RMC+MO+Data+&+Network+Security+10 1+-+User+Device+Security
RMC+MO+Data+&+Network+Security+10 1+-+User+Device+Security
Network Security
Section 10.1:
User Device
Security
Log in to the Cyber Range & open the
Windows machine (target.example.com) in
the LCPS Cyber exercise
environment
Open the Windows
Server 2019 virtual
machine
(target.example.com)
Unit Learning Objectives
• Background Scanning
– Also known as on-access scanning
– Scans all the files that you open (programs, files being opened by
programs)
– Gives real-time protection, safeguarding the computer from
threats & other malicious attacks
• Full System Scans
– Scans your entire system, starting with the boot record, then
every file
– Normally done when antivirus software is initially installed and
when antivirus software is updated (ensures your system hasn’t
been infected with malware unknown prior to update)
Antivirus Software Features
(continued)
• Virus Definitions
– Malware definitions contain signatures for new
viruses and malware considered “wild”
– If malware is detected, the antivirus software
terminates the file from executing & pushes it
to quarantine
– Malware definitions must be kept up-to-date
Methods for Employing
Antivirus Software
• Application built into operating system
– Windows Defender®
– Built-in malware protection in Apple’s
Mac® Operating System (Gatekeeper,
Xprotect, malware removal tool)
• Separate application installed on an
operating system (normally must be
purchased)
– Norton Antivirus®
– McAfee Antivirus®
– Kaspersky Antivirus®
– Others
Where is Antivirus
Software Installed?
• Host-Based
– Installed on the actual device (computer, mobile
device, etc.)
• Network-Based
– Installed on servers or perimeter firewall
– Designed to stop viruses, worms, etc., at the
perimeter of the network before they can even get
to the individual machines on the network
Section 10.1.3
Hardening the
Device
You should already be in the
Windows Server 2019
(target.example.com)
virtual machine.
Access the Windows
Administrative Tools
• Click on the Windows
icon in the lower left
of the terminal
window.
1. Click the Windows Icon
2.
first.
Select Windows
• Click on the Windows
Administrative Tools
Administrative Tools
button.
Access the Local
Security Policy Options
• Double-click on
the Local
Security Policy
option.
Access the Password
Policy Settings
• Click on the
drop-down arrow
for Account
Policies.
• Click on Password
Policy to display the
password policies in
the pane on the
right.
Each Property has two tabs: the Setting tab &
the Explain tab. You can click the Explain Tab to
get explanation of the specific setting.
Enforce Password History
• This security setting determines the minimum password length for which
password length audit warning events are issued. This setting may be
configured from 1 to 128.
• You should only enable and configure this setting when trying to
determine the potential impact of increasing the minimum password
length setting in your environment.
• If this setting is not defined, audit events will not be issued.
• If this setting is defined and is less than or equal to the minimum
password length setting, audit events will not be issued.
• If this setting is defined and is greater than the minimum password
length setting, and the length of a new account password is less than this
setting, an audit event will be issued.
• Leave as undefined and click Cancel.
Password Must Meet
Complexity Requirements
• This security setting determines whether passwords
must meet complexity requirements.
• If this policy is enabled, passwords must meet the
following minimum requirements:
– Not contain the user's account name or parts of the
user's full name that exceed two consecutive characters
– Be at least six characters in length
– Contain characters from three of the following four
categories:
• English uppercase characters (A through Z)
• English lowercase characters (a through z)
• Base 10 digits (0 through 9)
• Non-alphabetic characters (for example, !, $, #, %)
• Complexity requirements are enforced when
passwords are changed or created.
• Keep the setting as Enabled and click Ok.
Store Passwords Using
Reversible Encryption
• This security setting determines whether the
operating system stores passwords using
reversible encryption.
• Storing passwords using reversible encryption is
essentially the same as storing plaintext
versions of the passwords since the encryption
can be cracked.
• By disabling this option, the hashes of the
passwords are stored, making them more
secure.
– Note: Disabling does not mean passwords are
stored as plaintext.
• Keep this setting as Disabled and click Ok.
Account Lockout Policy