network Services, and select DHCP. On the “General” tab, the “Enable this configuration group” checkbox should be cleared. Criteria: If the “Enable this configuration group” checkbox is cleared for DHCP, this is not a finding.
Disable DHCP handling in the system policy. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Network Services, and select DHCP. On the “General” tab, clear the “Enable this configuration group” checkbox.
Ensure that unauthorized authentication traffic flow is not enabled. Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Authentication Services, and select Radius. On the “General” tab, the “Enable this configuration group” checkbox should be cleared. In the “Configuration Groups” list, identify Authentication Services, and select RSASecurID. On the “General” tab, the “Enable this configuration group” checkbox should be cleared. Criteria: If the “Enable this configuration group” checkbox is cleared for Radius and RSASecurID, this is not a finding.
Disable unneeded authentication types in the system policy. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Authentication Services, and select Radius. On the “General” tab, clear the “Enable this configuration group” checkbox. In the “Configuration Groups” list, identify Authentication Services, and select RSASecurID. On the “General” tab, clear the “Enable this configuration group” checkbox.
For sites using remote administration features, this finding may be closed provided the Mitigation criteria are met. Consult the mitigation steps to verify compliance using remote administration practices. Ensure that remote management traffic is disabled. Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> "Tasks" tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Remote Management. For each item listed (Microsoft Management Console (MMC), Terminal Server, and Web Management), perform the following: On the “General” tab, the “Enable this configuration group” checkbox should be cleared. Criteria: If the “Enable this configuration group” checkbox is cleared for each service type, this is not a finding.
Disable Remote Administration traffic in the system policy. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Remote Management. For each item listed (Microsoft Management Console (MMC), Terminal Server, and Web Management), perform the following: On the “General” tab, clear the “Enable this configuration group” checkbox.
Ensure that PING is not enabled. Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> (array name) >> Firewall Policy <server name> >> tasks tab >> Click the link for Edit System Policy. In the “Configuration Groups” list, identify Remote Management. Select PING and perform the following: On the “General” tab, the “Enable this configuration group” checkbox should be cleared. Criteria: If the “Enable this configuration group” checkbox is cleared, this is not a finding.
Disable Remote Administration PING traffic to the ISA server. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays (array name ) >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Remote Management Services, and select PING. On the “General” tab, clear the “Enable this configuration group” checkbox.
For sites using the included Microsoft Monitoring tools, this finding may be closed provided the Mitigation criteria are met. Consult the mitigation steps to verify compliance using Microsoft Monitoring tools. Ensure that remote monitoring traffic flow is disabled. Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab >> Click the link for Edit System Policy. In the “Configuration Groups” list, identify Remote Monitoring. For each item listed ([MOM], Remote Performance Monitor), perform the following: On the “General” tab, the “Enable this configuration group” checkbox should be cleared. Criteria: If the “Enable this configuration group” checkbox is cleared for each service type, this is not a finding.
Disable Remote Monitoring traffic in the system policy. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab >> Click the link for Edit System Policy. In the “Configuration Groups” list, identify Remote Monitoring. For each item listed ([MOM], Remote Performance Monitor), perform the following: On the “General” tab, clear the “Enable this configuration group” checkbox.
For sites using SMTP to send alert messages, this finding may be closed provided the Mitigation criteria are met. Consult the mitigation steps to verify compliance using SMTP to send email alert messages. Ensure that SMTP traffic flow is disabled. Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Remote Monitoring. Select SMTP and perform the following: On the “General” tab, the “Enable this configuration group” checkbox should be cleared. Criteria: If the “Enable this configuration group” checkbox is cleared for SMTP, this is not a finding.
Prevent SMTP traffic in the system policy. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Remote Monitoring. Select SMTP, and perform the following: On the “General” tab, clear the “Enable this configuration group” checkbox.
Ensure that the “Microsoft Customer Experience Improvement Program” is not enabled. Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> Right Click >> properties >> Customer Feedback tab Ensure that “No, I don’t wish to participate….” item is selected. Criteria: If “No, I don’t wish to participate….” is selected, this is not a finding.
Set participation in the “Microsoft Customer Experience Improvement Program” to “no”. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> Right Click >> properties >> Customer Feedback tab Select “No, I don’t wish to participate….”
Verify that the OWA firewall requires Kerberos Constrained Delegated to enable CAC authentication . Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >><array name> >> Firewall Policy (server name) >> (center panel) Firewall Policy Rules >> <OWA rule name> >> (right click) Properties >> Authentication Delegation tab The “Method used by ISA server to authenticate…” field must display Kerberos Constrained Delegation. The “Type the Service Principal Name…” field must display the OWA Front End server name. Criteria: If the ISA Firewall Rule for OWA displays Kerberos Constrained Delegation for authentication, and displays the OWA Front End server name, this is not a finding.
Ensure that Kerberos Constrained Delegation is configured to support CAC authentication for the OWA web site. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >> <array name> >> Firewall Policy (server name) >> (center panel) Firewall Policy Rules >> <OWA rule name> >> (right click) Properties >> Authentication Delegation tab For the “Method used by ISA server to authenticate…” select Kerberos Constrained Delegation. For the “Type the Service Principal Name…” field, type “http/<OWA server name>".
Verify that ISA web server reflects complete domain table scope. Procedure: From the ISA console tree: Networks >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <Array Name> >> Configuration >> Networks >> (center panel) Network tab >> Internal >> Properties >> Domains tab. For the “Domain Names” field, a list of the ISA server’s domain, plus any other domains for which this domain will process requests should be configured. Criteria: If ISA web server reflects complete domain table scope, this is not a finding.
Configure the domain scope. Procedure: From the ISA console tree: Networks >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <Array Name> >> Configuration >> Networks >> (center panel) Network tab >> Internal >> Properties >> Domains tab >> Add button. For the “Domain Names” field, type a list of the ISA server’s domain, plus any other domains for which this domain will process requests.
Verify that a domain controller destination is specified in the ISA system policy configuration. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name> >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Authentication Services, and select Active Directory. On the “General” tab, verify that the “Enable this configuration group” checkbox is selected. On the “To” tab, for “This rule applies to traffic sent to these destinations”, verify that a specific “network” or “computers” entry is configured for AD authentication. Criteria: If the “General” tab has the “Enable this configuration group” selected, and a specific “network” or “computers” entry is configured in the System Policy for AD authentication, this is not a finding.
Configure the global policy rule to enable use of AD traffic and specify a domain controller network or group. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy <server name> >> tasks tab Click the link for Edit System Policy. In the “Configuration Groups” list, identify Authentication Services, and select Active Directory. On the “General” tab, select the “Enable this configuration group” checkbox. On the “To” tab, for the “This rule applies to traffic sent to these destinations” field, select the Add button. Configure the “computers” or “network” authorized to perform AD authentications. Click the "Add" button, then the "Close" button, then the "OK" button.
Verify that ISA server trusts only DoD certificate authorities. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> (right panel) Toolbox tab >> Network Objects >> Web Listeners >> <OWA web listener name> >> (right click) Properties >> Authentication Tab >> Advanced Button >> Client Certificate Trust List The “Only accept client certificates trusted by the Root Certification Authorities selected below:” button should be selected. Within the “issued to” list, only Department of Defense (DoD) certificate Root Authorities should be selected. No other Root Authorities are permitted. Criteria: If only DoD certificate root authorities (and no other issuers) are selected, this is not a finding.
Ensure that only DoD certificate Root Authorities are selected for entry. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> (right panel) Toolbox tab >> Network Objects >> Web Listeners >> <OWA web listener name> >> (right click) Properties >> Authentication Tab >> Advanced Button >> Client Certificate Trust List Select the “Only accept client certificates trusted by the Root Certification Authorities selected below:” button. Within the “issued to” list, select only Department of Defense (DoD) certificate Root Authorities. No other Root Authorities may be selected.
Verify that the OWA rule is restricted to only authenticated users. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> Firewall Policy Rules >> <OWA rule name> >> Properties >> Users tab For the “This rule applies to requests from the following user sets”, “All Authenticated Users” must be selected. Criteria: If ISA server restricts rules to only authenticated users this is not a finding.
Ensure that only authenticated users are eligible to use the OWA firewall rule. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> Firewall Policy Rules >> <OWA rule name> >> Properties >> Users tab For “This rule applies to requests from the following user sets”, select “Add”, “All Authenticated Users”. Then select each alternative value (“All Users”, then “System”) and select “Remove”.
Verify that ISA server has UDP fragment blocking disabled. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> (left column) >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name> >> Configuration >> (center panel) General tab >> Additional Security Policy >> Configure IP Protection >> IP Fragments tab Ensure that the “Block IP Fragments” checkbox is clear. Criteria: If the “Block IP Fragments” checkbox is clear, this is not a finding.
Clear the “Block IP Fragments” checkbox. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> (left column) >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name> >> Configuration >> (center panel) General tab >> Additional Security Policy >> Configure IP Protection >> IP Fragments tab Clear the “Block IP Fragments” checkbox.
If the System Security Plan for the local network Infrastructure has documentation that describes Syn Flood and DOS attack protection configurations elsewhere in the infrastructure, this check is N/A. Verify that ISA server has Syn Flood and DOS attack prevention and the logging feature enabled. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name> >> Configuration >> (center panel) General tab >> Additional Security Policy >> Configure Flood Mitigation Settings The “Mitigate Flood Attacks and worm propagation” checkbox must be checked. The “log traffic blocked by flood mitigation settings” checkbox must be checked. For each mitigation value, click the edit button to confirm configuration values. Maximum TCP connect requests per minute per IP address: 600 Maximum concurrent TCP connections per IP address: 160 Maximum half-open TCP connections 80 Maximum HTTP requests per minute per IP address: 600 Maximum new non-TCP sessions per minute per rule 1,000 Maximum concurrent UDP sessions per IP address: 160 Specify how many denied packets trigger an alert: 600 Criteria: If ISA server has Syn Flood and DOS attack prevention plus the associated logging settings enabled, this is not a finding.
Ensure that Syn Flood and DOS attack mitigation is enabled. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name> >> Configuration >> (center panel) General tab >> Additional Security Policy >> Configure Flood Mitigation Settings Check the “Mitigate Flood Attacks and worm propagation” checkbox. Check the “Log traffic blocked by flood mitigation settings” checkbox. For each mitigation value, click the edit button to configure values. Maximum TCP connect requests per minute per IP address: 600 Maximum concurrent TCP connections per IP address: 160 Maximum half-open TCP connections 80 Maximum HTTP requests per minute per IP address: 600 Maximum new non-TCP sessions per minute per rule 1,000 Maximum concurrent UDP sessions per IP address: 160 Specify how many denied packets trigger an alert: 600
Verify that OWA arrays have required HTTP, PPTP and Authentication Delegation Web filters enabled. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management. From the ISA console: Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name> >> Configuration >> Add-ins >> Web Filters tab On the Web Filters tab, filters for OWA web services must be enabled. For each filter listed, observe the filter icon. Disabled filters are tagged with a red down-arrow icon. The following filters should list without a red down-arrow icon: HTTP Filter – Filters HTTP traffic PPTP Filter - Point to Point Tunneling Protocol Authentication Delegation Filter – Enables authentication delegation filtering to published web applications. All other web filters must be disabled, appearing with a red down-arrow icon, unless required for the mission and approved by the IAO and documented in the System Security Plan. Criteria: If the HTTP, PPTP and the Authentication Delegation web filters are listed without a red down-arrow icon (enabled), with all others tagged with a red down-arrow icon (disabled), this is not a finding.
Ensure the HTTP, PPTP, and Authentication Delegation web filters are enabled. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management. From the ISA console: Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name> >> Configuration >> Add-ins >> Web Filters tab For the following web filters listed: HTTP Filter – Filters HTTP traffic PPTP Filter - Point to Point Tunnelling Protocol Authentication Delegation Filter – Enables authentication delegation filtering to published web apps. For each filter not enabled, right click >> enable.
Verify that each web listener requires only Client Certificate Authentication. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> Toolbox tab >> Network Objects >> Web Listeners >> <OWA web listener name> >> Properties >> Authentication The “Methods clients use to authenticate to ISA Server” setting must be selected. The “Use a fallback authentication method” must be unchecked. Procedure: Criteria: If “Client Certificate Authentication” is selected and the “use fallback” checkbox is blank, this is not a finding.
Configure only Client Certificate Authentication. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> Toolbox tab >> Network Objects >> Web Listeners >> <OWA web listener name> >> Properties >> Authentication Select “Client Certificate Authentication” on the “Methods clients use to authenticate to ISA Server” setting. Uncheck the “Use a fallback authentication method”.
Verify that each web publishing rule identifies only one application. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> Firewall Policy Rules >> <OWA rule name> >> Properties >> Paths tab For “Internal Paths”, “/Public/”, “/Exchweb/”, and “/Exchange/” should be listed. Criteria: If only “/Public/”, “/Exchweb/”, and “/Exchange/” are selected, this is not a finding.
Ensure that only OWA paths are reachable from the OWA rule. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager. From the left side console tree: Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> Firewall Policy Rules >> <OWA rule name> >> Properties >> Paths tab For “Internal Paths” other than “/Public/”, “/Exchweb/”, and “/Exchange/”, highlight the path, and click on Remove. If additional applications must be published, use the “New web listener” wizard to create a new listener and rule for them. Additional web sites must be approved by the IAO and documented in the system security plan.
Verify that disk space conditions are monitored and that an alert is configured. Procedure: Arrays >> <array name> << monitoring >> alerts >> tasks >> alert definition >> log storage limits >> edit >> general. Ensure that enable checkbox is selected. On the events tab, in the Events list box for Log Storage Limits, the “By server” list box should have the local ISA server name selected. The Number of occurrences checkbox should be checked and show a quantity of 1. In the “each subsequent time the thresholds are met” area, the “Only if the alert was manually reset” button should be selected. Then on the Actions tab, ensure that the “Send e-mail” checkbox is checked, identifying a valid SMTP server, with valid From: and To: fields filled in. The “report to Windows Event Log” checkbox should be checked. In the “Stop Selected Services” field, click the Select button. The Microsoft Firewall and the Microsoft ISA Server Job Scheduler services should be checked. Criteria: If Log Storage Limits are enabled, and “Microsoft Firewall” and “Microsoft ISA Server Job Scheduler” are selected to be stopped, this is not a finding.
Enable and configure the alert for Log Storage Limits. Procedure: Arrays >> <array name> << monitoring >> alerts >> tasks >> alert definition >> log storage limits >> edit >> general. On the General tab, Select the enable checkbox. On the events tab, the Event list box should state Log Storage Limits. The “By server” list box should have the local ISA server name selected. The Number of occurrences checkbox should be checked with quantity of 1. And the “each subsequent time the thresholds are met” area, the “Only if the alert was manually reset” button should be selected. Then on the Actions tab, select the “Send e-mail” checkbox, and enter a valid SMTP server, with valid From: and To: fields filled in. Check the “report to Windows Event Log” checkbox. Check the “Stop Selected Services” checkbox, and click the Select button. Check the Microsoft Firewall and the Microsoft ISA Server Job Scheduler checkboxes.
Ensure that The ISA Application is installed on a dedicated partition separate from Security functions or other applications. Procedure: Criteria: If The ISA Application is installed on a dedicated partition separate from Security functions or other applications, this is not a finding.
Ensure that the ISA Application is installed on a dedicated partition separate from Security functions or other applications. Procedure: Install the ISA Application on a dedicated partition separate from Security functions or other applications.
Interview the ISA Server Administrator. Access the system security documentation that references the ISA server Configuration Storage location. Procedure: Start >> Settings >> control panel >> Add or Remove Programs. The following items must not be installed on the ISA OWA services computer: ISA Configuration Storage Adam Instance for ISASTGCTRL Microsoft SQL Server Desktop Engine (Microsoft ISA Server 2006 instance) Criteria: If “ISA Configuration Storage", "ADAM", and "SQL Server" are missing from the list, this is not a finding.
Install the ISA Configuration Storage server on a separate computer from the ISA services computer. Configure the ISA server to connect to the configuration storage server. Procedure: Install ISA Server 2006 on a separate computer, selecting “Install Configuration Storage Server” from the “setup scenarios”. NOTE: The configuration storage server is recommended to be the first component to be installed in an ISA configuration, followed by enterprise and array creation, then installation of the ISA services computers. Additional engineering and administrative tasks may be needed to separate the configuration storage services from the ISA computer.
Interview the ISA Server Administrator. Ensure that the ISA logs or audit data are on a separate partition from the ISA application. Procedure: Arrays >> <array name> << monitoring >> Logging tab >> tasks tab >> configure firewall logging >> log tab Verify that the “enable logging for this service” checkbox is checked There are choices for the “log storage format”. For MSDE database, click options, and verify that “ISALogs Folder” is not selected. Instead, “this folder (enter the full path)" must be selected and the path must be on a separate partition from the ISA services partition. For SQL database, click options and verify that a separate SQL database server is selected to collect the logs. Database and table name must be named, and “force data encryption” must be selected. Windows authentication must be used, with a services account and password named. For file format, select format type and click options. Verify that “ISALogs Folder” is not selected. Instead, “this folder (enter the full path)" must be selected and the path must be on a separate partition from the ISA services partition. Criteria: If ISA logs are configured to a location separate from the ISA services partition or server, this is not a finding.
Specify different host system disk partitions or directories for ISA log files Arrays >> <array name> << monitoring >> Logging tab >> tasks tab >> configure firewall logging >> log tab Select the “enable logging for this service” checkbox There are choices for the “log storage format”. For MSDE database, select MSDE, click options, and select “this folder (enter the full path)” and enter a path for a separate partition from the ISA services partition. For SQL database, select SQL, click options and verify that a separate SQL database server is selected to collect the logs. Enter the database and table name, and select “force data encryption”. Select “Use Windows authentication” and enter a services account and password. For file format, select format type and click options. Select “this folder (enter the full path)” and enter a path for a separate partition from the ISA services partition.
Verify that ISA services are deployed on compliant ports and protocols. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site >>Properties >> Web Site Tab >> Web site identification >> TCP port and SSL port Port 80 for HTTP and port 443 for SSL should be entered. Criteria: If E-mail Web applications and services are implemented on compliant ports of 80 and 443 with HTTP and SSL (respectively), this is not a finding.
Configure with PPSM compliant ports and protocols. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site >>Properties >> Web Site Tab >> Web site identification >> TCP port and SSL port Enter 80 for the TCP port and 443 for the SSL port
Interview the IAO. Access documentation pertaining to software modification detection procedures in place and request documents of these procedures to review. Verify by reviewing reports for inclusion of the ISA executable and configuration files. Criteria: If ISA software is monitored for changes according to INFOCON required frequencies, this is not a finding.
Procedure: Establish or update procedures to monitor any changes made to ISA Services software. Identify files and directories to be included in the host system or backups and provide these to the person responsible for backups. Verify that ISA software libraries are monitored according to INFOCON required frequencies.
Review ISA application software baseline procedures and implementation evidence. Procedure: Review the list of files and directories included in the baseline procedure for completeness. Criteria: If ISA software baseline exists and is available for comparison during scanning efforts, this is not a finding.
Ensure that a plan exists for periodic comparison and is incorporated into the configuration management procedures. Procedure: Implement ISA software baseline process.
Validate that an application certificate is installed for the OWA application’s listener: Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and acceleration Server >> Arrays >> <array name> >> Firewall Policy (server name) >> “Firewall Policy” tab Identify and highlight the OWA CAC enabled firewall rule. Right click >> properties >> “Listener” tab >> Properties >> “Certificates” tab Ensure that the “use a single certificate for this web listener” is selected, and that the OWA web server name appears in the field. Criteria: If the OWA listener has a valid certificate selected, this is not a finding.
Request and install an OWA SSL certificate on the ISA server. NOTE: The OWA SSL certificate should exist on the Exchange 2003 OWA server, for use by the OWA web site. If it does not, that configuration process should be executed first, by initiating a certificate request from the OWA server, installing the SSL certificate there, and then installing a copy of the SSL certificate on the ISA server for use by the ISA Proxy. Procedure: Once the SSL certificate is installed on the ISA server, bind the certificate to the OWA listener as follows: Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and acceleration Server >> Arrays >> <array name> >> Firewall Policy (server name) >> “Firewall Policy” tab Identify and highlight the OWA CAC enabled firewall rule. Right click >> properties >> “Listener” tab >> Properties >> “Certificates” tab Click “use a single certificate for the ISA web listener”. Click Select Certificate. In the Certificate Installation details list box, identify and select the OWA certificate and click the “Select” button.
Ensure that monitoring alerts that detect certificates nearing expiration are logged. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Credential Delegation using Kerberos Constrained failure >> Edit button >> General tab On the General tab: Verify that the “enable” checkbox is checked. On the Events tab: Verify that the “by server” is populated with the ISA server name. Verify that the “number of occurrences checkbox is checked and the value is 1 On the Actions tab: Verify that the “Send Email” checkbox is checked Verify that the “SMTP Server”, To, From fields are populated Verify that the “report to Windows event log” checkbox is checked. Verify that the “Stop Selected Services” checkbox is checked. Click on the “select” button aligned with the “stop selected services” checkbox. On the ‘select ISA server services’ dialog, verify that the “Microsoft firewall’ and the Microsoft ISA server job scheduler” checkboxes are checked. Criteria: If monitoring alerts failed Credential delegation using Kerberos are logged, this is not a finding.
Configure monitoring alerts that detect failed Credential delegation using Kerberos so they are logged. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Credential Delegation using Kerberos Constrained failure >> Edit button >> General tab On the General tab: Check the “enable” checkbox. On the Events tab: Populate the “by server” field with the ISA server name. Check the “number of occurrences” checkbox and enter the value 1 On the Actions tab: Check the “Send Email” checkbox. Populate the “SMTP Server”, To, and From fields. Check the “report to Windows event log” checkbox. Check the “Stop Selected Services” checkbox. Click on the “select” button aligned with the “stop selected services” checkbox. On the “select ISA server services” dialog, select “Microsoft firewall’ and the “Microsoft ISA server job scheduler” checkboxes.
Ensure that monitoring alerts that detect certificates nearing expiration are logged. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Certificate about to expire >> Edit button >> General tab On the General tab: Verify that the “enable” checkbox is checked. On the Events tab: Verify that the “by server” is populated with the ISA server name. Verify that the “number of occurrences checkbox is checked and the value is 1 On the Actions tab: Verify that the “Send Email” checkbox is checked Verify that the “SMTP Server”, To, From fields are populated Verify that the “report to Windows event log” checkbox is checked. Criteria: If monitoring alerts that Certificates about to expire are logged, this is not a finding.
Configure monitoring alerts that detect certificates about to expire so they are logged. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Certificates about to expire >> Edit button >> General tab On the General tab: Check the “enable” checkbox. On the Events tab: Populate the “by server” field with the ISA server name. Check the “number of occurrences” checkbox and enter the value 1 On the Actions tab: Check the “Send Email” checkbox. Populate the “SMTP Server”, To, and From fields. Check the “report to Windows event log” checkbox.
Ensure that monitoring alerts that detect insufficient disk space also cause the ISA firewall service to shut down. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Free Disk Space Limits >> Edit button >> General tab On the General tab: Verify that the “enable” checkbox is checked. On the Events tab: Verify that the “by server” is populated with the ISA server name. Verify that the “number of occurrences checkbox is checked and the value is 1 On the Actions tab: Verify that the “Send Email” checkbox is checked Verify that the “SMTP Server”, To, From fields are populated Verify that the “report to Windows event log” checkbox is checked. Verify that the “Stop Selected Services” checkbox is checked. Click on the “select” button aligned with the “stop selected services” checkbox. On the ‘select ISA server services’ dialog, verify that the “Microsoft firewall’ and the Microsoft ISA server job scheduler” checkboxes are checked. Criteria: If monitoring alerts that detect insufficient disk space also cause the ISA firewall service to shut down, this is not a finding.
Configure monitoring alerts that detect insufficient disk space available to cause the ISA firewall service to shut down. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Free Disk Space Limits >> Edit button >> General tab On the Events tab: Populate the “by server” field with the ISA server name. Check the “number of occurrences” checkbox and enter the value 1 On the Actions tab: Check the “Send Email” checkbox. Populate the “SMTP Server”, To, and From fields. Check the “report to Windows event log” checkbox. Check the “Stop Selected Services” checkbox. Click on the “select” button aligned with the “stop selected services” checkbox. On the ‘select ISA server services’ dialog, select “Microsoft firewall’ and the Microsoft ISA server job scheduler” checkboxes.
Ensure that monitoring alerts that detect disabled logging functions also cause the ISA firewall service to shut down. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Log Failure >> Edit button >> General tab On the General tab: Verify that the “enable” checkbox is checked. On the Events tab: Verify that the “by server” is populated with the ISA server name. Verify that the “number of occurrences checkbox is checked and the value is 1 On the Actions tab: Verify that the “Send Email” checkbox is checked Verify that the “SMTP Server”, To, From fields are populated Verify that the “report to Windows event log” checkbox is checked. Verify that the “Stop Selected Services” checkbox is checked. Click on the “select” button aligned with the “stop selected services” checkbox. On the ‘select ISA server services’ dialog, verify that the “Microsoft firewall’ and the Microsoft ISA server job scheduler” checkboxes are checked. Criteria: If monitoring alerts that detect disabled logging functions also cause the ISA firewall service to shut down, this is not a finding.
Configure monitoring alerts that detect disabled logging functions to cause the ISA firewall service to shut down. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Log Failure >> Edit button >> General tab On the Events tab: Populate the “by server” field with the ISA server name. Check the “number of occurrences” checkbox and enter the value 1 On the Actions tab: Check the “Send Email” checkbox. Populate the “SMTP Server”, To, and From fields. Check the “report to Windows event log” checkbox. Check the “Stop Selected Services” checkbox. Click on the “select” button aligned with the “stop selected services” checkbox. On the “select ISA server services” dialog, select “Microsoft firewall” and the “Microsoft ISA server job scheduler” checkboxes.
Ensure that monitoring alerts that detect log storage limit exceeded also cause the ISA firewall service to shut down. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Log Storage Limits >> Edit button On the General tab: Verify that the “enable” checkbox is checked. On the Events tab: Verify that the “by server” is populated with the ISA server name. Verify that the “number of occurrences checkbox is checked and the value is 1 On the Actions tab: Verify that the “Send Email” checkbox is checked Verify that the “SMTP Server”, To, From fields are populated Verify that the “report to Windows event log” checkbox is checked. Verify that the “Stop Selected Services” checkbox is checked. Click on the “select” button aligned with the “stop selected services” checkbox. On the ‘select ISA server services’ dialog, verify that the “Microsoft firewall’ and the Microsoft ISA serer job scheduler” checkboxes are checked. Criteria: If monitoring alerts that detect log storage limits exceeded also cause the ISA firewall service to shut down, this is not a finding.
Configure monitoring alerts that detect disabled logging functions to cause the ISA firewall service to shut down. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> Alerts tab >> Tasks tab >> Configure Alerts Definitions >> Log Storage Limits >> Edit button On the General tab, select the “enable” checkbox. On the Events tab: select the ISA server in the “by server” list. Select the “number of occurrences checkbox and type a value of 1 On the Actions tab: select the “Send Email” checkbox, populate the “SMTP Server”, “To”, and “From” fields with mail server and address that is able to accept email from this server. Select the “report to Windows event log” checkbox. Select the “Stop Selected Services” checkbox. Click on the “select” button aligned with the “stop selected services” checkbox. On the “select ISA server services” dialog, select the “Microsoft firewall” and the “Microsoft ISA server job scheduler” checkboxes.
For sites using an OCSP client rather than CRL download for certificate validation, this finding may be closed provided the Mitigation criteria are met. Consult the mitigation steps to verify compliance using an OCSP client. Interview the ISA Server Administrator. Review documentation that describes the CRL location(s) and IP address(es). Ensure that the ISA rule restricting CRL download traffic exists, and is configured to restrict the outbound HTTP traffic to only the CRL location. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy >> “Tasks” tab Identify and select the Edit System Policy link. From the “Configuration Groups” list, Authentication Services, click on CRL Download. On the “General” tab, verify that the “Enable this configuration group” checkbox is selected. On the “To” tab, identify the “This rule applies to traffic sent to these destinations:” list, and verify that valid CRL repository destinations are configured. Criteria: If the System Policy rule for CRL download is enabled, and lists valid CRL server locations, this is not a finding.
Configure the rule to restrict the outbound CRL traffic to the CRL repository. Procedure: Start >> Programs >> ISA Server Management >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Firewall Policy >> “Tasks” tab Identify and select the Edit System Policy link. From the “Configuration Groups” list, Authentication Services, click on CRL Download. On the “General” tab, check the “Enable this configuration group” checkbox. On the “To” tab, identify the “This rule applies to traffic sent to these destinations:” list, and click the “Add:” button. From the dialog list of additions, select computers or networks that host valid CRL repositories.
Verify that SSL is configured for connection to the ISA server. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> “Toolbox” tab >> Network Objects >> Web Listeners >> <OWA web listener name> >> Properties >> Connections The “Enable SSL (HTTPS) connections on port:” must be selected, with port 443 as the identified port. The “Enable HTTP connections on port:” must be deselected. Criteria: If HTTPS is selected, with HTTP deselected, this is not a finding.
Configure the OWA listener on the ISA server to require SSL only. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server >> Arrays >> Firewall Policy (server name) >> “Toolbox” tab >> Network Objects >> Web Listeners >> <OWA web listener name> >> Properties >> Connections Select the “Enable SSL (HTTPS) connections on port:” with port 443 as the identified port. Deselect the “Enable HTTP connections on port” checkbox.
Interview the ISA Server Administrator or IAO. Access information that identifies security groups for firewall administrators and their membership content. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server 2006 >> Enterprise >> Enterprise tab Select the “Assign Administrator Roles” item. The “ISA Server Enterprise Administrator” role must be listed with a domain group that specifically grants permissions to ISA administration, separate from those who are Windows Server administrators. Criteria: If groups other than <domain-name\ExchangeAdmin> or BUILTIN\Administrators are listed to assign separate abilities to “ISA Server Enterprise Admin” and “ISA Server Enterprise Auditor” roles, this is not a finding.
Procedure: Ensure that ISA administrative and configuration data is restricted to only ISA Server Administrators. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server 2006 >> Enterprise >> Enterprise tab Select the “Assign Administrator Roles” item. Click “Add…” Select the Browse button to acquire the Active Directory group comprising ISA administrators. Select “ISA Server Enterprise Administrator” for the role. Select OK.
Ensure that IPv6 traffic is not allowed to traverse the ISA server. Procedure: Start >> Settings >> Control Panel >> Network Connections Open the Network Connections applet and identify network interface hardware. For each network interface, perform the following: Right Click >> Properties. In the “This connection uses the following items” list box, verify that “Microsoft TCPIP version 6” is not listed. Criteria: If “Microsoft TCPIP version 6” is not listed, this is not a finding.
Remove TCPIP version 6 from the ISA Server. Procedure: Start >> Settings >> Control Panel >> Network Connections Open the Network Connections applet and identify network interface hardware. For each network interface, perform the following: Right Click >> Properties. In the “This connection uses the following items” list box, identify and highlight the “Microsoft TCPIP version 6” item. Click the “Uninstall” button and follow the instructions.
Ensure that the ISA External Interface is restricted to TCPIP protocol. Procedure: Interview the ISA Server administrator. Access the system or system documentation that identifies the ISA “External” interface that receives inbound OWA traffic. Validate against the following steps. First, Identify the External Network Interface. Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Firewall Policy >> Firewall Policy Rules Identify and select the OWA firewall rule for CAC enabled access. Right Click >> Properties >> Listener tab >> Properties >> Networks tab Note the “Selected IPs” address listed beside the “External” network name. Second, identify the server network card that is configured for the listener, with that IP address. Start >> Run, and type CMD in the “command” box. A command window should open. Enter the command: IPCONFIG /ALL and press enter. Each information block will be preceded by the network interface card identifier, for example, “Ethernet adapter Local Area Connection…” Note the interface identifier containing the OWA listener address. Third, check the protocols installed for the identified interface card. Start >> Settings >> Control Panel >> Network Connections Open the Network Connections applet and identify the listener’s network interface hardware. Right Click >> Properties. In the “This connection uses the following items” list box, verify that “Internet Protocol (TCP/IP)” is listed, but that no other protocols are listed. Criteria: If “Internet Protocol (TCP/IP)” is the only protocol listed, this is not a finding.
Remove all protocols from the ISA External Interface except TCPIP protocol. NOTE: if alternate protocols are installed to support devices and services other than ISA features, then System Administrators may have additional tasks to perform in providing protocols for those services. Procedure: First, if necessary, identify the ISA External Network Interface. Start >> Programs >> Microsoft ISA Server >> ISA Server Management >> Microsoft Internet Security and Acceleration >> Arrays >> <array name> >> Firewall Policy >> Firewall Policy Rules Identify and select the OWA firewall rule for CAC enabled access. Right Click >> Properties >> Listener tab >> Properties >> Networks tab. Note the “Selected IPs” address listed beside the “External” network name. Second, if necessary, identify the server network card that is configured for the listener, with that IP address. Start >> Run, and type CMD in the “command” box. A command window should open. Enter the command: IPCONFIG /ALL and press enter. Each information block will be preceded by the network interface card identifier, for example, “Ethernet adapter Local Area Connection…”. Note the interface identifier containing the OWA listener address. Third, check the protocols installed for the identified interface card. Start >> Settings >> Control Panel >> Network Connections Open the Network Connections applet and identify the listener’s network interface hardware. Right Click >> Properties. In the “This connection uses the following items” list box. NOTE: this list box contains a mix of network clients, network services, and network protocols. This fix requires that only protocols be identified. Remove every protocol so that only “Internet Protocol (TCP/IP)” protocol is listed, but no other protocols.
Interview the IAO or the ISA Server Administrator. Review documentation such as the System Security Plan, and identify the ISA server’s deployment role (for example, that of the OWA Proxy). Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server >> Arrays >> array name >> Configuration Expand the Configuration tree by clicking the “+”, and highlight Cache. Verify that the CACHE entry in the tree is marked with a small red downward arrow. In the center panel, the “cache drives” tab, identify and select the ISA server name entry. Verify that the “cache size on NTFS drives” is set to 0. Criteria: If the “caching” entry in the tree has the downward arrow (indicating that it is disabled) and has the “Cache Size on NTFS” set to 0, this is not a finding.
Disable Caching Services on the ISA server. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server >> Arrays >> array name >> Configuration Expand the Configuration tree by clicking the “+”, and highlight Cache. Select the “CACHE” entry in the tree. In the center panel, the “cache drives” tab, identify and select the ISA server name entry. Right click the ISA server entry and select “Properties”. For each disk drive on the ISA server, select the drive, and enter 0 in the “Maximum cache size (MB)” field, then click on the “Set” button. Click OK to close the dialog. Verify that the “cache size on NTFS drives” is now set to 0 and that the “Cache” entry in the tree shows the red downward arrow icon, indicating that it is disabled.
Identify and disable the ISA VPN services. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server >> Arrays >> array name >> VPN >>VPN clients tab >> “verify that VPN is enabled” button >> “General” tab. Verify that “Enable VPN Client Access” checkbox is cleared. Criteria: If the “Enable VPN Client Access” checkbox is cleared, this is not a finding.
Disable the VPN option and services. Procedure: Start >> Programs >> Microsoft ISA Server >> ISA Server Manager >> Microsoft Internet Security Acceleration Server >> Arrays >> array name >> VPN >>VPN clients tab >> “verify that VPN is enabled” button >> “General” tab Clear the “Enable VPN Client Access” checkbox.
View ISA service permissions to verify service account scope. Procedure: Start >> settings >> control panel >> administrative tools >> services For the following Services active in the services list: Microsoft ISA Server Control Microsoft ISA Server Job Scheduler Right Click >> Properties >> Logon tab >> “Log on as” field. Observe the user accounts specified. Criteria: If ISA service accounts are operating as SYSTEM, this is not a finding.
Ensure that ISA service accounts are restricted to running only the configured service. Procedure: Start >> settings >> control panel >> administrative tools >> services For the following Services active in the services list: Microsoft ISA Server Control Microsoft ISA Server Job Scheduler Right Click >> Properties >> Logon tab >> “Log on as” field. Select “Local SYSTEM account”.
Procedure: Access the System Security Plan documents that describe audit data location and protection measures. Included should be server locations and directory security that limits access to appropriate and authorized individuals or processes. Only ISA administrators, System Administrators, and "Backup and Restore" processes should have both "Read" and "Write" ability. All other users, if any, should be restricted to "Write" only. Criteria: If other users are authorized to "Write" only, and only ISA, System Administrators, and "Backup and Restore" processes may "Read" and "Write" to audit trails, this is not a finding.
Configure ISA Services audit trail protection against unauthorized access. Procedure: Access the ISA Services log files. Ensure that ISA Administrators, System Administrators, and "Backup and Restore" Processes have "Read" and "Write", and everyone else has "Write" only. Enumerate the access criteria into the System Security Plan.
Interview the IAO. Access the documentation that describes the antivirus solution for the ISA server. Provisions should include product, release, and licensing information, as well as technical details surrounding file exclusions, web filtering configuration, update schedule, and update method. Criteria: If the ISA server is operating with file and web combination antivirus software, this is not a finding.
Procedure: Obtain and install a “File plus Web” aware combination antivirus solution created for use on an ISA server. Document the product and configuration details as appropriate for the DIACAP Scorecard.
Ensure that monitoring alerts that detect invalid certificate usage are logged. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> “Alerts” tab >> “Tasks” tab >> Configure Alerts Definitions >> Invalid Certificate >> “Edit” button >> “General” tab On the “General” tab: Verify that the “enable” checkbox is checked. On the “Events” tab: Verify that the “by server” is populated with the ISA server name Verify that the “number of occurrences checkbox is checked and the value is 1 On the “Actions” tab: Verify that the “Send Email” checkbox is checked. Verify that the “SMTP Server”, “To”, and “From” fields are populated. Verify that the “report to Windows event log” checkbox is checked. Verify that the “Stop Selected Services” checkbox is checked. Click on the “select” button aligned with the “stop selected services” checkbox. On the ‘select ISA server services’ dialog, verify that the “Microsoft firewall” and the “Microsoft ISA server job scheduler” checkboxes are checked. Criteria: If monitoring alerts that Invalid Certificate usage is logged and that ISA services are stopped, this is not a finding.
Configure monitoring alerts that detect invalid certificate usage to be logged. Procedure: Start >> Programs >> ISA Server Management >> Monitoring >> Microsoft Internet Security and Acceleration Server 2006 >> Arrays >> <array name > >> Monitoring >> “Alerts” tab >> “Tasks” tab >> Configure Alerts Definitions >> Invalid Certificate >> “Edit” button >> “General” tab On the “General” tab: Check the “enable” checkbox. On the Events tab: Populate the “by server” field with the ISA server name. Check the “number of occurrences” checkbox and enter the value 1 On the Actions tab: Check the “Send Email” checkbox. Populate the “SMTP Server”, To, and From fields. Check the “report to Windows event log” checkbox. Check the “Stop Selected Services” checkbox. Click on the “select” button aligned with the “stop selected services” checkbox. On the “select ISA server services” dialog, select “Microsoft firewall” and the “Microsoft ISA server job scheduler” checkboxes.