Windows Administration How to protect your computer.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
Explanations Of Software Utilities By Tim Wong.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 10: Server Administration.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
File sharing. Connect the two win 7 systems with LAN card Open the network.
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Microsoft ® Official Course Module 9 Configuring Applications.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Test Review. What is the main advantage to using shadow copies?
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Cyber Patriot Training
Thrive Installation.
Services and Disk Management. Default Services (some) Alerter ClipBook Server Computer Browser DNS Client Event Log Messenger Net Logon Network DDE Network.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Copyright 2000 eMation SECURITY - Controlling Data Access with
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 14: Configuring Server Security Compliance
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
Microsoft FrontPage 2003 Illustrated Complete Finalizing a Web Site.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
70-270: MCSE Guide to Microsoft Windows XP Professional 1 Windows XP Professional User Accounts Designed for use as a network client for: Windows NT Windows.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Module 8 : Configuration II Jong S. Bok
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NetTech Solutions Security and Security Permissions Lesson Nine.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Tutorial 5 Protecting Your Computer
Chapter 6 Application Hardening
HARDENING CLIENT COMPUTERS
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
Microsoft FrontPage 2003 Illustrated Complete
Configuring Internet-related services
Press ESC for Startup Options © Microsoft Corporation.
Designing IIS Security (IIS – Internet Information Service)
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Windows Administration How to protect your computer

Issues Installation Operation

Installation Don‘t forget to set a password for the administrator account In order to prevent any unallowed access during installation the „setting- up network“ step could be skipped. Skip installing the other needed internet related services. Web (IIS) Server, FTP Server, SMTP Server...

Installation Why? Skipping some steps will speed up the installation Not installing the vulnerable parts will prevent any „hack“ before finishing the installation.

Right after installation Disable the default shared directories or disable write acces to them. Leave the simple file sharing disabled (XP Home - Problem) Create a new restricted user for normal usage of the computer, use the administrator account only for „administration“!

Right after installation Install all the service packs and the patches available from Microsoft. (Windows update) Install an anti-virus software Install a personal firewall software or activate the built-in firewall (ICF – internet connection firewall)

Right after installation Continue installing the rest of the software packets needed. (Also IIS, FTP...) A good ideea: after finishing the installation make a system back-up for being able later to repair a broken system.

Operation – User rights A more restricted user will protect the computer from you and from the rest… For tasks that need higher permissions you can always use „fast-switch“ to logon as administrator and accomplish the task without logging off.

Operation – User rights tuning Edit policies for different users. i.e. make a user for file sharing and grant only this right. Create user groups – don‘t set policies on simple users.

Operation – wrong defaults Enable the showing of known file extensions Default shared directories. Leave Guest account disabled Speed tuning – background picture, menu animations, window animations...

Operation – Don‘t s Connect using telnet Connect using standard ftp Problems Logging on public computers Using eBanking on public computers

Operation – Protect Privacy Internet explorer – History, Temporary Internet Files Cookies? Explorer – Recent Documents List Recycle Bin + Software Shredder

Operation – Nice Features Internet Connection Firewall Internet Connection Sharing

Operation – Fine tuning Stop: Alerter, Automatic Updates, Background Transfer, ClipBook, Computer Browser, DHCP Client, Human Interfaces Devices, Help and Support, IIS, FTP, Indexing Service, Messenger, Net Meeting, DDE, SMTP, Themes...

Operation – Hacker attack? Save Log Files Try to identify the malicious user Stop the malicious software Ensure the software won‘t start at a next start of the computer.