The operating systems' security features

Dec 18, 2006 11:26 GMT  ·  By

If you had to put your money on the Windows Vista features that will come under attack what would those features be? If I were to place my bet, I would do so on the operating system's security features. Windows Vista features an impressive panoply, but it also provides a guide of the features that will be targeted.

The User Account Control is one of the operating system's aspects that will need to be rendered as inoperable for a successful attack to take place. In Vista UAC handles the administrative tasks initiated by users in the Administrators group and safeguards Windows and System32 files.

Address Space Layout Randomization is a security feature that blocks buffer overflow attacks, but is dependent of the enabled/disabled status of the Data Execution Prevention/No eXecute. Internet Explorer 7 in Windows Vista runs in Protect Mode, also on top of the Address Space Layout Randomization.

In Vista, Windows firewall, Windows Defender and password-protected screensaver are installed by default, LM password hashes LM and NTLMv1 authentication protocols are disabled by default.

Vista services are now managed by SIDs, and the settings for security privilege permissions have been kept at low levels. The operating system additionally delivers in excess of 800 new group policy settings. All files and objects in Vista have been assigned integrity levels, alterations being permitted only if the security level exceeds the integrity level. Event Viewer has been expanded to include additional log files, the Previous Versions client is also a default installation and System Restore delivers backup for the My Documents folder.

In Windows Vista, IPv6 and IPv4 are active by default, and the Microsoft has improved the operating system's wireless security and improved SMB. The Redmond Company has even introduced virtualization to commonly handled folder and registry keys to limit system infections.