Presentation is loading. Please wait.

Presentation is loading. Please wait.

{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.

Similar presentations


Presentation on theme: "{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if."— Presentation transcript:

1 { Active Directory Security Why bother?

2   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if the secure way also happens to be the easy way   Law #3: If you don't keep up with security fixes, your network won't be yours for long   Law #4: It doesn't do much good to install security fixes on a computer that was never secured to begin with   Law #5: Eternal vigilance is the price of security Microsoft’s 10 Immutable Laws of Security Administration

3   Law #6: There really is someone out there trying to guess your passwords   Law #7: The most secure network is a well- administered one   Law #8: The difficulty of defending a network is directly proportional to its complexity   Law #9: Security isn't about risk avoidance; it's about risk management   Law #10: Technology is not a panacea Law’s continued

4 Next time someone asks why miscreants might want to hack his PC, show him this diagram. https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/

5 { Setting Up a Secure Environment Overview *Not all encompassing*

6  Service packs  Hotfixes  Notifications  Network scanners  Virus / malware protection software Updates http://www.pcprofessionals.com.au/2013/the-importance-of-windows-updates/

7  Disable guest account  Transport level encryption  Remote network access  File permissions  Security groups  Group policy  Disable / uninstall unused services  Secure user rights  Firewall settings  Backups  Best Practice Analyzer – BPA  Microsoft Baseline Security Analyzer Security Settings

8  Enabled  Adequate storage  Central location  Review schedule  Email & other notification Audit Logging

9  Why bother?  Limit access  Access logs  Locked server closet / room  Security cameras  Network plugs  Paper trail  Environment monitoring  Wireless vs wired  Biggest security vulnerability – humans Physical security http://goinfopipe.com/top-7-physical-security-trends/#!prettyPhoto

10  Company stand  Passwords  Employee dismissal  User access levels  Privacy  Mobile data transfer  Computer use Policies

11  Sync network time  Train your users Miscellaneous

12  http://www.newark.com/images/en_US/marketing/pdf/BLackBoxPhysi calNetworkSecurity.pdf http://www.newark.com/images/en_US/marketing/pdf/BLackBoxPhysi calNetworkSecurity.pdf http://www.newark.com/images/en_US/marketing/pdf/BLackBoxPhysi calNetworkSecurity.pdf  http://it-audit.sans.org/community/checklists/active-directory-security http://it-audit.sans.org/community/checklists/active-directory-security  http://technet.microsoft.com/en-us/library/cc722488.aspx http://technet.microsoft.com/en-us/library/cc722488.aspx  https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc- revisited/ https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc- revisited/ https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc- revisited/Sources


Download ppt "{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if."

Similar presentations


Ads by Google