1 / 19

Securing the Infrastructure

Securing the Infrastructure. IT:Network:Apps. Securing the Infrastructure. Security Options Group Policy AppLocker ACL. Security Options. Defense in depth Physical File level Folder/File permissions Minimalist mentality Object level Object permissions. Security Options. Desktop

inoke
Download Presentation

Securing the Infrastructure

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing the Infrastructure IT:Network:Apps

  2. Securing the Infrastructure • Security Options • Group Policy • AppLocker • ACL

  3. Security Options • Defense in depth • Physical • File level • Folder/File permissions • Minimalist mentality • Object level • Object permissions

  4. Security Options • Desktop • Physical • Group Policy • Access/Authentication • Server • Physical • Group Policy • Access/Authentication

  5. Security Options • Perimeter • NAT • Firewall • Security Appliances • Mail/Spam Gateway • VPN concentrator • Network Access Protection

  6. Security Options • Antivirus solutions • http://www.windowsitpro.com/article/antivirus/enterprise-antivirus-software.aspx • http://www.av-test.org/ • Network based Antivirus • Centrally managed • Centrally deployed • Engines for both server and client • Agents for server based applications • Exchange filtering • Central point for updates • Engines • Definitions

  7. Security Options • Antivirus solutions • Centralized reporting • Reports on activities, updates and policies

  8. Security Options • Antivirus solutions • Client based Antivirus • Updates done individually at client directly to Internet • Reporting local to client • Typically has engine for desktops and not server

  9. Group Policy • Group Policy Objects (GPO) can be used to secure both server and desktop machines • Security Configuration Wizard (SCW) • http://technet.microsoft.com/en-us/library/cc771492(WS.10).aspx

  10. Group Policy • What does SCW do? • Guides you through the process of creating, editing, applying, or rolling back a security policy. • It provides a way to create or modify a security policy for your server based on its role. • Use Group Policy to apply the security policy to multiple target servers that perform the same role • You can compare a server's security settings with a desired security policy to check for vulnerable configurations in the system.

  11. Group Policy • Security Configuration Wizard • StartProgramsAdministrative Tools

  12. Group Policy

  13. Group Policy • SCW will create/edit or roll back security settings based on your selections • Creates role based policy settings • Detects what roles are installed on server

  14. Group Policies • Controlling applications • Application Control Policies • Software Restriction Policies

  15. Group Policies • Applocker requirements • Works on Windows 7 and newer • Only available on 7 Enterprise and Ultimate…not Pro  • Application Identity service must be running. • Add default rules to prevent stepping on “required” services

  16. Group Policies • Applocker • Add default rules • Create new rule

  17. Group Policies • Software Restriction Polices • Similar to Applocker, works on XP and later

  18. ACL • Security can be controlled from the file level to the Active Directory Object level • NTFS permissions • Share permissions • ADO permissions • Out of sight, out of mind approach • Minimalist approach

  19. Questions?

More Related