Auditing Security and Controls of Windows Active Directory Domains
|
|
- Peter Clark
- 8 years ago
- Views:
Transcription
1 von Derek Melber Derek Melber, MCSE, CISM, is one of the leading technical instructors, authors, and consultants in the nation, with an innate understanding of how to decipher, organize, and communicate complex issues. With a master s degree from the University of Kansas, 1. Auflage Auditing Security and Controls of Windows Active Directory Domains Melber schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG The Institute of Internal Auditors Verlag C.H. Beck im Internet: ISBN Inhaltsverzeichnis: Auditing Security and Controls of Windows Active Directory Domains Melber
2 CHAPTER 1 AUDITING WINDOWS 2000/2003 INTRODUCTION Introduction Most companies run a domain, which controls the lifeblood of the company s network, security, and resources. The domain consists of domain controllers, member servers, and client computers. The domain will also work with other essential devices, such as routers, hubs, switches, and firewalls. It is important to understand that the domain model has changed dramatically from Windows NT 4.0 to Windows 2000 and Server Windows NT used a domain model that relied on a Security Accounts Manager (SAM). Windows 2000 and Server 2003 rely on Active Directory. In almost every instance, the Active Directory model is much better than the SAM foundation. In this handbook, we will not be focusing on the member servers and client computers. Instead, we will focus on the domain controllers and the domain infrastructure itself. If you have never audited a Windows Active Directory domain, or have only audited one a couple of times, this handbook is ideal for you. I find that many auditors still think about Windows domains the way they did in Windows NT, not like an Active Directory domain. For those of you who have audited numerous Active Directory domains (I have only met about two in a thousand auditors), this handbook is also ideal for you. It will expand your knowledge and push the limits of what your audit program includes, and there will be at least five control points that you don t currently check. We will dive directly into the domain controllers and the domain itself, exposing all of the nooks and crannies that need to be audited. Domain controllers are similar to member servers, but do have different control points due to their function in a domain. So, if you have read any books on member servers, this book will focus on different information. I feel that if the security control points, scope of domain controllers, scope of domains, and target goals are understood, then the audit will go smoother and faster. This book will solve all of those issues for you. We will start by discussing some terminology that can help you gather more information and perform better interviews. Being able to talk the talk with the IT and security administrators can go a long way. The terminology will also help in the evaluation and analysis of the audit data that is provided. Wading through the sea of three- and four-letter acronyms can be a full-time job. Understanding what each term means and how the audit fits into the terminology can help make your audit more efficient.
3 Next, we pinpoint where each control point resides for a server. Many of the control points for servers overlap those for clients, but the control point configuration and focus might be different than that of a client. The structure of each control is as follows: What is the control point? Why is the control point important? Which computers should be examined to audit the control point? Which control point details should be audited? How will the control point be audited? Example control point report. After the control points, we will discuss how to structure the audit with regard to the aspects of the domain. Scoping which computers should be audited can be highly beneficial. I will illustrate some different tactics for the sampling procedure, which might allow you to streamline the selection and evaluation process. Finally, I will lay out a detailed audit plan that will allow you to take the knowledge you learned and put it into action. With this structure, you will have all of the information required to perform a successful and efficient audit of servers on the network. Essential Windows Network and Security Concepts and Tools You can see something ten times and still not remember what it is. However, when you are taught, you will remember it. My goal is to teach you some quick and easy ways to remember what each technology does for a Windows environment. Windows Terminology Defined We will first start off with some basic Windows terminology. Some of these terms also work for other operating systems, but they are key to Windows. Workgroup A group of computers that are networked where each computer authenticates access to resources stored on the computer by using local SAM user and group accounts. The administration model here is decentralized. Domain A group of computers that are networked where dedicated servers (called domain controllers) authenticate access to resources stored on servers and clients using the Active Directory database. The administration model is centralized. SAM Security Accounts Manager. The SAM is used in two different areas. First, it is the Windows NT database that contains user, group, and computer accounts for the domain.
4 Second, every Windows NT, 2000, XP, and 2003 computer has a local SAM, which contains local user and group accounts. Active Directory Dynamic database that contains user, group, and computer accounts for the domain. Domain Controller Servers that store the Active Directory database. The primary function of these servers is to authenticate user logons and deploy security using Group Policy. LDAP Lightweight Directory Access Protocol. This protocol is used to communicate, reading and writing, with the Active Directory database. DNS Domain Naming System. This is the locator service for all Active Directory computers and Active Directory-based services. When a computer needs to find another computer on the network, it uses DNS to find the IP of the computer. ACL Access Control List. Term used to reference the list of users and groups that have permission to access a resource. DACL Discretionary Access Control List. The official term used to define the list of users and groups that have permission to access a resource. SACL System Access Control List. Determines the list of users and groups that will be audited when accessing the resource. Privileges This is also known as User Rights. User Rights are unique for each computer and determine which users can perform administrative and privileged tasks on that computer. Shared Folder A folder that is available to other computers on the network. The folder will be shown with a small hand under the folder in the interface. Baselines, Security Templates, and Windows Baseline Tools A security baseline is typically defined as a set of security settings for computers that meet the minimum requirements for the organization. The baseline can be self-made or based on a standard from Microsoft or other vendors that produce baseline configurations. If the baseline is detailed enough, it might become the company security policy. There can be baseline configurations for different types of computers on the network. Typical baselines exist for the following types of computers: Domain Controllers File Servers IAS Servers IIS Servers Infrastructure Servers Member Servers Print Servers Clients
5 Each type of computer can be broken down into different categories, depending on the security needs of the organization. These baselines are typically documented and deployed using security templates. Security templates are simple documents that interface with the policies that configure the computer s security. These security templates typically have an INF file extension and are very easy to move around since they are so small. The security templates are deployed to computers in several ways: Manually This process is cumbersome and not done very often. This requires that each computer be visited and the security template be applied one computer at a time. Automated Script This is often the solution for environments that don t rely on Active Directory, but still need the Windows computers to meet a minimum baseline. Group Policy Objects This is the most common scenario for deploying security templates, which can be easily imported into a GPO for consistent and targeted application to computers. The tools that are used to deploy security baselines using security templates include the following: Secedit Command This is the scripting method for deploying a security template to a computer. This is a built-in tool. Security Templates Snap-in This tool is used in conjunction with the MMC (see below). It allows easy creation and management of security templates. Security Configuration and Analysis Tool This tool is used in conjunction with the MMC (see below). It is designed to deploy security templates to a single computer. Group Policy Objects GPOs are a function of an Active Directory enterprise and support the importing of security templates and their settings. GPOs provide an efficient method for configuring multiple computers with the same security template. Essential Tools of the Trade There are some tools that are essential for establishing security, performing audits on Windows environments, and keeping up-to-date with other resources. There are also some Web sites that are important to visit often, since they are constantly changing and updating materials. Administrative Tools These tools are the tool belt for the administrator. They include management of Active Directory, DNS, GPOs, Event Viewer, and remote computers. The tools come standard with a domain controller, but servers and clients need to install adminpak.msi to access all of the Active Directory tools and service tools. TIP: If the computer you are auditing is not designed for administrators, it should not have the adminpak.msi or administrator tools installed on it.
6 Microsoft Management Console (MMC) This is not really a tool in the sense that you can use the MMC to perform a task. Rather, the MMC is a shell to which other snap-ins are added. The snap-ins are the actual tools. Just type MMC at the Start Run textbox and it will launch the MMC. Computer Management This is one of the Administrative Tools and is also a snap-in. The reason for mentioning it separately is because of the power the tool provides for auditors and security administrators alike. The tool can list shares, services, local SAM, and event viewer information for any computer in the domain. Microsoft Baseline Security Analyzer (MBSA) This is a free tool from Microsoft that you can download and use to analyze key security settings on any computer. The tool can be downloaded from The tool is designed to analyze and report on the most important aspects of a computer s security. Key configurations such as file system, blank passwords, update levels, and shares are just some of the settings MBSA can analyze. DumpSec When it comes to other tools useful for auditing Windows, one sticks out from the others. The DumpSec tool is one of the best tools for gathering this information. The tool is free and can be downloaded from It can be used locally or remotely, as long as you have administrative privilege to the computer. The current version is v Resource Kit This is not a default tool, but includes a suite of tools by Microsoft. Documentation also comes along with the kit, but the tools are essential for auditors. To download the tools for free, you can go to this link: (Sorry for the lengthy string, but this is the only link where I can find the tools.) TechNet TechNet is not a tool in terms of a typical application, it is the end-all, defacto documentation that Microsoft produces. The tool is worth its weight in gold and maybe diamonds. The tool consists of a new CD/DVD every month that contains the latest knowledge-base articles, Q articles, white papers, and other documentation that is produced from Microsoft. TechNet covers all applications and operating systems all of them! You can get it for $349 a year at Key Web Sites As a trainer, speaker, author, and consultant, I feel that education is key! Here are some Web sites that are constantly being updated with new articles and information regarding Windows auditing and security.
7 Additional Tools I am a huge proponent of free tools. In this book, you will only be introduced to the tools that don t cost anything. I know fully that auditors must work with a small budget, if they are afforded a budget for tools at all. However, I can t discount the amazing tools that are out on the market for auditing Windows. These tools provide reporting, summarizing, and querying that surpass the free tools. If you are working too hard with the free tools and need some help optimizing and making your audit more efficient, check out some of these companies and their tools. GFI LanGuard This is a suite of tools that help track, report, and protect the network. NetPro ChangeAuditor This tool tracks when any change occurs to Active Directory or related services. BindView Vulnerability Management This tool helps proactively audit the key security settings on the Windows network. Symantec Enterprise Security Manager This tool provides integrated auditing and security management for Windows and many other platforms. SystemTools Hyena This tool is an excellent reporting tool for users, groups, resources, and much more. Aelita InTrust This tool provides consolidation, reporting, and analysis of auditing information.
CHAPTER 1 AUDITING WINDOWS 2000/2003 INTRODUCTION
CHAPTER 1 AUDITING WINDOWS 2000/2003 INTRODUCTION Introduction Most companies run at least some, if not all, Windows computers. Of those companies that run Windows computers, the vast majority also use
More informationThe Administrator Shortcut Guide tm. Active Directory Security. Derek Melber, Dave Kearns, and Beth Sheresh
The Administrator Shortcut Guide tm To Active Directory Security Derek Melber, Dave Kearns, and Beth Sheresh Chapter 4: Delegating Administrative Control...68 Data Administration...69 Delegating GPO Administration
More informationIdentity and Access Management
Identity and Access Management Global Technology Audit Guide (GTAG) 9 von,,,, 1. Auflage Identity and Access Management White / Renshaw / Rai / et al. schnell und portofrei erhältlich bei beck-shop.de
More informationSession 17 Windows 7 Professional DNS & Active Directory(Part 2)
Session 17 Windows 7 Professional DNS & Active Directory(Part 2) Fall 2011 ITE153 Operating Systems 1 Session 17 Windows 7 Professional Operating in Microsoft Networks Fall 2011 ITE153 Operating Systems
More informationConfiguring Windows Server 2008 Active Directory
Configuring Windows Server 2008 Active Directory Course Number: 70-640 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-640: TS: Windows Server 2008
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More information70-640 R4: Configuring Windows Server 2008 Active Directory
70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity
More information7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia
7 Tips for Achieving Active Directory Compliance By Darren Mar-Elia Contents 7 Tips for Achieving Active Directory Compliance...2 Introduction...2 The Ups and Downs of Native AD Auditing...2 The Ups!...3
More informationModule 7 Management. Section 7.1: WSUS. CIST2414 Microsoft Server Administrator. Summary. Windows Server 2008 Server Administrator
Module 7 Management In Module 7 students will learn how to manage the server by implementing a patch management, optimizing server performance, and configuring event logs. They will also learn about using
More informationMCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 11 Managing and Monitoring a Windows Server 2008 Network
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network Objectives Use management consoles to maintain Windows
More informationMOC 6419: Configuring, Managing, and Maintaining Windows Server 2008
1 of 6 1/6/2010 3:23 PM MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 This five-day instructor-led course combines five days worth of instructor-led training content from the Network
More informationTHE POWER OF GROUP POLICY
Specops Software presents: THE POWER OF GROUP POLICY By Danielle Ruest and Nelson Ruest The Power of Group Policy... 3 The Inner Workings of GPOs... 4 The Ideal Tool for Systems Management... 7 Your Next
More informationANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003
More informationAdvanced Audit Policy Configurations for LT Auditor+ Reference Guide
Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing
More informationOutline SSS6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory
Outline SSS6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory Duration: Four consecutive Saturdays About this Course This instructor-led course provides the knowledge and skills
More informationMicrosoft Baseline Security Analyzer (MBSA)
Microsoft Baseline Security Analyzer Microsoft Baseline Security Analyzer (MBSA) is a software tool released by Microsoft to determine security state by assessing missing security updates and lesssecure
More informationImplementing and Supporting Microsoft Windows XP Professional
Implementing and Supporting Microsoft Windows XP Professional Key Data Course #: 2272C Number of Days: 5 Format: Instructor-led The purpose of this course is to address the implementation and desktop support
More informationSecuring Active Directory Correctly
SESSION ID: TECH-F02 Securing Active Directory Correctly Derek Melber, MVP Technical Evangelist ManageEngine @derekmelber About Your Speaker Derek Melber, MCSE & MVP (Group Policy and AD) derek@manageengine.com
More informationMCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
More informationConfiguring Managing and Maintaining Windows Server 2008 Servers (6419B)
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want
More informationNext-Gen Monitoring of Active Directory. Click to edit Master title style
Next-Gen Monitoring of Active Directory Click to edit Master title style About Your Speaker Derek Melber, MCSE & MVP (Group Policy and AD) derek@manageengine.com www.auditingwindowsexpert.com Online Resources
More informationInstalling, Configuring, and Managing a Microsoft Active Directory
Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing
More informationCourse 20411D: Administering Windows Server 2012
Course 20411D: Administering Windows Server 2012 Five Days, Instructor Led About this course Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in
More informationAdministering Windows Server 2012
www.etidaho.com (208) 327-0768 Course 20411D: Administering Windows Server 2012 5 Days About this Course Get hands on instruction and practice administering Windows Server 2012, including Windows Server
More informationConfiguring, Managing and Maintaining Windows Server 2008 Servers
Configuring, Managing and Maintaining Windows Server 2008 Servers MOC6419 About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network
More information6419: Configuring, Managing, and Maintaining Server 2008
6419: Configuring, Managing, and Maintaining Server 2008 Course Number: 6419 Category: Technical Duration: 5 days Course Description This five-day instructor-led course combines five days worth of instructor-led
More informationPLANNING AND DESIGNING GROUP POLICY, PART 1
84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group
More informationWhite Paper. Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software
Better Together: Auditing with Microsoft Audit Collection Services (ACS) and Quest Software Written by Tom Crane, Product Manager, Quest Software, Inc. Edited by James Galvin, Microsoft Sr. Product Manager,
More informationOutline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
More informationDirectory-enabled Lights-Out Management
Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...
More informationהמרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
More informationOV Operations for Windows 7.x
OV Operations for Windows 7.x Common questions about OV Operations for Windows Security Setup, Users and groups Whitepaper V.1.01 August 6, 2003 New: Updated for OV Operations for Windows 7.20 Troubleshoot
More informationNE-20411D Administering Windows Server 2012
NE-20411D Administering Windows Server 2012 Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 13 May 2014 200 Windows Server 2012 Delivery Method Instructor-led
More informationAdministering Windows Server 2012
Course 20411D: Administering Windows Server 2012 Course Details Course Outline Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including
More informationDesigning Security for Network Managers
3 Designing Strategies for Security Management............................................... Terms you ll need to understand: Remote desktop administration Telnet Emergency Management Services Software
More informationGuide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu
Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign
More informationTrue Continuous Auditing for Active Directory Derek Melber
True Continuous Auditing for Active Directory by Derek Melber Group Policy and Active Directory MVP ManageEngine ADSolutions Technical Evangelist True Continuous Auditing for Active Directory Today, most
More informationWindows" 7 Desktop Support
Windows" 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson WILEY Wiley Publishing, Inc. Contents Introduction xxiii Chapter 1 Planning for the Installation
More informationCOURSE 20411D: ADMINISTERING WINDOWS SERVER 2012
ABOUT THIS COURSE Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official course. This course is part two in a series
More informationSystemTools Software Inc. White Paper Series Hyena Installation Requirements
SystemTools Software Inc. White Paper Series Hyena Installation Requirements SystemTools Software, Inc. has created this white paper to cover all requirements to install and fully use all of the features
More informationSECURE YOUR WINDOWS ENTERPRISE WITH STRONG PASSWORD MANAGEMENT
Specops Software presents: SECURE YOUR WINDOWS ENTERPRISE WITH STRONG PASSWORD MANAGEMENT By Derek Melber, MCSE, MVP Secure Your Windows Enterprise with Strong Password Management... 3 Windows Default
More informationHow To Implement A Group Policy Object (Gpo)
IT Influencer Series Implementing Group Policy Objects 2004 GPO Introduction Your in-depth guide to understanding GPOs and how to implement them in your organization. Contents Group Policy Fundamentals
More informationActive Directory. Users & Computers. Group Policies
Active Directory Users & Computers Policies Users & Computers domains domain trusted domains, trusting domains subdomains tree of domains forest of trees s s in Active Directory are directory objects that
More informationDeploying GFI LANguard S.E.L.M.
Deploying GFI LANguard S.E.L.M. Design overview & deployment strategies This white paper gives an overview of how GFI LANguard S.E.L.M. works and discusses installation and deployment issues, enabling
More informationCourse 20411. Administering Windows Server 2012. About this Course. Level: 200 Technology: Windows Server 2012
Course 20411 Administering Windows Server 2012 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server 2012 Type: Course Delivery Method: Instructor-led
More informationM6419 Configuring, Managing and Maintaining Windows Server 2008 Servers
M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers Looking at Training Differently... Course 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers Length: Published:
More informationEXAM - 70-413. Designing and Implementing a Server Infrastructure. Buy Full Product. http://www.examskey.com/70-413.html
Microsoft EXAM - 70-413 Designing and Implementing a Server Infrastructure Buy Full Product http://www.examskey.com/70-413.html Examskey Microsoft 70-413 exam demo product is here for you to test the quality
More informationAudit Tools That Won t Break the Bank
Audit Tools That Won t Break the Bank 2011 Date or subtitle Presented by: Mark Scholl, Partner 1 Background These tools do not require a strong technical background! Do not scan or install tools without
More informationWindows Server 2012 R2 Certification
About this Course Administering Windows Server 2012 Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course.
More informationBMC Performance Manager Windows Security White Paper DCOM / WMI
BMC Performance Manager Windows Security White Paper DCOM / WMI Problem The IT department delivers user IT services to their internal and external customers. The IT department wants to maintain control
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:
More informationms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
More information411-Administering Windows Server 2012
411-Administering Windows Server 2012 Course Duration: 5 Days Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication
More informationProduct comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)
Product comparison GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) GFI LanGuard 2014 Windows Intune General features Scheduled scans Agent-less r Agent-based Integration with Active
More informationStellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
More informationAdministering Windows Server 2012
Course 20411D: Administering Windows Server 2012 Page 1 of 8 Administering Windows Server 2012 Course 20411D: 4 days; Instructor-Led Introduction Get hands-on instruction and practice administering Windows
More informationDepartment of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
More informationConfiguring, Managing and Maintaining Windows Server 2008 Servers
Configuring, Managing and Maintaining Windows Server 2008 Servers About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network Infrastructure
More informationStep-by-Step Guide for Setting Up VPN-based Remote Access in a
Page 1 of 41 TechNet Home > Products & Technologies > Server Operating Systems > Windows Server 2003 > Networking and Communications Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test
More informationQuick Start Guide. IT Management On-Demand
1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote
More informationSystem Area Management Software Tool Tip: Agent Deployment utilizing. the silent installation with Active Directory
System Area Management Software Tool Tip: Agent Deployment utilizing the silent installation with Active Directory Table of Contents Introduction... 3 Prerequisites... 3 Windows 2003 Server... 3 Using
More informationCOMPLETE COMPUTING, INC.
6425: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Five days; Instructor-Led Introduction This five-day instructor-led course provides to teach Active Directory
More informationImplementing Windows Security with Group Policy by Derek Melber MCSE, MVP
1 Implementing Windows Security with Group Policy by Derek Melber MCSE, MVP 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing,
More informationHow To Configure An Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services MOC6425 About this Course This five-day instructor-led course provides to teach Active Directory Technology Specialists
More informationMS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor
More informationChapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
More informationFive Steps to Improve Internal Network Security. Chattanooga Information security Professionals
Five Steps to Improve Internal Network Security Chattanooga Information security Professionals Who Am I? Security Analyst: Sword & Shield Blogger: averagesecurityguy.info Developer: github.com/averagesecurityguy
More informationConfiguring the Windows XP SP2/Vista Firewall for UserLock
Configuring the Windows XP SP2/Vista Firewall for UserLock Due to the modification of the Firewall s activation setting, that occurs when Service Pack 2 is deployed on a XP workstation, all incoming network
More informationCourse 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers
Course 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers Duration 5 Days About this Course This five-day instructor-led course combines five days worth of instructor-led training
More informationDesigning and Implementing a Server Infrastructure
Course Code: M20413 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing and Implementing a Server Infrastructure Overview Get hands-on instruction and practice planning, designing and deploying
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationCourse 10969 Active Directory Services with Windows Server
P a g e 1 of 11 Course 10969 Active Directory Services with Windows Server Introduction Get hands-on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows
More informationPlanning and Maintaining a Microsoft Windows Server Network Infrastructure
Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security
More informationExternal Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
More informationHosts HARDENING WINDOWS NETWORKS TRAINING
BROADVIEW NETWORKS Hosts HARDENING WINDOWS NETWORKS TRAINING COURSE OVERVIEW A hands-on security course that teaches students how to harden, monitor and protect Microsoft Windows based networks. A hardening
More informationIntel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
More informationActive Directory Services with Windows Server 10969B; 5 days, Instructor-led
Active Directory Services with Windows Server 10969B; 5 days, Instructor-led Course Description Get hands on instruction and practice administering Active Directory technologies in Windows Server 2012
More informationNE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
More informationModule 8: Implementing Group Policy
Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing
More informationCreating and Configuring Web Sites in Windows Server 2003
Page 1 of 18 Admin KnowledgeBase Articles & Tutorials Authors Hardware Links Message Boards Newsletters Software Control USB stick usage - Network-wide control with LANguard PSC. - Dl Admin KnowledgeBase
More informationBuild Your Knowledge!
About this Course Get hands-on instruction and practice administering, including R2, in this five-day Microsoft Official Course. This course is part two in a series of three courses that provides the skills
More informationInstalling GFI LANguard Network Security Scanner
Installing GFI LANguard Network Security Scanner System requirements Install GFI LANguard Network Security Scanner on a computer which meets the following requirements: Windows 2000 (SP4) / XP (SP2) /
More informationAdministering Windows Server 2012 Course M20411 5 Day(s) 30:00 Hours
Área de formação Plataforma e Tecnologias de Informação Administering Windows Introduction Get hands-on instruction and practice administering Windows, including Windows R2, in this five-day Microsoft
More informationImplementing Security Update Management
Implementing Security Update Management Wayne Harris MCSE Senior Consultant Certified Security Solutions Business Case for Update Management When determining the potential financial impact of poor update
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425B Course Length: 5 Days Course Overview This five-day course provides to teach Active Directory Technology
More informationSelecting the Right Active Directory Security Reports for Your Business
Selecting the Right Active Directory Security Reports for Your Business Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED.
More informationHOUR 3. Installing Windows Server 2003
HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that
More informationAdministering Windows Server 2012
Course 20411C Administering Windows Server 2012 Course Length: 5 days Overview Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this 5-day Microsoft
More informationCourse: Configuring and Troubleshooting Windows Server 2008 Active Direct-ory Domain Services
Page 1 of 7 Course: Configuring and Troubleshooting Windows Server 2008 Active Direct-ory Domain Services Course 6425A Duration: 5 Days About this Course This five-day instructor-led course provides to
More informationSECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
More informationM6425a Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
M6425a Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425A: Five days; Instructor-Led Introduction This five-day instructor-led course provides to teach Active
More informationMicrosoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support m-satut@northwestern.edu
Microsoft Software Update Services and Managed Symantec Anti-virus Michael Satut TSS/Crown IT Support m-satut@northwestern.edu Introduction The recent increase in virus and worm activity has created the
More informationCourse 20411B: Administering Windows Server 2012
Course 20411B: Administering Windows Server 2012 Length: 5 Days Published: January 04, 2013 Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server 2012 Type: Course Delivery
More informationAdministering Windows Server 2012
Course Code: M20411 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Administering Windows Server 2012 Overview Get hands-on instruction and practice administering Windows Server 2012, including
More informationAlpha High Level Description
Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global
More informationPC Power Down. MSI Deployment Guide
PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install
More informationWindows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products
Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet
More informationCreate, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationSchoolBooking LDAP Integration Guide
SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your
More information