Apple Mac OS X Panther Einstellungsanleitung Seite 1

Stöbern Sie online oder laden Sie Einstellungsanleitung nach Software Apple Mac OS X Panther herunter. Apple Mac OS X Panther Setup guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 109
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
UNCLASSIFIED
UNCLASSIFIED
Report Number:I331-009R-2004
Apple Mac OS
X v10.3.x
“Panther”
Security Configuration Guide
Guide Version 1.1
Systems and Network Attack Center (SNAC)
National Security Agency
9800 Savage Rd.
Ft. Meade, MD 20755-6704
Seitenansicht 0
1 2 3 4 5 6 ... 108 109

Inhaltsverzeichnis

Seite 1 - Security Configuration Guide

UNCLASSIFIED UNCLASSIFIED Report Number:I331-009R-2004 Apple Mac OS X v10.3.x “Panther” Security Configuration Guide Guide Version 1.1 Systems

Seite 2

UNCLASSIFIED UNCLASSIFIED x Table of Contents This Page Intentionally Left Blank

Seite 3

UNCLASSIFIED UNCLASSIFIED 88Chapter 6 – Future Guidance This Page Intentionally Left Blank

Seite 4

UNCLASSIFIEDAppendix A - Encrypting Files and Folders Appendix A Encrypting Files and Folders As described earlier, Mac OS X’s FileVault feature c

Seite 5

UNCLASSIFIED UNCLASSIFIED 90Appendix A – Encrypting Files and Folders 1. Open Disk Utility, located in /Applications/Utilities, and make sure not

Seite 6

UNCLASSIFIED Appendix A - Encrypting Files and Folders Figure 38: Disk Utility Save Panel 4. Choose the size of the disk image from the Size pop

Seite 7

UNCLASSIFIED UNCLASSIFIED 92Appendix A – Encrypting Files and Folders keychain is unlocked, the data will be transparently unencrypted if an attem

Seite 8

UNCLASSIFIED Appendix A - Encrypting Files and Folders Figure 41: Disk Utility Convert Image Panel 4. Select AES-128 (recommended) for Encryption

Seite 9

UNCLASSIFIED UNCLASSIFIED 94Appendix A – Encrypting Files and Folders This Page Intentionally Left Blank

Seite 10 - UNCLASSIFIED

UNCLASSIFIED Appendix B- References Appendix B References 1. Mac OS X Maximum Security; Ray, John, and Ray, Dr. William C.; Sams Publishing; 2003 2.

Seite 11 - Introduction

UNCLASSIFIED UNCLASSIFIED 96Appendix B – References This Page Intentionally Left Blank

Seite 12

UNCLASSIFIED Appendix C- Additional Resources Appendix C Additional Resources The following are additional resources that may be helpful to readers o

Seite 13 - Scope of Guidance

UNCLASSIFIED UNCLASSIFIED xi Introduction Introduction The purpose of this guide is to provide an overview of Mac OS X v10.3.x “Panther” operating sy

Seite 14

UNCLASSIFIED UNCLASSIFIED xii Introduction About this Guide This document consists of six chapters and two appendices: Chapter 1, “Scope of Guidanc

Seite 15

UNCLASSIFIED Chapter 1 UNCLASSIFIED 1Chapter 1 - Scope of Guidance Scope of Guidance Apple’s Mac OS X operating system is very versatile, and can b

Seite 16

UNCLASSIFIED UNCLASSIFIED 2Chapter 1 – Scope of Guidance user. This method is labor-intensive for the system administrator, so the most appropria

Seite 17

UNCLASSIFIED UNCLASSIFIED 3Chapter 2 - Intro to Mac OS X Security Chapter 2 Introduction to Mac OS X Security Mac OS X v10.3.x (a.k.a. “Panther”)

Seite 18

UNCLASSIFIED UNCLASSIFIED 4Chapter 2 – Intro to Mac OS X Security from an administrator account login. This means there will be an audit log show

Seite 19 - Initial Installation

UNCLASSIFIED UNCLASSIFIED 5Chapter 2 - Intro to Mac OS X Security manage the multitude of credentials and certificates that a user must maintain. M

Seite 20

UNCLASSIFIED UNCLASSIFIED 6Chapter 2 – Intro to Mac OS X Security This Page Intentionally Left Blank

Seite 21

UNCLASSIFIED Chapter 3 UNCLASSIFIED 7Chapter 3 - Initial Installation Initial Installation Although secure configuration of an existing Mac OS X in

Seite 22

UNCLASSIFIED UNCLASSIFIED This Page Intentionally Left Blank

Seite 23

UNCLASSIFIED UNCLASSIFIED 8Chapter 3 – Initial Installation • Only user files and data should be saved and later restored; restoring system sett

Seite 24

UNCLASSIFIED UNCLASSIFIED 9Chapter 3 - Initial Installation Continue Through Installation Screens Any necessary partitioning of the hard drive can

Seite 25

UNCLASSIFIED UNCLASSIFIED 10Chapter 3 – Initial Installation 6. Click the Continue button when the Select a Destination screen re-appears.  Inst

Seite 26

UNCLASSIFIED UNCLASSIFIED 11Chapter 3 - Initial Installation iCal – Optional. iCal provides an electronic calendar, including some Internet conne

Seite 27

UNCLASSIFIED UNCLASSIFIED 12Chapter 3 – Initial Installation Initial System Configuration The next set of screens deals with configuring the just-

Seite 28

UNCLASSIFIED UNCLASSIFIED 13Chapter 3 - Initial Installation across the network when the machine is connected to one. Sensitive information should

Seite 29

UNCLASSIFIED UNCLASSIFIED 14Chapter 3 – Initial Installation  Get Internet Ready Note: This screen will only appear if the entry of registration

Seite 30

UNCLASSIFIED UNCLASSIFIED 15Chapter 3 - Initial Installation "Mac OS X Update 10.3.4" and security updates "Security Update 2004-05-

Seite 31

UNCLASSIFIED UNCLASSIFIED 16Chapter 3 – Initial Installation Figure 1: Apple’s Update Download Web Page Administrators should note that updates

Seite 32

UNCLASSIFIED UNCLASSIFIED 17Chapter 3 - Initial Installation being updated is loaded with Mac OS X v.10.3.2 or earlier. If any of the listed updat

Seite 33 - Configuring System Settings

UNCLASSIFIED UNCLASSIFIED iii Warnings Warnings  Do not attempt to implement any of the settings in this guide without first testing in a non-opera

Seite 34

UNCLASSIFIED UNCLASSIFIED 18Chapter 3 – Initial Installation 1. Place the CD with the 10.3.3 Update package in the CD-ROM drive. Mac OS v.10.3.3

Seite 35

UNCLASSIFIED 4. Follow the instructions of the Installer. UNCLASSIFIED 19Chapter 3 - Initial Installation 5. When the Installer has completed, cl

Seite 36

UNCLASSIFIED UNCLASSIFIED 20Chapter 3 – Initial Installation operating system, updates, and applications.

Seite 37

UNCLASSIFIED Chapter 4 UNCLASSIFIED 21Chapter 4- Configuring System Settings Configuring System Settings System configuration follows the installat

Seite 38

UNCLASSIFIED UNCLASSIFIED 22Chapter 4 – Configuring System Settings Removing Registration Information Mac OS X stores any registration information

Seite 39

UNCLASSIFIED UNCLASSIFIED 23Chapter 4- Configuring System Settings Figure 2: System Preferences Application Many options within the System Prefere

Seite 40

UNCLASSIFIED UNCLASSIFIED 24Chapter 4 – Configuring System Settings system’s method of restricting a user from doing this places other serious rest

Seite 41

UNCLASSIFIED UNCLASSIFIED 25Chapter 4- Configuring System Settings Figure 4: Active Screen Corners Panel 7. Use the pull-down menu corresponding

Seite 42

UNCLASSIFIED UNCLASSIFIED 26Chapter 4 – Configuring System Settings Some users reported data loss under certain circumstances when using Mac OS X

Seite 43

UNCLASSIFIED UNCLASSIFIED 27Chapter 4- Configuring System Settings To set the FileVault master password: 1. Click on the Show All icon in System

Seite 44

UNCLASSIFIED UNCLASSIFIED This Page Intentionally Left Blank

Seite 45

UNCLASSIFIED UNCLASSIFIED 28Chapter 4 – Configuring System Settings At this point, FileVault may now be activated for any user or administrative ac

Seite 46

UNCLASSIFIED UNCLASSIFIED 29Chapter 4- Configuring System Settings Figure 6: Security Panel Additional Settings 3. Place a check in the box for R

Seite 47

UNCLASSIFIED UNCLASSIFIED 30Chapter 4 – Configuring System Settings not complete until the user makes a decision about whether to save the file.

Seite 48

UNCLASSIFIED UNCLASSIFIED 31Chapter 4- Configuring System Settings 1. Click on the Show All icon in System Preferences, or restart System Preferen

Seite 49

UNCLASSIFIED UNCLASSIFIED 32Chapter 4 – Configuring System Settings Figure 8: CDs & DVDs Panel 3. Pull down and select Ignore for the When y

Seite 50

UNCLASSIFIED UNCLASSIFIED 33Chapter 4- Configuring System Settings Figure 9: Energy Saver Sleep Panel 4. Unlock the window for editing if necessa

Seite 51

UNCLASSIFIED UNCLASSIFIED 34Chapter 4 – Configuring System Settings Figure 10: Energy Saver Options Panel 8. Uncheck the checkbox in front of th

Seite 52

UNCLASSIFIED UNCLASSIFIED 35Chapter 4- Configuring System Settings 4. Click on the Internal Microphone selection (if available) and set the input v

Seite 53

UNCLASSIFIED UNCLASSIFIED 36Chapter 4 – Configuring System Settings send a request for information to the Apple Federal e-mail address: AppleFeder

Seite 54

UNCLASSIFIED UNCLASSIFIED 37Chapter 4- Configuring System Settings 6. Pull down the Location menu and repeat step 5 for any other locations in the

Seite 55

UNCLASSIFIED UNCLASSIFIED v Trademark Information Trademark Information Apple, Macintosh, Mac OS X, and “Panther” are either registered trademarks o

Seite 56

UNCLASSIFIED UNCLASSIFIED 38Chapter 4 – Configuring System Settings this guide, there is no need for this capability when configuring according to

Seite 57

UNCLASSIFIED UNCLASSIFIED 39Chapter 4- Configuring System Settings Figure 13: Sharing Services Configuration Panel 4. Unlock the window for edit

Seite 58

UNCLASSIFIED UNCLASSIFIED 40Chapter 4 – Configuring System Settings application. Only the settings that are handled within the System Preferences

Seite 59

UNCLASSIFIED UNCLASSIFIED 41Chapter 4- Configuring System Settings left enabled, you will need to allow them through the firewall here. 3. Click th

Seite 60

UNCLASSIFIED UNCLASSIFIED 42Chapter 4 – Configuring System Settings Figure 15: Internet Sharing Configuration Panel 2. The words “Internet Sharin

Seite 61

UNCLASSIFIED UNCLASSIFIED 43Chapter 4- Configuring System Settings 4. Click on the Login Options button near the bottom left side of the panel (Fig

Seite 62

UNCLASSIFIED UNCLASSIFIED 44Chapter 4 – Configuring System Settings unencrypted form on the system. The password for this account should be change

Seite 63

UNCLASSIFIED UNCLASSIFIED 45Chapter 4- Configuring System Settings which can automatically update the system’s date and time by communicating with a

Seite 64

UNCLASSIFIED UNCLASSIFIED 46Chapter 4 – Configuring System Settings 3. If necessary, uncheck the checkbox in front of Check for updates: to disabl

Seite 65

UNCLASSIFIED Restricting Administrator’s Home Folder Permissions UNCLASSIFIED 47Chapter 4- Configuring System Settings When FileVault is not enabled

Seite 66

UNCLASSIFIED UNCLASSIFIED Trademark Information This Page Intentionally Left Blank

Seite 67

UNCLASSIFIED UNCLASSIFIED 48Chapter 4 – Configuring System Settings 3. Click on the root item in the users column. The root user’s properties and

Seite 68

UNCLASSIFIED UNCLASSIFIED 49Chapter 4- Configuring System Settings 9. Click the lock icon in the lower left corner of the NetInfo Manager window to

Seite 69

UNCLASSIFIED UNCLASSIFIED 50Chapter 4 – Configuring System Settings 4. At the next prompt, enter: setenv security-mode command 5. To restart th

Seite 70

UNCLASSIFIED UNCLASSIFIED 51Chapter 4- Configuring System Settings 2) Title: Open Firmware: Password Not Recognized when it Contains the Letter “U”

Seite 71

UNCLASSIFIED UNCLASSIFIED 52Chapter 4 – Configuring System Settings 6. Open a new terminal window and issue the following command, replacing <x

Seite 72

UNCLASSIFIED UNCLASSIFIED 53Chapter 4- Configuring System Settings <string>THIS IS A DEPARTMENT OF DEFENSE COMPUTER SYSTEM. USE OF THE SYSTEM

Seite 73 - Configuring User Accounts

UNCLASSIFIED UNCLASSIFIED 54Chapter 4 – Configuring System Settings Figure 20: Console Log In Mac OS X, log files are handled by either the BSD s

Seite 74

UNCLASSIFIED UNCLASSIFIED 55Chapter 4- Configuring System Settings mail.emerg /var/log/mail.log The facility and priority are separated by onl

Seite 75

UNCLASSIFIED UNCLASSIFIED 56Chapter 4 – Configuring System Settings DayOf DayOf #Minute Hour Month Month Week User Command 15 12 * * 2 root

Seite 76

UNCLASSIFIED UNCLASSIFIED 57Chapter 4- Configuring System Settings not permanently disable the components; however, administrative access is needed

Seite 77

UNCLASSIFIED UNCLASSIFIED vii Table of Contents Table of Contents Warnings...

Seite 78

UNCLASSIFIED UNCLASSIFIED 58Chapter 4 – Configuring System Settings running Mac OS 9 applications: booting the system into Mac OS 9, and running a

Seite 79

UNCLASSIFIED sudo rm –rf '/System/Library/Classic/' UNCLASSIFIED 59Chapter 4- Configuring System Settings sudo rm –rf '/System/Libra

Seite 80

UNCLASSIFIED UNCLASSIFIED 60Chapter 4 – Configuring System Settings This Page Intentionally Left Blank

Seite 81

UNCLASSIFIEDChapter 6 - Future Guidance Chapter 5 Configuring User Accounts Once the first administrator account and the root account are securely

Seite 82

UNCLASSIFIED UNCLASSIFIED 62Chapter 6 – Future Guidance Creating User Accounts The following instructions describe creation of a standard user acc

Seite 83

UNCLASSIFIEDpolicy should require a new user to change his password immediately upon first login. Chapter 6 - Future Guidance 6. Leave the Passwor

Seite 84

UNCLASSIFIED UNCLASSIFIED 64Chapter 6 – Future Guidance Granting Administrative Privileges An administrative user on the system can perform standa

Seite 85

UNCLASSIFIED Chapter 6 - Future Guidance Figure 23: Grant Administrative Privileges Limiting a User Account Two levels of limited user accounts a

Seite 86

UNCLASSIFIED UNCLASSIFIED 66Chapter 6 – Future Guidance 1. Click on the Show All icon in System Preferences, or restart System Preferences if nec

Seite 87

UNCLASSIFIEDA user with this capability enabled will be able to configure security-related items within the System Preferences panel such as the ti

Seite 88

UNCLASSIFIED UNCLASSIFIED viii Table of Contents Network...

Seite 89

UNCLASSIFIED UNCLASSIFIED 68Chapter 6 – Future Guidance 12. Click on the unlocked lock icon at the bottom of the panel to re-lock the preferences

Seite 90

UNCLASSIFIEDSystem Preferences Settings Chapter 6 - Future Guidance The following configuration should be done for every user account, and must be

Seite 91

UNCLASSIFIED UNCLASSIFIED 70Chapter 6 – Future Guidance 9. Click on the Hot Corners button at the bottom left of the Desktop & Screen Saver p

Seite 92

UNCLASSIFIED Chapter 6 - Future Guidance Figure 26: Disable Software Update If an internal microphone is installed on the system, it must be disa

Seite 93

UNCLASSIFIED UNCLASSIFIED 72Chapter 6 – Future Guidance Figure 27: Disable Internal Microphone 28. Use a dummy plug to plug the Line In jack on

Seite 94

UNCLASSIFIEDThe next step is to enable FileVault for this user: Chapter 6 - Future Guidance 33. Make sure all applications (other than System Pre

Seite 95

UNCLASSIFIED UNCLASSIFIED 74Chapter 6 – Future Guidance Overriding the Default umask The default umask value can be overridden for a particular us

Seite 96

UNCLASSIFIEDcertificate must be stored in a keychain. If a credential must be stored on the system, it should be stored and managed using the Keyc

Seite 97

UNCLASSIFIED UNCLASSIFIED 76Chapter 6 – Future Guidance login password and is automatically unlocked when the user logs in. It remains unlocked u

Seite 98

UNCLASSIFIED Chapter 6 - Future Guidance Figure 30: Keychain Password Change 6. From the Edit menu, select Change Settings for keychain “login”…

Seite 99 - Future Guidance

UNCLASSIFIED UNCLASSIFIED ix Table of Contents Creating an Encrypted Image From Existing Data ...92 Referenc

Seite 100

UNCLASSIFIED UNCLASSIFIED 78Chapter 6 – Future Guidance Figure 31: Keychain Settings 8. Check the configuration of each of the items in the log

Seite 101 - Encrypting Files and Folders

UNCLASSIFIEDe. Place a check in the Ask for keychain password checkbox. With this option selected, the user will be required to provide the keych

Seite 102

UNCLASSIFIED UNCLASSIFIED 80Chapter 6 – Future Guidance The first keychain configured here is designed to protect credentials that are accessed fr

Seite 103

UNCLASSIFIED7. Click on the name of the newly created keychain to highlight it. Chapter 6 - Future Guidance 8. Select Change Settings for keychai

Seite 104

UNCLASSIFIED UNCLASSIFIED 82Chapter 6 – Future Guidance Figure 34: Mail Keychain Items Access Control Settings Keychain 2: Moderately accessed c

Seite 105

UNCLASSIFIED7. Make sure the Lock when sleeping option is selected, and that the Lock after x minutes of inactivity option is selected and set to a

Seite 106

UNCLASSIFIED UNCLASSIFIED 84Chapter 6 – Future Guidance 4. Type a name for the new keychain in the Save As box in the window, and click on Create

Seite 107 - References

UNCLASSIFIEDguide may be used as the default keychain. If the user chooses to set a different keychain as the default, he should ensure that it is

Seite 108

UNCLASSIFIED UNCLASSIFIED 86Chapter 6 – Future Guidance 11. Drag the original file to the Trash. 12. Choose Secure Empty Trash from the Finder me

Seite 109 - Additional Resources

UNCLASSIFIEDChapter 6 - Future Guidance Chapter 6 Future Guidance Topics for consideration in future versions of this guide or in other guidance d

Kommentare zu diesen Handbüchern

Keine Kommentare