Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.

Slides:



Advertisements
Similar presentations
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
Advertisements

MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
 Overview User Accounts Groups User Rights Permissions.
Managing User Settings with Group Policy
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 8: Implementing Administrative Templates and Audit Policy.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Microsoft ® Official Course Module 9 Configuring Applications.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Chapter Overview Understanding Group Policies Implementing Group Policies Using Security Policies Troubleshooting Group Policy Problems.
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
70-270: MCSE Guide to Microsoft Windows XP Professional Second Edition, Enhanced Chapter 6: Windows XP Security and Access Controls.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Hands-On Microsoft Windows Server 2008
1 User Account Administration Introduction to User Accounts Planning New User Accounts Creating User Accounts Creating User Profiles Creating Home Directories.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Chapter Six Windows XP Security and Access Controls.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
1 Objectives Audit Policies Update and maintain your clients using Windows Server Update Service Microsoft Baseline Security Analyzer Windows Firewalls.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Overview Introduction to Managing User Environments Introduction to Administrative Templates Using Administrative Templates in Group Policy Assigning Scripts.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Module 6: Configuring User Environments Using Group Policy.
Module 7: Managing the User Environment by Using Group Policy.
Module 7 Configure User and Computer Environments By Using Group Policy.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
NetTech Solutions Security and Security Permissions Lesson Nine.
Administering Microsoft Windows Server 2003 Chapter 2.
Module 10: Implementing Administrative Templates and Audit Policy.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Module 9: Preparing to Administer a Server
Module Overview Installing and Configuring a Network Policy Server
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Module 9: Preparing to Administer a Server
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano Viola (CSIA)

Overview Securing Desktops and Services by Using Security Policies Auditing Access to System Resources

Securing Desktops and Services by Using Security Policies Implementing Security Policies Modifying Security Settings Using Predefined Security Templates Creating Custom Security Templates Analyzing Security Configuring and Analyzing Security from a Command Line

Implementing Security Policies Internet Services Manager Implementing Security Policies by Using Local Security Policy Implementing Security Policies by Using Local Security Policy Event Viewer Licensing Performance Routing and Remote Access Server Extensions Administrator Services Telnet Server Administration Local Security Policy Accessories Startup Internet Explorer Outlook Express Administrative Tools Group Policy Implementing Security Policies by Using Group Policy

Modifying Security Settings Account policies Local policies Public key policies IPSec policies Event log Configure password and account policies Configure auditing, user rights, and security options Configure encrypted data recovery agents, domain roots, trusted certificate authorities, etc. Configure encrypted data recovery agents, domain roots, trusted certificate authorities, etc. Configure IP security on a network Configures settings for application logs, system logs, and security logs Restricted Groups Configures group memberships for security sensitive groups System Services Configure security and startup settings for services running on a computer Configure security and startup settings for services running on a computer RegistryRegistry Configures security on registry keys File system Configures security on specific file paths

Using Predefined Security Templates Define the default security level for Windows Provide an additional level of security than Compatible, but do not ensure that all of the features of standard business applications will run. Provide a a higher level of security than Basic but still ensures that all the features of standard business applications will run. Enforce the maximum security for Windows 2000 without consideration for application functionality. Compatible Basic Secure High

Creating Custom Security Templates To create a custom security template Add the Security Template snap-in to MMC Select the template to customize Configure the new policy settings Save the new configuration

Analyzing Security Local Security Settings Console Favorites Console Root Policy Security Options ActionViewFavorites WindowHelp Tree Database SettingComputer Setting Security Configuration and A Account Policies User Rights Assignme Registry MACHINE CLASSES_ROOT System Services Restricted Groups Event Log Local Policies Audit Policies Additional restriction… Allow server operato... Allow system to be s... Allowed to eject rem… Amount of idle time r... Audit the access of g... Audit use of Backup… Automatically log off… Clear virtual memory... Digitally sign client co... Digitally sign client co… Do not allow en… Disabled Administrators Enabled 15 minutes Disabled Enabled Disabled None. Rely on … Disabled Administrators Enabled 15 minutes Disabled Enabled Disabled Current Computer Settings Template (.inf file) Analysis Database (.sdb file)

Configuring and Analyzing Security from a Command Line /analyze/configure/export/refreshpolicy/validate/areas FILESTORE C:\WINNT\System32\cmd.exe C:\>cd %windir%\security\database C:\WINNT\security\Database>secedit /configure /db mysecure.sdb /areas FILESTORE /Log C:\WINNT\security\logs\MySecure.Log /verbose Task is completed successfully. See log C:\WINNT\security\logs\MySecure.Log for detail info.

Auditing Access to System Resources Introduction to Auditing Selecting Events to Audit Planning an Audit Policy Setting Up an Audit Policy Auditing Access to Resources

Introduction to Auditing Auditing Tracks User and Operating System Activities Audit Entries Contain Actions Performed, Users Who Performed the Actions, and Success or Failure of the Events Audit Policy Defines the Types of Security Events That Windows 2000 Records You Set Up an Audit Policy to Track Success or Failure of Events, Identify Unauthorized Use of Resources, and Maintain a Record Activity You View Security Logs in Event Viewer Event Viewer User1 logon failed Access denied Printing successful Use of Resources Success or Failure Logged

Selecting Events to Audit EventEventExampleExample Account logon Domain controller receives a request to validate a user account Account management Administrator creates, changes, or deletes a user account or group Directory service access User gains access to an Active Directory object Logon User logs on or off a local computer Object access User gains access to a file, folder, or printer Policy change Change is made to the user security options, user rights, or Audit policies Privilege use User exercises a right, such taking ownership of a file Process tracking Application performs an action System User restarts or shuts down the computer

Planning an Audit Policy Determine the Computers on Which to Set Up Auditing Review Security Logs Frequently Determine Whether to Audit the Success or Failure of Events, or Both Determine Whether to Audit the Success or Failure of Events, or Both Determine Which Events to Audit Determine Whether You Need to Track Trends

Setting Up an Audit Policy Console Console1 – [Console\Root\Local Computer Policy\Computer Configuration\Windows Settings\Security Settings\Local Policie WindowHelp ActionView Tree Console Root Audit Policy Audit account logon events Audit account management Audit directory service access Audit logon events Audit object access Audit policy change Audit privilege use Audit process tracking Local Computer Policy Favorites PolicyLocal SettingEffective Setting Audit system events Computer Configuration Software Settings Window Settings Scripts (Startup/Shutdown) Security Settings Account Policies Local Policies User Rights Assignme Security Options Public Key Policies IP Security Policies on Lo Success, Failure No auditing Success, Failure No auditing Success Failure No auditing Assign Security Settings to a Single Computer by Configuring the Settings in Local Policies in Group PolicyAssign Security Settings to a Single Computer by Configuring the Settings in Local Policies in Group Policy Assign Security Settings to Multiple Computers by Creating a Group Policy Object and Assigning ItAssign Security Settings to Multiple Computers by Creating a Group Policy Object and Assigning It

Auditing Access to Resources File System Set the Audit Policy to Audit Object Access Enable Auditing for Specific NTFS Files and Folders Record Success or Failure of an Event Set the Audit Policy to Audit Object Access Enable Auditing for Specific NTFS Files and Folders Record Success or Failure of an Event NTFS Printers Set the Audit Policy to Audit Object Access Enable Auditing for Specific Printers Record Success or Failure of an Event Set the Audit Policy to Audit Object Access Enable Auditing for Specific Printers Record Success or Failure of an Event