MCDST 70-271: Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.

Slides:



Advertisements
Similar presentations
Chapter Five Users, Groups, Profiles, and Policies.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
Khan Rashid Lesson 11-The Best Policy: Managing Computers and Users Through Group Policy.
Chapter 13 Securing Windows Server 2008
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 7 HARDENING SERVERS.
Chapter 8 Chapter 8: Managing Accounts and Client Connectivity.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 6: Configure and Troubleshoot Local User and Group Accounts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Module 8: Implementing Administrative Templates and Audit Policy.
11 CERTIFICATE SERVICES AND SECURE AUTHENTICATION Chapter 10.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Network and Active Directory Performance Monitoring and Troubleshooting NETW4008 Lecture 8.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Securing Windows Servers Using Group Policy Objects
Hands-On Microsoft Windows Server 2008 Chapter 10 Securing Windows Server 2008.
CH 12 Securing Windows Server Objectives Understand the security enhancements included in Windows Server 2008 Understand how Windows Server 2008.
Windows Server 2008 Chapter 10 Last Update
1 Chapter Overview Understanding Group Policies Implementing Group Policies Using Security Policies Troubleshooting Group Policy Problems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
70-270: MCSE Guide to Microsoft Windows XP Professional Second Edition, Enhanced Chapter 6: Windows XP Security and Access Controls.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Hands-On Microsoft Windows Server 2008
Guide to Operating System Security Chapter 4 Account-based Security.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Chapter Six Windows XP Security and Access Controls.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Designing Active Directory for Security
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 22 Local Security Polcies 1.
Module 14: Configuring Server Security Compliance
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Understanding Group Policy James Michael Stewart CISSP, TICSA, CIW SA, CCNA, MCSE NT & W2K, iNet+
Some overlap exists between the settings of the MMC and the settings of the registry. The MMC is extensible. Policies and properties can be edited via.
NT4 SP4 Security Jack Schmidt - Fermilab
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
Module 7: Implementing Security Using Group Policy.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
NetTech Solutions Security and Security Permissions Lesson Nine.
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Introduction to Group Policy Lesson 7. Group Policy Group Policy is a method of controlling settings across your network. – Group Policy consists of user.
Configuring Windows Firewall with Advanced Security
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Presentation transcript:

MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security Policy

Guide to MCDST Objectives Understand the local security policy Understand group policies Use the Security Configuration and Analysis tool and secedit Perform troubleshooting for group policy

Guide to MCDST Local Security Policy Windows XP Professional is only subject to security restrictions of local security policy when it is a stand-alone system or member of a workgroup Group policy object –A collection of Registry settings that are applied to the system upon startup and user logon

Guide to MCDST Local Security Policy (continued) Contents of local security policy –Determined during installation Custom policies –Can be created through the use of.adm files.adm files used by group policy editors –Reside in the \inf subfolder of the main Windows XP directory

Guide to MCDST Local Security Policy (continued)

Guide to MCDST Local Security Policy (continued)

Guide to MCDST Password Policy Defines the restrictions on passwords Items in policy include: –Enforce password history: 0 passwords –Maximum password age: 42 days –Minimum password age: 0 days –Minimum password length: 0 characters

Guide to MCDST Account Lockout Policy Defines conditions that result when a user account is locked out Used to prevent brute force attacks against user accounts Items in policy include –Account lockout duration –Account lockout threshold: 0 invalid logon attempts –Reset account lockout counter after: Not Applicable

Guide to MCDST Account Lockout Policy (continued)

Guide to MCDST Audit Policy Defines events recorded in the Security log of the Event Viewer Auditing –Used to track resource usage Items in policy include: –Audit account logon events: No auditing –Audit account management: No auditing –Audit directory service access: No auditing

Guide to MCDST User Rights Assignment Defines which groups or users can perform the specific privileged action Troubleshooting user rights –A process of test, reconfigure, and retest

Guide to MCDST User Rights Assignment (continued)

Guide to MCDST Security Options Defines and controls various security features, functions, and controls Items in this policy include: –Accounts―Administrator account status: Enabled –Accounts―Guest account status: Disabled –Devices―Allow undock without having to logon: Enabled

Guide to MCDST Security Options (continued)

Guide to MCDST Public Key Policies Used to: –Offer additional controls over the Encrypting File System (EFS) –Enable the issuing of certificates –Allow you to establish trust in a certificate authority

Guide to MCDST Public Key Policies (continued)

Guide to MCDST Software Restriction Policies Used to restrict the programs and applications allowed to execute on a system Software restriction policies can be one of these: –“Deny all but the exceptions” method –“Allow all but the exceptions” method

Guide to MCDST Software Restriction Policies (continued)

Guide to MCDST IP Security Policies on Local Computer Used to define policies that control the function of IPSec Negotiates a secure encrypted communications link between a client and server through public and private encryption key management

Guide to MCDST IP Security Policies on Local Computer (continued) IPSec offers protection against: –Eavesdropping –Data modification –Identity spoofing –Password attacks –Denial-of-service attacks –Man-in-the-middle attacks

Guide to MCDST IP Security Policies on Local Computer (continued) Predefined IPSec policies –The Client (Respond Only) policy –The Server (Request Security) policy –The Secure Server (Require Security) policy Authentication methods –Kerberos version 5 –Public key certificate authentication –Preshared key

Guide to MCDST Group Policies An expanded version of the local security policy Divisions –Computer Configuration –User Configuration

Guide to MCDST Group Policies (continued)

Guide to MCDST Computer Configuration Used to define and regulate security-related features and functions Subnodes –Software Settings –The Windows Settings folder –The Administrative Templates folder

Guide to MCDST User Configuration Subfolders –Software Settings―empty by default –The Windows Settings folder―contains Internet Explorer Maintenance, Scripts (Logon/Logoff), and Security Settings –The Administrative Templates folder―contains a multilevel collection of user-specific, Registry- based controls

Guide to MCDST Application of Group Policies Applied in the following order: –Any existing legacy Windows NT 4.0 ntconfig.pol files are applied –Any unique local security policy is applied –Any site group policies are applied –Any domain group policies are applied –Any organizational units (OUs) group policies are applied

Guide to MCDST Security Configuration and Analysis Tool An MMC snap-in that can be used to analyze, configure, export, and validate system security based on a security template Security template –A predefined group policy file with specific levels of security Predefined security templates –compatws –hisecdc –hisecws

Guide to MCDST Using Secedit Used to analyze, configure, export, and validate security based on a security template Parameters of secedit –analyze –db FileName –cfg FileName –log FileName

Guide to MCDST Troubleshooting Policies If change does not seem to take effect on a system –Log out then back on –Reboot the system –If change still fails to take effect, examine the RSoP for the local system or access the Help and Support Center

Guide to MCDST Summary Local Security Policy tool –Used to manage passwords, account lockout parameters, audits, user rights Group policies –Domain-level versions of the local security policy Local computer policy (RSoP of applied GPOs) –Controls many aspects of the security system Troubleshooting GPOs includes discovering the RSoP