IT:Network:Apps.  Security Options  Group Policy  AppLocker  ACL.

Slides:



Advertisements
Similar presentations
Planning and Administering Windows Server® 2008 Servers
Advertisements

Auditing Microsoft Active Directory
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
Module 5: Creating and Configuring Group Policy
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 7 HARDENING SERVERS.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Microsoft Server 2008 R2 Group Policies & Network Policy and Access Services.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Module 8: Implementing Administrative Templates and Audit Policy.
Group Policy in Microsoft Windows Active Directory.
Module 16: Software Maintenance Using Windows Server Update Services.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Securing Microsoft® Exchange Server 2010
Module 6: Designing Active Directory Security in Windows Server 2008.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 6: Implementing Group Policy. Overview Implementing Group Policy Objects Implementing GPOs in a Domain Managing the Deployment of Group Policy.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Module 7: Managing the User Environment by Using Group Policy.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 5: Configuring Internet Explorer and Supporting Applications.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
12/1/2015Faculty : Trần Thị Ngọc Hoa1 ISA server Overview 1. Introducing ISA Server 2. Deployment Scenario for ISA Server.
Module 2: Installing Exchange Server Overview Introduction to the Exchange Server 2007 Server Roles Installing Exchange Server 2007 Completing the.
ISA SERVER 2004 Group members : Sagar Bhakta – [intro] Orit Ahmed – [installation] Michael Wijaya [advantages] Rene Salazar - [features]
Module 7: Implementing Security Using Group Policy.
Security Configuration Wizard James Leinweber Hygiene Lab / UW-MIST.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Module 8 Implementing Security Using Group Policy.
1 Installing Microsoft Exchange 2000 Server Installation Types Postinstallation Considerations.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Microsoft Installing & Configuring Windows Server Exam Questions Answers Powered By:
Administering Windows Server 2012 Question Answer.
Pass Microsoft Installing and Configuring Windows Server 2012 exam in just 24 HOURS! 100% REAL EXAM QUESTIONS ANSWERS Microsoft Installing.
Module 8: Implementing Group Policy. Overview Multimedia: Introduction to Group Policy Implementing Group Policy Objects Implementing GPOs on a Domain.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Configuring Windows Firewall with Advanced Security
HARDENING CLIENT COMPUTERS
Unit 27: Network Operating Systems
Utilize Group Policy Terminal Server Settings
Manage Security Settings with Group Policy
Module 8: Implementing Group Policy
Presentation transcript:

IT:Network:Apps

 Security Options  Group Policy  AppLocker  ACL

 Defense in depth ◦ Physical ◦ File level  Folder/File permissions  Minimalist mentality ◦ Object level  Object permissions

 Desktop ◦ Physical ◦ Group Policy ◦ Access/Authentication  Server ◦ Physical ◦ Group Policy ◦ Access/Authentication

 Perimeter ◦ NAT ◦ Firewall ◦ Security Appliances  Mail/Spam Gateway  VPN concentrator ◦ Network Access Protection

 Antivirus solutions  rise-antivirus-software.aspx rise-antivirus-software.aspx  ◦ Network based Antivirus  Centrally managed  Centrally deployed  Engines for both server and client  Agents for server based applications  Exchange filtering  Central point for updates  Engines  Definitions

 Antivirus solutions  Centralized reporting  Reports on activities, updates and policies

 Antivirus solutions ◦ Client based Antivirus  Updates done individually at client directly to Internet  Reporting local to client  Typically has engine for desktops and not server

 Group Policy Objects (GPO) can be used to secure both server and desktop machines  Security Configuration Wizard (SCW) ◦ us/library/cc771492(WS.10).aspx us/library/cc771492(WS.10).aspx

 What does SCW do? ◦ Guides you through the process of creating, editing, applying, or rolling back a security policy. ◦ It provides a way to create or modify a security policy for your server based on its role. ◦ Use Group Policy to apply the security policy to multiple target servers that perform the same role ◦ You can compare a server's security settings with a desired security policy to check for vulnerable configurations in the system.

 Security Configuration Wizard  Start  Programs  Administrative Tools 

 SCW will create/edit or roll back security settings based on your selections  Creates role based policy settings ◦ Detects what roles are installed on server

 Controlling applications ◦ Application Control Policies ◦ Software Restriction Policies

 Applocker requirements ◦ Works on Windows 7 and newer ◦ Only available on 7 Enterprise and Ultimate…not Pro  ◦ Application Identity service must be running. ◦ Add default rules to prevent stepping on “required” services

 Applocker ◦ Add default rules ◦ Create new rule

 Software Restriction Polices ◦ Similar to Applocker, works on XP and later

 Security can be controlled from the file level to the Active Directory Object level  NTFS permissions  Share permissions  ADO permissions  Out of sight, out of mind approach  Minimalist approach