Activity 1: Scanning with Windows Defender



Similar documents
Windows Operating Systems. Basic Security

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Abila MIP. Installation User's Guide

K7 Business Lite User Manual

Abila MIP. Installation Guide

Yale Software Library

ILTA HANDS ON Securing Windows 7

SupportDesk Installation Guide Main Client Version

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

Installation and Configuration Guide

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Agency Pre Migration Tasks

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Lab Configuring Access Policies and DMZ Settings

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

NetWrix USB Blocker. Version 3.6 Administrator Guide

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

How To Install And Configure Windows Server 2003 On A Student Computer

Advanced Event Viewer Manual

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

qliqdirect Active Directory Guide

SWCS 4.2 Client Configuration Users Guide Revision /26/2012 Solatech, Inc.

Setting up Your Acusis Address. Microsoft Outlook

File Management Utility User Guide

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Snow Inventory. Installing and Evaluating

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

System Administration Training Guide. S100 Installation and Site Management

Installation of MicroSoft Active Directory

GETTING STARTED GUIDE 4.5. FileAudit VERSION.

QUANTIFY INSTALLATION GUIDE

Host Installation on a Terminal Server

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

Web based training for field technicians can be arranged by calling These Documents are required for a successful install:

TrueEdit Remote Connection Brief

escan SBS 2008 Installation Guide

Spector 360 Deployment Guide. Version 7

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Kaseya Server Instal ation User Guide June 6, 2008

Quick Start - Virtual Server idataagent (VMware)


ACTIVE DIRECTORY DEPLOYMENT

Securing Remote Desktop for Windows XP

Release Notes for Websense Security v7.2

Diamond II v2.3 Service Pack 4 Installation Manual

GETTING STARTED GUIDE. FileAudit VERSION.

Introduction. This white paper provides technical information on how to approach these steps with Symantec Antivirus Corporate edition.

Using TViX Network. NFS mode : You must install the TViX NetShare utility in to your PC, but you can play the TP or DVD jukebox without stutter.

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sophos Anti-Virus for NetApp Storage Systems startup guide

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

2. Using Notepad, create a file called c:\demote.txt containing the following information:

IMAP and SMTP Setup in Clients

Microsoft XP Professional Remote Desktop Connection

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

NetSupport DNA Configuration of Microsoft SQL Server Express

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

NETWRIX ACCOUNT LOCKOUT EXAMINER

Troubleshooting File and Printer Sharing in Microsoft Windows XP

RMS Cloud - Setup Instructions for Windows Computers

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Pearl Echo Installation Checklist

Windows XP Exchange Client Installation Instructions

Microsoft Baseline Security Analyzer (MBSA)

Features - Microsoft Data Protection Manager

1. Installation Overview

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

Quickstart Guide. First Edition, Published September Remote Administrator / NOD32 Antivirus 4 Business Edition

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Initial Installation and Configuration

STIDistrict Server Replacement

Networking Best Practices Guide. Version 6.5

Neoteris IVE Integration Guide

ServiceDesk 7.1 Installation and Upgrade. ServiceDesk 7.1 Installation and Upgrade - Using Domain Service Credentials A Step by Step Guide

HP MediaSmart Server Software Upgrade from v.2 to v.3

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Installing Active Directory

User Management Guide

Accessing the Media General SSL VPN

Course: WIN310. Student Lab Setup Guide. Summer Microsoft Windows Server 2003 Network Infrastructure (70-291)

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

How To Upgrade A Websense Log Server On A Windows 7.6 On A Powerbook (Windows) On A Thumbdrive Or Ipad (Windows 7.5) On An Ubuntu (Windows 8) Or Windows

Configuring Windows Server Clusters

Hosted Microsoft Exchange Client Setup & Guide Book

BackupAssist v6 quickstart guide

Getting Started Configuring Your Computer Network Settings

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Contents. VPN Instructions. VPN Instructions... 1

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

LAB: Enterprise Single Sign-On Services. Last Saved: 7/17/ :48:00 PM

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Transcription:

Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1

4. Choose Scan selected drives and folders Click the Select button 5. Choose and click Ok 6. Close Windows Defender once the scan is finished Page 2

Activity 2: Microsoft Baseline Security Analyzer 1. Start > All Programs > Microsoft Baseline Securirty Analyzer 2. Click on Scan a computer 3. Make sure to check these boxes: Check for Windows administrative vulnerabilities Check for weak passwords Check for IIS administrative vulnerabilities Check for SQL administrative vulnerabilities Check for security updates 4. Click the Start Scan button Page 3

5. Once the scan is completed, a detailed report will be generated 6. You can look at the Result details 7. If there are any vulnerabilities discovered, click on How to corrrect this to view solutions 8. Click OK to close the program Page 4

Activity 3: Using Windows XP Professional Security Checklist Verify that all Disk partitions are Formatted with NTFS NTFS partitions offer access controls and protections that aren't available with the FAT, FAT32, or FAT32x file systems. Make sure that all partitions on your computer are formatted using NTFS. If necessary, use the Convert utility to non destructively convert your FAT partitions to NTFS. 1. Check the status of your Disk partitions Protect File Shares By default, Windows XP Professional systems that are not connected to a domain use a network access model called "Simple File Sharing," in which all attempts to log on to the computer from across the network will be forced to use the Guest account. This means that network access through Server Message Block (SMB, used for file and print access), as well as Remote Procedure Call (RPC, used by most remote management tools and remote registry access) will be available only to the Guest account. Page 5

In the Simple File Sharing model, file shares can be created so that access from the network is read only or access from the network is able to read, create, change, and delete files. Simple File Sharing is intended for use on a home network and behind a firewall, such as the one provided by Windows XP. If you are connected to the Internet, and are not operating behind a firewall, you should remember that any file shares you create might be accessible to any user on the Internet. The Classic security model is used if your Windows XP Professional computer is joined to a domain or if Simple File Sharing is disabled. In the Classic security model, users who attempt to log on to the local computer from across the network must authenticate as themselves and are not mapped to the Guest account. File shares should be created so that access from the network is granted only to the appropriate groups and/or individual users. 1. Go to Computer Management and drill down under Shared Folders 2. Right click on share to stop sharing Page 6

Use Account Passwords To protect users who do not password protect their accounts, Windows XP Professional accounts without passwords can be used only to log on at the physical computer console. By default, accounts with blank passwords can no longer be used to log on to the computer remotely over the network or for any other logon activity except at the main physical console logon screen. For example, you cannot use the secondary logon service (RunAs) to start a program as a local user with a blank password. Assigning a password to a local account removes the restriction that prevents logging on over a network. It also permits that account to access any resources it is authorized to access, even over a network connection. As a result, it is better to leave a blank password assigned to an account rather than assigning a weak, easily guessed password. When assigning account passwords, make sure the password is at least nine characters long and that it includes at least one punctuation mark or non printing ASCII character within the first seven characters. The longer the password, the stronger it is. Caution: If your computer is not in a physically secured location, it is recommended that you assign passwords to all local user accounts. Failure to do so allows anyone with physical access to the computer to easily log on by using an account that does not have a password. This is especially important for portable computers, which should always have strong passwords on all local user accounts. Note: This restriction does not apply to domain accounts. It also does not apply to the local Guest account. If the Guest account is enabled and has a blank password, it will be permitted to log on and access any resource authorized for access by the Guest account. If you want to disable the restriction against logging on to the network without a password, you can do so through Local Security Policy. 1. Go to Computer Manager, drill down under Local Users and Groups, create accounts and assign passwords here. Disable or delete unnecessary accounts here, such as Guest. Always rename the built in Admin account. Page 7

You should review the list of active accounts (for both users and programs) on the system in the Computer Management snap in. Disable any non active accounts and delete any accounts that are no longer required. This setting recommendation applies only to Windows XP Professional computers that belong to a domain or to computers that do not use the Simple File Sharing model. On Windows XP Professional systems that are not connected to a domain, users who attempt to log on from across the network will be forced to use the Guest account by default. This change is designed to prevent hackers attempting to access a system across the Internet from logging on by using a local Administrator account that has no password. To use this feature, which is part of the Simple File Sharing model, the Guest account must be enabled on all Windows XP computers that are not joined to a domain. For those computers that are joined to a domain, or for unjoined computers that have turned off the Simple File Sharing model, the Guest account should be disabled. This will prevent users attempting to log on to the computer from across the network from using the Guest account. Set Stronger Password Policies (Note: some of these policies are not required by DIR and not enforced by Texas State University) To protect users who do not password protect their accounts, Windows XP Professional accounts without passwords can be used only to log on at the physical computer console. By Page 8

default, accounts with blank passwords can no longer be used to log on to the computer remotely over the network or for any other logon activity except at the main physical console logon screen. Note: This restriction does not apply to domain accounts. It also does not apply to the local Guest account. If the Guest account is enabled and has a blank password, it will be permitted to log on and access any resource authorized for access by the Guest account. Use the Local Security Policy snap in to strengthen the system policies for password acceptance. Microsoft suggests that you make the following changes: Set the minimum password length to at least nine characters. The longer, the stronger. Set a minimum password age appropriate to your network (typically between 1 and 7 days). Set a maximum password age appropriate to your network (typically no more than 42 days). Set a password history maintenance (using the "Remember passwords" radio button) of at least six. Set Account Lockout Policy (Note: some of these policies are not required by DIR and not enforced by Texas State University) Windows XP Professional includes an account lockout feature that will disable an account after an administrator specified number of logon failures. For example, enable local account lockout after 5 10 failed attempts, reset the count after not less than 30 minutes, and set the lockout duration to "Forever (until admin unlocks)." If that's too aggressive, consider permitting the account to automatically unlock after a certain period of time. There are two common goals for using account lockout: one is to make it obvious that multiple attempts have been made to log on to a user account with an invalid password; the second is to protect accounts from attempts to guess a password by dictionary attacks or iterative guessing. There is no one correct setting here that will apply to all environments. Consider reasonable settings for your environment. Disable Unnecessary Services After installing Windows XP, you should disable any network services not required for the computer. In particular, you should consider whether your computer needs any IIS Web services. By default, IIS is not installed as part of Windows XP and should be installed only if its services are specifically required. Page 9

Install Antivirus Software and Updates One of the most important things for protecting systems is to use antivirus software and ensure that it is kept up to date. All systems on the Internet, a corporate Intranet, or a home network should have antivirus software installed. Keep up to Date on the Latest Security Updates The Auto Update feature in Windows XP can automatically detect and download the latest security fixes from Microsoft. Auto Update can be configured to automatically download fixes in the background and then prompt the user to install them once the download is complete. To configure Auto Update, click System in Control Panel and select the Automatic Updates tab. Choose the first notification setting to download the updates automatically and receive notification when they are ready to be installed. Activity 4: Google Scanning 1. Search within a site for all files with a particular file type site:http://security.vpit.txstate.edu pdf Page 10

2. Search within a site for all files with a particular file type with a particular set of characters. site:http://security.vpit.txstate.edu pdf password Page 11

Activity 5: Scanning with NMap for Windows 1. Open Command Prompt (Start > Run >Type cmd and click OK ) 2. Type nmap IP address (The IP address will be provided by the instructor) Example: 3. Other additional Nmap options Page 12

Activity 6: Scanning with Wireshark 1. Open Wireshark: Start > All Programs > Wireshark > Capture Options 2. Select appropriate Interface (your LAN card) 3. Set Capture Filter using IP address and settings instructor provides 4. Click Start 5. Nmap correllation with Wireshark results Page 13

Activity 7: Sysinternals 1. Download and run TCPview.exe from Microsoft Sysinternal site: http://live.sysinternals.com/ Page 14

2. Download and run Autoruns.exe from http://live.sysinternals.com 3. Download and run Procmon.exe from http://live.sysinternals.com Page 15

Activity 8: Windows Event Viewer 1. Open Computer Managent and drill down to System Tools > Event Viewer 2. Discuss each type of log and significance along with configuration options Activity 9: Identity Finder Scanning 1. Launch Identity Finder Start > All Programs > Identity Finder 2. The Identity Finder Wizard will open 3. Choose the option Skip Wizard and use the Advanced Mode 4. Click on the tab What to Search for Page 16

5. Make sure that the options Social Security and Credit Card are selected (Note: Click on buttons to Select and De select) 6. Click on the tab Where to Search 7. Select Custom 8. Click on the tab next to the box for Folder Choose Desktop Click OK Page 17

9. Make sure your Custom location is displayed in the field. Click on the Add button 10. Click Apply and then OK Page 18

11. Go to the tab Main 12. Click on Start to begin scanning 13. Once the search is completed, ID Finder Search Summary is displayed 14. Click OK to close the Summary pop up box Page 19

15. Go to the tab Tools and Options 16. Click on Shred 17. Click Yes 18. Click OK Remember: Once shredded Files/Folders cannot be recovered 19. Close Identity Finder Page 20