Title: Module 9: Implementing Windows 2000 Security
1Module 9 Implementing Windows 2000 Security
2Overview
- Securing Desktops and Services by Using Security
Policies - Auditing Access to System Resources
3Securing Desktops and Services by Using Security
Policies
- Implementing Security Policies
- Modifying Security Settings
- Using Predefined Security Templates
- Creating Custom Security Templates
- Analyzing Security
- Configuring and Analyzing Security from a Command
Line
4Implementing Security Policies
5Modifying Security Settings
6Using Predefined Security Templates
7Creating Custom Security Templates
Add the Security Template snap-in to MMC
Select the template to customize
Configure the new policy settings
Save the new configuration
8Analyzing Security
9Configuring and Analyzing Security from a Command
Line
C\WINNT\System32\cmd.exe
C\gtcd windir\security\database
C\WINNT\security\Databasegtsecedit /configure
/db mysecure.sdb /areas FILESTORE /Log
C\WINNT\security\logs\MySecure.Log /verbose
FILESTORE
Task is completed successfully. See log
C\WINNT\security\logs\MySecure.Log for detail
info.
- /analyze
- /configure
- /export
- /refreshpolicy
- /validate
- /areas
10 Lab A Configuring Windows 2000 Security
Settings
11Auditing Access to System Resources
- Introduction to Auditing
- Selecting Events to Audit
- Planning an Audit Policy
- Setting Up an Audit Policy
- Auditing Access to Resources
12Introduction to Auditing
- Auditing Tracks User and Operating System
Activities - Audit Entries Contain Actions Performed, Users
Who Performed the Actions, and Success or Failure
of the Events - Audit Policy Defines the Types of Security Events
That Windows 2000 Records - You Set Up an Audit Policy to Track Success or
Failure of Events, Identify Unauthorized Use of
Resources, and Maintain a Record Activity - You View Security Logs in Event Viewer
13Selecting Events to Audit
14Planning an Audit Policy
15Setting Up an Audit Policy
- Assign Security Settings to a Single Computer by
Configuring the - Settings in Local Policies in Group Policy
- Assign Security Settings to Multiple Computers by
Creating a Group Policy Object and Assigning It
16Auditing Access to Resources
File System
- Set the Audit Policy to Audit Object Access
- Enable Auditing for Specific NTFS Files and
Folders - Record Success or Failure of an Event
17 Lab B Configuring Auditing
18Review
- Securing Desktops and Services by Using Security
Policies - Auditing Access to System Resources