Presentation is loading. Please wait.

Presentation is loading. Please wait.

How to implement GPOs and secure a MS Windows Environment with little to NO user awareness!?!?

Similar presentations


Presentation on theme: "How to implement GPOs and secure a MS Windows Environment with little to NO user awareness!?!?"— Presentation transcript:

1 How to implement GPOs and secure a MS Windows Environment with little to NO user awareness!?!?

2  Most powerful free tool available to the Windows Administrator  If you can imagine locking, it down it can be done with this tool!  Good AD design and organization allows for ease of management

3  Basic GPMC run through  Securing basic workstation features  Using the GPMC to secure IE6 and IE7  Using the GPMC to manage the windows firewall  Custom Group Policy applications

4  Basic Helpful Design and ideas  Control Panel  Basic context menus to remove  Securing certain executables

5 Organization! Organization! Organization! Good AD design and layout of Groups and Users Good GPMC Groups and layout Turn off automatic updates of adm files and Always use local adm files for Group Policy Object Editor policy settings to reduce the size of the Sysvol folder and policy-related replication traffic

6  Easier to secure and patch IE than Firefox  Zone Trusts  Addon and Attachment management  Separates IE from and Big  Allows IE to surpass 3 rd party Advantage browsers in security

7  Helps Secure IE.  Setting up this policy allows you to control file extensions downloaded.  Drawback is other browsers. Cannot control what is downloaded through them.

8  Not easy to configure but once done

9  Built-in Windows Firewall  Traffic  Outgoing not blocked  Incoming is blocked  Vista blocks outgoing  Does not block outgoing traffic “Vista does”

10

11  Duplicates with remote assistance  If you configure the ports for Remote desktop  leave the Allow Remote Desktop Exception to be Not Configured

12 Notice no changes can be made by the User

13 Notice Allow echo request!! Don’t be alarmed

14  ADVANTAGE  Windows Firewall is FREE  Is easily manageable  DISADVANTAGE  CANNOT BLOCK outgoing request

15  A custom Policy can be made for any software that relies on registry key settings.  Must have a copy of the Custom.adm on the local machine if you want to be able to view the settings locally

16  Once your policy has been imported. You can view the settings of the policy only by 1. Selecting view from the menu. 2. Then from the pull down menu selecting Filtering 3. Unchecking “Only show policy settings that can be fully managed."

17

18  Importing your Custom GPO will debug and output syntax errors.  Custom GPs control registry keys. Once a key is set you must set it to something else if want to disable.  IN OTHER WORDWS:  If you set a value for something to be 30. Setting the policy to Not Configured does not remove the value. You must disable or change the value.

19  http://www.microsoft.com/technet/prodtech nol/windowsserver2003/technologies/manag ement/gp/admtgp.mspx#E1PAC http://www.microsoft.com/technet/prodtech nol/windowsserver2003/technologies/manag ement/gp/admtgp.mspx#E1PAC  http://blog.case.edu/djc6/2005/03/09/autom atically_log_off_users http://blog.case.edu/djc6/2005/03/09/autom atically_log_off_users  http://www.energystar.gov/index.cfm?c=po wer_mgt.pr_pm_ez_gpo http://www.energystar.gov/index.cfm?c=po wer_mgt.pr_pm_ez_gpo


Download ppt "How to implement GPOs and secure a MS Windows Environment with little to NO user awareness!?!?"

Similar presentations


Ads by Google