Apple Mac OS X Panther Instrukcja Konfiguracji

Przeglądaj online lub pobierz Instrukcja Konfiguracji dla Oprogramowanie Apple Mac OS X Panther. Apple Mac OS X Panther Setup guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 109
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
UNCLASSIFIED
UNCLASSIFIED
Report Number:I331-009R-2004
Apple Mac OS
X v10.3.x
“Panther”
Security Configuration Guide
Guide Version 1.1
Systems and Network Attack Center (SNAC)
National Security Agency
9800 Savage Rd.
Ft. Meade, MD 20755-6704
Przeglądanie stron 0
1 2 3 4 5 6 ... 108 109

Podsumowanie treści

Strona 1 - Security Configuration Guide

UNCLASSIFIED UNCLASSIFIED Report Number:I331-009R-2004 Apple Mac OS X v10.3.x “Panther” Security Configuration Guide Guide Version 1.1 Systems

Strona 2

UNCLASSIFIED UNCLASSIFIED x Table of Contents This Page Intentionally Left Blank

Strona 3

UNCLASSIFIED UNCLASSIFIED 88Chapter 6 – Future Guidance This Page Intentionally Left Blank

Strona 4

UNCLASSIFIEDAppendix A - Encrypting Files and Folders Appendix A Encrypting Files and Folders As described earlier, Mac OS X’s FileVault feature c

Strona 5

UNCLASSIFIED UNCLASSIFIED 90Appendix A – Encrypting Files and Folders 1. Open Disk Utility, located in /Applications/Utilities, and make sure not

Strona 6

UNCLASSIFIED Appendix A - Encrypting Files and Folders Figure 38: Disk Utility Save Panel 4. Choose the size of the disk image from the Size pop

Strona 7

UNCLASSIFIED UNCLASSIFIED 92Appendix A – Encrypting Files and Folders keychain is unlocked, the data will be transparently unencrypted if an attem

Strona 8

UNCLASSIFIED Appendix A - Encrypting Files and Folders Figure 41: Disk Utility Convert Image Panel 4. Select AES-128 (recommended) for Encryption

Strona 9

UNCLASSIFIED UNCLASSIFIED 94Appendix A – Encrypting Files and Folders This Page Intentionally Left Blank

Strona 10 - UNCLASSIFIED

UNCLASSIFIED Appendix B- References Appendix B References 1. Mac OS X Maximum Security; Ray, John, and Ray, Dr. William C.; Sams Publishing; 2003 2.

Strona 11 - Introduction

UNCLASSIFIED UNCLASSIFIED 96Appendix B – References This Page Intentionally Left Blank

Strona 12

UNCLASSIFIED Appendix C- Additional Resources Appendix C Additional Resources The following are additional resources that may be helpful to readers o

Strona 13 - Scope of Guidance

UNCLASSIFIED UNCLASSIFIED xi Introduction Introduction The purpose of this guide is to provide an overview of Mac OS X v10.3.x “Panther” operating sy

Strona 14

UNCLASSIFIED UNCLASSIFIED xii Introduction About this Guide This document consists of six chapters and two appendices: Chapter 1, “Scope of Guidanc

Strona 15

UNCLASSIFIED Chapter 1 UNCLASSIFIED 1Chapter 1 - Scope of Guidance Scope of Guidance Apple’s Mac OS X operating system is very versatile, and can b

Strona 16

UNCLASSIFIED UNCLASSIFIED 2Chapter 1 – Scope of Guidance user. This method is labor-intensive for the system administrator, so the most appropria

Strona 17

UNCLASSIFIED UNCLASSIFIED 3Chapter 2 - Intro to Mac OS X Security Chapter 2 Introduction to Mac OS X Security Mac OS X v10.3.x (a.k.a. “Panther”)

Strona 18

UNCLASSIFIED UNCLASSIFIED 4Chapter 2 – Intro to Mac OS X Security from an administrator account login. This means there will be an audit log show

Strona 19 - Initial Installation

UNCLASSIFIED UNCLASSIFIED 5Chapter 2 - Intro to Mac OS X Security manage the multitude of credentials and certificates that a user must maintain. M

Strona 20

UNCLASSIFIED UNCLASSIFIED 6Chapter 2 – Intro to Mac OS X Security This Page Intentionally Left Blank

Strona 21

UNCLASSIFIED Chapter 3 UNCLASSIFIED 7Chapter 3 - Initial Installation Initial Installation Although secure configuration of an existing Mac OS X in

Strona 22

UNCLASSIFIED UNCLASSIFIED This Page Intentionally Left Blank

Strona 23

UNCLASSIFIED UNCLASSIFIED 8Chapter 3 – Initial Installation • Only user files and data should be saved and later restored; restoring system sett

Strona 24

UNCLASSIFIED UNCLASSIFIED 9Chapter 3 - Initial Installation Continue Through Installation Screens Any necessary partitioning of the hard drive can

Strona 25

UNCLASSIFIED UNCLASSIFIED 10Chapter 3 – Initial Installation 6. Click the Continue button when the Select a Destination screen re-appears.  Inst

Strona 26

UNCLASSIFIED UNCLASSIFIED 11Chapter 3 - Initial Installation iCal – Optional. iCal provides an electronic calendar, including some Internet conne

Strona 27

UNCLASSIFIED UNCLASSIFIED 12Chapter 3 – Initial Installation Initial System Configuration The next set of screens deals with configuring the just-

Strona 28

UNCLASSIFIED UNCLASSIFIED 13Chapter 3 - Initial Installation across the network when the machine is connected to one. Sensitive information should

Strona 29

UNCLASSIFIED UNCLASSIFIED 14Chapter 3 – Initial Installation  Get Internet Ready Note: This screen will only appear if the entry of registration

Strona 30

UNCLASSIFIED UNCLASSIFIED 15Chapter 3 - Initial Installation "Mac OS X Update 10.3.4" and security updates "Security Update 2004-05-

Strona 31

UNCLASSIFIED UNCLASSIFIED 16Chapter 3 – Initial Installation Figure 1: Apple’s Update Download Web Page Administrators should note that updates

Strona 32

UNCLASSIFIED UNCLASSIFIED 17Chapter 3 - Initial Installation being updated is loaded with Mac OS X v.10.3.2 or earlier. If any of the listed updat

Strona 33 - Configuring System Settings

UNCLASSIFIED UNCLASSIFIED iii Warnings Warnings  Do not attempt to implement any of the settings in this guide without first testing in a non-opera

Strona 34

UNCLASSIFIED UNCLASSIFIED 18Chapter 3 – Initial Installation 1. Place the CD with the 10.3.3 Update package in the CD-ROM drive. Mac OS v.10.3.3

Strona 35

UNCLASSIFIED 4. Follow the instructions of the Installer. UNCLASSIFIED 19Chapter 3 - Initial Installation 5. When the Installer has completed, cl

Strona 36

UNCLASSIFIED UNCLASSIFIED 20Chapter 3 – Initial Installation operating system, updates, and applications.

Strona 37

UNCLASSIFIED Chapter 4 UNCLASSIFIED 21Chapter 4- Configuring System Settings Configuring System Settings System configuration follows the installat

Strona 38

UNCLASSIFIED UNCLASSIFIED 22Chapter 4 – Configuring System Settings Removing Registration Information Mac OS X stores any registration information

Strona 39

UNCLASSIFIED UNCLASSIFIED 23Chapter 4- Configuring System Settings Figure 2: System Preferences Application Many options within the System Prefere

Strona 40

UNCLASSIFIED UNCLASSIFIED 24Chapter 4 – Configuring System Settings system’s method of restricting a user from doing this places other serious rest

Strona 41

UNCLASSIFIED UNCLASSIFIED 25Chapter 4- Configuring System Settings Figure 4: Active Screen Corners Panel 7. Use the pull-down menu corresponding

Strona 42

UNCLASSIFIED UNCLASSIFIED 26Chapter 4 – Configuring System Settings Some users reported data loss under certain circumstances when using Mac OS X

Strona 43

UNCLASSIFIED UNCLASSIFIED 27Chapter 4- Configuring System Settings To set the FileVault master password: 1. Click on the Show All icon in System

Strona 44

UNCLASSIFIED UNCLASSIFIED This Page Intentionally Left Blank

Strona 45

UNCLASSIFIED UNCLASSIFIED 28Chapter 4 – Configuring System Settings At this point, FileVault may now be activated for any user or administrative ac

Strona 46

UNCLASSIFIED UNCLASSIFIED 29Chapter 4- Configuring System Settings Figure 6: Security Panel Additional Settings 3. Place a check in the box for R

Strona 47

UNCLASSIFIED UNCLASSIFIED 30Chapter 4 – Configuring System Settings not complete until the user makes a decision about whether to save the file.

Strona 48

UNCLASSIFIED UNCLASSIFIED 31Chapter 4- Configuring System Settings 1. Click on the Show All icon in System Preferences, or restart System Preferen

Strona 49

UNCLASSIFIED UNCLASSIFIED 32Chapter 4 – Configuring System Settings Figure 8: CDs & DVDs Panel 3. Pull down and select Ignore for the When y

Strona 50

UNCLASSIFIED UNCLASSIFIED 33Chapter 4- Configuring System Settings Figure 9: Energy Saver Sleep Panel 4. Unlock the window for editing if necessa

Strona 51

UNCLASSIFIED UNCLASSIFIED 34Chapter 4 – Configuring System Settings Figure 10: Energy Saver Options Panel 8. Uncheck the checkbox in front of th

Strona 52

UNCLASSIFIED UNCLASSIFIED 35Chapter 4- Configuring System Settings 4. Click on the Internal Microphone selection (if available) and set the input v

Strona 53

UNCLASSIFIED UNCLASSIFIED 36Chapter 4 – Configuring System Settings send a request for information to the Apple Federal e-mail address: AppleFeder

Strona 54

UNCLASSIFIED UNCLASSIFIED 37Chapter 4- Configuring System Settings 6. Pull down the Location menu and repeat step 5 for any other locations in the

Strona 55

UNCLASSIFIED UNCLASSIFIED v Trademark Information Trademark Information Apple, Macintosh, Mac OS X, and “Panther” are either registered trademarks o

Strona 56

UNCLASSIFIED UNCLASSIFIED 38Chapter 4 – Configuring System Settings this guide, there is no need for this capability when configuring according to

Strona 57

UNCLASSIFIED UNCLASSIFIED 39Chapter 4- Configuring System Settings Figure 13: Sharing Services Configuration Panel 4. Unlock the window for edit

Strona 58

UNCLASSIFIED UNCLASSIFIED 40Chapter 4 – Configuring System Settings application. Only the settings that are handled within the System Preferences

Strona 59

UNCLASSIFIED UNCLASSIFIED 41Chapter 4- Configuring System Settings left enabled, you will need to allow them through the firewall here. 3. Click th

Strona 60

UNCLASSIFIED UNCLASSIFIED 42Chapter 4 – Configuring System Settings Figure 15: Internet Sharing Configuration Panel 2. The words “Internet Sharin

Strona 61

UNCLASSIFIED UNCLASSIFIED 43Chapter 4- Configuring System Settings 4. Click on the Login Options button near the bottom left side of the panel (Fig

Strona 62

UNCLASSIFIED UNCLASSIFIED 44Chapter 4 – Configuring System Settings unencrypted form on the system. The password for this account should be change

Strona 63

UNCLASSIFIED UNCLASSIFIED 45Chapter 4- Configuring System Settings which can automatically update the system’s date and time by communicating with a

Strona 64

UNCLASSIFIED UNCLASSIFIED 46Chapter 4 – Configuring System Settings 3. If necessary, uncheck the checkbox in front of Check for updates: to disabl

Strona 65

UNCLASSIFIED Restricting Administrator’s Home Folder Permissions UNCLASSIFIED 47Chapter 4- Configuring System Settings When FileVault is not enabled

Strona 66

UNCLASSIFIED UNCLASSIFIED Trademark Information This Page Intentionally Left Blank

Strona 67

UNCLASSIFIED UNCLASSIFIED 48Chapter 4 – Configuring System Settings 3. Click on the root item in the users column. The root user’s properties and

Strona 68

UNCLASSIFIED UNCLASSIFIED 49Chapter 4- Configuring System Settings 9. Click the lock icon in the lower left corner of the NetInfo Manager window to

Strona 69

UNCLASSIFIED UNCLASSIFIED 50Chapter 4 – Configuring System Settings 4. At the next prompt, enter: setenv security-mode command 5. To restart th

Strona 70

UNCLASSIFIED UNCLASSIFIED 51Chapter 4- Configuring System Settings 2) Title: Open Firmware: Password Not Recognized when it Contains the Letter “U”

Strona 71

UNCLASSIFIED UNCLASSIFIED 52Chapter 4 – Configuring System Settings 6. Open a new terminal window and issue the following command, replacing <x

Strona 72

UNCLASSIFIED UNCLASSIFIED 53Chapter 4- Configuring System Settings <string>THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM. USE OF THE SYSTEM

Strona 73 - Configuring User Accounts

UNCLASSIFIED UNCLASSIFIED 54Chapter 4 – Configuring System Settings Figure 20: Console Log In Mac OS X, log files are handled by either the BSD s

Strona 74

UNCLASSIFIED UNCLASSIFIED 55Chapter 4- Configuring System Settings mail.emerg /var/log/mail.log The facility and priority are separated by onl

Strona 75

UNCLASSIFIED UNCLASSIFIED 56Chapter 4 – Configuring System Settings DayOf DayOf #Minute Hour Month Month Week User Command 15 12 * * 2 root

Strona 76

UNCLASSIFIED UNCLASSIFIED 57Chapter 4- Configuring System Settings not permanently disable the components; however, administrative access is needed

Strona 77

UNCLASSIFIED UNCLASSIFIED vii Table of Contents Table of Contents Warnings...

Strona 78

UNCLASSIFIED UNCLASSIFIED 58Chapter 4 – Configuring System Settings running Mac OS 9 applications: booting the system into Mac OS 9, and running a

Strona 79

UNCLASSIFIED sudo rm –rf '/System/Library/Classic/' UNCLASSIFIED 59Chapter 4- Configuring System Settings sudo rm –rf '/System/Libra

Strona 80

UNCLASSIFIED UNCLASSIFIED 60Chapter 4 – Configuring System Settings This Page Intentionally Left Blank

Strona 81

UNCLASSIFIEDChapter 6 - Future Guidance Chapter 5 Configuring User Accounts Once the first administrator account and the root account are securely

Strona 82

UNCLASSIFIED UNCLASSIFIED 62Chapter 6 – Future Guidance Creating User Accounts The following instructions describe creation of a standard user acc

Strona 83

UNCLASSIFIEDpolicy should require a new user to change his password immediately upon first login. Chapter 6 - Future Guidance 6. Leave the Passwor

Strona 84

UNCLASSIFIED UNCLASSIFIED 64Chapter 6 – Future Guidance Granting Administrative Privileges An administrative user on the system can perform standa

Strona 85

UNCLASSIFIED Chapter 6 - Future Guidance Figure 23: Grant Administrative Privileges Limiting a User Account Two levels of limited user accounts a

Strona 86

UNCLASSIFIED UNCLASSIFIED 66Chapter 6 – Future Guidance 1. Click on the Show All icon in System Preferences, or restart System Preferences if nec

Strona 87

UNCLASSIFIEDA user with this capability enabled will be able to configure security-related items within the System Preferences panel such as the ti

Strona 88

UNCLASSIFIED UNCLASSIFIED viii Table of Contents Network...

Strona 89

UNCLASSIFIED UNCLASSIFIED 68Chapter 6 – Future Guidance 12. Click on the unlocked lock icon at the bottom of the panel to re-lock the preferences

Strona 90

UNCLASSIFIEDSystem Preferences Settings Chapter 6 - Future Guidance The following configuration should be done for every user account, and must be

Strona 91

UNCLASSIFIED UNCLASSIFIED 70Chapter 6 – Future Guidance 9. Click on the Hot Corners button at the bottom left of the Desktop & Screen Saver p

Strona 92

UNCLASSIFIED Chapter 6 - Future Guidance Figure 26: Disable Software Update If an internal microphone is installed on the system, it must be disa

Strona 93

UNCLASSIFIED UNCLASSIFIED 72Chapter 6 – Future Guidance Figure 27: Disable Internal Microphone 28. Use a dummy plug to plug the Line In jack on

Strona 94

UNCLASSIFIEDThe next step is to enable FileVault for this user: Chapter 6 - Future Guidance 33. Make sure all applications (other than System Pre

Strona 95

UNCLASSIFIED UNCLASSIFIED 74Chapter 6 – Future Guidance Overriding the Default umask The default umask value can be overridden for a particular us

Strona 96

UNCLASSIFIEDcertificate must be stored in a keychain. If a credential must be stored on the system, it should be stored and managed using the Keyc

Strona 97

UNCLASSIFIED UNCLASSIFIED 76Chapter 6 – Future Guidance login password and is automatically unlocked when the user logs in. It remains unlocked u

Strona 98

UNCLASSIFIED Chapter 6 - Future Guidance Figure 30: Keychain Password Change 6. From the Edit menu, select Change Settings for keychain “login”…

Strona 99 - Future Guidance

UNCLASSIFIED UNCLASSIFIED ix Table of Contents Creating an Encrypted Image From Existing Data ...92 Referenc

Strona 100

UNCLASSIFIED UNCLASSIFIED 78Chapter 6 – Future Guidance Figure 31: Keychain Settings 8. Check the configuration of each of the items in the log

Strona 101 - Encrypting Files and Folders

UNCLASSIFIEDe. Place a check in the Ask for keychain password checkbox. With this option selected, the user will be required to provide the keych

Strona 102

UNCLASSIFIED UNCLASSIFIED 80Chapter 6 – Future Guidance The first keychain configured here is designed to protect credentials that are accessed fr

Strona 103

UNCLASSIFIED7. Click on the name of the newly created keychain to highlight it. Chapter 6 - Future Guidance 8. Select Change Settings for keychai

Strona 104

UNCLASSIFIED UNCLASSIFIED 82Chapter 6 – Future Guidance Figure 34: Mail Keychain Items Access Control Settings Keychain 2: Moderately accessed c

Strona 105

UNCLASSIFIED7. Make sure the Lock when sleeping option is selected, and that the Lock after x minutes of inactivity option is selected and set to a

Strona 106

UNCLASSIFIED UNCLASSIFIED 84Chapter 6 – Future Guidance 4. Type a name for the new keychain in the Save As box in the window, and click on Create

Strona 107 - References

UNCLASSIFIEDguide may be used as the default keychain. If the user chooses to set a different keychain as the default, he should ensure that it is

Strona 108

UNCLASSIFIED UNCLASSIFIED 86Chapter 6 – Future Guidance 11. Drag the original file to the Trash. 12. Choose Secure Empty Trash from the Finder me

Strona 109 - Additional Resources

UNCLASSIFIEDChapter 6 - Future Guidance Chapter 6 Future Guidance Topics for consideration in future versions of this guide or in other guidance d

Komentarze do niniejszej Instrukcji

Brak uwag