Information Security 493. Lab 10.1: Look for Security Events within Windows XP Logging is automatically enabled for many items on a workstation, but the.

Slides:



Advertisements
Similar presentations
FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
Advertisements

IMS Client Installation Procedures 1. Copy the Voic Pro from the shared folder on the Voic Pro server. Go to Start, Run, and \\ or \\
®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
XP Tutorial 4 New Perspectives on Microsoft Windows XP 1 Microsoft Windows XP Personalizing Your Windows Environment Tutorial 4.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Creating a UAA VPN Connection For Your Computer To Facilitate Polycom PVX – For Windows XP Last Modified On 10/25/2010 University of Alaska Anchorage,
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
Network Printing. Printer sharing Saves money by only needing one printer Increases efficiency of managing resources.
COMPREHENSIVE Windows Tutorial 10 Improving Your Computer’s Performance.
Domain Name Server © N. Ganesan, Ph.D.. Reference.
File sharing. Connect the two win 7 systems with LAN card Open the network.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
®® Microsoft Windows 7 Windows Tutorial 10 Improving Your Computer’s Performance.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Guide to MCSE , Second Edition, Enhanced 1 Objectives Understand and use the Control Panel applets Describe the versatility of the Microsoft Management.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Windows XP 101: Using Windows XP Professional in the Classroom.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Using Windows Firewall and Windows Defender
Ch 8. The Control Panel Window –Category View The Control Panel Window –Small icons View.
© 2009 FP Mailing Solutions. All rights reserved. Customer Service Training Basic Computer Training.
One-To-One Instruction How to install MS Exchange with a two user setup on Windows Server 2003.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
Creating a Web Site to Gather Data and Conduct Research.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Installing and Using Active Directory Written by Marc Zacharko.
Tutorial #1. Lab#: 1 Securing your system Lab 1.2: Tenable Nessus Nessus currently works on Windows, Linux, and Mac. It is a vulnerability scanner, which.
Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland t OIS Working with Windows 7 at CERN Michał Budzowski.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
PC Maintenance: Preparing for A+ Certification Chapter 23: Using a Windows Network.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Process Manual Using Your GL Account for Off-campus Access to the Internet By: Louisa Au May 5, 2003 English 393 Technical Writing.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
An Introduction to Designing and Executing Workflows with Taverna Aleksandra Pawlik materials by: Katy Wolstencroft University of Manchester.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
Administering Microsoft Windows Server 2003 Chapter 2.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Apple Remote Desktop Hey! I got some new software for my school. For free. For what?
TUTORIAL #3 INFORMATION SECURITY : LOOK FOR SECURITY EVENTS WITHIN WINDOWS XP Logging is automatically enabled for many items on a workstation,
These steps will guide you through installing the pcAnywhere Host software so that we can remote control your PC from NZ! Once installed, it will only.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
By Matt Jennings & David Spano.  History of Nmap  What is Nmap  How Nmap works  The goal of Nmap  What is Zenmap  Advantages of Zenmap  How to.
Software-Projekt 2008 Seminarvortrag“Short tutorial of MySql“ Wei Chen Verena Honsel.
IT Desktop Management GoToMeeting – Online Meeting Service Organizer/Presenter Guide May 2007 Prepared by Angela Mars IT Education and Training.
Steven Geisel Gabe Owens.  Angry IP Scanner is an open-source and cross-platform network scanner  Features include IP Address scanning, port scanning,
5/14/2003Sprint TekNet IP Train the Trainer1 Open TekNet Software If working at a client station, enter the IP address of the server and mark page as a.
Logging Into Windows XP for first time (labs only!)
Configuring ALSMS Remote Navigation
How to Fi
Creating a Windows Server 2012 R2 Datacenter Virtual machine
Creating a Windows Server 2016 Datacenter Virtual machine
Windows XP 101: Using Windows XP Professional in the Classroom
How to add Loopback adapter in windows 7
Presentation transcript:

Information Security 493

Lab 10.1: Look for Security Events within Windows XP Logging is automatically enabled for many items on a workstation, but the log entries are only meaningful if examined. To view the security events logged on a workstation, follow these steps:

Conti… 1. Choose Start  Run  eventvwr.msc 2. Within the left frame, click Security. All logged security events appear. To gather more information on any logged entry, double-click it. 5. Exit the Event Viewer.

Lab 10.2: SpiceWorks (Assets Listing) SpiceWorks is the complete network management & monitoring, helpdesk, PC inventory & software reporting solution to manage Everything IT in small and medium businesses. In this exercise you will learn how to use this program to do an inventory on your network, and be able to list your assets. To do so, follow these steps: (Make sure to follow steps one-by-one don’t go quickly clicking on next).

Cont… After installing “SpiceWork”, click on its icon to run it. Create your account by filling out your details. And click next. Click on ‘Start with inventory’.

Cont… Click ‘Scan my entire network’. Under “Does the account you are logged into right now have remote administration privileges to Windows computers on the network?” click on “NO”, and enter the user name and password given by the instructor.

Conti… Click on next, and then click on ‘Start’. Scan will take time depending on the size of the network, might take up to 15 minute. (Meanwhile, you can do exercise 10.3 and comeback when scan is over).

Conti… Once scan is completed. In the left box click on “Network Map”. How your network look like. Change the view of the network by clicking on “Arrange”; try the Tree, Hierarchy, and Radial layout. From the left box click on “inventory”, see how many workstations, Serves, and other hardware and software you have.

Spice Work

Assets in Spice Work

Network topology in Spice Work.

Lab 10.3: Compare Your System to a Security Template You must be logged in as a member of the Administrators group (or as Administrator) to be able to make this change. To do so, follow these steps: 1. Choose Start  Run. 2. Type mmc and press Enter. This command opens a console window.

Conti… 3. Choose File and then Add/Remove Snap-In. beneath Add/Remove Snap-In, click Add, and a list of available add- ins appears. 4. Choose Security Configuration and Analysis and click Add. 5. Click Close. 6. Click OK.

Conti… 7. Right-click Security Configuration and Analysis and choose Open Database. 8. Type in the name of a database you want to create (such as test) and click Open. 9. At the prompt to import a template, select ‘hisecws’ and click Open.

Conti… 10. Right-click Security Configuration and Analysis and choose Analyze Computer Now. 11. At the prompt for an error log file path, click OK to keep the default.

Conti… 12. Expand Security Configuration and Analysis and then Password Policy. A red circle should appear beside Minimum Password Age (and likely others), showing that the computer is not configured as the template is. 13. To make all settings in the template apply, right- click Security Configuration and Analysis and choose Configure Computer Now.

Conti… 14. Repeat the analysis step, and all settings should now equal those in the template.

Lab 10.4: Zenmap Zenmap is the official Nmap Security Scanner GUI, which makes Nmap easy for beginners to use. Zenmap is used to gather information about scanned IP or range of IPs. Zenamp can be helpful in Security Auditing, Finding any “unwanted” people using your network, creating simple visual diagrams of your network, and more. In this exercise you will be learning how to use Zenmap to scan a network and gather information. Follow these steps:

Start Zenmap, by clicking on the icon on your desktop. In the ‘Target’ field write down your IP address leaving the last number ‘0’, and then after your IP address directly write ‘/24’. (i.e. if your IP address is , you should write /24). You can find down your IP address from the CMD (ask your instructor).

Leave the ‘profile’ option on ‘intense scan’. And make sure the button ‘Hosts’ is clicked.

Conti… Click on scan. The left panel will show PCs found in your network and there operating systems. The right panel will show information about the scanned PCs. Search through data and find open ports on other PCs.

Tutorial Delivered By : Maqsood Mahmud Researcher/TA, Center of Excellence in Information Assurance, College of Computer and Information Sciences (CCIS), King Saud University, Riyadh, Kingdom of Saudi Arabia. Cell: Office: Fax: Web: