Session 12 Tp 12

841 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
841
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Session 12 Tp 12

  1. 1. Session 12 Deploying Security Configurations
  2. 2. <ul><li>Service packs combine multiple fixes into one package </li></ul><ul><li>Hot fixes address only a certain issue </li></ul><ul><li>Baseline Security Analyzer lists the updates required by the system </li></ul><ul><li>Software Update Services installs new updates automatically over a network </li></ul><ul><li>There are three wireless networking standards: 802.11b, 802.11a and 802.11g </li></ul><ul><li>Topology is the way computers are connected to each other </li></ul>Review
  3. 3. <ul><li>Ad hoc topology can be formed when two wireless devices come within each others range </li></ul><ul><li>Infrastructure topology enables linking wireless and wired networks </li></ul><ul><li>There are three ways of authentication </li></ul><ul><ul><li>Open system </li></ul></ul><ul><ul><li>Shared key </li></ul></ul><ul><ul><li>IEEE 802.1x </li></ul></ul><ul><li>Networks can be administered remotely using Remote Assistance and Remote Desktop </li></ul>Review Contd…
  4. 4. Objectives <ul><li>List the appropriate security requirements for a network </li></ul><ul><li>Create security configurations for networks </li></ul><ul><li>Use security templates </li></ul><ul><li>Test security settings of a network </li></ul><ul><li>Deploy security settings </li></ul>
  5. 5. Security Templates <ul><li>Consist of text files that contain the security settings of a machine </li></ul><ul><li>Saved with .inf extension </li></ul><ul><li>Windows Server 2003 machines have default security templates installed </li></ul><ul><li>We can create new templates and make changes to existing templates </li></ul>
  6. 6. Security Templates Snap-in <ul><li>Available in the Add Standalone Snap-in dialog box </li></ul><ul><li>Loads in the Microsoft Management Console (MMC) </li></ul>Add Standalone Snap-in dialog box Snap-in Microsoft Management Console
  7. 7. Predefined Security Templates <ul><li>Rootsec.inf – Contains the default file system permissions for a system drive </li></ul><ul><li>DC Security.inf – Contains the security settings for a Domain Controller </li></ul><ul><li>Compatws.inf – Changes the default security settings for members of a User’s Group] on a Windows Server 2003 computer </li></ul><ul><li>Securedc.inf – Contains security settings that increase the security level of a Domain Controller </li></ul>
  8. 8. Predefined Security Templates Contd… <ul><li>Hisecdc.inf – Contains security settings for a domain controller that implements a higher security compared to Securedc.inf </li></ul><ul><li>Securews.inf – Contains security settings that increase the security level of a workstation </li></ul><ul><li>Hisecws.inf – Contains security settings for a workstation that implement a higher security level compared to Securews.inf template </li></ul><ul><li>Setup Security.inf - Contains the default security settings of the computer during setup </li></ul>
  9. 9. Creating and Importing Security Templates <ul><li>To create a new template s elect Action  New Template </li></ul><ul><li>To import a template use the Import Template dialog box </li></ul>Creating a template Import Template dialog box
  10. 10. Application of Security Template <ul><li>Refers to deployment of the new or modified template </li></ul><ul><li>Use the Active Directory Users And Computers console for deployment </li></ul><ul><li>Group policies enable the deployment of a single security template to all the computers in a domain or group </li></ul>
  11. 11. Security Configuration and Analysis Tool <ul><li>Examines the effectiveness of a template </li></ul><ul><li>Security Configuration And Analysis snap-in c ompares the security settings of a template with those of a computer </li></ul><ul><li>To compare security settings using log file Select Action  View Log File </li></ul>
  12. 12. Applying a Template <ul><li>To apply a new or modified template s elect Action  Configure Computer Now </li></ul><ul><li>To apply the default template s elect Action  Import Template </li></ul>Default template
  13. 13. Testing Security Policies <ul><li>Test plan – Specifies the goal of the test and how it will be implemented </li></ul><ul><li>Test case – Tests specific elements of a network </li></ul><ul><li>Creation of the lab – Used for creation of the network design and checking suitability of the security policy </li></ul><ul><li>Implementation of tests – Helps in determination of the suitability of the security policy </li></ul><ul><li>Study of the results – Involves study of every test case and its result </li></ul>
  14. 14. Deployment of Security Policies <ul><li>Pilot deployment is a limited implementation of the security configuration of a network </li></ul><ul><li>The following points need to be noted while developing the pilot deployment plan: </li></ul><ul><ul><li>Select employees from different departments as users </li></ul></ul><ul><ul><li>Provide technical support team to resolve problems </li></ul></ul><ul><ul><li>Include a rollback procedure that can be used to recover the original configuration of a network, in case of serious problems in the pilot deployment </li></ul></ul>
  15. 15. Summary <ul><li>Security templates consist of text files that contain the security settings of a machine </li></ul><ul><li>The security templates snap-in loads in the Microsoft Management Console (MMC) </li></ul><ul><li>We need to deploy a new or modified template </li></ul><ul><li>To test security policies: </li></ul><ul><ul><li>Test plan </li></ul></ul><ul><ul><li>Test case </li></ul></ul><ul><ul><li>Creation of the lab </li></ul></ul><ul><ul><li>Implementation of tests </li></ul></ul><ul><ul><li>Study of the results </li></ul></ul><ul><li>Pilot deployment is a limited implementation of the security configuration of a network </li></ul>

×