Download presentation
Presentation is loading. Please wait.
1
Bethesda Cybersecurity Club
Lesson 5 MS Windows Security Configurations and Practice Images
2
Agenda Review (Accounts, Firewalls, OS Updates)
Windows security configurations File permissions and encryption Backups Auditing Performance monitoring practice images
3
File Permissions Parent and Child Objects Full Control Modify
Administrator level access Users can make all possible changes to file or folder Modify Users can change content, but not ownership Users cannot delete Read and Execute Users can open and run programs List Folder Contents Users can view names of files in folder Write Users can make changes to file/ overwrite content Read Users can view a file or folder, but not edit Parent and Child Objects
4
Customizing permissions
Apply same permissions to all contents of folder: Right-click Folder Properties Security Tab
5
Customizing permissions
Remove inherited permissions: Advanced Button Change Permissions Uncheck “Include Inheritable permissions”
6
MS Office File Encryption
Open MS Office File Window Button Protect Document Encrypt Document
7
Windows Backup Options
Windows allows you to create three types of backups System Repair Disc Contains only the system files needed to install/restore Windows to a computer without a functioning OS Can be followed with system image to restore everything else System image Contains files and programs on your system and Windows system files and settings When you boot a computer with a functioning OS from system image, the entire system will be automatically restored “Full” Backup Saves program files, folders, and documents so they can be restored to a machine with a functioning OS Much smaller in size than system discs, so can be run more frequently Control Panel System and Security Backup your computer
8
Windows Auditing | Event Viewer
View records of changes and other events Control Panel System and Security Administrative Tools Event Viewer Security Logs can be useful defense against attacks and tool for forensic investigations Events Logged by programs Logon attempts Events during installation Events logged by system components Events forwarded from other computers
9
Windows Auditing | Audit Policy
Control Panel System and Security Administrative Tools Local Security Policy Local Policies Audit Policy Success: Generates an event when the requested action succeeds Failure: Generates an event when the requested action fails No Auditing: Does not generate an event for the action
11
Performance Monitoring
Allows you to track the use and performance of hardware and software resources Allows you to view real-time and historical data Allows you to decide if hardware and software need updating Allows you to determine if unknown programs and/or malware are running Allows you to monitor and restrict user access
22
Practice Images
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.