home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
PC World 2007 September
/
PCWorld_2007-09_cd.bin
/
v cisle
/
regdacl
/
RegDACLE.exe
/
doc
/
SMWNCV.cmd
< prev
Wrap
OS/2 REXX Batch file
|
1999-01-05
|
4KB
|
89 lines
rem This script is only an example for setting permissions on the Registry subtree
rem HKLM\Software\Microsoft\Windows NT\CurrentVersion
rem This list was originally created by David LeBlanc <dleblanc@MINDSPRING.COM>
rem and enhanced by other members of the mailing list ntsecurity@listsev.ntbugtraq.com
rem
rem Use it on your own risk and check if it complies with your security policy
rem prior to running it!
rem
rem If you have comments to this script, please send them to fh@heysoft.de
rem ########################################################################
rem Assumptions Admins:F, System:F on all keys. (no need to change this!)
rem We are also going to skip keys which are properly secured by default.
rem
rem If a key seems to be only used locally, we recommend setting it to Local.
rem Setting it to Everyone would allow remote access.
rem Now let's really start:
rem [AeDebug]
rem Allow Local:R, and write permissions to anyone you want to be able
rem to install a development environment.
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\AeDebug" /rge /sgL:r
rem [Compatibility]
rem Change Everyone:special to Local:read
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Compatibility" /rge /sgL:r
rem [Drivers]
rem Set to Local:R
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Drivers" /rge /sgL:r
rem [drivers.desc]
rem Set to Local:R
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Drivers.desc" /rge /sgL:r
rem [Embedding]
rem Possibly only needed by 16-bit apps.
rem Change Everyone:special to Local:R
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Embedding" /rge /sgL:r
rem [Fonts] [FontSubstitutes] [GRE_Initialize] and [Image File Execution Options]
Set to Local:R
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Fonts" /rge /sgL:r
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\FontSubstitutes" /rge /sgL:r
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize" /rge /sgL:r
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" /rge /sgL:r
rem [MCI] [MCI32] and [MCI Extensions]
rem set to Local:R
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\MCI" /rge /sgL:r
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\MCI32" /rge /sgL:r
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\MCI Extensions" /rge /sgL:r
rem [Midimap]
rem Not sure what this is supposed to be doing - suggest changing to Local:R
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Midimap" /rge /sgL:r
rem [Network]
rem Most of this is secure - except a subkey named World Full Access Shared
rem Parameters, which contains something to do with drive mappings. Proposed
rem change: everyone to Interactive. This seems like a possible avenue of
rem attack. I'd like some more information on this one if anyone has it.
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Network\World Full Access Shared Parameters" /sgL:r /sga:f /sgs:f /rge
rem [Perflib]
rem Set to Local:R if you want to disallow non-admins the ability to view performance info remotely.
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Perflib" /rge /sgL:r
rem [Ports]
rem Change to Local:R
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Ports" /rge /sgL:r
rem [ProfileList]
rem This is perhaps the stickiest problem. It appears at the moment that this
rem key is only ever read or written by the system. IF this is the case, then
rem this key can be left with no permissions other than Admins and System:F.
rem If you want to hedge your bets, try Interactive:R. If anyone finds any
rem evidence of this key or subkeys ever being written by the logged in user,
rem please let us know.
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\ProfileList" /rge
rem [Winlogon]
rem this one may need no additional permissions.
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /rge
rem [WOW]
rem Local:R
regDACL "HKLM\Software\Microsoft\Windows NT\CurrentVersion\WOW" /rge /sGL:R