WNAG: Advisory Report Presented to: UCIST by: Stephen Sempson.

Slides:



Advertisements
Similar presentations
Active Directory Structure By Erick Engelke and Bruce Campbell.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Network Redesign and Palette 2.0. The Mission of GCIS* Provide all of our users optimal access to GCC’s technology resources. *(GCC Information Services:
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
March 20, 2008 Team DunKyan.  Functionality implemented to date  Current activities  Plans for rest of semester  Software demonstration  Reporting.
Hands-On Microsoft Windows Server Connecting Through Terminal Services Terminal server – Enables clients to run services and software applications.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
What are computers? Computers are machines that perform tasks or calculations according to a set of instructions, or programs. The first fully electronic.
Chapter 7 Installing and Using Windows XP Professional.
Test Review. What is the main advantage to using shadow copies?
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
Configuring the MagicInfo Pro Display
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Using Windows Firewall and Windows Defender
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
Module 4: Add Client Computers and Devices to the Network.
Enforcing Concurrent Logon Policies with UserLock.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Good Afternoon and Thank You!.  Have some Fun!  Learn at least one thing new!  Make myself available to you So please …  Ask questions and enjoy!
6.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 6: Administering User Accounts.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
 For Oracle Based Products  Windows XP Professional-SP3 / Window7-SP1 (32 Bit)  Min. Dual Processor or above  RAM 2GB or above  Internet explorer.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Securing AD DS Module A 3: Securing AD DS
Module 7: Fundamentals of Administering Windows Server 2008.
DIT314 ~ Client Operating System & Administration CHAPTER 2 INTRODUCTION TO WINDOWS XP PROFESSIONAL Prepared By : Suraya Alias.
Managing User Desktops with Group Policy
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Kevin Dunford – Windows Support & Development What do I do.. Support, configuration, and development of - Windows servers, desktops, Laptops, printers,
CPT 123 Internet Skills Class Notes Internet Security Session A.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
Lesson 11: Configuring and Maintaining Network Security
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Module 7: Implementing Security Using Group Policy.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Introduction TO Network Administration
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
WNAG: Advisory Report Presented to: UCIST By: Stephen Nickerson February 3, 2006.
Personal data protection in research projects
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Phase 4: Manage Deployment
Configuring ALSMS Remote Navigation
Active Directory Administration
Implementing Client Security on Windows 2000 and Windows XP Level 150
Chapter 10: Advanced Cisco Adaptive Security Appliance
Loyola University Holiday Card POD Portal
Windows Networking ICCM 2004 Tim Young
Presentation transcript:

WNAG: Advisory Report Presented to: UCIST by: Stephen Sempson

Nexus Changes Engineering –Bruce Campbell has left Engineering Computing to become the Manager of Science Computing IST –Ray White is now officially with Engineering Computing –this is an IST position shuffle

Nexus Icon/Logo the branding effect is good need to move on to a new icon the icon has to work in 3 formats this makes it quite challenging to design

Nexus Icon/Logo large icon - which can be more elaborate, suitable for splash screens, manual covers, etc. small icon - 32 x 32 pixels x 16 colours, for desktop icons tiny icon - 16 x 16 pixels x 16 colours, for upper left hand corner icon of apps

Nexus Icon/Logo suggestion for a logo that should fit all the requirements go back to the definition of nexus –a means of connection; a link or tie –a connected series or group –the core or centre

Nexus Icon/Logo a new icon/logo has been selected based on an earlier attempt to solicit suggestions/designs a review of all input, with the final design can be found at iew/Nexus/NewIcon

Nexus Icon/Logo this icon has been voted/recommended to be the new icon/logo for use

Nexus Office Computers more than 50% (conservative) of all faculty- based machines are still unmanaged there maybe thousands of computers which may move to managed systems Nexus is frequently and inaccurately thought of only the student network

Nexus Office Computers to move towards a managed workstation –Faculty has control in the managed system –users can keep control over their system –have different levels of managed control over the workstation

Nexus Office Computers basically 4 different models: –the very secure and locked down student lab workstation –the fully managed office workstation –the security managed office workstation –the portable devices

Nexus Office Computers all 4 models have the following managed services in common: –Antivirus –Windows Updates –very strict firewall using Internet Protocol Security (IPSec). this allows protection to users, within their environment, where office users can be local administrators who can administer their machine

Nexus Schema Change small nexus schema change added the field: nexusWksAdministrator this is being used to deal with distributed management

Nexus Schema Change moving forward in our plan to implement the new security model, there are two big steps that need to be accomplished –all Group Policies (GPOs) to be moved to the ownership of the people who should own them –all workstations permissions to the people selected by department to have write access both of these are now possible and are being implemented

WINS Flaw Windows Internet Naming Service (WINS) –provides a distributed database for registering and querying dynamic computer name-to-IP address mapping in a routed network environment a flaw in Windows server software could allow remote attacks to launched against systems disabled the WINS server for NEXUS domain

Nexus Break-in there was a break-in into nexus over the Christmas holidays various special utilities notification prevented the attacker from going further the attacker had prior knowledge of two administrator passwords this person had done significant legwork in advance, much of it in December

Nexus Slow Logins created a feature whereby the user can elect at login time whether to load the profile or not if the user enters a dash before the userid (e.g. - erick2) then we revert to a local profile on the workstation. for the duration of the session, the user has his usual N: drive, but the profile used is what would be given if the user was logging in for the first time

Nexus Slow Logins this local profile option should give approximately constant login delays (because less network i/o is required). the exact time will depend on the locally installed software, because each application will add its part to the profile

Nexus Slow Logins when the user logs off, this temporary profile is not copied back to the network. it still sits on the hard disk, and is eventually erased. the user's personal profile is untouched

Nexus Slow Logins the end result a university-wide solution to this problem this difficult issue was solved in a very short time, and in a very professional manner

Nexus moving to XP time to phase out Windows 2000