How to implement GPOs and secure a MS Windows Environment with little to NO user awareness!?!?

Slides:



Advertisements
Similar presentations
MODULE 3: OS & APP LAYERS. Agenda Preparing and importing a gold image Creating and understanding Install Machines Creating basic Application layers Understanding.
Advertisements

Microsoft Server 2008 R2 Group Policies & AD. Group Policies-Refresher  Policies are “all or nothing”  You cannot selectively choose within a policy.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
NREL is a national laboratory of the U.S. Department of Energy Office of Energy Efficiency and Renewable Energy operated by the Alliance for Sustainable.
Understanding Group Policy on Windows Server 2003.
Module 5: Creating and Configuring Group Policy
Khan Rashid Lesson 11-The Best Policy: Managing Computers and Users Through Group Policy.
Managing User Settings with Group Policy
Windows XP Service Pack 2 Deployment Dave Lee West Campus.
Changes in Windows XP Service Pack 2
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
Lesson 18: Configuring Application Restriction Policies
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Performing Software Installation with Group Policy
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Active Directory: OU Administration December 17th, pm Daniels 407.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Introduction to Active Directory December 10th, pm Daniels 407.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
GROUP POLICY An overview of Microsoft Windows Group Policy.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Thrive Installation.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
IS 2101—FALL 2009 Chapter 6 Getting Started with Windows Vista 9/22/08 and 9/24/08 9/21/09 1 IS Fall 2009.
Section 2: Using Group Policy Management Tools Local vs. Domain Policies Editing Local Policies Managing Domain Policies Understanding Group Policy Refresh.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Troubleshooting Windows Vista Security Chapter 4.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Managing User Desktops with Group Policy
More GPO’s & GPP Chapter 7. Agenda Group Policies (the day after) Group Policy Preferences.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Overview Introduction to Managing User Environments Introduction to Administrative Templates Using Administrative Templates in Group Policy Assigning Scripts.
Module 6: Implementing Group Policy. Overview Implementing Group Policy Objects Implementing GPOs in a Domain Managing the Deployment of Group Policy.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Performing Software Installation with Group Policy Lesson 9.
Module 6: Configuring User Environments Using Group Policy.
Module 7 Configure User and Computer Environments By Using Group Policy.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
4. Managing the Desktop Thomas Lee Chief Technologist – QA plc.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Deploying Software with Group Policy Chapter Twelve.
Implementing Group Policy
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
Implementing a Group Policy Infrastructure
Module 6: Configuring User Environments Using Group Policies.
Module 6 Creating and Configuring Group Policy. Module Overview Overview of Group Policy Configuring the Scope of Group Policy Objects Evaluating the.
Lesson 6: Controlling Access to Local Hardware and Applications
Why Window’s Firewall? Free and included with the OS Easy to use Management is thru Active Directory Windows Firewall.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Group Policy in Windows Vista. Group Policy Administration Group Policy with Windows Vista QoS Policies What Will We Cover?
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Fixing Windows 10 Automatic Updates Install Problem
Windows Vista Configuration MCTS : Network Security.
1.1 Microsoft® Windows® 2003 Server Group Policy Management Prof. Abdul Hameed.
Introduction to Group Policy Lesson 7. Group Policy Group Policy is a method of controlling settings across your network. – Group Policy consists of user.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Information Security Session October 24, 2005
Bethesda Cybersecurity Club
Security through Group Policy
Presentation transcript:

How to implement GPOs and secure a MS Windows Environment with little to NO user awareness!?!?

 Most powerful free tool available to the Windows Administrator  If you can imagine locking, it down it can be done with this tool!  Good AD design and organization allows for ease of management

 Basic GPMC run through  Securing basic workstation features  Using the GPMC to secure IE6 and IE7  Using the GPMC to manage the windows firewall  Custom Group Policy applications

 Basic Helpful Design and ideas  Control Panel  Basic context menus to remove  Securing certain executables

Organization! Organization! Organization! Good AD design and layout of Groups and Users Good GPMC Groups and layout Turn off automatic updates of adm files and Always use local adm files for Group Policy Object Editor policy settings to reduce the size of the Sysvol folder and policy-related replication traffic

 Easier to secure and patch IE than Firefox  Zone Trusts  Addon and Attachment management  Separates IE from and Big  Allows IE to surpass 3 rd party Advantage browsers in security

 Helps Secure IE.  Setting up this policy allows you to control file extensions downloaded.  Drawback is other browsers. Cannot control what is downloaded through them.

 Not easy to configure but once done

 Built-in Windows Firewall  Traffic  Outgoing not blocked  Incoming is blocked  Vista blocks outgoing  Does not block outgoing traffic “Vista does”

 Duplicates with remote assistance  If you configure the ports for Remote desktop  leave the Allow Remote Desktop Exception to be Not Configured

Notice no changes can be made by the User

Notice Allow echo request!! Don’t be alarmed

 ADVANTAGE  Windows Firewall is FREE  Is easily manageable  DISADVANTAGE  CANNOT BLOCK outgoing request

 A custom Policy can be made for any software that relies on registry key settings.  Must have a copy of the Custom.adm on the local machine if you want to be able to view the settings locally

 Once your policy has been imported. You can view the settings of the policy only by 1. Selecting view from the menu. 2. Then from the pull down menu selecting Filtering 3. Unchecking “Only show policy settings that can be fully managed."

 Importing your Custom GPO will debug and output syntax errors.  Custom GPs control registry keys. Once a key is set you must set it to something else if want to disable.  IN OTHER WORDWS:  If you set a value for something to be 30. Setting the policy to Not Configured does not remove the value. You must disable or change the value.

 nol/windowsserver2003/technologies/manag ement/gp/admtgp.mspx#E1PAC nol/windowsserver2003/technologies/manag ement/gp/admtgp.mspx#E1PAC  atically_log_off_users atically_log_off_users  wer_mgt.pr_pm_ez_gpo wer_mgt.pr_pm_ez_gpo