Bethesda Cybersecurity Club

Slides:



Advertisements
Similar presentations
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
Advertisements

Lesson 17: Configuring Security Policies
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
CSCD 303 Essential Computer Security Fall 2010 Lecture 4 - Desktop Security Reading:
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 24 NTFS Permissions and Sharing Printers 1.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Module 8: Implementing Administrative Templates and Audit Policy.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Windows Operating Systems Basic Security. Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
Chapter 17: Watching Your System BAI617. Chapter Topics Working With Event Viewer Performance Monitor Resource Monitor.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Security for Seniors SeniorNet Help Desk
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
®® Microsoft Windows 7 for Power Users Tutorial 8 Troubleshooting Windows 7.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Implementing File and Print Services
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Chapter Fourteen Windows XP Professional Fault Tolerance.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
NetTech Solutions Security and Security Permissions Lesson Nine.
Understanding Backup and Recovery Methods Lesson 8.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Module 10: Implementing Administrative Templates and Audit Policy.
Understand Audit Policies LESSON Security Fundamentals.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Windows Server 2003 群組原則設定與管理 林寶森
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Introducing, Installing, and Upgrading Windows 7
Chapter Objectives In this chapter, you will learn:
Module Overview Installing and Configuring a Network Policy Server
Introduction to Operating Systems
How to Fix Windows 10 Update Error 0x ?.
Managing Data by Using NTFS
Managing Data by Using NTFS
Bethesda Cybersecurity Club
Chapter 9: Managing Groups, Folders, Files, and Object Security
Designing IIS Security (IIS – Internet Information Service)
Bethesda Cybersecurity Club
Presentation transcript:

Bethesda Cybersecurity Club Lesson 5 MS Windows Security Configurations and Practice Images

Agenda Review (Accounts, Firewalls, OS Updates) Windows security configurations File permissions and encryption Backups Auditing Performance monitoring practice images

File Permissions Parent and Child Objects Full Control Modify Administrator level access Users can make all possible changes to file or folder Modify Users can change content, but not ownership Users cannot delete Read and Execute Users can open and run programs List Folder Contents Users can view names of files in folder Write Users can make changes to file/ overwrite content Read Users can view a file or folder, but not edit Parent and Child Objects

Customizing permissions Apply same permissions to all contents of folder: Right-click Folder  Properties  Security Tab

Customizing permissions Remove inherited permissions: Advanced Button  Change Permissions  Uncheck “Include Inheritable permissions”

MS Office File Encryption Open MS Office File  Window Button  Protect Document  Encrypt Document

Windows Backup Options Windows allows you to create three types of backups System Repair Disc Contains only the system files needed to install/restore Windows to a computer without a functioning OS Can be followed with system image to restore everything else System image Contains files and programs on your system and Windows system files and settings When you boot a computer with a functioning OS from system image, the entire system will be automatically restored “Full” Backup Saves program files, folders, and documents so they can be restored to a machine with a functioning OS Much smaller in size than system discs, so can be run more frequently Control Panel  System and Security  Backup your computer

Windows Auditing | Event Viewer View records of changes and other events Control Panel  System and Security  Administrative Tools  Event Viewer Security Logs can be useful defense against attacks and tool for forensic investigations Events Logged by programs Logon attempts Events during installation Events logged by system components Events forwarded from other computers

Windows Auditing | Audit Policy Control Panel  System and Security  Administrative Tools  Local Security Policy  Local Policies  Audit Policy Success: Generates an event when the requested action succeeds Failure: Generates an event when the requested action fails No Auditing: Does not generate an event for the action

Performance Monitoring Allows you to track the use and performance of hardware and software resources Allows you to view real-time and historical data Allows you to decide if hardware and software need updating Allows you to determine if unknown programs and/or malware are running Allows you to monitor and restrict user access

Practice Images