SlideShare une entreprise Scribd logo
1  sur  38
CONFIGURING AND MANAGING COMPUTER SECURITY Chapter 14
OVERVIEW ,[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
Overview - 2 ,[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
Security Policy? ,[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
Security Policy? ,[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECURITY POLICY ,[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
LOCAL SECURITY POLICY Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
LOCAL SECURITY POLICY (CONTINUED) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
DOMAIN SECURITY POLICY Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
Domain Security Policy…a little more detail ,[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
MANAGING SECURITY POLICY ,[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECURITY TEMPLATES ,[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECURITY TEMPLATES ,[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECURITY TEMPLATES ,[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECURITY TEMPLATES ,[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECURITY TEMPLATES ,[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
Apply a Security Template ,[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
Apply a Security Template ,[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
CREATING A CUSTOM SECURITY POLICY MANAGEMENT CONSOLE Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
CONFIGURING SECURITY TEMPLATES Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECURITY CONFIGURATION AND ANALYSIS SNAP-IN Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
CREATING AN ANALYSIS DATABASE Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
ANALYZING SECURITY Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
CONFIGURING SECURITY Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
Important Note… ,[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
EXPORTING A TEMPLATE Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECEDIT.EXE ,[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SECURITY AUDIT POLICY ,[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
WHAT CAN YOU AUDIT? Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
… Previous slide… ,[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
PLANNING AN AUDIT POLICY ,[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
CONFIGURING THE EVENT LOG Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
ENABLING AUDIT POLICY Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
Important Note ,[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
AUDITING NTFS OBJECT ACCESS Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY Amy Rusko will be audited for attempts to take ownership, change permissions, or delete objects in this folder.
MONITORING SECURITY EVENTS Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SUMMARY ,[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY
SUMMARY (CONTINUED) ,[object Object],[object Object],[object Object],[object Object],Chapter 14: CONFIGURING AND MANAGING COMPUTER SECURITY

Contenu connexe

En vedette

La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoEuler Ruiz
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEuler Ruiz
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11blusmurfydot1
 
DTA 2011 REV B
DTA 2011 REV BDTA 2011 REV B
DTA 2011 REV Btynanderek
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16blusmurfydot1
 
Assistive technology
Assistive technologyAssistive technology
Assistive technologykturne10
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise Worldefim13
 
El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEuler Ruiz
 
La computadora
La computadoraLa computadora
La computadorasilovera
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02blusmurfydot1
 
Most dangerous searchterm_us
Most dangerous searchterm_usMost dangerous searchterm_us
Most dangerous searchterm_usAngeline KH
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06blusmurfydot1
 

En vedette (20)

La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11
 
DTA 2011 REV B
DTA 2011 REV BDTA 2011 REV B
DTA 2011 REV B
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
Organizadores
OrganizadoresOrganizadores
Organizadores
 
Javascript for Wep Apps
Javascript for Wep AppsJavascript for Wep Apps
Javascript for Wep Apps
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise World
 
El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humana
 
La computadora
La computadoraLa computadora
La computadora
 
Test bram
Test bramTest bram
Test bram
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02
 
Most dangerous searchterm_us
Most dangerous searchterm_usMost dangerous searchterm_us
Most dangerous searchterm_us
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
 

Similaire à IT103Microsoft Windows XP/OS Chap14

Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security FeaturesRaja Waseem Akhtar
 
Managing security settings in windows server with group policy
Managing security settings in windows server with group policyManaging security settings in windows server with group policy
Managing security settings in windows server with group policyMiguel de la Cruz
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferencesRob Dunn
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1Hamed Moghaddam
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy ConceptsRob Dunn
 
IOUG Collaborate 2014 Auditing/Security in EM12c
IOUG Collaborate 2014 Auditing/Security in EM12cIOUG Collaborate 2014 Auditing/Security in EM12c
IOUG Collaborate 2014 Auditing/Security in EM12cKellyn Pot'Vin-Gorman
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
Session 12 Tp 12
Session 12 Tp 12Session 12 Tp 12
Session 12 Tp 12githe26200
 
Enforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesEnforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesJuan J. Merelo
 
create your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdfcreate your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdfFORTUNE2505
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeYusuf Hadiwinata Sutandar
 

Similaire à IT103Microsoft Windows XP/OS Chap14 (20)

Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security Features
 
Managing security settings in windows server with group policy
Managing security settings in windows server with group policyManaging security settings in windows server with group policy
Managing security settings in windows server with group policy
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferences
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
Ch14
Ch14Ch14
Ch14
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
 
IOUG Collaborate 2014 Auditing/Security in EM12c
IOUG Collaborate 2014 Auditing/Security in EM12cIOUG Collaborate 2014 Auditing/Security in EM12c
IOUG Collaborate 2014 Auditing/Security in EM12c
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Client deployment
Client deploymentClient deployment
Client deployment
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Session 12 Tp 12
Session 12 Tp 12Session 12 Tp 12
Session 12 Tp 12
 
Enforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence TechniquesEnforcing Corporate Security Policies via Computational Intelligence Techniques
Enforcing Corporate Security Policies via Computational Intelligence Techniques
 
create your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdfcreate your own Security Management Model using the NIST Special Pub.pdf
create your own Security Management Model using the NIST Special Pub.pdf
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPracticeLOUCA23 Yusuf Hadiwinata Linux Security BestPractice
LOUCA23 Yusuf Hadiwinata Linux Security BestPractice
 

Plus de blusmurfydot1

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12blusmurfydot1
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04blusmurfydot1
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01blusmurfydot1
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01blusmurfydot1
 

Plus de blusmurfydot1 (15)

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

IT103Microsoft Windows XP/OS Chap14

Notes de l'éditeur

  1. This chapter covers policy-based security management. Students will learn how to manage security with Local Security Policy and security templates, how to create and copy templates, and how to apply template settings using the Security Configuration and Analysis snap-in or Secedit.exe. We will also cover auditing and its use to detect security breaches.
  2. This section introduces Local Security Policy and Domain Security Policy. Emphasize the relationship between these policies, with the domain policy overriding the local policy.
  3. This slide shows the major security policy areas discussed in the textbook. As you discuss each frame, point out specific policies and explain what they do.
  4. Continue the discussion of settings, referring to the textbook for descriptions of policies in each policy area. Account policy and user rights assignment should be familiar to the students from Chapter 13.
  5. This slide depicts the Domain Security Policy console on a Windows Server 2003 system. Point out that even though there are additional settings that apply to domains or Windows Server 2003, the familiar account policies and local policies are still present. Describe the role of domain security in managing security for workstations in the domain. Be sure to emphasize that domain policy overrides local policy, and mention that even domain policy can be overridden by security policies created for an OU within the domain.
  6. This section covers managing security with security templates. Templates are collections of security settings that make it easy to define local or domain security policies. We will discuss the built-in security templates as well as how to create and use custom templates. We will then discuss importing, analyzing, and exporting templates using the Security Configuration and Analysis snap-in and Secedit.exe.
  7. This slide lists the workstation templates included with Windows XP. Two other built-in templates—Securedc.inf and Hisecdc.inf—are used to configure security for domain controllers. Discuss each template’s intended purpose and use. You can refer to the textbook for descriptions of each template.
  8. This slide lists the workstation templates included with Windows XP. Two other built-in templates—Securedc.inf and Hisecdc.inf—are used to configure security for domain controllers. Discuss each template’s intended purpose and use. You can refer to the textbook for descriptions of each template.
  9. This slide lists the workstation templates included with Windows XP. Two other built-in templates—Securedc.inf and Hisecdc.inf—are used to configure security for domain controllers. Discuss each template’s intended purpose and use. You can refer to the textbook for descriptions of each template.
  10. This slide lists the workstation templates included with Windows XP. Two other built-in templates—Securedc.inf and Hisecdc.inf—are used to configure security for domain controllers. Discuss each template’s intended purpose and use. You can refer to the textbook for descriptions of each template.
  11. This slide lists the workstation templates included with Windows XP. Two other built-in templates—Securedc.inf and Hisecdc.inf—are used to configure security for domain controllers. Discuss each template’s intended purpose and use. You can refer to the textbook for descriptions of each template.
  12. This slide depicts the creation of a custom Security Policy Management console. You can step through the screen shots or build the console in class. This is a good time to make sure students are familiar with customizing Microsoft Management Console (MMC). Point out the inclusion of the default security templates in the Security Templates snap-in.
  13. This slide depicts the creation of a new security template. Discuss the steps taken to create, modify, and save the template. If time permits, open some of the built-in templates and discuss their settings. Encourage students to familiarize themselves with templates and their configuration.
  14. This slide shows the first screen of the Security Configuration and Analysis snap-in. If possible, walk through the next few slides on a classroom system to demonstrate how to import, analyze, and configure security settings using templates.
  15. This slide depicts the creation of a security analysis database. This is the first step in analyzing or configuring security with Security Configuration and Analysis. Step through the frames, explaining what is being done in each frame. You can also demonstrate this on a classroom system.
  16. This slide shows the use of the custom template we created earlier to analyze security on a system. Once again, step through the procedure using the slides or a classroom system. Point out the green check mark icons for settings that are consistent with the template and the red X for settings that are not.
  17. This slide shows a security template being used to configure security. Emphasize that this is a one-way process. To revert to the original settings, you have to import settings from the Setup Security template or use System Restore to revert to a restore point prior to the configuration.
  18. This slide shows the export of security settings to a template file. The new template (New Base.inf) can be used to configure security on other systems/domains/OUs.
  19. You can use Secedit.exe to perform the tasks of the Security Configuration and Analysis snap-in from the command prompt. Type Secedit /? at a command prompt, and browse the help file to show students the complete syntax for this utility.
  20. Security auditing is an important part of ensuring that security policies and procedures are effective. Without auditing, you really cannot tell when unauthorized access occurs, how it occurs, and who is responsible. This section covers planning and implementing an audit policy. We also discuss the use of Event Viewer to monitor security audits.
  21. This slide shows the Audit Policy section of Local Security Policy. It lists the audit types you can implement. The textbook describes each type in detail and presents three other audit-related settings found in Security Settings. Describe each one and discuss when each might be used. Audit The Access Of Global System Objects Audit The Use Of Backup And Restore Privilege Shut Down The System Immediately If Unable To Log Security Audits
  22. This slide lists the three steps in planning an audit policy. Discuss the tasks you would perform at each juncture and why it is important to begin this process with a plan.
  23. This slide depicts the Security Properties dialog box in Event Viewer. Demonstrate the configuration options of the Security log in class, if possible. For students not familiar with log settings, explain how to configure log size and the settings for actions to be taken when the log reaches the maximum size.
  24. This slide shows the use of Local Security Policy to enable auditing of object access on a system. Emphasize that you can also enable auditing on multiple systems by using Domain Security Policy. Also point out that enabling auditing is only half the job. You also have to configure SACLs for each object to be audited (next slide).
  25. This slide depicts the configuration for auditing a user on the C:\\Deploy folder. Amy Rusko will be audited for attempts to take ownership, change permissions, or delete objects in this folder. If time permits, enable auditing on objects in another area such as System Events on a classroom system.
  26. This slide shows an administrator monitoring events in the Security log. It also demonstrates the use of Find and Filter to locate specific events. Step through this slide or demonstrate these steps on a classroom system.
  27. Emphasize key points of the lecture, tailored to your class’s level of comprehension. Stress the importance of proper planning of security configuration and monitoring.
  28. Stress the importance once again of proper planning for successful auditing.