Security Assessment Tools Paula Kiernan Senior Consultant Ward Solutions.

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Advertisements

Paula Kiernan Senior Consultant Ward Solutions
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Vulnerability Analysis Borrowed from the CLICS group.
Chapter 7 HARDENING SERVERS.
Microsoft Security Resources. URL’s for this talk All URL’s mentioned in this talk can be found here: All URL’s mentioned in this talk can be found here:
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Essentials of Security Steve Lamb Technical Security Advisor
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Windows Server 2008 Network Access Protection (NAP) Technical Overview.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Assessing Network Security
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Implementing Exchange Server Security Ward Solutions.
Windows Anti-virus and Security WNUG Meeting
DePaul Information Security
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Microsoft® Software Assurance Program Employee Benefits
Group Policy in Microsoft Windows Active Directory.
IT:Network:Microsoft Applications
Module 16: Software Maintenance Using Windows Server Update Services.
Agenda 9:30 – 10:45 Assessing Network Security 10:45 – 11:00 Break 11:00 – 11:45 BS7799 How Are you Managing Security? 11:45 – 12:15 Security Assessment.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Hands-On Ethical Hacking and Network Defense Chapter 8 Microsoft Operating System Vulnerabilities.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Module 13: Maintaining Software by Using Windows Server Update Services.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Microsoft Management Seminar Series SMS 2003 Change Management.
Frontline Enterprise Security
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
NetTech Solutions Protecting the Computer Lesson 10.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Maintaining and Updating Windows Server 2008 Lesson 8.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 6 Application Hardening
CompTIA Security+ SY0-401 Real Exam Question Answer
HARDENING CLIENT COMPUTERS
Information Security Session October 24, 2005
Implementing Client Security on Windows 2000 and Windows XP Level 150
Hacking Windows Damian Gordon.
Security in the Real World – Plenary Day One
Using Software Restriction Policies
Presentation transcript:

Security Assessment Tools Paula Kiernan Senior Consultant Ward Solutions

Session Prerequisites Hands-on experience with Windows 2000 or Windows Server 2003 Working knowledge of networking, including basics of security Basic knowledge of network security-assessment strategies Level 200

Session Overview Free Security Assessment Tools from Microsoft Alternative Assessment Methods

Security Assessment Tools Free Security Assessment Tools from Microsoft Alternative Assessment Methods

Free Security Assessment Tools Free Security Assessment Tools from Microsoft include: MBSA Microsoft Update ExBPA MSRSAT Port Query MBSA Microsoft Update ExBPA MSRSAT Port Query

MBSA Microsoft Baseline Security Analyzer can examine one or more computers for the following: Missing Security Updates Missing Office Updates Vulnerabilities in Windows, IIS, SQL and Exchange (depending on MBSA version) Vulnerabilities in Internet Explorer Weak passwords, Auditing, Shares and much more… Missing Security Updates Missing Office Updates Vulnerabilities in Windows, IIS, SQL and Exchange (depending on MBSA version) Vulnerabilities in Internet Explorer Weak passwords, Auditing, Shares and much more…

Demonstration 1: Using the MBSA Analyze a computer using the MBSA

Microsoft Update Main site for obtaining updates for:  Windows  Office  Internet Explorer  All other Microsoft applications  Will replace Windows and Office Update sites

Exchange Best Practices Analyzer ExBPA can examine your Exchange servers to: Generate a list of issues, such as misconfigurations or unsupported or non-recommended options Judge the general health of a system Help troubleshoot specific problems

Demonstration 2: Analyzing Configuration Settings on Exchange Server 2003 Analyze Exchange Server using the ExBPA Tool

MSRSAT Microsofts’ Security Risk Self-Assessment Tool: Assess compliance with Microsoft Security Risk Management Discipline guidelines Baseline for assessing security status of an organization Obtain advice on areas requiring improvement that may otherwise have been missed

Demonstration 3: Using the MSRSAT Using the MSRSA tool

Port Query Port Query can be used to: Examine specified ports to determine their state LISTENING FILTERED NOT LISTENING PortqryUI.exe Portqry.exe Examine specified ports to determine their state LISTENING FILTERED NOT LISTENING PortqryUI.exe Portqry.exe portqry -n microsoft.com -p tcp -e 25 portqry -n p tcp -o 143,110,25 -l portqry.txt portqry -n microsoft.com -p tcp -e 25 portqry -n p tcp -o 143,110,25 -l portqry.txt

Port Query UI

Demonstration 4: Using the Port Query UI Analyze a computer using Port Query

Other Free Security Assessment Tools Other free software available from Microsoft: Malicious Software Removal Tool Windows AntiSpyware (in Beta) Application Threat Modeling Tool Malicious Software Removal Tool Windows AntiSpyware (in Beta) Application Threat Modeling Tool

Malicious Software Removal Tool

Demonstration 5: Using the Malicious Software Removal Tool Analyze a computer using MSRT

Security Assessment Tools Free Security Assessment Tools from Microsoft Alternative Security Assessment Methods

Other methods for assessing your network security include: Purchase advanced security assessment tools e.g. NetIQs’ Vulnerability Manager Have a professional Penetration Test carried out by security experts Purchase advanced security assessment tools e.g. NetIQs’ Vulnerability Manager Have a professional Penetration Test carried out by security experts

Session Summary Take advantage of the free security assessment tools from Microsoft Check regularly for new free tools Sign up for the Security Bulletin service from Microsoft Follow a Defense in Depth approach to security and security assessments Keep systems up-to-date on security updates and service packs

Next Steps Find additional security training events: Sign up for security communications: Find additional e-learning clinics / Find additional tools and downloads:

Questions and Answers Clinic

Security Clinic Questions Patch Management Anti-Virus Firewalls and Perimeter Security Server Hardening Group Policy Security Assessment Policies and Procedures