My 7-Point Plan for Windows Security

Slides:



Advertisements
Similar presentations
Planning and Administering Windows Server® 2008 Servers
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Case Studies for Projects. Network Audit A brief description of the systems (via fingerprinting, if black box is used) Network perimeter should be described.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Lesson 19: Configuring Windows Firewall
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
1 Enabling Secure Internet Access with ISA Server.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Using Windows Firewall and Windows Defender
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
Module 4: Add Client Computers and Devices to the Network.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Module 14: Configuring Server Security Compliance
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
,294,967,296 Q. What are private IP addresses? A. The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the.
Lesson 11: Configuring and Maintaining Network Security
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
Module 7: Implementing Security Using Group Policy.
Administering Microsoft Windows Server 2003 Chapter 2.
Module 10: Windows Firewall and Caching Fundamentals.
Module 8 Implementing Security Using Group Policy.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Why Window’s Firewall? Free and included with the OS Easy to use Management is thru Active Directory Windows Firewall.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
Cryptography and Network Security
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Windows Vista Configuration MCTS : Network Security.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Nassau Community College
Port Scanning James Tate II
Enumeration.
Configuring Windows Firewall with Advanced Security
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Introduction to Networking
Ch 3: Obtaining Help and Support
Security of a Local Area Network
How to Fix Windows 10 Update Error 0x ?.
Information Security Session October 24, 2005
Server-to-Client Remote Access and DirectAccess
PPPoE Internet Point to Point Protocol over Ethernet
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Firewall.
Windows desktop sharing
Firewall Installation
Designing IIS Security (IIS – Internet Information Service)
IP Addresses & Ports IP Addresses – identify a device on a network
Network Security in Academia: an Oxymoron?
Presentation transcript:

My 7-Point Plan for Windows Security Terry Gray Director, Networks & Distributed Computing UW Computing & Communications September 2002

Objective Make Windows computers “Network Safe”, right out of the box. Make it easy for users to adjust their security policy in accordance with principle of least privilege (or minimum necessary access from the network). An “Open Letter” to Microsoft...

My 7-Point Plan for Windows Security Require the administrator account to have a password! By default, deny incoming connections to all but a minimum number of necessary service ports via integral firewalling. When an application requires listening on a port, give users the option of opening the port just for the session, or for a fixed time interval, or "forever”… but remind later about ports left open. Make it easy for users to establish their own local perimeter defense via IP access lists. (Important if they need to run insecure protocols within their workgroup.) Enhance existing "IP Security" capabilities to allow blocking only "initial connection" (SYN) packets. By default, have connections use IPSEC whenever available. Be wary of the UPNP NAT/firewall traversal stuff --a major security headache waiting to happen.