版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Module 7: Implementing Security Using Group Policy,Module Overview,Configuring Security Policies Implementing Fine-Grained Password Policies Restricting Group Membership and Access to Software Managing Security Using Security Templates,Lesson 1: Configuring Security Policies,What Are Security Polici
2、es? What Is the Default Domain Security Policy? What Are the Account Policies? What Are Local Policies? What Are Network Security Policies? Windows Firewall with Advanced Security Demonstration: Overview of Additional Security Settings Demonstration: What Is the Default Domain Controller Security Po
3、licy?,What Are Security Policies?,What Is the Default Domain Security Policy?,Provides account policies for the domain; other settings are not configured by default Use to provide security settings that will affect the entire domain Use domain policy to provide security settings, as a best practice.
4、 Use separate GPOs to provide other types of settings,Domain,Default domain policy,Account and security settings,What Are the Account Policies?,Account policies mitigate the threat of brute force guessing of account passwords,What Are Local Policies?,Every computer running Windows 2000 and later has
5、 a local security policy that is part of local Group Policy,Domain policy will override local policies in cases of conflict,In a workgroup, you must configure local security policies to provide security,You can assign local rights through local Group Policies,Security options control many different
6、aspects of a computers security,Local Policies determine the security options for a user or service account,What Are Network Security Policies?,Separate wireless policies for Windows XP and Windows Vista,Windows Vista policies contain more options for wireless,Windows Vista wireless policies can den
7、y access to wireless networks,802.1x authentication can be configured via Group Policy,Only Windows Vista and later can receive wired network policies,Define the available networks and authentication methods for wireless connections for Windows Vista and Windows XP clients, and LAN authentication fo
8、r Windows Vista and Windows Server 2008 clients,Windows Firewall with Advanced Security,Supports filtering for both incoming and outgoing traffic,Used for advanced settings configuration,Provides integrated firewall filtering and IPsec protection settings,Allows rule configuration for various criter
9、ia, such as users, groups, and TCP and UDP ports,Provides network location-aware profiles,Can import or export policies,A stateful host-based firewall that allows or blocks network traffic according to its configuration,Windows Server 2008,Internet,LAN,Firewall,Firewall rules control inbound and out
10、bound traffic,Demonstration: Overview of Additional Security Settings,In this demonstration, you will see how to configure additional security settings,Demonstration: What Is the Default Domain Controller Security Policy?,In this demonstration, you will see the default domain controller policy setti
11、ngs,Provides an extra layer of security for domain controllers,Allows many user rights to be configured,Provides enabled auditing,Lesson 2: Implementing Fine-Grained Password Policies,What Are Fine-Grained Password Policies? How Fine-Grained Password Policies Are Implemented Implementing Fine-Graine
12、d Password Policies Demonstration: Implementing Fine-Grained Password Policies,What Are Fine-Grained Password Policies?,Administrator group,Manager group,End user group,Password changes: 7 days,Password changes: 14 days,Password changes: 30 days,Fine-grained passwords allow multiple password policie
13、s to exist in the same domain,How Fine-Grained Password Policies Are Implemented,Considerations when implementing PSOs:,Password Settings Container and Password Setting Objects are new schema object classes,PSOs can only be applied to users or global groups,PSOs can be created through ADSI Edit or L
14、DIFDE,A PSO has the following settings available:,Password policies Account lockout policies PSO Link Precedence,Implementing Fine-Grained Password Policies,Shadow groups can be used to apply a PSO to all users that do not already share a global group membership A user or group could have multiple P
15、SOs linked to them The precedence attribute is used to resolve conflicts Lower precedence values have higher priority PSOs linked directly to user objects override PSOs linked to a users global groups If there are no PSOs, normal domain account policies apply,Demonstration: Implementing Fine-Grained
16、 Password Policies,In this demonstration, you will see how to create and apply PSOs,Lesson 3: Restricting Group Membership and Access to Software,What Is Restricted Group Membership? Demonstration: Configuring Restricted Group Membership What Is a Software Restriction Policy? Options for Configuring
17、 Software Restriction Policies Demonstration: Configuring Software Restriction Policies,What Is Restricted Group Membership?,Group Policy can control group membership:,For any group on a local computer, by applying a GPO to the OU that holds the computer account For any group in AD DS, by applying a
18、 GPO to the domain controller,Demonstration: Configuring Restricted Group Membership,In this demonstration, you will see how to configure restricted groups,What Is a Software Restriction Policy?,A policy-driven mechanism that identifies and controls software on a client computer A mechanism restrict
19、ing software installation and viruses A component with two parts: A default rule with three options: Unrestricted, Basic, and Disallowed Exceptions to the default rule,Options for Configuring Software Restriction Policies,Certificate Rule Checks for digital signature on application Use when you want
20、 to restrict Win32 applications and ActiveX content,Internet Zone Rule Controls how Internet Zones can be accessed Use in high-security environments to control access to Web applications,Hash Rule Use to employ MD5 or SHA1 hash of a file to confirm identity Use to allow or prohibit a certain file ve
21、rsion from being run,Path Rule Use when restricting a file path Use when multiple files exist for the same application Essential when SRPs are strict,Demonstration: Configuring Software Restriction Policies,In this demonstration, you will see how to configure a software restriction policy,Lesson 4:M
22、anaging Security Using Security Templates,What Are Security Templates? Demonstration: Applying Security Templates What Is the Security Configuration Wizard? Demonstration: Configuring Server Security Using the Security Configuration Wizard Options for Integrating the Security Configuration Wizard an
23、d Security Templates Demonstration: Importing Security Configuration Policies into Security Templates,What Are Security Templates?,Security templates:,Allow administrators to apply consistent security settings to multiple computers,Can be applied via Group Policy,Can be designed based on server role
24、s,Demonstration: Applying Security Templates,In this demonstration, you will see how to create a security template and import it into a GPO,What Is the Security Configuration Wizard?,SCW provides guided attack surface reduction by:,Disabling unnecessary services and Internet Information Services (II
25、S)Web extensions Blocking unused ports and securing ports that are left open using IPSec Reducing protocol exposure Configuring audit settings,SCW supports:,Rollback Analysis Remote configuration Command-line support Active Directory integration Policy editing,Demonstration: Configuring Server Secur
26、ity Using the Security Configuration Wizard,In this demonstration, you will see how to create a security policy using the SCW,Options for Integrating the Security Configuration Wizard and Security Templates,Options:,Policies created with the SCW can be applied individually Other Security templates c
27、an be incorporated into the SCW,Scwcmd.exe command-line utility can be used to convert the XML policy into a GPO,Demonstration: Importing Security Configuration Policies into Security Templates,In this demonstration, you will see how to transform the XML policy file into a GPO,Lab: Implementing Security
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 跨境包裹運(yùn)輸協(xié)議2025
- 朝陽單招考試題目及答案
- 礦山救護(hù)工試題及答案
- 2025-2026九年級(jí)道德與法治上學(xué)期期末測(cè)試
- 衛(wèi)生院應(yīng)急值守管理制度
- 中學(xué)生教室衛(wèi)生管理制度
- 落實(shí)美發(fā)店衛(wèi)生管理制度
- 行車室衛(wèi)生管理制度
- 鄉(xiāng)鎮(zhèn)衛(wèi)生院廉政管理制度
- 寢室值日衛(wèi)生制度
- 四川省遂寧市2026屆高三上學(xué)期一診考試英語試卷(含答案無聽力音頻有聽力原文)
- 福建省寧德市2025-2026學(xué)年高三上學(xué)期期末考試語文試題(含答案)
- 建筑施工行業(yè)2026年春節(jié)節(jié)前全員安全教育培訓(xùn)
- 2026屆高考語文復(fù)習(xí):小說人物形象復(fù)習(xí)
- 2026及未來5年中國防病毒網(wǎng)關(guān)行業(yè)市場(chǎng)全景調(diào)查及發(fā)展前景研判報(bào)告
- 2026年山東省煙草專賣局(公司)高校畢業(yè)生招聘流程筆試備考試題及答案解析
- 八年級(jí)下冊(cè)《昆蟲記》核心閱讀思考題(附答案解析)
- 煤礦復(fù)產(chǎn)安全培訓(xùn)課件
- 2025年中職藝術(shù)設(shè)計(jì)(設(shè)計(jì)理論)試題及答案
- 2026屆高考?xì)v史二輪突破復(fù)習(xí):高考中外歷史綱要(上下兩冊(cè))必考??贾R(shí)點(diǎn)
- 鐵路交通法律法規(guī)課件
評(píng)論
0/150
提交評(píng)論