0% found this document useful (0 votes)
3 views32 pages

CSCU-Module-02-Securing-Operating-Systems-PART 2

The document provides detailed instructions on various Windows security features, including Encrypting File System (EFS), BitLocker, Windows Defender, and Event Viewer. It also covers methods for managing system performance by disabling unnecessary services, killing unwanted processes, and configuring audit policies. Additionally, it discusses tools for enhancing security, such as Microsoft Security Essentials, KeePass, and Registry Mechanic.

Uploaded by

dhamardominic
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views32 pages

CSCU-Module-02-Securing-Operating-Systems-PART 2

The document provides detailed instructions on various Windows security features, including Encrypting File System (EFS), BitLocker, Windows Defender, and Event Viewer. It also covers methods for managing system performance by disabling unnecessary services, killing unwanted processes, and configuring audit policies. Additionally, it discusses tools for enhancing security, such as Microsoft Security Essentials, KeePass, and Registry Mechanic.

Uploaded by

dhamardominic
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Windows Encrypting File System (EFS)

Windows Encrypting File System (EFS) allows


Windows 7 system users to encrypt files and folders
in an NTFS formatted disk drive
Right‐click the file to be encrypted  select
Properties on the General tab  click the Advanced
button. The Advanced attributes dialog box appears.
There are two options under Compress or Encrypt
attributes, Compress contents to save disk space
and Encrypt contents to secure data
Select Encrypt contents to secure data  click OK to
close the Compress or Encrypt Attributes dialog box
 click Apply
An Encryption Warning dialog box appears, check
any of the two options: Encrypt the file and its
parent folder and Encrypt the file only  click OK

41 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Decrypt a File Using EFS in
Windows?
• Right‐click the file to be decrypted 
select Properties
• On the General tab, click the
Advanced button. An Advanced
Attributes dialog box appears
• There are two options under
Compress or Encrypt Attributes,
Compress contents to save disk space
and Encrypt contents to secure data
• Uncheck Encrypt contents to secure
data  click OK to close the
Compress/Encrypt Attributes dialog
box  apply the settings  click OK

42 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Using Windows Defender
Windows Defender is an antispyware software that offers real‐time protection against spyware and other potentially
malicious programs infecting the computer
To turn Windows Defender ON or OFF  open Windows Defender by clicking the Start button  click All Programs  click
Windows Defender or type Windows Defender in the search space
Click Tools  click Options  click Administrator  select or clear the Use Windows Defender check box  click Save

43 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Enable BitLocker in Windows 7
1. BitLocker Drive Encryption provides better data protection by encrypting an entire Windows operating system
volume
2. The hard drive and any removable media on the computer can be encrypted
3. Encrypted removable media can be decrypted and re‐encrypted on any Windows 7 computer
4. Click Start  click Computer  Right click on any drive and select the option Turn on BitLocker…

Note: BitLocker is available only in the Enterprise and Ultimate editions of Windows Vista and Windows 7

44 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Launching Event Viewer in
Windows 7
Event Viewer is a built‐in Windows utility that allows users to view and manage the event logs, gather
information about hardware and software problems, and monitor Windows security events
To start Event Viewer in Windows 7  click Start  Control Panel  System and Security
Administrative Tools  Event Viewer

Windows XP Windows 7

45 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Event Viewer: Events 1. Event Viewer categorizes events into five types:
Error, Warning, Information, Audit Success, and
and How to Read Logs Audit Failure
2. Each event log is differentiated by its level and
on the System contains header information and a description of
the event
3. Each event header contains a detailed description
of the level, date, time, source, event ID, and task
category

46 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Disabling Unnecessary Services in
Windows 7
A service is a long‐running executable that
performs specific functions without
requiring any user intervention
Services normally start during the system
start up or booting
Some services load automatically, while
others are called when a program is used
To view running services, click Start 
Control Panel  Administrative Tools 
double‐click Services
Alternatively, select Start  type
services.msc in search bar  press ENTER
Once the Services window is loaded, the
user can turn off any unneeded services

47 Copyright © by EC-
Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Killing Unwanted Processes
Kill or terminate unnecessary and suspicious processes to increase system performance and protect system
against malwares

Killing a process
Press [Alt]+ [Ctrl] + [Del] keys simultaneously  click
Task Manager

In Task Manager go to Processes tab  select the


Process  click End Process

Alternatively, right click on a selected target process


 select End Process

Killing a Process Tree


Run the Task Manager  select the target process 
right‐click and select End Process Tree

48 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Finding Open Ports Using Netstat Tool
Knowing open ports, and services and applications associated with these ports helps in detecting the presence
of malware such as virus, worms, Trojans, etc. in the system
Malware generally open ports to receive or send data packets from attackers
Netstat, a Windows inbuilt utility, can be used to determine open ports in the system and associated
applications
Click Start  All Programs  Accessories, right‐click Command Prompt, and then click Run as administrator.
Type the password or provide confirmation if prompted
Type netstat –b in the command prompt window to see the open ports and associated applications

49 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Audit Policy
Audit policies should be configured to identify attempted or successful attacks on system and network

1. Click Start  type secpol.msc in


search bar, and press Enter

2. Click Local Policies  select Audit


Policy  double‐click the Audit
account logon events policy 
check the Success and Failure boxes
 click Apply  click OK

3. Similarly, change the security


setting for all the policies listed in
the right hand pane of Local
Security Policy window
4. Close the Local Security Policy
window

50 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Hide Files and Folders?
Right‐click the file or folder to be hidden  click Properties  under Attributes
check Hidden  click Apply  click OK
On the Organize menu from Windows Explorer  click Folder and search options
On the View tab, Select the Do not show hidden files and folders option

51 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Disable Simple File Sharing in
Windows
1. Go to Start  Control Panel  Folder
Options
2. From the Folder Options window 
select the View tab
3. Scroll to the bottom of the Advanced
Settings pane
4. Uncheck the checkbox for Using
sharing wizard (for Windows 7) 
click OK

52 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Raise the UAC Slider Bar in Windows 7
User Account Control (UAC) helps the user to make critical decisions while installing software
Click Start  Control Panel  Action Center  Change User Account Control Settings 
Raise/Adjust the UAC slider bar to Always notify

53 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Guidelines for Securing
System Security
Mac OS X

Windows Security Threats to System


Tools Security

Windows Encrypting How Does


File System (EFS) Malware Propagate?

Guidelines for Windows OS Security

54 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security Tools: Microsoft
Security Essentials

Microsoft Security Essentials


provides real‐time protection
for a home PC that guards
against viruses, spyware, and
other malicious software

http://www.microsoft.com

55 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security Tools: KeePass
Password Safe Portable
KeePass is a password
manager that manages
passwords in a secure way
and carries all passwords in
one database, which is locked
with one master key or a
key‐disk

The databases are encrypted


using current known secure
encryption algorithms (AES‐
256 and Twofish)

http://portableapps.com

56 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security Tools: Registry
Mechanic
1. Registry Mechanic offers tools to speed up and improve the stability of Windows7, Windows Vista, or
Windows XP PC
2. Registry Mechanic safely cleans, repairs, and optimizes the registry and automatically backs up changes
for future recovery
3. Permanently erases Internet activity, personal files, and free space to keep information away from
prying eyes

http://www.pctools.com

57 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security Tools:Windows
Defender
Windows Defender helps protect a
computer against pop‐ups, slow
performance, and security threats
caused by spyware and other
unwanted software by detecting and
removing known spyware from a
computer

http://www.microsoft.com

58 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Guidelines for Securing
System Security
Mac OS X

Windows Security Threats to System


Tools Security

Windows Encrypting How Does


File System (EFS) Malware Propagate?

Guidelines for Windows OS Security

59 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 1: Enabling and Locking Down the
Login Window
Click Apple menu  System
Preferences  Accounts 
Login options  Display Login
Windows as  Name and
Password
Uncheck Automatically login as:
 Check Hide the Sleep, Restart,
and Shut Down buttons
 Uncheck Enable fast users
switching if not used

60 Copyright © byEC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 2: Configuring Accounts
Preferences
From the Apple menu choose System
Preferences  from the View menu
choose Accounts  select the username
whose password you want to change
Click Reset Password (Mac OS X v10.3 and
v10.4) or Change Password (Mac OS X
v10.5 or later)
Enter a new password in both the
Password and Verify fields  click the
Reset Password (Mac OS X v10.3 and
v10.4) or the Change Password (Mac OS X
v10.5 or later)
If a dialog box appears with the message
Your Keychain password will be changed
to your new account password,  click
OK

61 Copyright © by EC-
Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 3: Guidelines for Creating
Accounts
Never create accounts Each user should have his or
that are shared by her own standard or
several users managed account

Administrators should only


Individual accounts are
use their administrator
necessary to maintain
accounts for administration
accountability
purposes

62 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 4: Securing the Guest Account
The guest account must be used for
temporary access to the system

The guest account should be


disabled by default as it does not
require a password to login to the
computer

If the guest account is enabled,


Enable Parental Controls to limit
what the user can do
If the user permits the guest
account to access shared folders, an
attacker can easily attempt to
access shared folders without a
password

63 Copyright © by EC-
Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 5: Controlling Local Accounts
with Parental Controls
Network
Traffic Analysis
Open System Preferences  click
Accounts
If the lock icon is locked  click the
lock icon and provide an
Administrator name and Password
Select the user account to be
managed with parental controls 
select the Enable Parental Controls
checkbox
Click Open Parental Controls  click
System, Content, Mail & iChat, Time
Limits, and Logs

64 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 6: Use Keychain Settings
Keychain stores passwords on the disk in an encrypted form and it is difficult for a non‐root user to
sniff a password between applications
Go to Applications  Utilities  Keychain Access  Edit  Change settings for Keychain "login"
Check Lock after  change minutes of inactivity to the desired number of minutes  check Lock
when sleeping  click Save

65 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 7: Use Apple Software Update
Mac OS X includes an automatic software update tool to patch the majority of Apple applications
Software Update often includes important security updates that should be applied to a user’s machine
To update software :
 Open Software Update preferences  click the Scheduled Check pane
 Deselect Download updates automatically  click Check Now

66 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 8: Securing Date & Time Preferences
1. Open Date & Time preferences  in the Date & Time pane, enter a secure and trusted
NTP server in the Set date & time automatically field

2. Click the Time Zone button  choose a Time Zone

67 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 9: Securing Network Preferences
It is recommended to disable unused
hardware devices listed in Network
preferences
Open Network preferences  from the
list of hardware devices, select the
hardware device that connects one’s
network
From the Configure pop‐up menu,
choose Manually
Enter the user’s static IP address, Subnet
Mask, Router, DNS Server, and Search
Domain configuration settings
Click Advanced  in the Configure IPv6
pop‐up menu, choose Off  click OK

68 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 10: Enable Screen Saver Password
To prevent unauthorized access to a system, enable a screen saver password

1. From the Apple menu  select System


Preferences  click Security  click the Lock
icon to make changes
2. If prompted, type the admin userid and
password
3. In the Security window  click the General
tab  check Require password to wake this
computer from sleep or screen saver (Leopard)
or Require password immediately after sleep
or screen saver begins (Snow Leopard)
4. In addition to the screen saver password, also
secure the system by selecting:
 Disable automatic login
 Require password to unlock each System
Preference.
 Use secure virtual memory
 Click the lock icon to prevent further changes
 Close the Security window and restart your
machine

69 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 11: Set Up FileVault to Keep
Home Folder Secure
Click System Preferences  click
Security  click FileVault 
click Set Master Password
Create the master password for
the computer but ensure this
password is different from user
account password
Verify the password  click OK

70 Copyright © by EC-
Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 12: Firewall Security
Mac OS X firewall blocks unwanted network
communication with the computer:
1. Click System Preferences  click Security  click
Firewall
2. Click the Lock Icon to make changes
3. If prompted, type the admin userid and password
4. By default, the firewall allows all incoming
connections, change the option by clicking the
second option (Allow only essential services) or
third option (Set access for specific services and
applications)
5. Choose which application(s) you want the firewall
to allow and which to block
6. Click the lock icon to prevent further changes and
close the Security window

71 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Summary

 Attackers discover new vulnerabilities and bugs to exploit in computer software


 Software vendors usually develop patches to address the problems
 Encryption is the process of converting data into a secret code
 Regularly update the operating system and other applications
 Windows System Restore is used to return one’s computer to an earlier state in
case of a system failure or other major problem with the system
 Microsoft Security Essentials provides real‐time protection for the PC that guards
against viruses, spyware, and other malicious software
 Windows Defender helps to protect the system against pop‐ups, slow performance,
and security threats

73 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like