Windows NT default services Service Name
Default Startup
File Name
Definition
Methods of Securing this Service
Alerter
Manual
SERVICES.EXE
Sends system announcements and alerts to users and machines
in conjunction with the Messenger Service.
Can be disabled.
ClipBook Server
Manual
SERVICES.EXE
Can be disabled.
Computer Browser
Automatic
SERVICES.EXE
Works with other Windows machines on the network to maintain
a current list of available resources.
Though it is not really a security issue, I recommend
selecting a few machines to maintain browser lists (including your DC’s)
and then setting the following on all other machines and/or disabling
the Computer Browser Service: Directory Replicator Service
Manual
Synchronizes files from domain controller %SERVER%\c$\Winnt\System32\REPL\Export\Scripts
to C:\Winnt\System32\REPL\IMPORT\Scripts
Can be disabled. EventLog
Automatic
SERVICES.EXE
System logging service
Should NEVER be disabled. Messenger
Automatic
Allows the sending of NetBIOS messages between Windows
machines and is needed for the Alerter Service to function between machines.
Can be disabled if you don’t want to be able to use NET
SEND to confuse and aggravate users.
NetLogon
Manual
LSASS.EXE
Local Security Authority Service handles
These Services cannot be disabled. NT LM Security Support Provider
Manual
Plug and Play
Automatic
SERVICES.EXE (and PNPISA.SYS in "Devices" if
you install it)
Enables "Plug and Play" capabilities for Windows
NT 4.0
Probably should not be disabled. Remote Procedure Call (RPC) Locator
Manual
RPCSS.EXE
Remote Procedure Call Services.
Cannot be disabled. Remote Procedure Calls are used by many basic functions
within the Windows NT Operating System and its applications. You cannot
disable them and can only really secure them by tightening general security
Remote Procedure Call (RPC) Service
Automatic
RPCSS.EXE
Schedule
Manual
System event scheduler
Should be disabled unless needed. Spooler
Automatic
SPOOLS.EXE
Print spooler
Disable on machines that do not print locally or act
as a print server. TCP/IP NetBIOS Helper
Automatic
Passes normal TCP/IP connection requests to the sockets
interface to allow NetBIOS resolution.
Can be disabled on systems not requiring NetBIOS functionality.
Microsoft recommends this for IIS servers. However, the Computer Browser
and Net Logon services depend on this service so it is necessary for remote
access to the machine
Server
Automatic
SERVICES.EXE / SRV.SYS
Remote redirector
Required as long as Microsoft specific network protocols
(e.g. SMB) are used.
Workstation
Automatic
SERVICES.EXE / RDR.SYS
Local redirector
Required as long as Microsoft specific network protocols
(e.g. SMB) are used.
Network DDE
Manual
NDDEAGNT.EXE
Network Dynamic Data Exchange
Inherently vulnerable and can probably be disabled depending
on the custom applications you use.
Network DDE DSDM
Manual
HKLM\SYSTEM\CurrentControlSet\Services\Browser\Paramters
MaintainServerList [RegSZ] False
This will keep browser election traffic down and prevent
your server logs from being spammed with election announcements.
Ensure that proper ACL’s have been set on the Domain Controllers so that
only authorized users may change these files. Set the actual names of
the exporting Domain Controllers on the Workstations’ Replicator Services
instead of using the Domain name.
Use a syslog compliant service such as Addiscon’s (http://www.addiscon.com//)
EventSlog to reformat and forward all NT Event Log messages to a central
logging server
Set an account lockout policy in UserManager to hinder "brute force"
password attacks.
This has actually become reasonably functional under the latest Service
Packs and I know of no security holes that it opens up.
Restrict who may add jobs to the Scheduler using the AT or WINAT commands
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
SubmitControl [Reg_DWORD] =0 Admins only
SubmitControl [Reg_DWORD] =1 Admins & Server Operators
Set the ACL on
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Schedule and it’s subkeys
to either “Administrators” or “Administrators and Server Operators”
Print drivers run in the SYSTEM context and can be trojaned. Make the
Administrators group the owner of all print drivers in C:\Winnt\System32\Spool\Drivers
and set the ACL on this directory so that only Administrators can change
or add files (other users will still need “Read” permissions).
Add the following registry value:
HKLM\SYSTEM\CurrentControlSet\Control\Print\Providers\LanMan Print
Service\Servers
AddPrintDrivers [Reg_DWORD] =1