Secure configuration document

Size: px
Start display at page:

Download "Secure configuration document"

Transcription

1 Secure configuration document Windows 7 Draft 0.1. DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India

2 Document Control S. No. Type of Information Document Data 1. Document Title Secure Configuration Document Windows 7 2. Document Code PR_SCD_Windows_7 3. Date of Release 4. Next Review Date 5. Document Owner DietY 6. Document Author(s) 7. Document Reviewer 8. Document Reference PR_Harden Document Approval S. No. Document Approver Approver Designation Approver ID Document Change History Version No. Revision Date Nature of Change Date of Approval Document Classification: Internal Page 5 of 53

3 Purpose This document is intended to guide Windows System administrators to secure Windows 7 Operating System. This document should be used to harden all Windows 7 desktops and laptops being used in e-gov service delivery environment. Security compliance on Windows 7 systems can be measured and reported considering the below mentioned control points as benchmark or criteria. How to use this Document The document covers the mandatory security configurations for Windows 7 OS. Please test the prescribed settings in the staging setup before deploying it to production environment. The Solution sections in control point/s below provide solutions and configurations as per industry best practices. The configurations also provide recommended values in a production environment, determined with practical experience in a production environment. The recommended values and parameters can be redefined specific to the environment if found not suitable or as desired. The SCD document may also provide suggestive steps to harden the target systems hosting other supporting technologies/tools and utilities prevalent in the industry. In case the target environment is not hosting such tools and technologies the control point can be marked Not Applicable while determining the compliance. The document also mentions the How to check section, the output of these can be utilized to capture in hardening reports. These reports can serve audit artifacts in meeting hardening compliance on a specific device. Document Classification: Internal Page 6 of 53

4 Table of Contents 1. ENFORCE PASSWORD AND ACCOUNT LOCKOUT POLICY ENABLE AUDIT AND LOGGING DETAILED AUDIT POLICY EVENT LOG WINDOWS FIREWALL WINDOWS UPDATE USER ACCESS CONTROL USER RIGHTS SECURITY OPTIONS REMOTE DESKTOP SERVICES INTERNET COMMUNICATION ADDITIONAL SECURITY SETTINGS USER POLICIES Document Classification: Internal Page 7 of 53

5 1. Enforce Password and Account Lockout policy Description Configure following password and account lockout policy 1. Enforce password history 2. Maximum password age 3. Minimum password age 4. Minimum password length 5. Password must meet complexity requirements 6. Store passwords using reversible encryption 7. Account lockout duration Impact Solution 8. Account lockout threshold In absence of password and account lockout policy implementation, can lead to unauthorized access. To establish the recommended configuration via GPO, set the following to the value prescribed in e-gov policy or Password management guidelines: 1. Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\Enforce password history 2. Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\Maximum password age 3. Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\Minimum password age 4. Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\Minimum password length 5. Computer Configuration\Windows Settings\Security Document Classification: Internal Page 8 of 53

6 Settings\Account Policies\Password Policy\Password must meet complexity requirements 6. Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\Store passwords using reversible encryption 7. Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout duration 8. Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy\Account lockout threshold How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. Document Classification: Internal Page 9 of 53

7 2. Enable Audit and Logging Description Windows 7 has detailed audit facilities that allow administrators to tune their audit policy with greater specificity. 1. Audit account logon events 2. Audit account management 3. Audit directory service access 4. Audit logon events 5. Audit object access 6. Audit policy change 7. Audit privilege use 8. Audit process tracking Impact Solution Audit and logging if disabled can lead to inefficient incident and event tracking. To establish the recommended configuration via GPO, set the following to the value prescribed e-gov policy or Audit logging guidelines: 1. Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit account logon events 2. Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit account management 3. Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit directory service access 4. Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit logon events 5. Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit object access 6. Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit policy change 7. Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit privilege use Document Classification: Internal Page 10 of 53

8 8. Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit process tracking How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. 3. Detailed Audit Policy Description This section articulates the detailed audit policies introduced in Windows Vista and later. The values prescribed in this section represent the minimum recommended level of auditing. 1. Audit Policy: System: IPsec Driver 2. Audit Policy: System: Security State Change 3. Audit Policy: System: Security System Extension 4. Audit Policy: System: System Integrity 5. Audit Policy: Logon-Logoff: Logoff 6. Audit Policy: Logon-Logoff: Logon 7. Audit Policy: Logon-Logoff: Special Logon 8. Audit Policy: Object Access: File System Impact Solution In absence of audit policy settings security incident tracking will be inefficient. To establish the recommended configuration via GPO, set the following to the value prescribed e-gov policy or Audit logging guidelines: 1. Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\System\Audit IPSec Driver\Audit Policy: System: IPsec Driver Document Classification: Internal Page 11 of 53

9 2. Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\System\Audit Security State Change\Audit Policy: System: Security State Change 3. Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\System\Audit Security System Extension\Audit Policy: System: Security System Extension 4. Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\System\Audit System Integrity\Audit Policy: System: System Integrity 5. Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\Logon/Logoff\Audit Logoff\Audit Policy: Logon-Logoff: Logoff 6. Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\Logon/Logoff\Audit Logon\Audit Policy: Logon-Logoff: Logon 7. Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\Logon/Logoff\Audit Special Logon\Audit Policy: Logon-Logoff: Special Logon 8. Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\Object Access\Audit File System\Audit Policy: Object Access: File System How to check Navigate to the GPO articulated in the Remediation section and confirm Document Classification: Internal Page 12 of 53

10 it is set as prescribed. Document Classification: Internal Page 13 of 53

11 4. Event Log Description This control suggests the minimum and maximum size of event logs Application: 1. Maximum Log Size (KB) 2. Application: Retain old events 3. Security: Maximum Log Size (KB) 4. Security: Retain old events 5. System: Maximum Log Size (KB) 6. System: Retain old events Impact Solution In absence of any control of event log size can lead to compliance issues as well as inappropriate usage of resources. To establish the recommended configuration via GPO, set the following to the value prescribed e-gov policy or Audit Log procedure and guidelines: 1. Computer Configuration\Administrative Templates\Windows Components\Event Log Service\Application\Application: Maximum Log Size (KB) 2. Computer Configuration\Administrative Templates\Windows Components\Event Log Service\Application\Application: Retain old events 3. Computer Configuration\Administrative Templates\Windows Components\Event Log Service\Security\Security: Maximum Log Size (KB) 4. Computer Configuration\Administrative Templates\Windows Components\Event Log Service\Security\Security: Retain old events Document Classification: Internal Page 14 of 53

12 5. Computer Configuration\Administrative Templates\Windows Components\Event Log Service\System\System: Maximum Log Size (KB) 6. Computer Configuration\Administrative Templates\Windows Components\Event Log Service\System\System: Retain old events How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. Document Classification: Internal Page 15 of 53

13 5. Windows Firewall Description This control defines if the Windows Firewall will use the settings for this profile to filter network traffic. 1. Windows Firewall: Domain: Firewall state 2. Windows Firewall: Domain: Inbound connections 3. Windows Firewall: Domain: Display a notification 4. Windows Firewall: Domain: Allow unicast response 5. Windows Firewall: Domain: Apply local firewall rules 6. Windows Firewall: Domain: Apply local connection security rules 7. Windows Firewall: Private: Firewall state 8. Windows Firewall: Private: Inbound connections 9. Windows Firewall: Private: Display a notification Impact Solution Absence of appropriate Firewall configurations can lead to remote attack surface of the system. To establish the recommended configuration via GPO, set the following to the value prescribed e-gov policy or Network Security procedure and guidelines 1. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Firewall state 2. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Inbound connections Document Classification: Internal Page 16 of 53

14 3. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Display a notification 4. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Allow unicast response 5. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Apply local firewall rules 6. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Apply local connection security rules 7. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Private Profile\Windows Firewall: Private: Firewall state 8. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Private Profile\Windows Firewall: Private: Inbound connections 9. Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Document Classification: Internal Page 17 of 53

15 Properties\Private Profile\Windows Firewall: Private: Display a notification How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. Document Classification: Internal Page 18 of 53

16 6. Windows Update Description This control defines how Windows will receive security updates 1. Configure Automatic Updates 2. Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box 3. No auto-restart with logged on users for scheduled automatic updates installations 4. Reschedule Automatic Updates scheduled installations Impact Solution In case; windows systems are not upto date, can leave the system open to known and fixed vulnerabilities. To establish the recommended configuration via GPO, set the following to the value prescribed e-gov policy or Patch Management procedure and guidelines 1. Computer Configuration\Administrative Templates\Windows Components\Windows Update\Configure Automatic Updates 2. Computer Configuration\Administrative Templates\Windows Components\Windows Update\Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box 3. Computer Configuration\Administrative Templates\Windows Components\Windows Update\No auto-restart with logged on users for scheduled automatic updates installations 4. Computer Configuration\Administrative Templates\Windows Components\Windows Update\Reschedule Automatic Updates scheduled installations Document Classification: Internal Page 19 of 53

17 How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. Document Classification: Internal Page 20 of 53

18 7. User Access Control Description This control defines how to manage user access. Impact Solution 1. User Account Control: Admin Approval Mode for the Built-in Administrator account 2. User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode 3. User Account Control: Behavior of the elevation prompt for standard users 4. User Account Control: Detect application installations and prompt for elevation 5. User Account Control: Only elevate UIAccess applications that are installed in secure locations 6. User Account Control: Run all administrators in Admin Approval Mode 7. User Account Control: Switch to the secure desktop when prompting for elevation 8. User Account Control: Virtualize file and registry write failures to per-user locations 9. User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop These recommended user account controls the access of builtin and other administrator accounts, the absence of such control can lead to security incidents due to ineffective user privileges and account management. To establish the recommended configuration via GPO, set the following to the value prescribed e-gov policy or User Access Management procedure and guidelines 1. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Admin Approval Mode for the Built-in Administrator account 2. Computer Configuration\Windows Settings\Security Document Classification: Internal Page 21 of 53

19 Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode 3. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for standard users 4. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Detect application installations and prompt for elevation 5. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Only elevate UIAccess applications that are installed in secure locations 6. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Run all administrators in Admin Approval Mode 7. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Switch to the secure desktop when prompting for elevation 8. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Virtualize file and registry write failures to per-user locations How to check 9. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. Document Classification: Internal Page 22 of 53

20 8. User Rights Description Configure the following attributes of user rights for the user profiles on the system; as per the recommendations in solution section. 1. Access this computer from the network 2. Act as part of the operating 3. Adjust memory quotas for a process 4. Back up files and directories 5. Bypass traverse checking 6. Change the system time 7. Create a pagefile 8. Create a token object 9. Create global objects 10. Create permanent shared objects 11. Debug programs 12. Deny access to this computer from 13. Enable computer and user accounts to 14. Force shutdown from a remote system 15. Impersonate a client after authentication 16. Increase scheduling priority 17. Load and unload device drivers 18. Lock pages in memory 19. Manage auditing and security log 20. Modify firmware environment values Document Classification: Internal Page 23 of 53

21 21. Modify an object label 22. Perform volume maintenance tasks 23. Profile single process 24. Profile system performance 25. Remove computer from docking station 26. Replace a process level token 27. Shut down the system 28. Allow log on locally 29. Allow log on through Remote Desktop 30. Create symbolic links 31. Deny log on locally 32. Deny log on through Remote Desktop 33. Generate security audits 34. Increase a process working set 35. Log on as a batch job 36. Log on as a service 37. Restore files and directories 38. Take ownership of files or other 39. Access Credential Manager as a trusted Impact Solution In the absence of appropriate user rights configured in different types of user roles, incorrect ownership can be assigned to users leading to security breaches and inefficient incident tracking. To establish the recommended configuration via GPO, set the following to the value prescribed above: Document Classification: Internal Page 24 of 53

22 1. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Access this computer from the network 2. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Act as part of the operating system 3. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Adjust memory quotas for a process 4. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Back up files and directories 5. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Bypass traverse checking 6. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Change the system time 7. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create a pagefile 8. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create a token object 9. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create global objects Document Classification: Internal Page 25 of 53

23 10. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create permanent shared objects 11. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Debug programs 12. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny access to this computer from the network 13. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Enable computer and user accounts to be trusted 14. Computer Configuration\Windows Settings\Local Policies\User Rights 15. Assignment\Force shutdown from a remote system 16. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Impersonate a client after authentication 17. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Increase scheduling priority 18. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Load and unload device drivers 19. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Lock pages in memory Document Classification: Internal Page 26 of 53

24 20. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Manage auditing and security log 21. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Modify firmware environment values 22. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Modify an object label 23. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Perform volume maintenance tasks 24. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Profile single process 25. Administrators, NT SERVICE\WdiServiceHost 26. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Profile system performance 27. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Remove computer from docking station 28. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Replace a process level token 29. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Shut down the Document Classification: Internal Page 27 of 53

25 system 30. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on locally 31. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on through Remote Desktop Services Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create symbolic links 32. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on locally 33. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny log on through Remote Desktop Services 34. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Generate security audits 35. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Increase a process working set 36. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Log on as a batch job 37. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Log on as a service Document Classification: Internal Page 28 of 53

26 38. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Restore files and directories 39. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Take ownership of files or other objects How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed in Solution section. Document Classification: Internal Page 29 of 53

27 9. Security Options Description Configure the following attributes of user rights for the user profiles on the system; as per the recommendations in solution section. 1. Network security: Minimum session security for NTLM SSP based (including secure RPC) servers 2. Network access: Remotely accessible registry paths and subpaths 3. Accounts: Rename administrator account 4. Accounts: Rename guest account 5. Accounts: Administrator account status 6. Accounts: Guest account status 7. Network access: Allow anonymous SID/Name translation 8. Accounts: Limit local account use of blank passwords to console logon only 9. Devices: Allowed to format and eject removable media 10. Devices: Prevent users from installing printer drivers 11. Devices: Restrict CD-ROM access to locally logged-on user only 12. Devices: Restrict floppy access to locally logged-on user only 13. Domain member: Digitally encrypt or sign secure channel data (always) 14. Domain member: Digitally encrypt secure channel data (when possible) 15. Domain member: Digitally sign secure channel data (when possible) Document Classification: Internal Page 30 of 53

28 16. Domain member: Disable machine account password changes 17. Domain member: Maximum machine account password age 18. Domain member: Require strong (Windows 2000 or later) session key 19. Interactive logon: Do not display last user name 20. Interactive logon: Number of previous logons to cache (in case domain controller is not available) 21. Interactive logon: Prompt user to change password before expiration 22. Interactive logon: Require Domain Controller authentication to unlock workstation 23. Interactive logon: Smart card removal behavior 24. Interactive logon: Message text for users attempting to log on 25. Interactive logon: Message title for users attempting to log on 26. Interactive logon: Require smart card 27. Microsoft network client: Digitally sign communications (always) 28. Microsoft network client: Digitally sign communications (if server agrees) 29. Microsoft network client: Send unencrypted password to thirdparty SMB servers 30. Microsoft network server: Amount of idle time required before suspending session 31. Microsoft network server: Digitally sign communications (always) 32. Microsoft network server: Digitally sign communications (if client agrees) Document Classification: Internal Page 31 of 53

29 33. Microsoft network server: Disconnect clients when logon hours expire 34. Microsoft network server: Server SPN target name validation level 35. MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) 36. MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) 37. MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes 38. MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments) 39. MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds 40. MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic 41. MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers 42. MSS: (NtfsDisable8dot3NameCreation) Enable the computer to stop generating MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS) 44. MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) Document Classification: Internal Page 32 of 53

30 46. MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default) 47. MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning 48. Network access: Do not allow anonymous enumeration of SAM accounts 49. Network access: Do not allow anonymous enumeration of SAM accounts and shares 50. Network access: Let Everyone permissions apply to anonymous users 51. Network access: Named Pipes that can be accessed anonymously 52. Network access: Remotely accessible registry paths 53. Network access: Restrict anonymous access to Named Pipes and Shares 54. Network access: Shares that can be accessed anonymously 55. Network access: Sharing and security model for local accounts 56. Network security: Do not store LAN Manager hash value on next password change 57. Network security: LAN Manager authentication level 58. Network security: LDAP client signing requirements 59. Network security: Minimum session security for NTLM SSP based (including secure RPC) clients 60. Recovery console: Allow automatic administrative logon 61. Recovery console: Allow floppy copy and access to all drives and Document Classification: Internal Page 33 of 53

31 all folders 62. Shutdown: Allow system to be shut down without having to log on 63. System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing 64. System objects: Require case insensitivity for non-windows subsystems 65. System objects: Strengthen default permissions of internal system objects (e 66. System cryptography: Force strong key protection for user keys stored on the computer 67. System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies 68. MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) 69. MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default) 70. Network security: Allow LocalSystem NULL session fallback 71. Network security: Allow Local System to use computer identity for NTLM Network Security: Allow PKU2U authentication requests to this computer to use online identities Impact 73. Interactive logon: Do not require CTRL+ALT+DEL In absence of absolute security policies configured in local system, domain, network variety of impacts can happen viz resource loss, data loss and other kinds of thefts. Document Classification: Internal Page 34 of 53

32 Solution To establish the recommended configuration via GPO, set the following to the value prescribed above: 1. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Minimum session security for NTLM SSP based (including secure RPC) servers 2. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Remotely accessible registry paths and sub-paths 3. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Rename administrator account 4. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Rename guest account 5. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Administrator account status 6. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Guest account status Document Classification: Internal Page 35 of 53

33 7. Computer Configuration\Windows Settings\Local Policies\Security Options\Network access: Allow anonymous SID/Name translation 8. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Accounts: Limit local account use of blank passwords to console logon only 9. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Devices: Allowed to format and eject removable media 10. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Devices: Prevent users from installing printer drivers 11. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Devices: Restrict CD- ROM access to locally logged-on user only 12. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Devices: Restrict floppy access to locally logged- on user only 13. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Digitally encrypt or sign secure channel data (always) 14. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Document Classification: Internal Page 36 of 53

34 Digitally encrypt secure channel data (when possible) 15. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Digitally sign secure channel data (when possible) 16. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Disable machine account password changes 17. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Maximum machine account password age 18. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Require strong (Windows 2000 or later) session key 19. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Do not display last user name 20. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Number of previous logons to cache (in case domain controller is not available) 21. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Prompt user to change password before expiration 22. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Require Domain Controller authentication to unlock workstation 23. Computer Configuration\Windows Settings\Security Document Classification: Internal Page 37 of 53

35 Settings\Local Policies\Security Options\Interactive logon: Smart card removal behavior 24. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Message text for users attempting to log on 25. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Message title for users attempting to log on 26. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Require smart card Note: Ensure that smart cards and smart card readers are provisioned before implementing this policy. 27. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network client: Digitally sign communications (always) 28. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network client: Digitally sign communications (if server agrees) 29. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network Document Classification: Internal Page 38 of 53

36 client: Send unencrypted password to third-party SMB servers 30. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Amount of idle time required before suspending session 31. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Digitally sign communications (always) 32. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Digitally sign communications (if client agrees) 33. Computer Configuration\Windows Settings\Security Settings\Local olicies\security Options\Microsoft network server: Disconnect clients when logon hours expire 34. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network server: Server SPN target name validation level 35. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended) 36. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (DisableIPSourceRouting) IP source routing protection level Document Classification: Internal Page 39 of 53

37 (protects against packet spoofing) 37. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes 38. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (Hidden) Hide Computer From the Browse List (not recommended except for highly secure environments) 39. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds 40. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic 41. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers 42. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (NtfsDisable8dot3NameCreation) Enable the computer to stop Document Classification: Internal Page 40 of 53

38 generating 8.3 style filenames (recommended) 43. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure Default Gateway addresses (could lead to DoS) 44. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) 45. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) 46. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default) 47. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning 48. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not Document Classification: Internal Page 41 of 53

39 allow anonymous enumeration of SAM accounts 49. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts and shares 50. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Let Everyone permissions apply to anonymous users 51. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Named Pipes that can be accessed anonymously 52. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Remotely accessible registry paths 53. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Restrict anonymous access to Named Pipes and Shares 54. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Shares that can be accessed Anonymously 55. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Sharing and security model for local accounts 56. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Do not store LAN Manager hash value on next password change Document Classification: Internal Page 42 of 53

40 57. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: LAN Manager authentication level 58. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: LDAP client signing requirements 59. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Minimum session security for NTLM SSP based (including secure RPC) clients 60. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Recovery console: Allow automatic administrative logon 61. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Recovery console: Allow floppy copy and access to all drives and all folders 62. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Shutdown: Allow system to be shut down without having to log on 63. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\System cryptography: Use FIPS compliant algorithms for encryption, hashing, and Document Classification: Internal Page 43 of 53

41 signing 64. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\System objects: Require case insensitivity for non-windows subsystems 65. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) 66. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\System cryptography: Force strong key protection for user keys stored on the computer 67. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\System settings: Use Certificate Rules on WindowsExecutables for Software Restriction Policies 68. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) 69. Computer Configuration\Windows Settings\Security Document Classification: Internal Page 44 of 53

42 Settings\Local Policies\Security Options\MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default) 70. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Allow LocalSystem NULL session fallback 71. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network security: Allow Local System to use computer identity for NTLM 72. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network Security: Allow PKU2U authentication requests to this computer to use online identities 73. Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Do not require CTRL+ALT+DEL How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. Document Classification: Internal Page 45 of 53

43 10. Remote Desktop Services Description Following configuration settings are recommended for Remote desktop services. 1. Always prompt for password upon connection 2. Set client connection encryption level 3. Do not allow drive redirection 4. Allow users to connect remotely using Remote Desktop Services 5. Do not allow passwords to be saved Impact Solution In absence of appropriate configurations remote desktop service exposes the system to hacking and data theft during a remote session. To establish the recommended configuration via GPO, set the following to the value prescribed above: 1. Computer Configuration\Administrative Templates\Windows Components\RemoteDesktop Services\Remote Desktop Session Host\Security\Always prompt for password upon connection 2. Computer Configuration\Administrative Templates\Windows Components\RemoteDesktop Services\Remote Desktop Session Host\Security\Set client connection encryption level. 3. Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Device and Resource Redirection\Do not allow drive redirection 4. Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections\Allow users to connect remotely using Remote Desktop Services 5. Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Connection Client\Do not allow passwords to be saved Document Classification: Internal Page 46 of 53

44 How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. Alternatively, execute the following to determine if the system is configured as recommended: 1. reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v fpromptforpassword 2. reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v MinEncryptionLevel 3. reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v fdisablecdm 4. reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v fdenytsconnections 5. reg query HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services /v DisablePasswordSaving Document Classification: Internal Page 47 of 53

45 11. Internet Communication. Description Impact 1. Turn off downloading of print drivers over HTTP 2. Turn off the "Publish to Web" task for files and folders. 3. Turn off Internet download for Web publishing and online ordering wizards 4. Turn off printing over HTTP 5. Turn off Search Companion content file updates 6. Turn off the Windows Messenger Customer Experience Improvement Program 7. Turn off Windows Update device driver searching In absence of stringent security configurations for a system exposed to internet or intranet can lead to security incidents viz virus and other Information Security policy breaches. Solution 1. Computer Configuration\Administrative Templates\System\Internet Communication Management\Internet Communication settings\turn off downloading of print drivers over HTTP 2. Computer Configuration\Administrative Templates\System\Internet Communication Management\Internet Communication settings\turn off the "Publish to Web" task for files and folders 3. Computer Configuration\Administrative Templates\System\Internet Communication Management\Internet Communication settings\turn off Internet download for Web publishing and online ordering wizards 4. Computer Configuration\Administrative Templates\System\Internet Communication Management\Internet Communication settings\turn off printing over HTTP 5. Computer Configuration\Administrative Templates\System\Internet Communication Management\Internet Communication settings\turn off Search Document Classification: Internal Page 48 of 53

46 Companion content file updates 6. Computer Configuration\Administrative Templates\System\Internet Communication Management\Internet Communication settings\turn off the Windows Messenger Customer Experience Improvement Program 7. Turn off Windows Update device driver searching. Enabling this setting prevents users from downloading and installing device drivers that reduces system stability and security. How to check Navigate to the GPO articulated in the Remediation section and confirm it is set as prescribed. Alternatively, execute the following to determine if the system is configured as recommended: 1. reg query HKLM\Software\Policies\Microsoft\Windows NT\Printers /v DisableWebPnPDownload 2. reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Expl orer /v NoPublishingWizard 3. reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Expl orer /v NoWebServices 4. reg query HKLM\Software\Policies\Microsoft\Windows NT\Printers /v DisableHTTPPrinting 5. reg query HKLM\Software\Policies\Microsoft\SearchCompanion /v DisableContentFileUpdates 6. reg query HKLM\Software\Policies\Microsoft\Messenger\Client /v CEIP Document Classification: Internal Page 49 of 53

47 7. reg query HKLM\Software\Policies\Microsoft\Windows\DriverSearching /vdontsearchwindowsupdate Document Classification: Internal Page 50 of 53

48 12. Additional Security Settings Description 1. Require a Password When a Computer Wakes (On Battery) 2. Require a Password When a Computer Wakes (Plugged In) 3. Allow Remote Shell Access For the SSLF desktop and SSLF laptop profile(s), the recommended value is Disabled. For the Enterprise desktop and Enterprise laptop profile(s), the recommended value is Not Defined. 4. Turn off Data Execution Prevention for Explorer 5. Do not process the legacy run list. The run list is the list of programs that Windows runs automatically when it starts. It is recommended that this setting be configured as described below: For the Enterprise desktop and Enterprise laptop profile(s), the recommended value is Not Configured. For the SSLF desktop and SSLF laptop profile(s), the recommended value is Enabled. 6. Registry policy processing should be enabled for all profiles. 7. Autoplay is disabled by default on some removable drive types, such as floppy disk and network drives, but not on CD-ROM drives. Impact Solution These are few desktop level security settings that if not configured can lead to data loss through end user using the system due to malicious intend to inappropriate handling of assets. To establish the recommended configuration via GPO, set the following to the value prescribed above: 1. Computer Configuration\Administrative Templates\System\Power Management\Sleep Settings\Require a Password When a Computer Wakes (On Battery) Document Classification: Internal Page 51 of 53

Windows Server 2008/2012 Server Hardening

Windows Server 2008/2012 Server Hardening Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible

More information

Web. Security Options Comparison

Web. Security Options Comparison Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.

More information

Security Configuration Benchmark For. Microsoft Windows 7. Version 1.1.0 July 30 th 2010

Security Configuration Benchmark For. Microsoft Windows 7. Version 1.1.0 July 30 th 2010 Security Configuration Benchmark For Microsoft Windows 7 Version 1.1.0 July 30 th 2010 Copyright 2001-2010, The Center for Internet Security http://cisecurity.org feedback@cisecurity.org Background. CIS

More information

CIS Microsoft Windows Server 2012. v1.0.0. Benchmark

CIS Microsoft Windows Server 2012. v1.0.0. Benchmark CIS Microsoft Windows Server 2012 v1.0.0 Benchmark 01-31-2013 The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and

More information

Belarc Advisor Security Benchmark Summary

Belarc Advisor Security Benchmark Summary Page 1 of 5 The license associated with the Belarc Advisor product allows for free personal use only. Use on multiple computers in a corporate, educational, military or government installation is prohibited.

More information

Security Options... 1

Security Options... 1 Effective Server Security Options Period: Last 20 week(s) Generated: For: Brian Bartlett bbartlett@ecora.com By: Ecora Auditor Professional 4.5 - Windows Module 4.5.8010.20310 Using: Customized FFR Definition

More information

Microsoft Windows Server 2008

Microsoft Windows Server 2008 Security Configuration Benchmark For Microsoft Windows Server 2008 Version 1.1.0 July 30 th, 2010 Copyright 2001-2010, The Center for Internet Security http://cisecurity.org feedback@cisecurity.org Background.

More information

CIS Microsoft Windows 7 Benchmark. v2.1.0-12-03-2013. http://benchmarks.cisecurity.org

CIS Microsoft Windows 7 Benchmark. v2.1.0-12-03-2013. http://benchmarks.cisecurity.org CIS Microsoft Windows 7 Benchmark v2.1.0-12-03-2013 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics,

More information

NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v2-1-0-2

NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v2-1-0-2 NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v2-1-0-2: NNTDC01 On NNTDC01 - By admin for time period 5/23/2014 8:49:51 AM to 5/23/2014 8:49:51 AM NNT CIS Microsoft Windows Server

More information

Defense Security Service Office of the Designated Approving Authority

Defense Security Service Office of the Designated Approving Authority Defense Security Service Office of the Designated Approving Authority Baseline Technical Security Configuration of Microsoft Windows 7 and Microsoft Server 2008 R2 Version 1.0 Title Page Document Name:

More information

NNT PCI DSS Microsoft Windows Server 2012 R2 Benchmark 12/17/2015 12:37

NNT PCI DSS Microsoft Windows Server 2012 R2 Benchmark 12/17/2015 12:37 NNT PCI DSS Microsoft Windows Server 2012 R2 Benchmark 12/17/2015 12:37 Compliance Score : 89.81% 370 of 412 rules passed 0 of 412 rules partially passed 42 of 412 rules failed Detailed PCI DSS v3.1 Requirements

More information

CIS Microsoft Windows Server 2003. Benchmark. v3.1.0-12-03-2013. http://benchmarks.cisecurity.org

CIS Microsoft Windows Server 2003. Benchmark. v3.1.0-12-03-2013. http://benchmarks.cisecurity.org CIS Microsoft Windows Server 2003 v3.1.0-12-03-2013 Benchmark http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services,

More information

About Microsoft Windows Server 2003

About Microsoft Windows Server 2003 About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system

More information

How To Set A Group Policy On A Computer With A Network Security Policy On Itunes.Com (For Acedo) On A Pc Or Mac Mac (For An Ubuntu) On An Ubode (For Mac) On Pc Or Ip

How To Set A Group Policy On A Computer With A Network Security Policy On Itunes.Com (For Acedo) On A Pc Or Mac Mac (For An Ubuntu) On An Ubode (For Mac) On Pc Or Ip CIS Microsoft Windows XP Benchmark v3.1.0-12-03-2013 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics,

More information

Defense Security Service Industrial Security Field Operations NISP Authorization Office. Technical Assessment Guide for Windows 7 Operating System

Defense Security Service Industrial Security Field Operations NISP Authorization Office. Technical Assessment Guide for Windows 7 Operating System Defense Security Service Industrial Security Field Operations NISP Authorization Office Technical Assessment Guide for Windows 7 Operating System February 2016 Revision Log Date Revision Description of

More information

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General Default Domain Default Domain Data collected on: 10/12/2012 5:28:08 PM General Details Domain Owner Created Modified User Revisions Computer Revisions Unique ID GPO Status webrecon.local WEBRECON\Domain

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 Domain Controllers Version: 3.0.0 Symantec Enterprise Security Manager Baseline Policy Manual for

More information

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section

More information

Microsoft Solutions for Security and Compliance. Windows Server 2003 Security Guide

Microsoft Solutions for Security and Compliance. Windows Server 2003 Security Guide Microsoft Solutions for Security and Compliance Windows Server 2003 Security Guide 2006 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-Non Commercial License. To view

More information

Hardening Microsoft Windows 7 SP1 Standard Operating Environments

Hardening Microsoft Windows 7 SP1 Standard Operating Environments July 2015 Hardening Microsoft Windows 7 SP1 Standard Operating Environments Workstations are often targeted by an adversary using malicious webpages, emails with malicious attachments and removable media

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Windows 7 / Server 2008 R2 Configuration Overview. By: Robert Huth Dated: March 2014

Windows 7 / Server 2008 R2 Configuration Overview. By: Robert Huth Dated: March 2014 Windows 7 / Server 2008 R2 Configuration Overview By: Robert Huth Dated: March 2014 Expectations This Windows 7 / Server 2008 R2 (Win7-2K8) presentation is a general overview of the technical security

More information

Experiment No.5. Security Group Policies Management

Experiment No.5. Security Group Policies Management Experiment No.5 Security Group Policies Management Objectives Group Policy management is a Windows Server 2003 features in which it allows administrators to define policies for both servers and user machines.group

More information

Windows Advanced Audit Policy Configuration

Windows Advanced Audit Policy Configuration Windows Advanced Audit Policy Configuration EventTracker v7.x Publication Date: May 6, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This document describes auditing

More information

Hardening Microsoft Windows 8.1 Standard Operating Environments

Hardening Microsoft Windows 8.1 Standard Operating Environments Hardening Microsoft Windows 8.1 Standard Operating Environments July 2015 Workstations are often targeted by an adversary using malicious webpages, emails with malicious attachments and removable media

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

CIS Microsoft Windows 8.1 Benchmark. v1.0.0-09-15-2014. http://benchmarks.cisecurity.org

CIS Microsoft Windows 8.1 Benchmark. v1.0.0-09-15-2014. http://benchmarks.cisecurity.org CIS Microsoft Windows 8.1 Benchmark v1.0.0-09-15-2014 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics,

More information

Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations

Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations March 2009 Version 2.2 This page intentionally left blank. 2 1. Introduction...4

More information

Next-Gen Monitoring of Active Directory. Click to edit Master title style

Next-Gen Monitoring of Active Directory. Click to edit Master title style Next-Gen Monitoring of Active Directory Click to edit Master title style About Your Speaker Derek Melber, MCSE & MVP (Group Policy and AD) derek@manageengine.com www.auditingwindowsexpert.com Online Resources

More information

Microsoft Windows XP Professional: Guide to Creating a More Secure Operating System

Microsoft Windows XP Professional: Guide to Creating a More Secure Operating System Microsoft Windows XP Professional: Guide to Creating a More Secure Operating System Introduction This document contains specific guidelines for establishing a secure Microsoft Windows XP computing environment.

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

1.1.1.1.2.1 Set 'Reset account lockout counter after' to '15' or more

1.1.1.1.2.1 Set 'Reset account lockout counter after' to '15' or more NNT CIS Server 2003 Benchmark_v3.1.0 Level 1 Member Server: NNT-2003-32-BIT On NNT-2003-32-BIT - By admin for time period 28/07/2014 13:43:41 to 28/07/2014 13:43:41 NNT CIS Server 2003 Benchmark_v3.1.0

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers) Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 (Domain Member Servers and Domain Controllers) Symantec Enterprise Security Manager Baseline Policy

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Locking Down Windows Server 2003 Terminal Server Sessions

Locking Down Windows Server 2003 Terminal Server Sessions Locking Down Windows Server 2003 Terminal Server Sessions Microsoft Corporation Published: July, 2003 Abstract This article demonstrates the ability of Active Directory to restrict Microsoft Windows Server

More information

CIS Microsoft Windows Server 2012 R2. Benchmark. v1.0.0-09-15-2014. http://benchmarks.cisecurity.org

CIS Microsoft Windows Server 2012 R2. Benchmark. v1.0.0-09-15-2014. http://benchmarks.cisecurity.org CIS Microsoft Windows Server 2012 R2 v1.0.0-09-15-2014 Benchmark http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services,

More information

Diebold Security Analysis of ATM Operating and Application Systems Using the Center for Internet Security Scoring Tool

Diebold Security Analysis of ATM Operating and Application Systems Using the Center for Internet Security Scoring Tool Diebold Security Analysis of ATM Operating and Application Systems Using the Center for Internet Security Scoring Tool TP-821129-001B PD 6099 Document History Document Number Date Remarks TP-821129-001A

More information

CIS Microsoft Windows Server 2012 R2. Benchmark. v1.1.0-11-04-2014. http://benchmarks.cisecurity.org

CIS Microsoft Windows Server 2012 R2. Benchmark. v1.1.0-11-04-2014. http://benchmarks.cisecurity.org CIS Microsoft Windows Server 2012 R2 v1.1.0-11-04-2014 Benchmark http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services,

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol... Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers

More information

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources MCSE TestPrep: Windows NT Server 4, Second Edition - CH 3 - Managing Resources Page 1 of 36 [Figures are not included in this sample chapter] MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing

More information

Secure configuration document

Secure configuration document Secure configuration document MS Exchange 2003 Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Submitted by Wipro

More information

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the

More information

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005 Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005 Revision 1.3: Cleaned up resources and added additional detail into each auditing table. Revision 1.4:

More information

Centralizing Windows Events with Event Forwarding

Centralizing Windows Events with Event Forwarding 1 Centralizing Windows Events with Event Forwarding 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation

More information

How To Audit A Windows Active Directory System

How To Audit A Windows Active Directory System South Northamptonshire Council Windows Active Directory Final Internal Audit Report - September Distribution list: Mike Shaw IT & Customer Services Manager David Price Director of Community Engagement

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

Setting Up, Managing, and Troubleshooting Security Accounts and Policies

Setting Up, Managing, and Troubleshooting Security Accounts and Policies 3 Setting Up, Managing, and Troubleshooting Security Accounts and Policies............................................... Terms you ll need to understand: Local user account Local group Complex password

More information

Windows security for n00bs part 1 Security architecture & Access Control

Windows security for n00bs part 1 Security architecture & Access Control Grenoble INP Ensimag _ (in)security we trust _!! SecurIMAG 2011-05-12 Windows security for n00bs part 1 Security architecture & Access Control Description: whether you are in favor or against it, the Windows

More information

Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Member Servers

Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Member Servers Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Member Servers Version 1.2 October 17, 2005 Copyright 2004, The Center

More information

Windows Policies That Policy Check Verifies

Windows Policies That Policy Check Verifies Windows Policies That Check Verifies - September 26, 2014 Windows Policies That Check Verifies September 2014 The Scanner is a PCI module which verifies whether certain settings on a computer comply with

More information

ManageEngine Desktop Central Training

ManageEngine Desktop Central Training ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Audit account logon events

Audit account logon events Audit account logon events Description This security setting determines whether to audit each instance of a user logging on to or logging off from another computer in which this computer is used to validate

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Controllers

Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Controllers Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Controllers Version 2.0 November 2007 Copyright 2007, The Center for Internet

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Hardening IIS Servers

Hardening IIS Servers 8 Hardening IIS Servers Overview This chapter focuses on the guidance and procedures required to harden the IIS servers in your environment. To provide comprehensive security for Web servers and applications

More information

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS SonicOS User Identification Using the Domain Controller Security Log Contents Supported Platforms... 1 Event Viewer... 1 Configuring Group Policy to Enable Logon Audit... 2 Events in Security Log... 4

More information

Windows 2003 Server Hardening Checklist

Windows 2003 Server Hardening Checklist 1 of 10 12/5/2013 12:33 PM Information Security Office > Securing Departmental Systems Support Topics for Users Securing Departmental Systems Report a Violation Risk Management Services Consensus Papers

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

Best Practice Guide CLEO Remote Access Services

Best Practice Guide CLEO Remote Access Services Best Practice Guide CLEO Remote Access Services A Guide to Preparing Your School Network & Remote Users PCs V 5.0 Published: October 2007 Please refer to www.cleo.net.uk for the most recently published

More information

Managing Remote Access

Managing Remote Access VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

Alpha High Level Description

Alpha High Level Description Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global

More information

By Citrix Consulting Services. Citrix Systems, Inc.

By Citrix Consulting Services. Citrix Systems, Inc. Best Practices for Securing a Citrix Secure Gateway Deployment By Citrix Consulting Services Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION

More information

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

Windows XP Professional Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Baseline Security Settings

Windows XP Professional Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Baseline Security Settings Windows XP Professional Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Baseline Security Settings Version 2.01 August, 2005 Copyright 2005, The Center for Internet Security

More information

Web Plus Security Features and Recommendations

Web Plus Security Features and Recommendations Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Windows IIS Server hardening checklist

Windows IIS Server hardening checklist General Windows IIS Server hardening checklist By Michael Cobb Do not connect an IIS Server to the Internet until it is fully hardened. Place the server in a physically secure location. Do not install

More information

Default configuration for the Workstation service and the Server service

Default configuration for the Workstation service and the Server service Article ID: 887429 - Last Review: November 30, 2007 - Revision: 2.4 Overview of Message Block signing INTRODUCTION This article describes Message Block (SMB) signing. SMB signing is a security mechanism

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance

Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance Microsoft Windows Common Criteria Evaluation Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance Microsoft

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Member Servers

Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Member Servers Windows Server 2003 Operating System Legacy, Enterprise, and Specialized Security Benchmark Consensus Security Settings for Domain Member Servers Version 2.0 November 2007 Copyright 2007, The Center for

More information

e-governance Password Management Guidelines Draft 0.1

e-governance Password Management Guidelines Draft 0.1 e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

31 Ways To Make Your Computer System More Secure

31 Ways To Make Your Computer System More Secure 31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways

More information

Level Two Benchmark Windows 2000 Professional Operating System V1.0.4

Level Two Benchmark Windows 2000 Professional Operating System V1.0.4 Level Two Benchmark Windows 2000 Professional Operating System V1.0.4 Copyright 2002, The Center for Internet Security www.cisecurity.org Terms of Use Agreement 1. Grant of Permission to use the Windows

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign

More information

Activity 1: Scanning with Windows Defender

Activity 1: Scanning with Windows Defender Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders

More information

Data Stored on a Windows Server Connected to a Network

Data Stored on a Windows Server Connected to a Network Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to

More information

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Step By Step Guide: Demonstrate DirectAccess in a Test Lab Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008

More information

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed. CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day

More information