123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

The Process: Designing A Strategy For Hardening Clients

Profile Picture
By Author: Jasmine
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Client computers are hardened by configuring security settings and securing applications. To design Designing exam strategy for Windows 2000 and Windows XP Professional client computers, security designers follow a process like this one:
1.Design baseline and incremental security templates for each OU.
2.Design administrative templates for each OU.
3.Design software restriction policies for each OU.
4.Design an implementation strategy for security templates, administrative templates, and software restriction policies.
The folio-wing topics teach what you need to know to complete these steps.
System monitoring Consider allowing only Administrators to have the Profile Single Process right. This right allows users to use monitoring tools for system performance. It is not necessary in order to use the System Monitor. Llowever, if the System Monitor is used to collect data using Windows Management Instrumentation (WMI), sensitive information might be available Free Security+ practice exams ...
... that would assist an attacker.Restricting this right to Administrators prevents all others from obtaining that data.
Backup and restore Consider splitting these rights by giving the right to back up files and directories only to Backup Operators and reserving for Administrators the right to Restore Files And Directories. A user who has the Restore Files And Directories right can restore an old backup over current information and thus destroy the current data. Backup Operators have access to backup tapes and disks. By restricting the Restore right to Administrators, you prevent rogue backup operators from accidentally or maliciously damaging systems.
Audit policies Consider the need for audit records on the client system. Audit records on client systems might be perceived to be of less importance than those on server systems. However, the value of audit records is twofold. One value is their ability to assist in intrusion detection. The other is to determine what happened, who did what, and when something happened. Therefore, you should consider 70-680 enabling auditing. Table 11-1 lists recommendations for auditing for Windows clients.

Total Views: 308Word Count: 318See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: