1 Host Hardening Chapter 6 Copyright 2003 Prentice-Hall.

Slides:



Advertisements
Similar presentations
By Rashid Khan Lesson 5-Directory Assistance: Administration Using Active Directory Users and Computers.
Advertisements

Case Study: Pat Lee’s Home PC Network Chapter 1a Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Host Hardening (March 21, 2011) © Abdou Illia – Spring 2011.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
11 ADMINISTERING MICROSOFT WINDOWS SERVER 2003 Chapter 2.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Chapter 1 Introducing Windows Server 2012/R2
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Case Study: Pat Lee’s Home PC Network Chapter 1a Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Working with Workgroups and Domains
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Operating Systems on the Network Approaches to managing network resources –Peer-to-peer model All the computers on the LAN have the same authority and.
Chapter Overview Network Communications.
LO2 Understand the key components used in networking
Chapter 7 Host Hardening.
Chapter 9: Novell NetWare
Copyright 2003 CCNA 3 Chapter 7 Switch Configuration By Your Name.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
1 Host Hardening Chapter 6 Copyright 2003 Prentice-Hall.
XTR Consulting: A SOHO Network with Dedicated Servers Chapter 1b Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.
Chapter Nine NetWare-Based Networking. Introduction to NetWare In 1983, Novell introduced its NetWare network operating system Versions 3.1 and 3.1—collectively.
Host Hardening Chapter 6 Panko, Corporate Computer and Network Security Copyright 2005 Prentice-Hall.
Active Directory Maryam Izadi. Topics Covered NT Vs 2000/2003 Active Directory LDAP MMC.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Chapter 10: Rights, User, and Group Administration.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
Guide to MCSE , Enhanced1 Activity 1-1: Determining the Windows Server 2003 Edition Installed on a Server Objective is to determine the edition of.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
11 PLANNING A GROUP POLICY MANAGEMENT AND IMPLEMENTATION STRATEGY Chapter 10.
Administering Microsoft Windows Server 2003 Chapter 2.
MICROSOFT WINDOWS 2000 NT ADVANCED SERVER Esra Tanrisever&Ozgur Topcu.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
© 2015 Pearson Education Ltd. Chapter 7 Chapter 7.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Guide to Operating Systems, 5th Edition
Chapter 6 Application Hardening
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Unit 6 NT1330 Client-Server Networking II Date: 7/19/2016
Access Control and Site Security
Presentation transcript:

1 Host Hardening Chapter 6 Copyright 2003 Prentice-Hall

2 Figure 6-1: Hardening Host Computers The Problem  Computers installed out of the box have known vulnerabilities Not just Windows computers  Hackers can take them over easily  They must be hardened—a complex process that involves many actions

3 Figure 6-1: Hardening Host Computers Elements of Hardening  Physical security (Chapter 2).  Secure installation and configuration  Fix known vulnerabilities  Turn off unnecessary services (applications)  Harden all remaining applications (Chapter 9)

4 Figure 6-1: Hardening Host Computers Elements of Hardening  Manage users and groups  Manage access permissions For individual files and directories, assign access permissions specific users and groups  Back up the server regularly  Advanced protections

5 Figure 6-1: Hardening Host Computers Security Baselines Guide the Hardening Effort  Specifications for how hardening should be done  Different for different operating systems  Different for different types of servers (webservers, mail servers, etc.)  Needed because it is easy to forget a step

6 Figure 6-1: Hardening Host Computers Server Administrators Are Called Systems Administrators

7 Figure 6-1: Hardening Host Computers Windows Computers  Microsoft Network Operating Systems (NOSs) LAN Manager (LANMAN) Windows NT Server Windows 2000 Server Windows 2003 Server (called.NET in the book)  Graphical user interface looks like client versions to ease learning (Figure 6-2)

8 Figure 6-2: Windows 2000 Server User Interface

9 Figure 6-1: Hardening Host Computers Windows Computers  Administrative Tools Group under Programs has Microsoft Management Consoles (MMCs) (Figure 6-3) Used to conduct most administrative actions Can add snap-ins for specific functionality

10 Figure 6-3: Computer Management Microsoft Management Console (MMC) System Tools snap-in

11 Figure 6-1: Hardening Host Computers Windows Computers  Windows 2000 introduced hierarchical domain structure with Active Directory Domain is a collection of resources Domain contains one or more domain controllers, member servers, client PCs Group policy objects (GPOs) on a domain controller can implement policies throughout a domain

12 Figure 6-1: Hardening Host Computers UNIX  Many versions of UNIX  LINUX is a set of versions for PCs—there are several different distributions  User can select the user interface—GUI or command-line interface (CLI)  CLIs are called shells (Bourne, BASH, etc.)  CLIs have picky syntax, capitalization, and spacing

13 Figure 6-1: Hardening Host Computers Internetwork Operating System (IOS)  For Cisco Routers, Some Switches, Firewalls Other Host Operating Systems  Macintosh  Novell NetWare  Firewalls  Even cable modems with web-based management interfaces