Bethesda Cybersecurity Club Lesson 5 MS Windows Security Configurations and Practice Images
Agenda Review (Accounts, Firewalls, OS Updates) Windows security configurations File permissions and encryption Backups Auditing Performance monitoring practice images
File Permissions Parent and Child Objects Full Control Modify Administrator level access Users can make all possible changes to file or folder Modify Users can change content, but not ownership Users cannot delete Read and Execute Users can open and run programs List Folder Contents Users can view names of files in folder Write Users can make changes to file/ overwrite content Read Users can view a file or folder, but not edit Parent and Child Objects
Customizing permissions Apply same permissions to all contents of folder: Right-click Folder Properties Security Tab
Customizing permissions Remove inherited permissions: Advanced Button Change Permissions Uncheck “Include Inheritable permissions”
MS Office File Encryption Open MS Office File Window Button Protect Document Encrypt Document
Windows Backup Options Windows allows you to create three types of backups System Repair Disc Contains only the system files needed to install/restore Windows to a computer without a functioning OS Can be followed with system image to restore everything else System image Contains files and programs on your system and Windows system files and settings When you boot a computer with a functioning OS from system image, the entire system will be automatically restored “Full” Backup Saves program files, folders, and documents so they can be restored to a machine with a functioning OS Much smaller in size than system discs, so can be run more frequently Control Panel System and Security Backup your computer
Windows Auditing | Event Viewer View records of changes and other events Control Panel System and Security Administrative Tools Event Viewer Security Logs can be useful defense against attacks and tool for forensic investigations Events Logged by programs Logon attempts Events during installation Events logged by system components Events forwarded from other computers
Windows Auditing | Audit Policy Control Panel System and Security Administrative Tools Local Security Policy Local Policies Audit Policy Success: Generates an event when the requested action succeeds Failure: Generates an event when the requested action fails No Auditing: Does not generate an event for the action
Performance Monitoring Allows you to track the use and performance of hardware and software resources Allows you to view real-time and historical data Allows you to decide if hardware and software need updating Allows you to determine if unknown programs and/or malware are running Allows you to monitor and restrict user access
Practice Images