Download presentation
Presentation is loading. Please wait.
Published byGodfrey Barker Modified over 9 years ago
1
{ Active Directory Security Why bother?
2
Law #1: Nobody believes anything bad can happen to them, until it does Law #2: Security only works if the secure way also happens to be the easy way Law #3: If you don't keep up with security fixes, your network won't be yours for long Law #4: It doesn't do much good to install security fixes on a computer that was never secured to begin with Law #5: Eternal vigilance is the price of security Microsoft’s 10 Immutable Laws of Security Administration
3
Law #6: There really is someone out there trying to guess your passwords Law #7: The most secure network is a well- administered one Law #8: The difficulty of defending a network is directly proportional to its complexity Law #9: Security isn't about risk avoidance; it's about risk management Law #10: Technology is not a panacea Law’s continued
4
Next time someone asks why miscreants might want to hack his PC, show him this diagram. https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/
5
{ Setting Up a Secure Environment Overview *Not all encompassing*
6
Service packs Hotfixes Notifications Network scanners Virus / malware protection software Updates http://www.pcprofessionals.com.au/2013/the-importance-of-windows-updates/
7
Disable guest account Transport level encryption Remote network access File permissions Security groups Group policy Disable / uninstall unused services Secure user rights Firewall settings Backups Best Practice Analyzer – BPA Microsoft Baseline Security Analyzer Security Settings
8
Enabled Adequate storage Central location Review schedule Email & other notification Audit Logging
9
Why bother? Limit access Access logs Locked server closet / room Security cameras Network plugs Paper trail Environment monitoring Wireless vs wired Biggest security vulnerability – humans Physical security http://goinfopipe.com/top-7-physical-security-trends/#!prettyPhoto
10
Company stand Passwords Employee dismissal User access levels Privacy Mobile data transfer Computer use Policies
11
Sync network time Train your users Miscellaneous
12
http://www.newark.com/images/en_US/marketing/pdf/BLackBoxPhysi calNetworkSecurity.pdf http://www.newark.com/images/en_US/marketing/pdf/BLackBoxPhysi calNetworkSecurity.pdf http://www.newark.com/images/en_US/marketing/pdf/BLackBoxPhysi calNetworkSecurity.pdf http://it-audit.sans.org/community/checklists/active-directory-security http://it-audit.sans.org/community/checklists/active-directory-security http://technet.microsoft.com/en-us/library/cc722488.aspx http://technet.microsoft.com/en-us/library/cc722488.aspx https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc- revisited/ https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc- revisited/ https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc- revisited/Sources
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.