Website under construction



Download 13,37 Mb.
Pdf ko'rish
bet107/131
Sana27.03.2022
Hajmi13,37 Mb.
#512480
1   ...   103   104   105   106   107   108   109   110   ...   131
Bog'liq
9780735697744 Introducing Windows Server 2016 pdf

Time frame 
Description 
Short term 
2- to 4-week plan 
Quick mitigation of the most frequently used attacks 
Medium term 
1- to 3-month plan 
Build visibility and control of administrative activity 
Long term 
6 months and beyond Build a proactive security posture 
Short-term plan 
For the short-term goal, it is critical that you mitigate the most frequently used attacks in any 
organization to provide a secure base. 
One of the first things you need to do is to establish separation of duties. This means that if you need 
to perform a privileged-access task, you should have an appropriate privileged-access account to 
carry it out. You should never grant your standard user account privileged access in a network to 
perform tasks. This account should always be considered a user. The privileged-access account you 
create for tasks can be audited and tracked in more detail. Because you maintain a different set of 


120 
CHAPTER 4 | Security and identity 
credentials for this account with stricter requirements, you will be able to mitigate an attack if your 
user account is compromised. 
Securing the local administrator account was previously done during deployment and was rarely 
changed after it was set. The password was usually kept the same throughout the entire estate of 
workstations, which led to a huge problem if the password was compromised. However, if you don’t 
use the same password throughout the estate, you might have a more complicated problem trying 
to remember the unique password for each of the workstations. To help you manage the local 
administrator password for both workstations and servers, Microsoft provides a tool called Local 
Administrator Password Solution (LAPS). 
LAPS creates a unique password for each server and workstation in an environment and stores them 
in Active Directory as a confidential attribute in the computer object. They have an appropriate access 
control list applied to them so that only the appropriate accounts can access them and retrieve them 
as necessary. For more information on LAPS, go to 
http://aka.ms/LAPS.
 
The final key part of the short-term goals should be focused around creating Privileged-Access 
Workstations (PAWs). PAWs are hardened workstations implemented specifically to act as a controlled 
point of administration to more secure systems. PAWs would be restricted from accessing the Internet 
or unsecure resources, ensuring that their attack surface is held to an absolute minimum. Only a 
restricted set of authorized users would also be able to sign in to the PAWs, which in turn would 
reduce the ability to attack secure part of the networks. For more information on PAWs, go to 
http://aka.ms/CyberPAW.
Figure 4-3 illustrates the steps that you can take as part of your short-term plan. 

Download 13,37 Mb.

Do'stlaringiz bilan baham:
1   ...   103   104   105   106   107   108   109   110   ...   131




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish