Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.

Slides:



Advertisements
Similar presentations
Security Update Server Registration, Active scanning and Windows patching.
Advertisements

Your Definitive Lockdown Guide
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Microsoft Windows Server 2008 Software Deployment Chris Rutherford EKU Technology: CEN/CET.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 7 HARDENING SERVERS.
Windows 2003 SP1 Member Server in ASU Active Directory WNUG/CCC February 2, 2006 Sharon Bushart CLAS Information Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Enterprise Network Security Accessing the WAN Lecture week 4.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Module 8: Implementing Administrative Templates and Audit Policy.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
IT:Network:Microsoft Applications
SUS Services ECE Computer Facilities. SUS Services Software Update Services Microsoft Security And Critical Update Service Microsoft Security And Critical.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training
Hands-On Microsoft Windows Server 2008
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Honeypot and Intrusion Detection System
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Windows NT 4.0. NT Architecture Executive Services I/O Manager –cache manager –file systems –network drivers –device drivers Object Manager Security.
NT4 SP4 Security Jack Schmidt - Fermilab
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
IT Audit 2006 Deborah Joyner, Marjorie Tucker, Kay Simpson, Dawn Rountree, Kathy Jones.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
Module 10: Implementing Administrative Templates and Audit Policy.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Windows Administration How to protect your computer.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Maintaining and Updating Windows Server 2008 Lesson 8.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Windows Security.
Chapter 6 Application Hardening
Chapter 4: Security Baselines
How to Fix Windows 10 Update Error 0x ?.
Lesson 16-Windows NT Security Issues
Operating System Security
IT Management, Simplified
Presentation transcript:

Operating System Hardening

Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems Vendors try to correct Attackers try to exploit Security professionals must keep update

Typical Vulnerabilities Default install Auto login, FTP server, Service exploits Auto Play (C/DVD, USB) Default protocols FTP, HTTP, RDP, Known accounts and passwords Administrator, Root, admin : admin Built-in applications Remote administration File access methods FAT32, Everyone, 777 Physical access Anything could happen Buffer overflows Injection, Adware, Worm

Windows Hardening Security Assesment Identify Asset Risk Assessment Vulnerability & Threats Security Hardening GUI Tools Microsoft Config (msconfig) Services Registry Security Policy (secpol.msc) User Rights Audit Group Policy (gpedit.msc) Windows Settings Windows Behaviour Computer Management (compmgmt.msc) Event Viewer

Windows Hardening Windows Update – Important update Security update Driver / Bug – Optional update Enhancement Non-Essentials Update Type – Patch Bug Fix – Hot Fix Fix Security Flaw – Roll up Cumulative patches & hotfixes – Service pack Added feature

Windows Hardening Configuration Management Security Baseline – A template of configuration that applies to a group of system Antivirus (adware, malware, worm, virus) Event Viewer (Windows Log) Auditing (Action purpose)

Group Policy Applying security baseline

Group Policy Apply template to a system Predefined settings Templates based on role

Windows Hardening File / Print server hardening (Tutorial) Directory service hardening (Tutorial)

Virtualization Technology Honey Pot Testing Patch Management

Directory Service OpenLDAP Microsoft Active Directory Novell eDirectory LDAP client LDAP server LDAP client Stores directory data Directory query