1 / 16

Week 5 Objectives

Week 5 Objectives. Windows Operating Systems Security Overview Configuring Security Settings Restricting Software Configuring Windows Firewall with Advanced Security. Security Risks and Costs. Malware

clovis
Download Presentation

Week 5 Objectives

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Week 5 Objectives • Windows Operating Systems Security Overview Configuring Security Settings Restricting Software Configuring Windows Firewall with Advanced Security

  2. Security Risks and Costs • Malware • Malware can be used to steal passwords and other useful information from your organization. Malware can also use your computers to send out spam. The most sophisticated malware could be written specifically to target your organization. • Stolen data. • Stolen data can be used by a competitor, or used to embarrass your organization. • Legal issues. • Customer confidential or private data is stolen or made public. • Deleted data. • lost data can be expensive and time-consuming to recover.

  3. Applying Defense-In-Depth to Increase Security Defense-in-depth uses a layered approach to security • Reduces an attacker’s chance of success • Increases an attacker’s risk of detection

  4. Best Practices for Increasing Security Some best practices for increasing security are: • Apply all available security updates quickly • Follow the principle of least privilege • Restrict console login • Restrict physical access

  5. Configuring Security Templates Security Templates categories: • Account Policies • Local Policies • Event Log • Restricted Groups • System Services • Registry • File System How Security Templates are distributed: • Secedit.exe • Security Template Snap-in • Security Configuration Wizard • Group Policy • Security Compliance Manager

  6. Configuring User Rights User Rights Types: • Privileges • Logon Rights Examples: • Add workstations to a domain • Allow log on locally • Back up files and directories • Change the system time • Force shutdown from a remote computer • Shut down the system

  7. Configuring Security Options Security options settings: • Administrator and Guest account names • Access to CD/DVD drives • Digital data signatures • Driver installation behavior • Logon prompts • User account control Examples: • Prompt user to change password before expiration • Do not display last user name • Rename administrator account • Restrict CD-ROM access to locally logged-on users only

  8. Configuring Restricted Groups Group Policy can control group membership: • For any group on a local computer, by applying a GPO to the OU containing the computer account • For any group in AD DS, by applying a GPO to the Domain Controller’s OU

  9. Configuring Account Policy Settings Account policies mitigate the threat of brute force guessing of account passwords

  10. What Are Software Restriction Policies? • SRPs allow administrators to identify which applications are allowed to run on client computers • SRPs can be based on the following: • Hash • Certificate • Path • Zone • SRPs are applied through Group Policy

  11. What Is AppLocker? AppLocker applies Application Control Policies in Windows Server 2012 and Windows 8 • AppLocker contains capabilities and extensions that: • Reduce administrative overhead • Helps administrators control how users can access and use files: • .exe files • scripts • Windows Installer files (.msi and .msp files) • DLLs • Benefits of AppLocker: • Controls how users can access and run all types of applications • Allows the definition of rules based on a wide variety of variables • Provides for importing and exporting entire AppLocker policies

  12. AppLocker Rules AppLocker defines rules based on file attributes such as: Rule actions • Publisher name • Product name • File name • File version • Allow or Deny conditions • Enforce or Audit Only policies

  13. What Is Windows Firewall with Advanced Security? Windows Firewall is a stateful, host-based firewall that allows or blocks network traffic according to its configuration • Supports filtering for both incoming and outgoing traffic • Integrates firewall filtering and IPsec protection settings • Enables you to configure rules to control network traffic • Provides network location-aware profiles • Enables you to import or export policies Firewall rules control inbound and outbound traffic Windows Server 2008 Internet LAN Firewall

  14. Firewall Profiles Firewall profiles are a set of configuration settings that apply to a particular network type • The firewall profiles are: • Domain • Public • Private Windows Server 2012 includes the ability to have multiple active firewall profiles

  15. Connection Security Rules Connection security rules: • Authenticate two computers before they begin communications • Secure information being sent between two computers • Use key exchange, authentication, data integrity, and data encryption (optionally) How firewall rules and connection rules are related: • Firewall rules allow traffic through, but do not secure that traffic • Connection security rules can secure the traffic, but only if a firewall rule was previously configured

  16. Deploying Firewall Rules You can deploy Windows Firewall rules: • By using Windows Firewall with Advanced Security • By using Group Policy • By exporting and importing firewall rules

More Related