Presentation is loading. Please wait.

Presentation is loading. Please wait.

Module 8: Implementing Administrative Templates and Audit Policy.

Similar presentations


Presentation on theme: "Module 8: Implementing Administrative Templates and Audit Policy."— Presentation transcript:

1 Module 8: Implementing Administrative Templates and Audit Policy

2 Overview Managing User Rights in Windows Server 2003 Using Security Templates to Secure Computers Testing Computer Security Policy Configuring Auditing Managing Security Logs

3 Lesson: Managing User Rights in Windows Server 2003 What Are User Rights? User Rights vs. Permissions User Rights Assigned to Built-In Groups Practice: Assigning User Rights

4 What Are User Rights? Examples of User Rights

5 User Rights vs. Permissions User Rights: Actions on System User Rights: Actions on System Permissions: Actions on Object

6 User Rights Assigned to Built-In Groups Built-in local groups: Administrators Backup Operators Power Users Remote Desktop Users Users Administrators Backup Operators Power Users Remote Desktop Users Users Groups in Builtin container: Account Operators Administrators Backup Operators Pre—Windows 2000 Compatible Access Print Operators Server Operators Account Operators Administrators Backup Operators Pre—Windows 2000 Compatible Access Print Operators Server Operators Groups in Users container: Domain Admins Enterprise Admins Domain Admins Enterprise Admins

7 Practice: Assigning User Rights In this practice, you will: Assign the Authenticated Users group the right to change the system time Assign Judy Lew the right to log on locally to the domain controller

8 Lesson: Using Security Templates to Secure Computers What Is a Security Policy? What Are Security Templates? What Are Security Template Settings? Windows Server 2003 Security Guide Templates Windows XP Security Guide Templates Ways to Deploy Security Templates Practice: Using Security Templates to Secure Computers

9 What Is a Security Policy?

10 What Are Security Templates? TemplateDescription Setup security.inf Default security settings DC security.inf Default security settings for a domain controller Compatws.inf Modifies permissions and registry settings for application compatibility Securedc.inf and Securews.inf Enhances security settings Hisecdc.inf and Hisecws.inf Increases the restrictions on security settings Rootsec.inf Specifies permissions for the root of the system drive IESacls.inf Configures auditing and permissions on registry keys of Internet Explorer

11 What Are Security Template Settings? Security Template: Setup Security Sample Settings

12 Windows Server 2003 Security Guide Templates The Windows Server 2003 Security Guide provides: Security documents and checklists Sample scripts Security templates for:  Legacy Clients  Enterprise Clients  High Security Security documents and checklists Sample scripts Security templates for:  Legacy Clients  Enterprise Clients  High Security

13 Windows XP Security Guide Templates The Windows XP Security Guide provides: Security documents and checklists Sample scripts Administrative templates Security templates for:  Enterprise Clients  High Security  Legacy Clients Security documents and checklists Sample scripts Administrative templates Security templates for:  Enterprise Clients  High Security  Legacy Clients

14 Ways to Deploy Security Templates

15 Practice: Using Security Templates to Secure Computers In this practice, you will: Create a security template Import the security template into a GPO and apply the GPO to an organizational unit

16 Lesson: Testing Computer Security Policy What Is the Security Configuration and Analysis Tool? Practice: Testing a Computer Security Policy

17 What Is the Security Configuration and Analysis Tool? Template Setting Actual Setting Setting That Does Not Match Template

18 Practice: Testing a Computer Security Policy In this practice, you will analyze a computer’s security policy by using a security template

19 Lesson: Configuring Auditing What Is Auditing? What Is an Audit Policy? Types of Events to Audit Guidelines for Planning an Audit Policy Practice: Configuring Auditing Best Practices for Configuring Auditing

20 What Is Auditing? Auditing tracks user and operating system activities and records selected events in security logs Enable auditing to:  Create a baseline  Detect threats and attacks  Determine damages  Prevent further damage Audit access to objects, management of accounts, and users logging on and logging off What occurred? When? Who did it? What was the result?

21 What Is an Audit Policy? An audit policy determines the security events that will be reported to the network administrator Set up an audit policy to:  Track success or failure of events  Minimize unauthorized use of resources  Maintain a record of activity Security events are stored in security logs

22 Types of Events to Audit Account Logon Account Management Directory Service Access Logon Object Access Policy Change Privilege Use Process Tracking System

23 Guidelines for Planning an Audit Policy Determine the computers to set up auditing on Determine which events to audit Determine whether to audit success or failure events Determine whether to track trends Review security logs frequently

24 Practice: Configuring Auditing In this practice, you will create a GPO to enable auditing for files and folders

25 Best Practices for Configuring Auditing Audit success events in the directory service access category Audit success events in the object access category Audit success and failure events in the system category Audit success and failure events in the policy change category on domain controllers Audit success and failure events in the account management category Audit success events in the logon category Audit success events in the account logon category on domain controllers

26 Lesson: Managing Security Logs Types of Log Files Common Security Events Tasks Associated with Managing the Security Log Files Practice: Managing Security Logs

27 Types of Log Files The following logs are available in Event Viewer: Application Security System Directory service File Replication service

28 Common Security Events LogonEvent description Event ID 528 Successful logon Event ID 529 Unsuccessful logon attempt Event ID 539 Attempts to log on to a locked out account Security LogEvent description Event ID 517 Security log cleared ShutdownEvent description Event ID 513 System is shut down

29 Tasks Associated with Managing the Security Log Files

30 Practice: Managing Security Logs In this practice, you will: Configure security log properties Create a security log filter that filters the failure events for Don Hall

31 Lab: Managing Security Settings In this lab, you will: Create a custom security template Import and deploy the custom template


Download ppt "Module 8: Implementing Administrative Templates and Audit Policy."

Similar presentations


Ads by Google