SlideShare a Scribd company logo
1 of 22
Documentation Artifact 5
Long Term Care Plan
-Continuing to work with your fictional consumer, do you feel
he or she is a good candidate for in home care? Why or why
not?
-Living in the community, what types of supports and services
do you feel that your consumer may need to have a high quality
of life, potential employment or day activities, and continued
treatment (if needed)? (This will require knowing what typical
services are for people with similar disabilities and situations)
-Where could your consumer get these supports and services in
the local community? (This will require researching local
agencies and services)
Assignment: Write a memo to me stating the above information
in a clear and professional manner. This should build the case
for in home care or highlight the infeasibility of it (approximate
length should be 1 page)
Security Strategies in Windows Platforms and Applications
Lesson 11
Hardening the Microsoft Windows Operating System
© 2020 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Cover image © Sharpshot/Dreamstime.com
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2020 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
1
Learning Objective(s)
Apply system hardening techniques in Microsoft Windows.
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2020 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Key Concepts
General hardening concepts and strategies
Hardening servers, clients, networks, and more
Security awareness
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2020 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Understanding the Hardening Process and Mind-set
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
4
Employ strategies to secure Windows computers
Install only what you need
Use Security Compliance Toolkit (SCT)
Manually disable and remove programs/services
Strategies to Secure Windows Computers
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2020 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
The process of making configuration changes and deploying
controls to reduce the attack surface is called hardening.
5
Disable/remove programs with vulnerabilities
Establish controls on running programs
Install Only What You Need
When installing Windows Server, select which programs to
install
Customize a server by defining one or more roles
Role is a predefined set of services, programs, and
configuration settings that enables a computer to fulfill specific
requirements
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2020 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Security Compliance Toolkit (SCT)
A set of tools from Microsoft to help manage Windows security
baselines
Provides guidance to administrators that makes it easier to
ensure policies adhere to policy best practices
Includes two tools to help manage baseline input and GPOs
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2020 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Policy Analyzer Selection Window
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8
Windows Security Configuration Wizard—Select Server Roles
Policy Analyzer
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
9
Manually Disabling and Removing Programs and Services
Back up the Windows Registry before making any changes
Make changes on a test computer whenever possible
Evaluate each computer
Identify remaining programs and services you don’t need
Remove unneeded programs
Use the Windows Services maintenance utility to start, stop, and
change services settings
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Uninstalling a Program in Windows
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
11
Windows Services Maintenance
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
12
Windows Services Properties
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
13
Hardening Microsoft Windows Operating System Authentication
Disallow older authentication methods
Remove or disable any unused or inactive user accounts
Protect Administrator account
Establish and enforce strong account policies
Password policy
Account policy
Kerberos policy
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
14
Hardening the Network Infrastructure
Identify network server and client services that require access to
ports
Modify firewall settings to open those ports; close all other
ports
To manage firewall settings, use:
Windows Defender Firewall with Advanced Security
Local Group Policy Editor
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
15
Windows Defender Firewall with Advanced Security
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
16
Group Policy Management Editor—Windows Defender Firewall
with Advanced Security
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
17
Securing Directory Information and Operations
Active Directory (AD)
Limit the number of administrators with access to AD
Ensure that administrators use separate Administrator user
accounts
Administrators should have one account for AD administration
and at least one other account for other administration tasks
Create an AD security group
Require that AD administrators do their AD work only from
dedicated terminal servers instead of workstations
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
18
Securing Information and Operations (Cont.)
Directory Service Restore Mode (DSRM)
Change password from the default password after installation
Periodically change the DSRM password
Protect the DSRM password for each domain controller and
change it every six months
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
19
Hardening Microsoft Windows OS Administration
After creating other user accounts with Administrator
privileges, disable default Administrator account
Enable strong passwords
Set Administrator passwords to expire on a regular basis
Create and maintain baselines
Create full backup of each system before and after hardening
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
20
Hardening Microsoft Windows OS Administration (Cont.)
Create individual backups of policies each time they change
Ensure Windows systems are updated to latest patch
Ensure Windows Update is configured to automatically
download and install latest updates from Microsoft
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
21
Group Policy Management Console—Backup GPO
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
22
Windows Update
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
23
Windows Update Advanced Options
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
24
Hardening Server Computers
Ensure server computers don’t do anything they’re not supposed
to do, such as run unneeded services
Harden services they are supposed to provide
After installing a server, run Security Compliance Toolkit to
disable unneeded roles and services
Use nmap utility to identify open ports
Enable IPSec for server-to-server communications
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
25
Hardening Workstation Computers
Use malware protection
Mitigate vulnerabilities
Disable programs and services not used
Review firewall settings
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
26
Hardening Data Access and Controls
Minimize number of user accounts on computers
Carefully control access to accounts with Administrator rights
Use Windows Group Policy to establish access control lists
(ACLs)
Avoid allowing anonymous or guest user accounts to access
sensitive data
Protect data at rest with Windows Encrypting File System (EFS)
or Windows BitLocker
Ensure data backups are encrypted
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
27
Hardening Communications and Remote Access
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
28
Network access control (NAC)
Authentication servers
VPN and encryption
Hardening PKI
Public key infrastructure (PKI): The hardware, software,
policies, and procedures to manage all aspects of digital
certificates
Makes environments more secure
Ensure all computers that participate are hardened
Harden certificate authority (CA) servers
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
29
Hardening PKI (Cont.)
Ensure CAs are physically secure and only accessible by
authorized administrators
Backup CA keys and store them in a safe location
Use GPOs to distribute root CA certificates
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
30
Security Awareness Reminders
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Physical posters and banners in conspicuous locations, such as
in break rooms and cafeterias, and around printers, fax
machines, or shredders
Email newsletters, social media contact, and security policy
updates
Periodic website reminders
Social media messages
Daily or weekly tip programs
Contests with security themes
Security events on specific dates, such as November 30,
International Computer Security Awareness Day
Lunch-and-learn meetings about topics of interest to employees
personally—such as identity theft or cyberbullying—as well as
topics of interest to your organization
Visible modeling of good security behaviors by your
organization’s leaders
31
Posters and banners
Newsletters
Website reminders
Social media messages
Daily or weekly tip programs
Contests
Security events
Lunch-and-learn meetings
Leadership
Best Practices
Install only the Windows Server Core option when you don’t
need extra functionality.
Select the minimum number of roles in Windows Server.
Run SCT immediately after installation of Windows Server.
Update and patch systems; configure for automatic Windows
updates.
Install and run Microsoft Baseline Security Analyzer (MBSA)
and at least one vulnerability scanner.
Create one or more user accounts with Administrator rights.
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
32
Best Practices (Cont.)
Disable the Administrator and Guest user accounts.
Disable all unneeded services.
Close all ports not required by services or applications.
Create GPOs for all security settings, including firewall rules.
Use AD to distribute all configuration changes using GPOs.
Create a backup of each GPO.
Scan all computers for open ports and vulnerabilities.
Limit physical access to all critical servers.
Create an initial baseline backup.
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
33
Best Practices (Cont.)
Change the AD DSRM password periodically, at least every six
months.
Install anti-malware software on each computer.
Ensure all anti-malware software and data are current.
Use NAC software or devices to control remote computer
connections.
Use remote authentication methods to authorize remote
computers and users.
Require secure VPNs to access internal network resources.
Use IPSec with digital certificates to authenticate computer-to-
computer connections in the datacenter.
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
34
Best Practices (Cont.)
Require security awareness training prior to issuing access
credentials.
Require periodic recurrent security awareness training to retain
access credentials.
Provide continuing security awareness.
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
35
Summary
General hardening concepts and strategies
Hardening servers, clients, networks, and more
Security awareness
Page ‹#›
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
36
APA format
No resources before 2015
DO all parts of below assignment
Assume you are a security professional. You are determining
which of the following backup strategies will provide the best
protection against data loss, whether from disk failure or natural
disaster:
Daily full server backups with hourly incremental
backupsRedundant array of independent disks (RAID) with
periodic full backupsReplicated databases and folders on high-
availability alternate servers
Answer the following question(s):
Which backup strategy would you adopt? Why?
To complete this assignment, you must do the following:
A) Create a new thread.
B) Select AT LEAST 3 other students' threads and post
substantive comments on those threads, evaluating the pros and
cons of that student’s recommendations.
Your comments should extend the conversation started with the
thread.
ALL original posts and comments must be substantive. (I'm
looking for about a paragraph - not just "I agree.")
NOTE: These discussions should be informal discussions, NOT
research papers. If you MUST directly quote a resource, then
cite it properly. However,
I would much rather simply read your words.

More Related Content

Similar to Documentation Artifact 5Long Term Care Plan-Continuing to .docx

Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Frank Lesniak
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategyRMayo22
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaFlexera
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?BoTree Technologies
 
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...WASdev Community
 
Integrating BigInsights and Puredata system for analytics with query federati...
Integrating BigInsights and Puredata system for analytics with query federati...Integrating BigInsights and Puredata system for analytics with query federati...
Integrating BigInsights and Puredata system for analytics with query federati...Seeling Cheung
 
IBM Customer Experience Suite Rich Media Edition
IBM Customer Experience Suite Rich Media EditionIBM Customer Experience Suite Rich Media Edition
IBM Customer Experience Suite Rich Media Editionncarrier
 
Windows 7 Enhanced Security And Control
Windows 7 Enhanced Security And ControlWindows 7 Enhanced Security And Control
Windows 7 Enhanced Security And ControlKeith Combs
 
inSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & HistorianinSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & HistorianKondapi V Siva Rama Brahmam
 
Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche AGILLY
 
MD-100T00-ENU-PowerPoint_M01.pptx
MD-100T00-ENU-PowerPoint_M01.pptxMD-100T00-ENU-PowerPoint_M01.pptx
MD-100T00-ENU-PowerPoint_M01.pptxAreshaKhan5
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
COM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxCOM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxdrandy1
 
COM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxCOM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxmccormicknadine86
 
COM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxCOM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxcargillfilberto
 
Schahin presentation at IBM Connect 2014
Schahin presentation at IBM Connect 2014Schahin presentation at IBM Connect 2014
Schahin presentation at IBM Connect 2014Flávio Mendes
 
New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4Susan Yoskin
 

Similar to Documentation Artifact 5Long Term Care Plan-Continuing to .docx (20)

Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
App store and SAM strategy
App store and SAM strategyApp store and SAM strategy
App store and SAM strategy
 
Windows 7
Windows 7Windows 7
Windows 7
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring Adaptiva
 
What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?What are the Best Practices for Enterprise Software Applications?
What are the Best Practices for Enterprise Software Applications?
 
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
 
Integrating BigInsights and Puredata system for analytics with query federati...
Integrating BigInsights and Puredata system for analytics with query federati...Integrating BigInsights and Puredata system for analytics with query federati...
Integrating BigInsights and Puredata system for analytics with query federati...
 
IBM Customer Experience Suite Rich Media Edition
IBM Customer Experience Suite Rich Media EditionIBM Customer Experience Suite Rich Media Edition
IBM Customer Experience Suite Rich Media Edition
 
Windows 7 Enhanced Security And Control
Windows 7 Enhanced Security And ControlWindows 7 Enhanced Security And Control
Windows 7 Enhanced Security And Control
 
inSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & HistorianinSis Suite - Process Data Analytics, Dashboards, Portal & Historian
inSis Suite - Process Data Analytics, Dashboards, Portal & Historian
 
Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche
 
MD-100T00-ENU-PowerPoint_M01.pptx
MD-100T00-ENU-PowerPoint_M01.pptxMD-100T00-ENU-PowerPoint_M01.pptx
MD-100T00-ENU-PowerPoint_M01.pptx
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
COM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxCOM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docx
 
COM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxCOM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docx
 
COM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docxCOM520 Written Assignment 6 Assignment Policy for Securin.docx
COM520 Written Assignment 6 Assignment Policy for Securin.docx
 
Schahin presentation at IBM Connect 2014
Schahin presentation at IBM Connect 2014Schahin presentation at IBM Connect 2014
Schahin presentation at IBM Connect 2014
 
New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4New Continuous Release and Deployment Capabilities for CICS Customers v4
New Continuous Release and Deployment Capabilities for CICS Customers v4
 

More from petehbailey729071

Does facial recognition violates our right to privacy  Incl.docx
Does facial recognition violates our right to privacy  Incl.docxDoes facial recognition violates our right to privacy  Incl.docx
Does facial recognition violates our right to privacy  Incl.docxpetehbailey729071
 
Dont Blame the Eater By DAVID ZINCZENKO NOV. 23, 2002.docx
Dont Blame the Eater By DAVID ZINCZENKO NOV. 23, 2002.docxDont Blame the Eater By DAVID ZINCZENKO NOV. 23, 2002.docx
Dont Blame the Eater By DAVID ZINCZENKO NOV. 23, 2002.docxpetehbailey729071
 
Domestic TravelVisit the Travel Facts and Statistics website.docx
Domestic TravelVisit the Travel Facts and Statistics website.docxDomestic TravelVisit the Travel Facts and Statistics website.docx
Domestic TravelVisit the Travel Facts and Statistics website.docxpetehbailey729071
 
Don Marquis, in Why Abortion is Immoral,” champions an account of t.docx
Don Marquis, in Why Abortion is Immoral,” champions an account of t.docxDon Marquis, in Why Abortion is Immoral,” champions an account of t.docx
Don Marquis, in Why Abortion is Immoral,” champions an account of t.docxpetehbailey729071
 
Dollar General has been working to fashion itself into a one-stop sh.docx
Dollar General has been working to fashion itself into a one-stop sh.docxDollar General has been working to fashion itself into a one-stop sh.docx
Dollar General has been working to fashion itself into a one-stop sh.docxpetehbailey729071
 
Dodge, M., Bosick, S., Antwerp, V., & Benson, M. (2013). Do Men an.docx
Dodge, M., Bosick, S., Antwerp, V., & Benson, M. (2013). Do Men an.docxDodge, M., Bosick, S., Antwerp, V., & Benson, M. (2013). Do Men an.docx
Dodge, M., Bosick, S., Antwerp, V., & Benson, M. (2013). Do Men an.docxpetehbailey729071
 
Does Ex Parte Quirin justify the treatment of detainees at Guant.docx
Does Ex Parte Quirin justify the treatment of detainees at Guant.docxDoes Ex Parte Quirin justify the treatment of detainees at Guant.docx
Does Ex Parte Quirin justify the treatment of detainees at Guant.docxpetehbailey729071
 
Documentation of at least four initial scholarly sources from the .docx
Documentation of at least four initial scholarly sources from the .docxDocumentation of at least four initial scholarly sources from the .docx
Documentation of at least four initial scholarly sources from the .docxpetehbailey729071
 
Documents of United States Indian Policy (Third Edition) Fra.docx
Documents of United States Indian Policy (Third Edition) Fra.docxDocuments of United States Indian Policy (Third Edition) Fra.docx
Documents of United States Indian Policy (Third Edition) Fra.docxpetehbailey729071
 
Doctorate Level Questions No Plagiarism....Paraphrase the cont.docx
Doctorate Level Questions No Plagiarism....Paraphrase the cont.docxDoctorate Level Questions No Plagiarism....Paraphrase the cont.docx
Doctorate Level Questions No Plagiarism....Paraphrase the cont.docxpetehbailey729071
 
DOCUMENT-BASED QUESTION RUBRIC   5  4  3  2  1 ·​ .docx
DOCUMENT-BASED QUESTION RUBRIC   5  4  3  2  1 ·​   .docxDOCUMENT-BASED QUESTION RUBRIC   5  4  3  2  1 ·​   .docx
DOCUMENT-BASED QUESTION RUBRIC   5  4  3  2  1 ·​ .docxpetehbailey729071
 
DOCUMENT 4Dwight D. Eisenhower, Farewell Address to the Nation” (.docx
DOCUMENT 4Dwight D. Eisenhower, Farewell Address to the Nation” (.docxDOCUMENT 4Dwight D. Eisenhower, Farewell Address to the Nation” (.docx
DOCUMENT 4Dwight D. Eisenhower, Farewell Address to the Nation” (.docxpetehbailey729071
 
docsch09.pptxManaging and Using Information Systems A St.docx
docsch09.pptxManaging and Using Information Systems A St.docxdocsch09.pptxManaging and Using Information Systems A St.docx
docsch09.pptxManaging and Using Information Systems A St.docxpetehbailey729071
 
Doc with options for readings and films attached.Option 1 - .docx
Doc with options for readings and films attached.Option 1 - .docxDoc with options for readings and films attached.Option 1 - .docx
Doc with options for readings and films attached.Option 1 - .docxpetehbailey729071
 
Do you support or oppose the death penaltyRequirementsYo.docx
Do you support or oppose the death penaltyRequirementsYo.docxDo you support or oppose the death penaltyRequirementsYo.docx
Do you support or oppose the death penaltyRequirementsYo.docxpetehbailey729071
 
Do you think it is possible that this pandemic might end up working .docx
Do you think it is possible that this pandemic might end up working .docxDo you think it is possible that this pandemic might end up working .docx
Do you think it is possible that this pandemic might end up working .docxpetehbailey729071
 
Do you think that mandating the construction of such IA-centric or.docx
Do you think that mandating the construction of such IA-centric or.docxDo you think that mandating the construction of such IA-centric or.docx
Do you think that mandating the construction of such IA-centric or.docxpetehbailey729071
 
Do you think there is a victimless crime, if so, what is it and what.docx
Do you think there is a victimless crime, if so, what is it and what.docxDo you think there is a victimless crime, if so, what is it and what.docx
Do you think there is a victimless crime, if so, what is it and what.docxpetehbailey729071
 
Do you believe that people in South Florida have different sorts of .docx
Do you believe that people in South Florida have different sorts of .docxDo you believe that people in South Florida have different sorts of .docx
Do you believe that people in South Florida have different sorts of .docxpetehbailey729071
 
Do you agree that Immanuel Kant’s categorical imperative is the high.docx
Do you agree that Immanuel Kant’s categorical imperative is the high.docxDo you agree that Immanuel Kant’s categorical imperative is the high.docx
Do you agree that Immanuel Kant’s categorical imperative is the high.docxpetehbailey729071
 

More from petehbailey729071 (20)

Does facial recognition violates our right to privacy  Incl.docx
Does facial recognition violates our right to privacy  Incl.docxDoes facial recognition violates our right to privacy  Incl.docx
Does facial recognition violates our right to privacy  Incl.docx
 
Dont Blame the Eater By DAVID ZINCZENKO NOV. 23, 2002.docx
Dont Blame the Eater By DAVID ZINCZENKO NOV. 23, 2002.docxDont Blame the Eater By DAVID ZINCZENKO NOV. 23, 2002.docx
Dont Blame the Eater By DAVID ZINCZENKO NOV. 23, 2002.docx
 
Domestic TravelVisit the Travel Facts and Statistics website.docx
Domestic TravelVisit the Travel Facts and Statistics website.docxDomestic TravelVisit the Travel Facts and Statistics website.docx
Domestic TravelVisit the Travel Facts and Statistics website.docx
 
Don Marquis, in Why Abortion is Immoral,” champions an account of t.docx
Don Marquis, in Why Abortion is Immoral,” champions an account of t.docxDon Marquis, in Why Abortion is Immoral,” champions an account of t.docx
Don Marquis, in Why Abortion is Immoral,” champions an account of t.docx
 
Dollar General has been working to fashion itself into a one-stop sh.docx
Dollar General has been working to fashion itself into a one-stop sh.docxDollar General has been working to fashion itself into a one-stop sh.docx
Dollar General has been working to fashion itself into a one-stop sh.docx
 
Dodge, M., Bosick, S., Antwerp, V., & Benson, M. (2013). Do Men an.docx
Dodge, M., Bosick, S., Antwerp, V., & Benson, M. (2013). Do Men an.docxDodge, M., Bosick, S., Antwerp, V., & Benson, M. (2013). Do Men an.docx
Dodge, M., Bosick, S., Antwerp, V., & Benson, M. (2013). Do Men an.docx
 
Does Ex Parte Quirin justify the treatment of detainees at Guant.docx
Does Ex Parte Quirin justify the treatment of detainees at Guant.docxDoes Ex Parte Quirin justify the treatment of detainees at Guant.docx
Does Ex Parte Quirin justify the treatment of detainees at Guant.docx
 
Documentation of at least four initial scholarly sources from the .docx
Documentation of at least four initial scholarly sources from the .docxDocumentation of at least four initial scholarly sources from the .docx
Documentation of at least four initial scholarly sources from the .docx
 
Documents of United States Indian Policy (Third Edition) Fra.docx
Documents of United States Indian Policy (Third Edition) Fra.docxDocuments of United States Indian Policy (Third Edition) Fra.docx
Documents of United States Indian Policy (Third Edition) Fra.docx
 
Doctorate Level Questions No Plagiarism....Paraphrase the cont.docx
Doctorate Level Questions No Plagiarism....Paraphrase the cont.docxDoctorate Level Questions No Plagiarism....Paraphrase the cont.docx
Doctorate Level Questions No Plagiarism....Paraphrase the cont.docx
 
DOCUMENT-BASED QUESTION RUBRIC   5  4  3  2  1 ·​ .docx
DOCUMENT-BASED QUESTION RUBRIC   5  4  3  2  1 ·​   .docxDOCUMENT-BASED QUESTION RUBRIC   5  4  3  2  1 ·​   .docx
DOCUMENT-BASED QUESTION RUBRIC   5  4  3  2  1 ·​ .docx
 
DOCUMENT 4Dwight D. Eisenhower, Farewell Address to the Nation” (.docx
DOCUMENT 4Dwight D. Eisenhower, Farewell Address to the Nation” (.docxDOCUMENT 4Dwight D. Eisenhower, Farewell Address to the Nation” (.docx
DOCUMENT 4Dwight D. Eisenhower, Farewell Address to the Nation” (.docx
 
docsch09.pptxManaging and Using Information Systems A St.docx
docsch09.pptxManaging and Using Information Systems A St.docxdocsch09.pptxManaging and Using Information Systems A St.docx
docsch09.pptxManaging and Using Information Systems A St.docx
 
Doc with options for readings and films attached.Option 1 - .docx
Doc with options for readings and films attached.Option 1 - .docxDoc with options for readings and films attached.Option 1 - .docx
Doc with options for readings and films attached.Option 1 - .docx
 
Do you support or oppose the death penaltyRequirementsYo.docx
Do you support or oppose the death penaltyRequirementsYo.docxDo you support or oppose the death penaltyRequirementsYo.docx
Do you support or oppose the death penaltyRequirementsYo.docx
 
Do you think it is possible that this pandemic might end up working .docx
Do you think it is possible that this pandemic might end up working .docxDo you think it is possible that this pandemic might end up working .docx
Do you think it is possible that this pandemic might end up working .docx
 
Do you think that mandating the construction of such IA-centric or.docx
Do you think that mandating the construction of such IA-centric or.docxDo you think that mandating the construction of such IA-centric or.docx
Do you think that mandating the construction of such IA-centric or.docx
 
Do you think there is a victimless crime, if so, what is it and what.docx
Do you think there is a victimless crime, if so, what is it and what.docxDo you think there is a victimless crime, if so, what is it and what.docx
Do you think there is a victimless crime, if so, what is it and what.docx
 
Do you believe that people in South Florida have different sorts of .docx
Do you believe that people in South Florida have different sorts of .docxDo you believe that people in South Florida have different sorts of .docx
Do you believe that people in South Florida have different sorts of .docx
 
Do you agree that Immanuel Kant’s categorical imperative is the high.docx
Do you agree that Immanuel Kant’s categorical imperative is the high.docxDo you agree that Immanuel Kant’s categorical imperative is the high.docx
Do you agree that Immanuel Kant’s categorical imperative is the high.docx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Documentation Artifact 5Long Term Care Plan-Continuing to .docx

  • 1. Documentation Artifact 5 Long Term Care Plan -Continuing to work with your fictional consumer, do you feel he or she is a good candidate for in home care? Why or why not? -Living in the community, what types of supports and services do you feel that your consumer may need to have a high quality of life, potential employment or day activities, and continued treatment (if needed)? (This will require knowing what typical services are for people with similar disabilities and situations) -Where could your consumer get these supports and services in the local community? (This will require researching local agencies and services) Assignment: Write a memo to me stating the above information in a clear and professional manner. This should build the case for in home care or highlight the infeasibility of it (approximate length should be 1 page) Security Strategies in Windows Platforms and Applications Lesson 11 Hardening the Microsoft Windows Operating System © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company
  • 2. www.jblearning.com All rights reserved. Cover image © Sharpshot/Dreamstime.com Page ‹#› Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 1 Learning Objective(s) Apply system hardening techniques in Microsoft Windows. Page ‹#› Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Key Concepts General hardening concepts and strategies Hardening servers, clients, networks, and more Security awareness Page ‹#› Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com
  • 3. All rights reserved. Understanding the Hardening Process and Mind-set Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 4 Employ strategies to secure Windows computers Install only what you need Use Security Compliance Toolkit (SCT) Manually disable and remove programs/services Strategies to Secure Windows Computers Page ‹#› Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 4. The process of making configuration changes and deploying controls to reduce the attack surface is called hardening. 5 Disable/remove programs with vulnerabilities Establish controls on running programs Install Only What You Need When installing Windows Server, select which programs to install Customize a server by defining one or more roles Role is a predefined set of services, programs, and configuration settings that enables a computer to fulfill specific requirements Page ‹#› Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Security Compliance Toolkit (SCT) A set of tools from Microsoft to help manage Windows security baselines Provides guidance to administrators that makes it easier to ensure policies adhere to policy best practices Includes two tools to help manage baseline input and GPOs
  • 5. Page ‹#› Security Strategies in Windows Platforms and Applications © 2020 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Policy Analyzer Selection Window Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8 Windows Security Configuration Wizard—Select Server Roles Policy Analyzer Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 9
  • 6. Manually Disabling and Removing Programs and Services Back up the Windows Registry before making any changes Make changes on a test computer whenever possible Evaluate each computer Identify remaining programs and services you don’t need Remove unneeded programs Use the Windows Services maintenance utility to start, stop, and change services settings Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Uninstalling a Program in Windows Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 11 Windows Services Maintenance Page ‹#› Security Strategies in Windows Platforms and Applications
  • 7. © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 12 Windows Services Properties Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 13 Hardening Microsoft Windows Operating System Authentication Disallow older authentication methods Remove or disable any unused or inactive user accounts Protect Administrator account Establish and enforce strong account policies Password policy Account policy Kerberos policy Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
  • 8. Company www.jblearning.com All rights reserved. 14 Hardening the Network Infrastructure Identify network server and client services that require access to ports Modify firewall settings to open those ports; close all other ports To manage firewall settings, use: Windows Defender Firewall with Advanced Security Local Group Policy Editor Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 15 Windows Defender Firewall with Advanced Security Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
  • 9. Company www.jblearning.com All rights reserved. 16 Group Policy Management Editor—Windows Defender Firewall with Advanced Security Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 17 Securing Directory Information and Operations Active Directory (AD) Limit the number of administrators with access to AD Ensure that administrators use separate Administrator user accounts Administrators should have one account for AD administration and at least one other account for other administration tasks Create an AD security group Require that AD administrators do their AD work only from dedicated terminal servers instead of workstations Page ‹#› Security Strategies in Windows Platforms and Applications
  • 10. © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 18 Securing Information and Operations (Cont.) Directory Service Restore Mode (DSRM) Change password from the default password after installation Periodically change the DSRM password Protect the DSRM password for each domain controller and change it every six months Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 19 Hardening Microsoft Windows OS Administration After creating other user accounts with Administrator privileges, disable default Administrator account Enable strong passwords Set Administrator passwords to expire on a regular basis Create and maintain baselines Create full backup of each system before and after hardening
  • 11. Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 20 Hardening Microsoft Windows OS Administration (Cont.) Create individual backups of policies each time they change Ensure Windows systems are updated to latest patch Ensure Windows Update is configured to automatically download and install latest updates from Microsoft Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 21 Group Policy Management Console—Backup GPO Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com
  • 12. All rights reserved. 22 Windows Update Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 23 Windows Update Advanced Options Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 24 Hardening Server Computers Ensure server computers don’t do anything they’re not supposed
  • 13. to do, such as run unneeded services Harden services they are supposed to provide After installing a server, run Security Compliance Toolkit to disable unneeded roles and services Use nmap utility to identify open ports Enable IPSec for server-to-server communications Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 25 Hardening Workstation Computers Use malware protection Mitigate vulnerabilities Disable programs and services not used Review firewall settings Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 26 Hardening Data Access and Controls
  • 14. Minimize number of user accounts on computers Carefully control access to accounts with Administrator rights Use Windows Group Policy to establish access control lists (ACLs) Avoid allowing anonymous or guest user accounts to access sensitive data Protect data at rest with Windows Encrypting File System (EFS) or Windows BitLocker Ensure data backups are encrypted Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 27 Hardening Communications and Remote Access Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 28 Network access control (NAC)
  • 15. Authentication servers VPN and encryption Hardening PKI Public key infrastructure (PKI): The hardware, software, policies, and procedures to manage all aspects of digital certificates Makes environments more secure Ensure all computers that participate are hardened Harden certificate authority (CA) servers Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 29 Hardening PKI (Cont.) Ensure CAs are physically secure and only accessible by authorized administrators Backup CA keys and store them in a safe location Use GPOs to distribute root CA certificates Page ‹#›
  • 16. Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 30 Security Awareness Reminders Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Physical posters and banners in conspicuous locations, such as in break rooms and cafeterias, and around printers, fax machines, or shredders Email newsletters, social media contact, and security policy updates Periodic website reminders Social media messages Daily or weekly tip programs Contests with security themes Security events on specific dates, such as November 30, International Computer Security Awareness Day Lunch-and-learn meetings about topics of interest to employees personally—such as identity theft or cyberbullying—as well as topics of interest to your organization Visible modeling of good security behaviors by your organization’s leaders
  • 17. 31 Posters and banners Newsletters Website reminders Social media messages Daily or weekly tip programs Contests Security events Lunch-and-learn meetings Leadership Best Practices Install only the Windows Server Core option when you don’t need extra functionality. Select the minimum number of roles in Windows Server. Run SCT immediately after installation of Windows Server.
  • 18. Update and patch systems; configure for automatic Windows updates. Install and run Microsoft Baseline Security Analyzer (MBSA) and at least one vulnerability scanner. Create one or more user accounts with Administrator rights. Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 32 Best Practices (Cont.) Disable the Administrator and Guest user accounts. Disable all unneeded services. Close all ports not required by services or applications. Create GPOs for all security settings, including firewall rules. Use AD to distribute all configuration changes using GPOs. Create a backup of each GPO. Scan all computers for open ports and vulnerabilities. Limit physical access to all critical servers. Create an initial baseline backup. Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 19. 33 Best Practices (Cont.) Change the AD DSRM password periodically, at least every six months. Install anti-malware software on each computer. Ensure all anti-malware software and data are current. Use NAC software or devices to control remote computer connections. Use remote authentication methods to authorize remote computers and users. Require secure VPNs to access internal network resources. Use IPSec with digital certificates to authenticate computer-to- computer connections in the datacenter. Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 34 Best Practices (Cont.) Require security awareness training prior to issuing access credentials. Require periodic recurrent security awareness training to retain access credentials. Provide continuing security awareness. Page ‹#› Security Strategies in Windows Platforms and Applications
  • 20. © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 35 Summary General hardening concepts and strategies Hardening servers, clients, networks, and more Security awareness Page ‹#› Security Strategies in Windows Platforms and Applications © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 36 APA format No resources before 2015 DO all parts of below assignment
  • 21. Assume you are a security professional. You are determining which of the following backup strategies will provide the best protection against data loss, whether from disk failure or natural disaster: Daily full server backups with hourly incremental backupsRedundant array of independent disks (RAID) with periodic full backupsReplicated databases and folders on high- availability alternate servers Answer the following question(s): Which backup strategy would you adopt? Why? To complete this assignment, you must do the following: A) Create a new thread. B) Select AT LEAST 3 other students' threads and post substantive comments on those threads, evaluating the pros and cons of that student’s recommendations. Your comments should extend the conversation started with the thread. ALL original posts and comments must be substantive. (I'm looking for about a paragraph - not just "I agree.")
  • 22. NOTE: These discussions should be informal discussions, NOT research papers. If you MUST directly quote a resource, then cite it properly. However, I would much rather simply read your words.