More about Windows OS Security

Similar documents
How To Remove Personal Antivirus Security Pro Virus Windows 8

How To Remove Personal Antivirus Security Pro Virus Manually

Introduction to Information Security Dr. Rick Jerz

MODERN DESKTOP SECURITY

Seqrite Endpoint Security

Avg Antivirus Manual Latest Version 2013 For Xp

Manually Remove Of Xp Internet Security Protect

How To Removing Personal Antivirus Security Pro From Windows 8

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

Free antivirus software download

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro

Airtel PC Secure Trouble Shooting Guide

Schematic Antivirus For Windows 7 64 Bit Full Version

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days

Cyber Essentials Questionnaire Guidance

How To Remove Personal Antivirus Security Pro Virus

Manually Remove Of Xp Internet Security Pro Virus Windows 7

Ceedo Client Family Products Security

How To Remove Software Manually Windows Xp Password Login

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Activation Screen Virus

Get BitDefender Client Security 2 Years 30 PCs software suite ]

How To Remove Personal Antivirus Security Pro From Registry

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Discount Bitdefender Security for SharePoint website for free software ]

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

Seqrite Antivirus for Server

Tanium Protect User Guide. Version 1.9.3

Protection Against Malware. Alan German Ottawa PC Users Group

How To Remove A Virus Manually Windows 7 Laptop Using Antivirus Program

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

12/5/2013. work-life blur. more mobile. digital generation. multiple devices. tech. fast savvy

TRAPS ADVANCED ENDPOINT PROTECTION

Norton Internet Security 2008 Manual Uninstall Tools

UTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution

Enterprise Ransomware Mitigations

Firewall Antivirus For Windows Xp Avast 2012 With Key

AT&T Endpoint Security

CIS Controls Measures and Metrics for Version 7

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Symantec Multi-tier Protection

ESET Secure Business. Simple and Straightforward

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Schematic Antivirus For Windows 8 64 Bit Full Version

CIS Controls Measures and Metrics for Version 7

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Windows 10 Security & Audit

9 Steps to Protect Against Ransomware

Avg Antivirus Manual 2013 Full Version For Windows 7

Maximum Security with Minimum Impact : Going Beyond Next Gen

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

for businesses with more than 25 seats

Schematic Antivirus For Windows Bit Full Version

Comodo IT and Security Manager Software Version 6.6

Trend Micro OfficeScan Client User Guide

Manual Removal Norton Internet Security Won't Open Or

For Businesses with more than 25 seats.

Course Outline (version 2)

MIGRATING FROM WINDOWS XP

MESSAGING SECURITY GATEWAY. Solution overview

Best Practices. Kevin Chege

Symantec Protection Suite Add-On for Hosted Security

Identity & Access Management

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

How To Remove A Virus Manually Windows 7

How To Remove Security Shield 2012 Virus Manually

Modern Realities of Securing Active Directory & the Need for AI

Norton Internet Security 2011 Removal Tool Windows 7

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Office 365 Buyers Guide: Best Practices for Securing Office 365

for businesses with more than 25 seats

Manually Remove Of Xp Internet Security Protect Virus Manually

Computer Network Vulnerabilities

Massive Attack WannaCry Update and Prevention. Eric Kwok KL.CSE

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

PRACTICING SAFE COMPUTING AT HOME

Hardening the Modern Windows Client Let s NOT break it this time

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

whitepaper: Whitelisting Without The Complexity

Installation Manual. and User Guide

Get Bitdefender Security for Mail Servers online software downloads ]

Free antivirus software download windows 10

Real Fast PC. Real Fast PC Win 7.

Comodo Client Security Software Version 11.1

rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

ConnectWise Automate. What is ConnectWise Automate?

Stop Ransomware In Its Tracks. Chris Chaves Channel Sales Engineer

Manual Internet Explorer 10 Xp Vista Full. Version >>>CLICK HERE<<<

Tanium Protect User Guide. Version 1.2.0

How To Delete Avira Antivirus From My >>>CLICK HERE<<<

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Comodo Unknown File Hunter Software Version 2.1

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

CS 356 Operating System Security. Fall 2013

Transcription:

OPC Presentation 10-31-17 More about Windows OS Security By Len Groth

PC Security by Listing Blacklisting Greylisting Whitelisting

Blacklisting* (in Computing) A Blacklist is an access control system that denies entry to a specific list of users, programs, or network addresses* Security technologies such as antivirus or other malware which prevents known bad activity & permits all others Requires virus signature code to identify Requires continuous updating of signature codes Zero Day Vulnerability: There can be a delay between appearance of virus and signature code Personally Use: Avast antivirus & Malwarebytes, Glary Utilities *Source: Wikipedea

Verifying Good Software Sysinternals Utilities: Check for Software Verification & for Viruses Download URL https://docs.microsoft.com/en-us/sysinternals/downloads/ Download entire suite or specific files Live Service URL https://live.sysinternals.com/ Run a program from the web Very useful Sysinternals Programs: Autoruns Demo ProcExp Demo

Multi Antivirus Scan Virus Total website: Upload & scan File Search or Scan a URL Search a URL, IP Address, Domain, or File hash https://www.virustotal.com/#/home/upload Demos Good File Virus

User Account Control (UAC):* UAC is a technology and security infrastructure introduced by MS in Windows Vista. UAC is also in Windows 7, 8 and 10 Aims to improve the security of Windows, by limiting application software to standard user privileges until an administrator authorizes and increase or elevation (in privileges). In this way applications trusted by the user may receive admin privileges, and malware should be kept from compromising the operating system. * Source: Wikipedia

UAC continued:* User Account Control asks for credentials in a Secure Desktop mode, where the entire screen is temporarily dimmed, Windows Aero disabled, and only the authorization window at full brightness, to present only the elevation user interface (UI). Normal applications cannot interact with the Secure Desktop. This helps prevent spoofing, such as overlaying different text or graphics on top of the elevation request, or tweaking the mouse pointer to click the confirmation button when that's not what the user intended. If an administrative activity comes from a minimized application, the secure desktop request will also be minimized so as to prevent the focus from being lost. It is possible to disable Secure Desktop, though this is inadvisable from a security perspective. UAC Demo *Source: Wikipedia

Grey-/Graylisting Greylisting:* Greylisting is a method of defending e-mail users against spam. A mail transfer agent using greylisting will temporarily reject any email from a sender it does not recognize. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted. Thunderbird has ways to filter scam or block a sender Graylisting:** A graylist is a list of of entities that have not yet been established as benign or malicious and more info is needed to move graylist items to blacklists or whitelists. *Source: Wikipedia ** Guide to Application Whitelisting, NIST Special Pub. 800-167

Whitelisting (in Computing): Permitting only specific known good software to run on a PC that has been identified by the Whitelist. Thought by some to be more effective than blacklisting in stopping unknown malware threats where signature code is not known. Experts recommend use of both whitelisting and blacklisting: e.g. use of a Whitelist and Antivirus. Using both methods is better than just one. Note: Expert hackers can get around both

Whitelisting Methods: Apps from Apple store, since Apple verifies the integrity of the Apps software. Same for Microsoft Store Apps Microsoft AppLocker: Available in Win 7, 8, 10 Win 7: Professional, Enterprise, Ultimate Win 8: Enterprise Win 10: Enterprise and Education How to Find Applocker in Windows 7 or 10: secpol.msc Special Software

Whitelisting continued. Windows 7, 8, 10, Versions Pro and above allow whitelisting using the Security Policy Editor Using Windows Security Policy Editor: Bleepingcomputer.com/Tutorial Whitelisting in Windows Home needs special software: CryptoPrevent (free and premium versions) CryptoPrevent Demo Note: Before running CryptoPrevent make sure your system is clean!!!

Some points on CryptoPrevent It is a Security Supplement It works along side Anti Virus Prgrams It is not a replacement for Anti-Virus, and Firewalls Backups CryptoPrevent Manual Best Practices for Avoiding Malicious Software

Some Useful Programs I Use IOBit Uninstaller Aomei Partion Assistant CPUID Monitor DrvBk.exe Self Driving Vehicle Law