l Overview: Define the purpose of the Registry Identify the permissions provided to protect the registry Identify the key registry values to protect Understand.

Slides:



Advertisements
Similar presentations
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
Advertisements

Deploying and Managing Active Directory Certificate Services
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 3 Configuring the Windows Server 2008 Environment.
Configuration Files CGS2564. DOS Config.sys Device drivers Memory configuration Autoexec.bat Run programs, DOS commands, etc. Environment settings File.
The Windows Registry Adapted from
Registry Analysis What is it? What does it contain?
Registry Structure What is it? What does it contain?
The Windows XP Registry : MCSE Guide to Microsoft Windows XP Professional.
Chapter 9 Database Design
Chapter 9 Chapter 9: Managing Server Folders, Permissions, and Software Installation.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Operating System & Application Files BACS 371 Computer Forensics.
Working with the Windows XP Registry
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 8: Implementing Administrative Templates and Audit Policy.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Module 8: Designing Active Directory Disaster Recovery in Windows Server 2008.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Course 6425A Module 9: Implementing an Active Directory Domain Services Maintenance Plan Presentation: 55 minutes Lab: 75 minutes This module helps students.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Mastering Windows Network Forensics and Investigation Chapter 9: Registry Evidence.
Lecture 7 Forensic Analysis of Windows Systems (contd.)
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Module 3: Resolving Boot Process Issues. Overview Understanding the Boot Process Using Advanced Boot Options Using the Boot.ini file to Change Startup.
Module 11 : Backup and Restore Jong S. Bok
1 Chapter Overview Understanding the Boot Process Editing the Registry Using Startup and Recovery Tools Safe mode LastKnownGood configuration Advanced.
Implementing File and Print Services
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
MCTS Guide to Microsoft Windows 7
Ch 11. Services A service is a specialized program that performs a function to support other programs Many services operate at a very low level – Interacting.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
I-Suite An Automated Incident Business Information and Support Tool WILDLAND FIRE HURRICANES ALL RISK ASSIGNMENTS Full Versions of these Training Materials.
Course Topics Administering SQL Server 2012 Jump Start 01 | Install and Configure SQL Server04 | Manage Data 02 | Maintain Instances and Databases05 |
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
5. Windows System Artifacts Part 1. Topics Deleted data Hibernation Files Registry.
11 MANAGING AND MONITORING DHCP Chapter 2. Chapter 2: MANAGING AND MONITORING DHCP2 MANAGING DHCP: COMMON DHCP ADMINISTRATIVE TASKS  Configure or modify.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Support for Vista Unity 5.0(1)
Windows Registry Application Developer Issues SIG North Texas PC Users Group January 11, 2003 Daniel Ogden SIG Co-Leader
Module 10: Maintaining Active Directory. Overview Introduction to Maintaining Active Directory Moving and Defragmenting the Active Directory Database.
Backing up a Database Using RB2000 Start and End of the Day Module.
Windows Vista Inside Out Chapter 24 – Recovering From an Computer Crash Last modified am.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 23 – The Registry.
Overview Managing a DHCP Database Monitoring DHCP
MCTS Guide to Microsoft Windows Vista Chapter 12 Application Support.
 Click Start, point to All Programs, point to Accessories, point to System Tools,and then click Backup. The Backup or Restore Wizard starts.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 11 Application Support.
How PC Works PC Works Based on Memory handling The registry Windows boot Windows architecture o systems and subsystem details o PE files  exe and dll.
Understanding Backup and Recovery Methods Lesson 8.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Understand Permissions LESSON Security Fundamentals.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
SQL Server Administration. Overview  Security  Server roles  Database roles  Object permissions  Application roles  Managing data  Backups  Restoration.
Module 7: Auditing Active Directory Domain Services Changes.
Chapter 8 Server Management: Directories & Software Directory Structure Creating A Directory Directory Properties Setup Wizard Registry Installing/Uninstalling.
Ministry of Finance of the Republic of Azerbaijan State Treasury Agency Public Finance Management Information System.
FORENSICS ANALYSIS OF THE REGISTRY OF WINDOWS 7 “SYSTEM ANALYSIS” 시스템 포렌식 실습 NURHALIMATUSADIAH SYARA 시스템 포렌식 실습.
Information Processing Modules. 10 -level INF1030- Word Processing INF1050- Spreadsheets INF1060- Databases INF1070- Digital Presentation INF1910- Special.
BACKUP AND RESTORE. The main area to be consider when designing a backup strategy Which information should be backed up Which technology should be backed.
Management Tools for Microsoft Exchange 2000 Server
Module Overview Installing and Configuring a Network Policy Server
Module 7: Server Cluster Maintenance and Troubleshooting
Introduction to Operating Systems
Files Used in the Boot Process
برنامه‌ريزي منابع انساني
Bethesda Cybersecurity Club
AD RMS Back Up and Restore
Presentation transcript:

l Overview: Define the purpose of the Registry Identify the permissions provided to protect the registry Identify the key registry values to protect Understand the steps needed to audit the registry Understand the steps needed to properly backup the registry database Module 7

l DescriptionRegistry

l Registry SubTrees HKEY_LOCAL_MACHINE SYSTEM Clone ControlSet001 ControlSet002 CurrentControlSet Select Current Default Failed LastKnownGood Registry

l Hives l HKEY_LOCAL_MACHINE\SAMSam, Sam.log, Sam.sav l HKEY_LOCAL_MACHINE\SecuritySecurity, Security.log, Security.sav l HKEY_LOCAL_MACHINE\SoftwareSoftware, Software.log, Software.sav l HKEY_LOCAL_MACHINE\SystemSystem, System.alt, System.log, l...

l HKEY_LOCAL_MACHINE\… l SubKeys

l Changing Key Permissions l Read l Full Control l Special Access Registry

l Default Settings l Registry Tools

l Registry Security And Protection

l Security Setting

l Key Registry Values

l Auditing l Key Registry Values

l Backing Up and Restoring Keys l Key Registry Values

l

l