SECURITY AUDIT CHECKLIST FOR WINDOWS ACTIVE DIRECTORY

Size: px
Start display at page:

Download "SECURITY AUDIT CHECKLIST FOR WINDOWS ACTIVE DIRECTORY"

Transcription

1

2 SL.NO POLICY NAME AUDIT STEPS DEFAULT VALUE OBSERVED VALUE 1 Password Policy 24 passwords Settings\Account Policies\Password Policy\Enforce remembered password hisry 2 Set 'Maximum password age' 60 or fewer days, but not 0 3 Set 'Minimum password age' '1 or more day Type gpedit.msc in run terminal (Shortcut) Settings\Account Policies\Password Policy\Maximum password age Settings\Account Policies\Password Policy\Minimum password age RECOMMENDED Set the following 24 or more password(s). 42 days Set the following 60 or fewer days, but not 0. 0 days Set the following 1 or more day(s). 4 Set 'Minimum password length' '14 or more character 5 Set 'Password must meet complexity requirements' '' 6 Set 'Sre passwords using reversible encryption' Settings\Account Policies\Password Policy\Minimum password length Settings\Account Policies\Password Policy\Password must meet complexity requirements Settings\Account Policies\Password Policy\Sre 0 Characters Set the following 14 or more character(s). Set the following. Set the following Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 1

3 '' passwords using reversible encryption. 7 Set 'Account lockout duration' '15 or more minutes 8 Set 'Account lockout threshold' 10 or fewer invalid logon attempt(s), but not 0 9 Set 'Reset account lockout counter after' '15 or more minute 10 Set 'Access Credential Manager as a trusted caller' 'No One' 11 Set 'Access this computer from the network' 12 Set 'Act as part of the operating system' 'No Settings\Account Policies\Account Lockout Policy\Account lockout duration Settings\Account Policies\Account Lockout Policy\Account lockout threshold Settings\Account Policies\Account Lockout Policy\Reset account lockout counter after Assignment\Access Credential Manager as a trusted caller Assignment\Access this computer from the network Not Defined Set the following 15 or more minute(s). 0 invalid logon attempts Setting this policy 0 does not conform with the benchmark as doing so disables the account lockout threshold 0 Set the following 15 or more minute(s). No one Set the following No One. Everyone, Administrars, Users, Backup Operars No one Set the following Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 2

4 One' Assignment\Act as part of the operating system No One. 13 Set 'Add workstations domain' 'Administrars' Assignment\Add workstations domain Not defined (Authenticated Users for domain controllers) Set the following Administrars. 14 Set 'Adjust memory quotas for a process' 'Administrars, LOCAL SERVICE, NETWORK SERVICE' 15 Set 'Allow log on locally' 'Administrars' Assignment\Adjust memory quotas for a process Assignment\Allow log on locally Administrars, LOCAL SERVICE, NETWORK SERVICE Administrars, Users, Backup Operars Set the following Administrars, LOCAL SERVICE, NETWORK SERVICE Set the following Administrars. 16 Configure 'Allow log on through Remote Deskp Services' Assignment\Allow log on through Remote Deskp Services Administrars, Remote Deskp Users Set the following as described in the description. 17 Set 'Back up files and direcries' 'Administrars' Assignment\Back up files and direcries Administrars, Backup Operars Set the following Administrars. 18 Set 'Change the system time' 'Administrars, LOCAL SERVICE' Assignment\Change the system time Administrars, LOCAL SERVICE Set the following Administrars, LOCAL SERVICE. 19 Set 'Change the time zone' Administrars, LOCAL Set the following Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 3

5 'Administrars, LOCAL SERVICE' Assignment\Change the time zone SERVICE Administrars, LOCAL SERVICE. 20 Set 'Create a pagefile' 'Administrars' 21 Set 'Create a ken object' 'No One' Assignment\Create a pagefile Assignment\Create a ken object Administrars Set the following Administrars. No one Set the following No One. 22 Set 'Create global objects' 'Administrars, LOCAL SERVICE, NETWORK SERVICE, SERVICE' Assignment\Create global objects Administrars, LOCAL SERVICE, NETWORK SERVICE, SERVICE Administrars, LOCAL SERVICE, NETWORK SERVICE, SERVICE. 23 Set 'Create permanent shared objects' 'No One' 24 Set 'Create symbolic links' 'Administrars' Assignment\Create permanent shared objects Assignment\Create symbolic links No one No One. Administrars Set the following Administrars. Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 4

6 25 Set 'Debug programs' 'Administrars' Assignment\Debug programs Administrars Administrars. 26 Set 'Deny access this computer from the network' Assignment\Deny access this computer from the network Guests 27 Set 'Deny log on as a batch job' include 'Guests' Assignment\Deny log on as a batch job Guests No one 28 Set 'Deny log on as a service' include 'Guests' Assignment\Deny log on as a service No one Guests 29 Set 'Deny log on locally' include 'Guests' Assignment\Deny log on locally Guests Set the following include: Guests. 30 Set 'Deny log on through Remote Deskp Services' include 'Guests, Local account' Assignment\Deny log on through Remote Deskp Services No one Set the following UI path include Guests, Local account. 31 Set 'Enable computer and user accounts be trusted for delegation Assignment\Enable computer and user accounts No one Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 5

7 be trusted for delegation 32 Set 'Force shutdown from a remote system' 'Administrars' Assignment\Force shutdown from a remote system Administrars Administrars 33 Set 'Generate security audits' 'LOCAL SERVICE, NETWORK SERVICE' Assignment\Generate security audits LOCAL SERVICE, NETWORK SERVICE 34 Set 'Impersonate a client after authentication' 'Administrars, LOCAL SERVICE, NETWORK SERVICE, SERVICE Assignment\Impersonate a client after authentication Administrars, LOCAL SERVICE, NETWORK SERVICE, SERVICE LOCAL SERVICE, NETWORK SERVICE. Set the following Administrars, LOCAL SERVICE, NETWORK SERVICE, SERVICE. 35 Set 'Increase scheduling priority' 'Administrars' Assignment\Increase scheduling priority Administrars Administrars 36 Set 'Load and unload device drivers' 'Administrars' Assignment\Load and unload device drivers Administrars Administrars Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 6

8 37 Set 'Lock pages in memory' 'No One' Assignment\Lock pages in memory No one No one 38 'Manage auditing and security log' 'Administrars' 39 Set 'Modify firmware environment values' 'Administrars' Assignment\Manage auditing and security log Assignment\Modify firmware environment values Administrars Administrars Administrars Administrars. 40 Set 'Perform volume maintenance tasks' 'Administrars' Assignment\Perform volume maintenance tasks Administrars configuration state, set the following Group Policy setting Administrars. Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 7

9 41 Set 'Resre files and direcries' 'Administrars' Assignment\Resre files and direcries Administrars, Backup Operars configuration state, set the following Group Policy setting Administrars. 42 Set 'Shut down the system' 'Administrars' Assignment\Shut down the system Administrars, Backup Operars configuration state, set the following Group Policy setting Administrars. 43 Set 'Synchronize direcry service data' 'No One' Assignment\Synchronize direcry service data Not defined configuration state, set the following Group Policy setting No One. 44 Set 'Take ownership of files or other objects' Administrars Administrars Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 8

10 'Administrars' Assignment\Take ownership of files or other objects 45 Set 'Accounts: Guest account status' '' Settings\Local Policies\Security Options\Accounts: Guest account status 46 Configure 'Accounts: Rename administrar account' Settings\Local Policies\Security Options\Accounts: Rename administrar account Administrar Administrar 47 Configure 'Accounts: Rename guest account' Settings\Local Policies\Security Options\Accounts: Rename guest account Guest Guest 48 Set 'Audit: Shut down system immediately if unable log security audits' '' This group policy setting is backed by the following registry location: HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control\Lsa\crashonauditfail Settings\Local Policies\Security Options\Audit: Shut down system immediately if unable log security audits 49 Set 'Devices: Allowed format and eject removable media' 'Administrars' This group policy setting is backed by the following registry location: HKEY_LOCAL_MACHINE\Software\Microsoft\Windo wsnt\currentversion\winlogon\allocatedasd Administrars Administrars Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 9

11 50 Set 'Domain controller: LDAP server signing requirements' 'Require signing' This group policy setting is backed by the following registry location: HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Services\NTDS\Parameters\ldapserverintegrity Not defined Not defined Settings\Local Policies\Security Options\Domain controller: LDAP server signing requirements 51 Set 'Domain controller: Refuse machine account password changes' '' This group policy setting is backed by the following registry location: HKEY_LOCAL_MACHINE\System\CurrentCont rolset\services\netlogon\parameters\refuse PasswordChange Not Defined configuration state, set the following Group Policy setting. 52 Set 'Domain member: Digitally encrypt or sign secure channel data (always)' '' This group policy setting is backed by the following registry location: HKEY_LOCAL_MACHINE\System\CurrentCont rolset\services\netlogon\parameters\requir esignorsea l Configuration\Windows Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 10

12 Settings\Security Settings\Local Policies\Security Options\Domain member: Digitally encrypt or sign secure channel data (always) 53 Set 'Domain member: Maximum machine account password age' 30 or fewer days, but not 0 Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Maximum machine account password age 30 Days 30 Days or fewer 54 Set 'Domain member: Require strong (Windows 2000 or later) session key' '' HKEY_LOCAL_MACHINE\System\CurrentCont rolset\services\netlogon\parameters\requir estrongkey Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Domain member: Require strong (Windows 2000 or later) session key 55 Set 'Interactive logon: Do not require CTRL+ALT+DEL' '' HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Policies\System\Di sablecad Settings\Security Policies\Security Configuration\Windows Settings\Local Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 11

13 Options\Interactive logon: Do not require CTRL+ALT+DEL 56 Set 'Interactive logon: Machine inactivity limit' 900 or fewer second(s), but not 0 HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows\CurrentVersion\Policies\System\In activitytimeoutsecs Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Machine inactivity limit Not Defined 900 Seconds 57 Set 'Interactive logon: Prompt user change password before expiration' 'between 5 and 14 days' HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows NT\CurrentVersion\Winlogon\scremoveoptio n Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Interactive logon: Smart card removal behavior No Action configuration state, set the following Group Policy setting Lock Workstation. 58 Set 'Microsoft network client: Send unencrypted password third- party SMB servers' '' HKEY_LOCAL_MACHINE\System\CurrentCont rolset\services\lanmanworkstation\parame ters\enableplaintextpassword Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 12

14 Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Microsoft network client: Send unencrypted password third-party SMB servers 59 Enable Aumatic Logon '' HKEY_LOCAL_MACHINE\Software\Microsoft\ Windows NT\CurrentVersion\Winlogon\AuAdminLog on Not Defined Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (AuAdminLogon) Enable Aumatic Logon (not ) 60 IP source routing protection level HKEY_LOCAL_MACHINE\System\CurrentCont rolset\services\tcpip6\parameters\disableip SourceRouting Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against Not Defined Set the following UI path Highest protection, source routing is Completely disabled Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 13

15 packet spoofing) 61 The time in seconds before the screen saver grace period expires HKEY_LOCAL_MACHINE\Software\Microsoft\ WindowsNT\CurrentVersion\Winlogon\Scree nsavergraceperiod Configuration\Windows Settings\Security Settings\Local Policies\Security Options\MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 ) 5 Seconds 5 Seconds 62 Set 'Network access: Do not allow anonymous enumeration of SAM accounts' '' HKEY_LOCAL_MACHINE\System\CurrentControlSe t\control\lsa\restrictanonymoussam Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts 63 Set 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' '' HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control\Lsa\RestrictAnonymous Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts and shares Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 14

16 64 Set 'Network access: Let Everyone permissions apply anonymous users' '' HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control\Lsa\EveryoneIncludesAnonymous Settings\Local Policies\Security Options\Network access: Let Everyone permissions apply anonymous users 65 Set 'Network access: Shares that can be accessed anonymously' 'None' 66 Set 'Network Security: Configure encryption types allowed for Kerberos' 'RC4\AES128\AES256\Futur e types' Settings\Local Policies\Security Options\Network access: Shares that can be accessed anonymously Settings\Local Policies\Security Options\Network Security: Configure encryption types allowed for Kerberos Not Defined To establish the configuration via GP, set the following UI path :None Not Defined To establish the configuration via GP, set the following UI path RC4\AES128\AES25 6\Future types. 67 Set 'Network security: Do not sre LAN Manager hash value on next password change' Settings\Local Policies\Security Options\Network security: Do not sre LAN Manager hash value on next password change Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 15

17 '' 68 Set 'Network security: Force logoff when logon hours expire' '' Settings\Local Policies\Security Options\Network security: Force logoff when logon hours expire 69 Set 'Recovery console: Allow aumatic administrative logon' '' Settings\Local Policies\Security Options\Recovery console: Allow aumatic administrative logon 70 Set 'Recovery console: Allow floppy copy and access all drives and all folders' '' Settings\Local Policies\Security Options\Recovery console: Allow floppy copy and access all drives and all folders 71 Set 'Shutdown: Allow system be shut down without having log on' '' 72 Set 'User Account Control: Switch the secure deskp when prompting for elevation' '' Settings\Local Policies\Security Options\Shutdown: Allow system be shut down without having log on Settings\Local Policies\Security Options\User Account Control: Switch the secure deskp when prompting for elevation 73 Set 'Windows Firewall: Domain: Firewall state' 'On Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Firewall state ON ON Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 16

18 74 Set 'Windows Firewall: Domain: Inbound connections' 'Block (default)' Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Inbound connections Block Block 75 Set 'Windows Firewall: Domain: Outbound connections' 'Allow (default)' Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Outbound connections Allow Allow 76 Set 'Windows Firewall: Domain: Display a notification' 'Yes (default)' Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Display a notification Yes Yes 77 Set 'Windows Firewall: Domain: Allow unicast response' 'No' Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Allow unicast response Yes NO 78 Set 'Windows Firewall: Yes Yes Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 17

19 Domain: Apply local firewall rules' 'Yes 79 Set 'Windows Firewall: Domain: Logging: Size limit (KB)' '16,384 KB or greater ' 80 Set 'Windows Firewall: Domain: Logging: Log dropped packets' 'Yes' 81 Set 'Windows Firewall: Domain: Logging: Log successful connections' 'Yes' Security\Windows Firewall Properties\Domain Profile\Windows Firewall: Domain: Apply local firewall rules Security\Windows Firewall Properties\Domain Profile\Logging\Windows Firewall: Domain: Logging: Size limit (KB) Security\Windows Firewall Properties\Domain Profile\Logging\Windows Firewall: Domain: Logging: Log dropped packets Security\Windows Firewall Properties\Domain Profile\Logging\Windows Firewall: Domain: Logging: Log successful connections Not Configured To 16,384 KB or greater Not Configured To establish the configuration via GP, set the following UI path Yes. Not Configured To establish the configuration via GP, set the following UI path Yes. 82 Set 'Windows Firewall: On To establish the Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 18

20 Private: Firewall state' 'On 83 Set 'Windows Firewall: Private: Inbound connections' 'Block 84 Set 'Windows Firewall: Private: Logging: Size limit (KB)' '16,384 KB or greater' 85 Set 'Windows Firewall: Public: Firewall state' 'On Security\Windows Firewall Properties\Private Profile\Windows Firewall: Private: Firewall state Security\Windows Firewall Properties\Private Profile\Windows Firewall: Private: Inbound connections Security\Windows Firewall Properties\Private Profile\Logging\Windows Firewall: Private: Logging: Size limit (KB) Security\Windows Firewall Properties\Public Profile\Windows Firewall: Public: Firewall state configuration via GP, set the following UI path On () Block To establish the configuration via GP, set the following UI path Block (default). Not configured To establish the configuration via GP, set the following UI path 16,384 KB or greater ON To establish the configuration via GP, set the following UI path On Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 19

21 86 Set 'Windows Firewall: Public: Inbound connections' 'Block (default)' 87 Set 'Windows Firewall: Public: Outbound connections' 'Allow 88 Set 'Windows Firewall: Public: Logging: Size limit (KB)' '16,384 KB or greater' 89 Set 'Audit Credential Validation' 'Success and Failure' Security\Windows Firewall Properties\Public Profile\Windows Firewall: Public: Inbound connections Security\Windows Firewall Properties\Public Profile\Windows Firewall: Public: Outbound connections Security\Windows Firewall Properties\Public Profile\Logging\Windows Firewall: Public: Logging: Size limit (KB) Settings\Advanced Audit Policy Configuration\Audit Policies\Account Logon\Audit Policy: Account (Recommended). Block To establish the configuration via GP, set the following UI path Block (Default). Allow To establish the configuration via GP, set the following UI path Allow (default). Not Configured To establish the configuration via GP, set the following UI path 16,384 KB or greater No Auditing Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 20

22 Logon: Credential Validation Success and Failure. 90 Set 'Audit Account Management' 'Success and Failure' 91 Set 'Audit Other Account Management Events' 'Success and Failure' 92 Set 'Audit Security Group Management' 'Success and Failure' 93 Set 'Audit Process Creation' 'Success' Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit Policy: Account Management: Account Management Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit Policy: Account Management: Other Account Management Events Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit Policy: Account Management: Security Group Management Settings\Advanced Audit Policy Configuration\Audit Policies\Detailed Tracking\Audit Policy: Detailed Tracking: Process Creation Success No Auditing Success No Auditing Success and Failure Success and Failure. Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 21

23 94 Set 'Audit Direcry Service Access' 'Success and Failure' Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Policy: DS Access: Direcry Service Access No Auditing Success 95 Set 'Audit Direcry Service Changes' 'Success and Failure' Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Policy: DS Access: Direcry Service Changes No Auditing Success and Failure 96 Set 'Audit Account Lockout' 'Success' Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Account Lockout Success Success and Failure Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 22

24 97 Set 'Audit Logoff' 'Success' 98 Set 'Audit Logon' 'Success and Failure' Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Logoff Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Logon Success Success Success Success. 99 Set 'Audit Other Logon/Logoff Events' 'Success and Failure' Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Other Logon/Logoff Events No Auditing Success and Failure Success Failure and Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 23

25 100 Set 'Audit Special Logon' 'Success' Settings\Advanced Audit Policy Configuration\Audit Policies\Logon/Logoff\Audit Policy: Logon-Logoff: Special Logon Success 101 Set 'Audit Removable Srage' 'Success and Failure' Settings\Advanced Audit Policy Configuration\Audit Policies\Object Access\Audit Policy: Object Access: Removable Srage No Auditing Success 102 Set 'Audit Sensitive Privilege Use' 'Success and Failure' Settings\Advanced Audit Policy Configuration\Audit Policies\Privilege Use\Audit Policy: Privilege Use: Sensitive Privilege Use No Auditing Success and Failure Success and Failure 103 Set 'Audit IPSec Driver' No Auditing Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 24

26 'Success and Failure' Settings\Advanced Audit Policy Configuration\Audit Policies\System\Audit Policy: System: IPSec Driver configuration state, set the following Group Policy setting 104 Set 'Turn off Auplay' ':All drives' Templates\Windows Components\AuPlay Policies\Turn off Auplay\Turn off Auplay Not Configured Success and Failure. configuration state, set the following Group Policy setting. 105 Set 'Default Protections for Internet Explorer' '' 106 Set 'Default Protections for Popular Software' '' 107 Set 'Application: Control Event Log behavior when the log file reaches its maximum size' '' 108 Set 'Security: Maximum Log Size (KB)' ':196,608 or greater' Templates\Windows Components\EMET\Default Protections for Internet Explorer Templates\Windows Components\EMET\Default Protections for Popular Explorer Templates\Windows Components\Event Log Service\Application\Control Event Log behavior when the log file reaches its maximum size Templates\Windows Components\Event Log Service\Security\Specify the maximum log file size 20,480 KB Set the Maximum Log Size (KB) option 196,608 Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 25

27 (KB)\Specify the maximum log file size (KB) or greater. 109 'Do not allow passwords be saved' '' 110 'Always prompt for password upon connection' '' 111 Set 'Allow unencrypted traffic' '' 112 Set 'Configure Aumatic Updates' '' 113 Set 'Configure Aumatic Updates: Scheduled install day' '0 - Every day' Templates\Windows Components\Remote Deskp Services\Remote Deskp Connection Client\Do not allow passwords be saved Templates\Windows Components\Remote Deskp Services\Remote Deskp Session Host\Security\Always prompt for password upon connection Templates\Windows Components\Windows Remote Management (WinRM)\WinRM Client\Allow unencrypted traffic Templates\Windows Components\Windows Update\Configure Aumatic Updates Templates\Windows Components\Windows Update\Configure Aumatic Updates: Scheduled install day Not Configured Not Configured Download the updates aumatically and notify when they are ready be installed Not Defined Disbaled To establish the configuration via GP, set the following UI path 0 - Every day. Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 26

28 114 Set 'No au-restart with logged on users for scheduled aumatic updates installations' '' 115 Set 'Reschedule Aumatic Updates scheduled installations' ':1 minute' 116 Set 'Enable screen saver' '' 117 Set 'Password protect the screen saver' '' 118 'Screen saver timeout' ':900 seconds or fewer ', but not Set 'Notify antivirus programs when opening attachments' '' Templates\Windows Components\Windows Update\No au-restart with logged on users for scheduled aumatic updates installations Templates\Windows Components\Windows Update\Reschedule Aumatic Updates scheduled installations User Templates\Control Panel\Personalization\Enable screen saver User Templates\Control Panel\Personalization\Password protect the screen saver User Templates\Control Panel\Personalization\Screen saver timeout User Templates\Windows Components\Attachment Manager\Notify antivirus programs when opening attachments Not Configured Not Configured Not Configured To establish the configuration via GP, set the following UI path :1 minute Copyright 2017, Centre For Development of Advanced Computing, Hyderabad Page 27

29

Unified CCE Security Compliance for Windows Server 2012 R2

Unified CCE Security Compliance for Windows Server 2012 R2 Unified CCE Security Compliance for Windows Server 2012 R2 This topic contains the security baseline for hardening Windows Server 2012 R2 Servers running Unified CCE. This baseline is essentially a collection

More information

Password policy settings control the complexity and lifetime for passwords. This section discusses each specific password policy setting

Password policy settings control the complexity and lifetime for passwords. This section discusses each specific password policy setting Windows Security Reference This document is a checklist of the security options with reference material (provided by Microsoft) for a Windows server implementation. The options are based on Windows 2003

More information

file:///c:/users/nsadmin/desktop/default%20domain%20policy.htm

file:///c:/users/nsadmin/desktop/default%20domain%20policy.htm Page 1 of 5 Data collected on: 1:22:33 PM General Details Domain Owner Created Modified User Revisions Computer Revisions Unique ID GPO Status naturalsmilesdentistry.com NS\Domain Admins 1/28/2012 11:09:00

More information

Configure advanced audit policies

Configure advanced audit policies 7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Copyright

Copyright This video will look at configuring the default password policy in Active Directory. These setting determines setting like how long a user password will be, if the password needs to complex, and how many

More information

Hardening the CyberArk CPM and PVWA Servers

Hardening the CyberArk CPM and PVWA Servers Hardening the CyberArk CPM and PVWA Servers June 2017 Copyright 1999-2017 CyberArk Software Ltd. All rights reserved. This document contains information and ideas, which are proprietary to CyberArk Software

More information

BitLocker Group Policy Settings

BitLocker Group Policy Settings BitLocker Group Policy Settings Updated: September 13, 2013 Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2 This reference topic for the IT professional describes the function,

More information

How To Reset Local Group Policy Objects To Default Settings Windows 7

How To Reset Local Group Policy Objects To Default Settings Windows 7 How To Reset Local Group Policy Objects To Default Settings Windows 7 more information. Group policy unable to apply firewall change on Windows 7 cilent - blocked Try to reset GPO settings to default values

More information

Group Policy Reference

Group Policy Reference Report Number: C4-053R-00 Group Policy Reference Systems and Network Attack Center (SNAC) Author: David C. Rice Updated: March 2, 2001 Version 1.0.8 National Security Agency 9800 Savage Rd. Suite 6704

More information

SERVER HARDENING CHECKLIST

SERVER HARDENING CHECKLIST SERVER HARDENING CHECKLIST WINDOWS 2003 SERVER CHECKLIST This checklist contains server hardening procedures for Windows 2003 Server. The procedures listed in this document are a balance of industry best

More information

LepideAuditor. Compliance Reports

LepideAuditor. Compliance Reports Compliance Compliance Table of Contents 1. Introduction... 2 2. Purpose of this Document... 2 3. FISMA Compliance... 3 4. GLBA Compliance... 4 5. HIPAA Compliance... 5 6. PCI Compliance... 6 7. SAS Compliance...

More information

MANAGING LOCAL AUTHENTICATION IN WINDOWS

MANAGING LOCAL AUTHENTICATION IN WINDOWS MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved

More information

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Topics: TACACS+ Authentication for Centralized Control of Switch Access Security (page 7) CDP (page

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

McAfee Policy Auditor Content Update Summary. New Checks

McAfee Policy Auditor Content Update Summary. New Checks 2016-May-12 McAfee Policy Auditor Content Update Summary Product / Version Content Version McAfee Policy Auditor 6.x 1185 New Checks Oval ID oval:com.mcafee.oval.common:def:2485824 oval:com.mcafee.oval.common:def:2485826

More information

ProfileUnity with FlexApp Technology

ProfileUnity with FlexApp Technology ProfileUnity with FlexApp Technology Best Practices for Highly Secured Desktop Environments Introduction This guide has been authored by experts at Liquidware in order to provide information and guidance

More information

Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES

Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES Category: G950A Server Operating System; Initial Security Requirements CONTENTS: I. Definition

More information

Implementing and Troubleshooting Account Lockout

Implementing and Troubleshooting Account Lockout Page 1 of 7 Implementing and Troubleshooting Account Lockout Launched: Aug 31, 2004 Updated: Nov 18, 2004 Section: Articles :: Authentication, Access Control & Encryption Author: Mitch Tulloch Rating:

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

ADVANCED WINDOWS AUDITING

ADVANCED WINDOWS AUDITING ADVANCED WINDOWS AUDITING Introduction Many organisations have insufficient visibility of activity occurring on their workstations and servers. Good visibility and detection of what is happening on an

More information

Windows 7 Install Printer Drivers Without Admin Rights Gpo

Windows 7 Install Printer Drivers Without Admin Rights Gpo Windows 7 Install Printer Drivers Without Admin Rights Gpo I have a GPO to allow user could and unthe device printer driver without the Did anybody find a way to allow non-admin users to install these

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51 Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

Antivirus Solution Guide for Clustered Data ONTAP: Kaspersky

Antivirus Solution Guide for Clustered Data ONTAP: Kaspersky Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Kaspersky Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4445 Abstract An antivirus solution is key to enable enterprises

More information

Getting started with ActiveSecurity MyLogin

Getting started with ActiveSecurity MyLogin 1 (5) Getting started with ActiveSecurity MyLogin 1 Introduction This document contains instructions for starting to use Aventra s ActiveSecurity MyLogin software and explanations of the basic settings.

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

6 Months Training Module in MS SQL SERVER 2012

6 Months Training Module in MS SQL SERVER 2012 6 Months Training Module in MS SQL SERVER 2012 Module 1 Installing and Configuring Windows Server 2012 Installing and Managing Windows Server 2012 Windows Server 2012 Overview Installing Windows Server

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Managing the VPN Client

Managing the VPN Client Managing the VPN Client This chapter explains the tasks you can perform to manage connection entries, view and manage event reporting, and upgrade or uninstall the VPN Client software. The management features

More information

Setup Smart Login for Windows V2

Setup Smart Login for Windows V2 Setup Smart Login for Windows V2 Smart Login allows workstations to login to a Smart-Net server without having to join a domain. Smart Login is suitable for both laptops and desktop PC s. Features Users

More information

RAP as a Service Active Directory Security: Prerequisites

RAP as a Service Active Directory Security: Prerequisites RAP as a Service Active Directory Security: Prerequisites This document explains the required steps to configure the RAP as a Service for Active Directory Security. There are two scenarios available to

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

Web and MAC Authentication

Web and MAC Authentication 3 Web and MAC Authentication Contents Overview..................................................... 3-2 Client Options.............................................. 3-3 General Features............................................

More information

Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Port-Based and Client-Based Access Control (802.1X) 9 Configuring Port-Based and Client-Based Access Control (802.1X) Contents Overview..................................................... 9-3 Why Use Port-Based or Client-Based Access Control?............

More information

MDaemon Vs. Zimbra Network Edition Professional

MDaemon Vs. Zimbra Network Edition Professional Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

User Management Tool

User Management Tool Citrix Product Documentation docs.citrix.com September 21, 2018 Contents What s new 3 What s new in User Management Tool 1.8.1........................... 3 What s new in User Management Tool 1.8............................

More information

GFI EventsManager 8 ReportPack. Manual. By GFI Software Ltd.

GFI EventsManager 8 ReportPack. Manual. By GFI Software Ltd. GFI EventsManager 8 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-Mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Activity 1: Using Windows XP Professional Security Checklist

Activity 1: Using Windows XP Professional Security Checklist Activity 1: Using Windows XP Professional Security Checklist Verify that all Disk partitions are Formatted with NTFS NTFS partitions offer access controls and protections that aren't available with the

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

MOC 6419B: Configuring, Managing and Maintaining Windows Server based Servers

MOC 6419B: Configuring, Managing and Maintaining Windows Server based Servers MOC 6419B: Configuring, Managing and Maintaining Windows Server 2008- based Servers Course Overview This instructor-led course provides students with the knowledge and skills that are required to manage

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

VMware vcloud Air SOC 1 Control Matrix

VMware vcloud Air SOC 1 Control Matrix VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

R5: Configuring Windows Server 2008 R2 Network Infrastructure

R5: Configuring Windows Server 2008 R2 Network Infrastructure 70-642 R5: Configuring Windows Server 2008 R2 Network Infrastructure Course Introduction Course Introduction Chapter 01 - Understanding and Configuring IP Lesson 1: Introducing the OSI Model Understanding

More information

MDaemon Vs. IceWarp Unified Communications Server

MDaemon Vs. IceWarp Unified Communications Server Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

BEETLE /mopos Tablet Mobile POS solution

BEETLE /mopos Tablet Mobile POS solution BEETLE /mopos Tablet Mobile POS solution Windows 8.1 Security Advice (July 2015) We would like to know your opinion on this publication. Please send us a copy of this page if you have any constructive

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window 9. Security DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Port Security 802.1X AAA RADIUS TACACS IMPB DHCP Server Screening ARP Spoofing Prevention MAC Authentication Web-based

More information

Contents User Guide... 1 Overview... 1 Create a New Report... 3 Create Report... 3 Select Devices... 3 Report Generation... 4 Your Audit Report...

Contents User Guide... 1 Overview... 1 Create a New Report... 3 Create Report... 3 Select Devices... 3 Report Generation... 4 Your Audit Report... User Guide Version 3.4 (Paws Studio 3.0.0) Titania Limited 2015. All Rights Reserved This document is intended to provide advice and assistance for the installation and running of Paws Studio. While Titania

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Pass Microsoft Exam

Pass Microsoft Exam Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION

More information

Server. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2

Server. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2 Local and Domain Logon User accounts and groups Access tokens Objects and security descriptors The Register Some features in Windows 7 and Windows 8 Windows XP evolved from Windows 2000 Windows 10, 8,

More information

FTD MERCURY X2 IMPLEMENTATION GUIDE FOR PA-DSS

FTD MERCURY X2 IMPLEMENTATION GUIDE FOR PA-DSS FTD MERCURY X2 IMPLEMENTATION GUIDE FOR PA-DSS FTD Mercury X2 Implementation Guide for PA-DSS 2010 Florists Transworld Delivery, Inc. All Rights Reserved. Last Updated: March 1, 2010 Last Reviewed: February

More information

MAC HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your Mac computer

MAC HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your Mac computer MAC HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your Mac computer WiseMo develops software for

More information

SQL Server Hardening Considerations, on page 1 SQL Server 2014 Security Considerations, on page 3

SQL Server Hardening Considerations, on page 1 SQL Server 2014 Security Considerations, on page 3 Considerations, on page 1 SQL Server 2014 Security Considerations, on page 3 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1. Do not install SQL Server on an Active

More information

Outline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements

Outline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements Outline Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ratings System Components 2 Ratings TCSEC Rating Levels National Computer Center (NCSC) part of US Department of Defense

More information

Copyright 2017 Softerra, Ltd. All rights reserved

Copyright 2017 Softerra, Ltd. All rights reserved Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service

More information

Xerox VersaLink B7025/B7030/B7035 Multifunction Printer Security Function Supplementary Guide

Xerox VersaLink B7025/B7030/B7035 Multifunction Printer Security Function Supplementary Guide Xerox VersaLink B7025/B7030/B7035 Multifunction Printer Document Version 1.0: March 2018 Contents Xerox VersaLink B7025/B7030/B7035 Multifunction Printer Before Using the Security Features... 5 Preface...

More information

Security. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik

Security. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline Ratings System Components Logon Object (File) Access Impersonation Auditing 2 Ratings National Computer Center (NCSC) part

More information

x CH03 2/26/04 1:24 PM Page

x CH03 2/26/04 1:24 PM Page 03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your

More information

Remote Support Security Provider Integration: RADIUS Server

Remote Support Security Provider Integration: RADIUS Server Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks

More information

EveryonePrint Integration with Equitrac. Configuration Guide. EveryonePrint Integration with Equitrac Page 1 of 14

EveryonePrint Integration with Equitrac. Configuration Guide. EveryonePrint Integration with Equitrac Page 1 of 14 EveryonePrint Integration with Equitrac Configuration Guide EveryonePrint Integration with Equitrac 2014.06.02 Page 1 of 14 1. Overview... 3 1.1 Added features with Equitrac integration... 3 1.2 Prerequisites

More information

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Configuring RADIUS Clients

Configuring RADIUS Clients CHAPTER 8 This chapter describes the following: Overview Adding RADIUS Clients Editing RADIUS Clients Deleting RADIUS Clients Overview Remote Authentication Dial In User Service (RADIUS) is an AAA (authentication,

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

SECURITY DOCUMENT. 550archi

SECURITY DOCUMENT. 550archi SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or

More information

Stripe Terminal Implementation Guide

Stripe Terminal Implementation Guide Stripe Terminal Implementation Guide 12/27/2018 This document details how to install the Stripe Terminal application in compliance with PCI 1 PA-DSS Version 3.2. This guide applies to the Stripe Terminal

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 8 Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the switch. IEEE 802.1x authentication prevents unauthorized

More information

Novell Filr 1.2 Administration Guide. November 2015

Novell Filr 1.2 Administration Guide. November 2015 Novell Filr 1.2 Administration Guide November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims

More information

Standard: Event Monitoring

Standard: Event Monitoring October 24, 2016 Page 1 Contents Revision History... 4 Executive Summary... 4 Introduction and Purpose... 5 Scope... 5 Standard... 5 Audit Log Standard: Nature of Information and Retention Period... 5

More information

KB How to Configure IPSec Tunneling in Windows 2000

KB How to Configure IPSec Tunneling in Windows 2000 Page 1 of 5 Knowledge Base How to Configure IPSec Tunneling in Windows 2000 PSS ID Number: 252735 Article Last Modified on 3/17/2004 The information in this article applies to: Microsoft Windows 2000 Server

More information

Network security session 9-2 Router Security. Network II

Network security session 9-2 Router Security. Network II Network security session 9-2 Router Security Network II Router security First line of defense of the network Compromise of a router can lead to many issues: Denial of network services Degrading of network

More information

User Manual. ARK for SharePoint-2007

User Manual. ARK for SharePoint-2007 User Manual ARK for SharePoint-2007 Table of Contents 1 About ARKSP (Admin Report Kit for SharePoint) 1 1.1 About ARKSP 1 1.2 Who can use ARKSP? 1 1.3 System Requirements 2 1.4 How to activate the software?

More information

Configuring 802.1X Port-Based Authentication

Configuring 802.1X Port-Based Authentication CHAPTER 10 This chapter describes how to configure IEEE 802.1X port-based authentication on the Catalyst 3750 switch. As LANs extend to hotels, airports, and corporate lobbies, creating insecure environments,

More information

Network Performance Analysis System. User Guide

Network Performance Analysis System. User Guide Network Performance Analysis System User Guide Copyrig ht Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

Active Directory Attacks and Detection

Active Directory Attacks and Detection Active Directory Attacks and Detection #Whoami Working as an Information Security Executive Blog : www.akijosberryblog.wordpress.com You can follow me on Twitter: @AkiJos This talk is Based on Tim Madin

More information

Updating The Operating System & User Accounts

Updating The Operating System & User Accounts U Updating he perating ystem & User Accounts P PAG YM UPA Update A minor revision to a software product, usually intended to address specific performance issues rather than add new features Upgrade A major

More information

HIPAA Controls. Powered by Auditor Mapping.

HIPAA Controls. Powered by Auditor Mapping. HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard

More information

Antivirus Solution Guide for Clustered Data ONTAP: Sophos

Antivirus Solution Guide for Clustered Data ONTAP: Sophos Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Sophos Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4309 Abstract An antivirus solution is key for enterprises

More information

How to Configure IPSec Tunneling in Windows 2000

How to Configure IPSec Tunneling in Windows 2000 Home Self Support Assisted Support Custom Support Worldwide Support How to Configure IPSec Tunneling in Windows 2000 The information in this article applies to: Article ID: Q252735 Last Reviewed: February

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services License Management Administrator s Guide December 2018 (release 18.11) Centrify Corporation Legal Notice This document and the software described in this document are furnished

More information

Managing Security for the Analyst Software on Stand-alone Windows 7 Workstations Blair C. James, Patrick Quinn-Paquet

Managing Security for the Analyst Software on Stand-alone Windows 7 Workstations Blair C. James, Patrick Quinn-Paquet WHITE PAPER Analyst Software Validation Service Managing Security for the Analyst Software on Stand-alone Windows 7 Workstations Blair C. James, Patrick Quinn-Paquet Managing Security for the Analyst Software

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

HT812/HT814 Firmware Release Note IMPORTANT UPGRADING NOTE

HT812/HT814 Firmware Release Note IMPORTANT UPGRADING NOTE HT812/HT814 Firmware Release Note IMPORTANT UPGRADING NOTE Once HT812/HT814 is upgraded to 1.0.3.2 or above, downgrading to 1.0.2.x firmware version or lower is not supported. Once HT812/HT814 is upgraded

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

Windows Server 2008 Training

Windows Server 2008 Training Windows Server 2008 Training Day -4 Vijay Bhalerao BCS, MCM, CISA, DCL,MCTS, ISO 27001 LA univijay2001@yahoo.com 1 Day-4 Troubleshooting AD & issues- Solutions Server Security Measures - Installation &

More information