Author Archive for KW – Page 20

CryptoLocker Protection Utility for Home Users

Read detail instructions for installing the KW Support’s CryptoLocker Prevention Utility for home computers and for non-domain joined business computers.

Screenshot #1

image

Screenshot #2

image

Screenshot #3

image

Screenshot #4

image

Screenshot #5

image

Screenshot #6

image

Screenshot #7

image

Screenshot #8

image

Screenshot #9

image

Screenshot #10

image

Screenshot #11

image

Screenshot #11

Creating the SBS MyBusiness OU

The SBS products (SBS 2003/2008/2011) all included a pre-installed set of Group Policy OU’s called MyBusiness. Organizational Units (OU’s) are used to organize users and computers (workstations and servers) in order to manage and apply specific rules and policies.

However, the Essentials products (SBS 2011 Essentials, Windows 2012 Essentials) do not include the MyBusiness OU. So, if you wish to keep consistency between the SBS and Essentials platforms, you will need to create this on your own. One reason for doing this would be to implement the Group Policies related to blocking the CryptoLocker ransomware.

Fortunately, Microsoft did identify the basic steps for creating the MyBusiness OU in KB 2578426 and scroll down to Issue 3 / Rule 3 in the KB article for the required steps.

To (re)create the MyBusiness OU manually. To do this, follow these steps:

  1. Open Active Directory Users and Computers.
  2. Right-click the domain name object. In the shortcut menu, point to New…, and then click Organizational Unit. Type MyBusiness to name the new object.
    Note Type MyBusiness as one word.
  3. In the MyBusiness OU that you created in step 2, create the following OUs:
    • Computers
    • Distribution Groups
    • Security Groups
    • Users
  4. In the Computers OU that you created in step 3, create the following OUs:
    • SBSComputers
    • SBSServers
  5. In the Users OU that you created in step 3, create the following OU:
    • SBSUsers

After you have finished these steps, your Group policy structure should look like this:

2620671

CryptoLocker Group Policy Exceptions

In recent posts (here) I’ve addressed the process of creating Group Policy rules for securing your workstations from attacks like the CryptoLocker ransomware. These rules will prevent random executable files located in your local Application Data folder (AppData) from running.

The vast majority of programs that you may use should not put .exe files in the AppData folder, but every so often we come across an exception. In my case, I tried running Join.Me this morning and was greeted with this pop up window:

image

The process of adding an exception to the Software Restriction Rules we previously created is very straightfoward:

  1. From the server, open up Group Policy Management console
  2. Drill down Your_domain.local –> MyBusiness –> Computers –> SBSComputers

    Modify the XP rule

  3. Right click on the Prevent CryptoLocker XP rule, and click Edit
  4. Drill down Computer Configuration –> Policies –> Windows Settings –> Security Settings –> Software Restriction Policies
  5. Right click on Additional Rules, then click New Path rule… and create a new rule for the exception.
    In my case, my rule looks like this:
    image
  6. Click OK

    Modify the Vista and higher rule

  7. Right click on the Prevent CryptoLocker Vista and higher rule, and click Edit
  8. Drill down Computer Configuration –> Policies –> Windows Settings –> Security Settings –> Software Restriction Policies
  9. Right click on Additional Rules, then click New Path rule… and create a new rule for the exception.
    In my case, my rule looks like this:
    image
  10. Click OK

You may now wait the appropriate time (somewhere around 90 minutes, I believe) for Group Policy changes to be broadcast to all workstations, or, if you are in a hurry:

  1. From the server, open up an elevated command prompt and run: gpupdate /force
  2. Then from your workstation, open up an elevated command prompt and run: gpupdate /force

You may now test out your application

Testing your CryptoLocker Group Policy

I posted previously on using Group Policy to establish rules to prevent executable files (.exe) stored in the Windows AppData directory from running, as a way to minimize or prevent the Cryptolocker-type ransomware from infecting your computers.

Someone asked me: “How do I know if the group policy rules are working?”

Good question … easy answer: drop in a small executable file into your local AppData directory and try to run it. I like to use notepad.exe for this test.

Here are the steps if doing this from a Vista / Win7 / Win8 workstation:

  1. Open up an elevated command prompt window.
    By default, it should put you into the C:\Windows\System32 folder
  2. Enter the following commands, pressing Enter after each:
    copy notepad.exe %localappdata% 
    cd %localappdata%
    notepad.exe
  3. If you receive an error message: “This program is blocked by group policy.” – then your group policy rules are working.
    Congratulations!

image

Block Executables from AppData folder

The SMB Kitchen team from Third Tier has made available (for free) a CryptoLocker Prevention Kit that includes a 20 page document that includes step by step instructions on how to lock down your servers and workstation using Group Policy settings to minimize future attacks.

The purpose of this post is to summarize those steps down to a single page. These steps are specific to SBS 2008/2011, but should be applicable to Windows 2008/2012 servers.

GOAL: create Software Restriction Policies within Group Policies to block executables (.exe) from running when they are located in the AppData folder or subfolders therein.

CREATE POLICIES FOR XP

  1. Open up Group Policy and drill down to Domain –> Computers –> SBSComputers
  2. Right click on SBSComputers and select ‘Create a GPO in this domain and link…
  3. Title this policy Prevent CryptoLocker XP and click OK
  4. Right click on this policy and select Edit
  5. Navigate to Computer Configuration –> Policies –> Windows Settings –> Security Settings –> Software Restriction Policies
  6. Right click on Software Restriction Policies and click on ‘New Software Restriction Policies
  7. Right click on Additional Rules and click on ‘New Path rule’ and then enter the following information and then click OK
    Path = %AppData%\*.exe
    Security Level = Disallowed
    Description: Don’t allow executables from AppData
  8. Repeat Step 7 for AppData subfolders
    Path = %AppData%\*\*.exe
    Security Level = Disallowed
    Description: Don’t allow executables from AppData subfolders
  9. Close this policy configuration window
  10. From the Prevent CryptoLocker XP policy locate WMI filtering near the bottom of the middle frame and select ‘Windows SBS Client – Windows XP

CREATE POLICIES FOR VISTA / WIN7 / WIN8

  1. Open up Group Policy and drill down to Domain –> Computers –> SBSComputers
  2. Right click on SBSComputers and select ‘Create a GPO in this domain and link…
  3. Title this policy Prevent CryptoLocker Vista and higher and click OK
  4. Right click on this policy and select Edit
  5. Navigate to Computer Configuration –> Policies –> Windows Settings –> Security Settings –> Software Restriction Policies
  6. Right click on Software Restriction Policies and click on ‘New Software Restriction Policies
  7. Right click on Additional Rules and click on ‘New Path rule’ and then enter the following information and then click OK
    Path = %localAppData%\*.exe
    Security Level = Disallowed
    Description: Don’t allow executables from AppData
  8. Repeat Step 7 for AppData subfolders
    Path = %localAppData%\*\*.exe
    Security Level = Disallowed
    Description: Don’t allow executables from AppData subfolders
  9. Close this policy configuration window
  10. From the Prevent CryptoLocker Vista and higher policy locate WMI filtering near the bottom of the middle frame and select ‘Windows SBS Client – Windows Vista

From XP and Vista to Windows 8.1 over the years

My trusty (and crusty) Dell Optiplex 745 has been a great workstation for me over the past seven years.

  • I started with Windows XP on the workstation.
  • Over the 4th of July weekend in 2007 I upgraded my workstation to Vista and wrote about my experience here.
  • Then in October 2009 I did an in-place upgrade of my workstation from Vista to Windows 7, and wrote about it here.
  • So here we are in October 2013, and I finally decided to proceed with a double upgrade this weekend – first to Windows 8, and then Windows 8.1.

Once again my experience was fantastic. Here is a summary of my process:

Pre-Cleanup

I knew I had collected a lot of older 3rd party utilities and apps on this workstation over the years. So, I first took time to review and uninstall those apps that I did not need or use. I recommend doing this before proceeding with the upgrade.

For Quicken, I did a final download of all my accounts and then did a backup of my Quicken database.

I also cleaned out temp files using CCleaner, and reviewed my various Download directories and removed anything I no longer needed.

Backup

Please be sure you have a full system image backup of your workstation before proceeding. That’s just being smart. In my case, I still run Windows Home Server in-house, and fired up a backup of my workstation.

Verify Hardware/Software Compatibility

My only complaint was that it appeared that Microsoft bundled the Upgrade Assistant with the actual setup of Windows 8 – which means that you had to obtain/purchase a copy of Windows 8 prior to determining if your workstation is compatible.

However, with kudos from GHacks.net, I found that Microsoft does indeed have a standalone Windows 8.1 Upgrade Assistant which you can download and run.

image

I was pleasantly surprised to find that I only had 13 items that I needed to review, and the majority of those were older 3rd party utilities that I really don’t care if they work or not. The only significant app that was flagged that I was concerned with was Quicken, as I was still running Quicken 2011.

image

Upgrade to Windows 8

I then used my Action Pack subscription to download the Windows 8 Professional iso file, and burned it to a DVD. Running the in-place upgrade took quite a while,  but lo and behold, when it finished I was setting at a Windows 8 login.

Before proceeding with upgrading to Windows 8.1, I thought it would be advisable to check out the workstation – Internet, Office, Quicken, and printing, and everything looked good.

Upgrade to Windows 8.1

I went to the Windows Store app looking for the Upgrade to 8.1, but it wasn’t there. So, I decided to run Windows Update and install all Windows 8  related updates, and then rebooted. After that, the Windows store app showed the 8.1 Upgrade option.

Final Comments

Jump in and learn Windows 8. Buy yourself a book.

There’s even a free Windows 8.1 eBook from Microsoft Press!

Free Windows 8.1 eBook

Microsoft Press has made available a free eBook, written by Ed Bott, titled Introducing Windows 8.1 for IT Professionals Technical Overview.

That certainly is a mouthful – but this 130 page eBook is jammed pack with information.

Here is the Table of Contents:

  • imageIntroduction
  • Overview of 8.1
  • The 8.1 User Experience
  • Deploying 8.1
  • Security in 8.1
  • Internet Explorer 11
  • Delivering Windows Store Apps
  • Recovery options in 8.1
  • 8.1 and Networks
  • Virtualization in 8.1
  • Windows RT 8.1
  • Managing Mobile Devices

Be careful with KB2862330

Several new Windows updates were recently released. The word from a trusted security MVP is to be careful, especially with KB2862330 which has caused some BSOD’s on some systems (Read more on this issue).

Once again, I always encourage people to make sure that they create a system restore point before installing updates, or better yet, do regular full backups of your computer.

If you do encounter a BSOD with any Microsoft update, call Microsoft:

“We can offer anyone who has this issue and is willing to go through troubleshooting a free-of-charge support incident and Support will work with you 1-1 to get your computer(s) back into a working state. The teams who released this update do know that there may be a problem and are doing additional testing to identify the root cause of the issue that folks are experiencing,” (Ben Herila, Microsoft product manager).

Windows 8.1 now available!

imageThe much-anticipated upgrade to Windows 8 …

Windows 8.1

is now available today (October 17, 2013).

 

Upgrading to Windows 8.1 is free and easy. Just start up Windows 8, click on the Windows Store tile, and click to start updating!

image  image  image

After Windows 8.1 has been installed, and you restart your computer. you will be have a chance to set additional Express Settings. You can choose to take the default settings, or customize them on your own.

After logging in, you will have an option to generate a security code (6 digit pin code) for you to use in case of suspicious activity with your account.

Enjoy!

Fix Word Starter 2010 File Association Issue

You installed a trial version of Microsoft Office 2010, and the trial version has now expired. Now, when you try to double click on a Word (.doc, .docx) or Excel (.xls, .xlsx) file, you get a big screen saying you don’t have Office 2010’s Word/Excel installed.

What happened is that when the trial version expired, it flipped you to running the Starter version of Microsoft Word and Excel. All that needs to be done is to update the file association for those specific file types.

Here’s what you need to do:

  1. Click on the Start button on the lower left
    image
  2. In the right hand column, click on the option labeled Default Programs
  3. Then click on Associate a file type or protocol with a program, and a list of file types will display
  4. Locate .doc and double click on it.
  5. Now select Microsoft Office Client Virtualization Handler* as the program to associate with .doc files.
  6. Repeat this process for .docx, .xls, .xlsx, or any other related file types.

* If you see Microsoft Application Virtualization DDE Launcher listed instead, use that instead.