Download presentation
Presentation is loading. Please wait.
1
IT:Network:Apps
2
Security Options Group Policy AppLocker ACL
3
Defense in depth ◦ Physical ◦ File level Folder/File permissions Minimalist mentality ◦ Object level Object permissions
4
Desktop ◦ Physical ◦ Group Policy ◦ Access/Authentication Server ◦ Physical ◦ Group Policy ◦ Access/Authentication
5
Perimeter ◦ NAT ◦ Firewall ◦ Security Appliances Mail/Spam Gateway VPN concentrator ◦ Network Access Protection
6
Antivirus solutions http://www.windowsitpro.com/article/antivirus/enterp rise-antivirus-software.aspx http://www.windowsitpro.com/article/antivirus/enterp rise-antivirus-software.aspx http://www.av-test.org/ http://www.av-test.org/ ◦ Network based Antivirus Centrally managed Centrally deployed Engines for both server and client Agents for server based applications Exchange filtering Central point for updates Engines Definitions
7
Antivirus solutions Centralized reporting Reports on activities, updates and policies
8
Antivirus solutions ◦ Client based Antivirus Updates done individually at client directly to Internet Reporting local to client Typically has engine for desktops and not server
9
Group Policy Objects (GPO) can be used to secure both server and desktop machines Security Configuration Wizard (SCW) ◦ http://technet.microsoft.com/en- us/library/cc771492(WS.10).aspx http://technet.microsoft.com/en- us/library/cc771492(WS.10).aspx
10
What does SCW do? ◦ Guides you through the process of creating, editing, applying, or rolling back a security policy. ◦ It provides a way to create or modify a security policy for your server based on its role. ◦ Use Group Policy to apply the security policy to multiple target servers that perform the same role ◦ You can compare a server's security settings with a desired security policy to check for vulnerable configurations in the system.
11
Security Configuration Wizard Start Programs Administrative Tools
13
SCW will create/edit or roll back security settings based on your selections Creates role based policy settings ◦ Detects what roles are installed on server
14
Controlling applications ◦ Application Control Policies ◦ Software Restriction Policies
15
Applocker requirements ◦ Works on Windows 7 and newer ◦ Only available on 7 Enterprise and Ultimate…not Pro ◦ Application Identity service must be running. ◦ Add default rules to prevent stepping on “required” services
16
Applocker ◦ Add default rules ◦ Create new rule
17
Software Restriction Polices ◦ Similar to Applocker, works on XP and later
18
Security can be controlled from the file level to the Active Directory Object level NTFS permissions Share permissions ADO permissions Out of sight, out of mind approach Minimalist approach
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.