CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.

Slides:



Advertisements
Similar presentations
Security Update Server Registration, Active scanning and Windows patching.
Advertisements

SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Monitors and reacts to network and server failures to ensure maximum network uptime.
WSUS Windows Update Services
System Security Scanning and Discovery Chapter 14.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Network Security Scanner Network vulnerability scanning, patch management and auditing.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Vulnerability Analysis Borrowed from the CLICS group.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
1 Presentation ISS Security Scanner & Retina by Adnan Khairi
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Presentation outline IT pain points Top features Product snapshot
Windows Anti-virus and Security WNUG Meeting
SUS Services ECE Computer Facilities. SUS Services Software Update Services Microsoft Security And Critical Update Service Microsoft Security And Critical.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Cyber Patriot Training
Module 4: Add Client Computers and Devices to the Network.
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
Shadow Security Scanner Li,Guorui. Introduction Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built.
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
10. Resources: where to go for more info?. 2 Microsoft Objectives “Working with Microsoft technologies has its ups and downs…” Where to find stuff…
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone SmartEvent (Intro) Антон Разумов Консультант по безопасности.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
NT4 SP4 Security Jack Schmidt - Fermilab
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Information Security 493. Lab 10.1: Look for Security Events within Windows XP Logging is automatically enabled for many items on a workstation, but the.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Microsoft Management Seminar Series SMS 2003 Change Management.
TCOM Information Assurance Management System Hacking.
Retina Network Security Scanner
Product Presentation. SysKit By Acceleratio Acceleratio Ltd. is a software development company based in Zagreb, Croatia, Europe founded in Technology.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Module 7: Designing Security for Accounts and Services.
Windows Administration How to protect your computer.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Windows Security.
CSCE 548 Student Presentation By Manasa Suthram
Kennesaw State University
Network hardening Chapter 14.
Designing IIS Security (IIS – Internet Information Service)
Hacking Windows Damian Gordon.
Presentation transcript:

CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard

12/10/2004CIS Oscar Vazquez2 GFI LANguard OVERVIEW Network Security Scanner (N.S.S.) checks network for all potential methods that a hacker might use to attack it. By analyzing the operating system and the applications running on your network, identifies possible security holes.

12/10/2004CIS Oscar Vazquez3 Scanned Vulnerabilities Service pack level & security patches –Windows NT/2000/2003/XP –Microsoft Office –Microsoft Exchange Server –Microsoft SQL Server –virus updates or client software deployment Open shares –administrative and printer shares (C$,D$, ADMIN$) –shows you who has access to the share. Open ports –Port-scanning engine, allowing you to scan your network –TCP/IP and UDP Services –Identifies well-known services (www / FTP / telnet / SMTP... )

12/10/2004CIS Oscar Vazquez4 Scanned Vulnerabilities (Cont…) Applications –Deploy 3rd party software or patches network-wide –Update custom or non-Microsoft software –Virus updates –Checks for programs that run automatically (potential Trojans) Key registry entries –Security auditing policies –Start up –Log system Weak passwords –Maximum password age –Password history –Minimum password length

12/10/2004CIS Oscar Vazquez5 Basic Settings and Use

Scanned Results Nodes by IP HTML Report Comparisons

12/10/2004CIS Oscar Vazquez7 Basic Settings and Use

12/10/2004CIS Oscar Vazquez8 HTML Report

12/10/2004CIS Oscar Vazquez9 Basic Settings and Use

12/10/2004CIS Oscar Vazquez10 Basic Settings and Use

12/10/2004CIS Oscar Vazquez11 Practical Demo LAB Setting –Windows 2000 is installed from scratch on the Target box –LANGUARD app. is installed on Administrator machine –Both PCs are connected to the same network segment Run on Target NSS Tool just after W 2000 installation –Create a ReportCreate a Report –Applied parches –Applied security policies –Shutdown ports and services –Password settings

12/10/2004CIS Oscar Vazquez12 Practical Demo (Cont…) After complete the OS Hardening –Run NSS Tool on Target machine Again –Create a HTML reportCreate a HTML report

12/10/2004CIS Oscar Vazquez13 Practical Demo Conclusion The initial operating system installed showed many vulnerabilities. The computer could be very easy compromised by a hacker. LANGuard is an excellent tool to test the security level of an entire network of computers. Lots of vulnerability can easily be fixed updating software applications and the operating system In addition to maintain the system up-to-date, is mandatory the execution of operating system hardening to customize the security level of the computer according to the level of the preferred functionality.

12/10/2004CIS Oscar Vazquez14 LANGuard Features review… Network-wide patch management Check for unused user accounts on workstations Audit your network for security vulnerabilities Detect unnecessary shares, open ports & unused user accounts on workstations Check for and deploy missing security patches & service packs in OS & Office. Automatically alerts new security holes Price $495 for 100 IPs, $995 for unlimited IPs.

12/10/2004CIS Oscar Vazquez15 LANGuard Questions…??