Website under construction


Figure 4-3: Short-term goal plan  The figure shows four separate areas:  1



Download 13,37 Mb.
Pdf ko'rish
bet108/131
Sana27.03.2022
Hajmi13,37 Mb.
#512480
1   ...   104   105   106   107   108   109   110   111   ...   131
Bog'liq
9780735697744 Introducing Windows Server 2016 pdf

Figure 4-3:
Short-term goal plan 
The figure shows four separate areas: 
1.
Create a separate administrator account for administrative tasks as shown with the Admin User. 
2.
Deploy PAWs for Active Directory administrators. For more information, go to 
http://aka.ms/cyberPAW
, where this step is shown as Phase 1. 
3.
Create unique LAPS for workstations. For more information, go to 
http://aka.ms/LAPS

4.
Create unique LAPS for servers. For more information, go to 
http://aka.ms/LAPS

Medium-term plan 
The first thing you need to do for your medium-term plan is to expand the deployment of PAWs so 
that you can bring more systems into scope, which you can manage only from these workstations. 


121 
CHAPTER 4 | Security and identity 
Following on from that, you should begin to focus on implementing time-bound privileges; that is, a 
user can request privileges that will expire after a predefined period of time. This means that there 
does not need to be actual administrators, as such, because the users can request the access they 
need, be approved, and perform the necessary tasks. This concept is based on Microsoft Identity 
Manager and functions provided by JEA. 
You also should implement multifactor authentication for privileged access to further mitigate attacks 
on the systems. You can do this by using token-based security or call-back or smart cards. Next, you 
can begin to implement JEA. JEA is simple in principle because it specifies that you grant the very 
minimal amount of privileges to an account that are needed to perform the given function. We will 
talk about JEA in more detail later in this chapter. 
Further securing domain controllers is the next step, and you will finish by implementing threat 
detection via Advanced Threat Analytics (ATA). ATA provides the ability to detect abnormal behavior 
in your systems and make you aware of them quickly. It does this by profiling your user’s behavior 
and establishing what that user’s normal patterns are. If the user does something outside this normal 
pattern, ATA will alert you. ATA is far more advanced than this simple explanation implies. To learn 
more about it, go to 
http://aka.ms/ata

Figure 4-4 presents an illustrated overview of the medium-term plan. 

Download 13,37 Mb.

Do'stlaringiz bilan baham:
1   ...   104   105   106   107   108   109   110   111   ...   131




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish