Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.

Slides:



Advertisements
Similar presentations
Security Features in Microsoft® Windows® XP James Noyce, Senior Consultant Security Solutions Team, Business Critical Services Microsoft Security Solutions,
Advertisements

Enabling Secure Internet Access with ISA Server
Configuring Windows to run Dr.Web scanner remotely.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Configuring Access to Internal Resources.
Chapter 7 HARDENING SERVERS.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 19: Configuring Windows Firewall
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
Understanding Active Directory
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Windows Security Mechanisms Al Bento - University of Baltimore.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Chapter Six Windows XP Security and Access Controls.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at
Windows 7 Firewall.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Active Directory Travis Favors Ryan Manuel Robert Rayer.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Module 5: Designing Security for Internal Networks.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Module 7: Implementing Security Using Group Policy.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Module 10: Windows Firewall and Caching Fundamentals.
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Module 8 Implementing Security Using Group Policy.
Windows Administration How to protect your computer.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
4 Securing Secure the hardware –Lock the server room and other ways to get access to the hardware. –Password protect the BIOS-setup Secure the NOS.
Windows Vista Configuration MCTS : Network Security.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Basharat Institute of Higher Education
Nassau Community College
Introduction to Operating Systems
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
Unit OS7: Security 7.4. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze.
Implementing TMG Server Publishing
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Information Security Session October 24, 2005
Computer Security Distributed System Security
Identity & Access Management
Securing Windows 7 Lesson 10.
(Authentication / Authorization)
Designing IIS Security (IIS – Internet Information Service)
Protection Mechanisms in Security Management
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Windows Security

Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall

Authentication Credentials Identity (username) Proof of identity (password) Graphical Identification and Authentication (GINA) DLL Authentication Managed by Local Security Authority (LSA) Security Accounts Manager (SAM) database (local) Kerberos version 5 + Active Directory (remote) Network LanMan (NTLM) + SAM database(remote) Security Support Provider Interface (SSPI)

Authentication process in Windows 2000/XP network. Authentication

Authorization Security principal Any entity that can perform an action User Group Computer Service Security identifier (SID) Uniquely identifies security principal

Authorization Access token Stores in security information about security principal Security principal SID All group SIDs Session ID Enables fast user switching Session ID tells which processes to run in background Inheritance Given to all processes and threads owned by security principal

Authorization Security descriptor Protect resources: files, programs, printers, etc. Discretionary Access Control List (DACL) Ordered list of Access Control Entries (ACEs) Stores SID What security principal with that SID may do First ACE to match access token SID determines authorization Inclusive or exclusive security policy (or both)

Internet Connection Firewall Internet Connection Firewall (ICF) protects Single computer Network Packet filtering Outbound traffic recorded in flow table Inbound packets permitted only if match entry in flow table Port mapping Some applications require unsolicited inbound traffic Web servers On-line games LDAP Users may explicitly open a port to unsolicited packets

Other Features Encrypting File System Cookie management Control software execution File hash provides extra protection Certificates Trusted Internet Zones Automatic Update Notifies users of security patches Can download and install patches automatically