CSCU-Module-02-Securing-Operating-Systems-PART 2
CSCU-Module-02-Securing-Operating-Systems-PART 2
41 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Decrypt a File Using EFS in
Windows?
• Right‐click the file to be decrypted
select Properties
• On the General tab, click the
Advanced button. An Advanced
Attributes dialog box appears
• There are two options under
Compress or Encrypt Attributes,
Compress contents to save disk space
and Encrypt contents to secure data
• Uncheck Encrypt contents to secure
data click OK to close the
Compress/Encrypt Attributes dialog
box apply the settings click OK
42 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Using Windows Defender
Windows Defender is an antispyware software that offers real‐time protection against spyware and other potentially
malicious programs infecting the computer
To turn Windows Defender ON or OFF open Windows Defender by clicking the Start button click All Programs click
Windows Defender or type Windows Defender in the search space
Click Tools click Options click Administrator select or clear the Use Windows Defender check box click Save
43 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Enable BitLocker in Windows 7
1. BitLocker Drive Encryption provides better data protection by encrypting an entire Windows operating system
volume
2. The hard drive and any removable media on the computer can be encrypted
3. Encrypted removable media can be decrypted and re‐encrypted on any Windows 7 computer
4. Click Start click Computer Right click on any drive and select the option Turn on BitLocker…
Note: BitLocker is available only in the Enterprise and Ultimate editions of Windows Vista and Windows 7
44 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Launching Event Viewer in
Windows 7
Event Viewer is a built‐in Windows utility that allows users to view and manage the event logs, gather
information about hardware and software problems, and monitor Windows security events
To start Event Viewer in Windows 7 click Start Control Panel System and Security
Administrative Tools Event Viewer
Windows XP Windows 7
45 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Event Viewer: Events 1. Event Viewer categorizes events into five types:
Error, Warning, Information, Audit Success, and
and How to Read Logs Audit Failure
2. Each event log is differentiated by its level and
on the System contains header information and a description of
the event
3. Each event header contains a detailed description
of the level, date, time, source, event ID, and task
category
46 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Disabling Unnecessary Services in
Windows 7
A service is a long‐running executable that
performs specific functions without
requiring any user intervention
Services normally start during the system
start up or booting
Some services load automatically, while
others are called when a program is used
To view running services, click Start
Control Panel Administrative Tools
double‐click Services
Alternatively, select Start type
services.msc in search bar press ENTER
Once the Services window is loaded, the
user can turn off any unneeded services
47 Copyright © by EC-
Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Killing Unwanted Processes
Kill or terminate unnecessary and suspicious processes to increase system performance and protect system
against malwares
Killing a process
Press [Alt]+ [Ctrl] + [Del] keys simultaneously click
Task Manager
48 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Finding Open Ports Using Netstat Tool
Knowing open ports, and services and applications associated with these ports helps in detecting the presence
of malware such as virus, worms, Trojans, etc. in the system
Malware generally open ports to receive or send data packets from attackers
Netstat, a Windows inbuilt utility, can be used to determine open ports in the system and associated
applications
Click Start All Programs Accessories, right‐click Command Prompt, and then click Run as administrator.
Type the password or provide confirmation if prompted
Type netstat –b in the command prompt window to see the open ports and associated applications
49 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Configuring Audit Policy
Audit policies should be configured to identify attempted or successful attacks on system and network
50 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Hide Files and Folders?
Right‐click the file or folder to be hidden click Properties under Attributes
check Hidden click Apply click OK
On the Organize menu from Windows Explorer click Folder and search options
On the View tab, Select the Do not show hidden files and folders option
51 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Disable Simple File Sharing in
Windows
1. Go to Start Control Panel Folder
Options
2. From the Folder Options window
select the View tab
3. Scroll to the bottom of the Advanced
Settings pane
4. Uncheck the checkbox for Using
sharing wizard (for Windows 7)
click OK
52 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Raise the UAC Slider Bar in Windows 7
User Account Control (UAC) helps the user to make critical decisions while installing software
Click Start Control Panel Action Center Change User Account Control Settings
Raise/Adjust the UAC slider bar to Always notify
53 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Guidelines for Securing
System Security
Mac OS X
54 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security Tools: Microsoft
Security Essentials
http://www.microsoft.com
55 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security Tools: KeePass
Password Safe Portable
KeePass is a password
manager that manages
passwords in a secure way
and carries all passwords in
one database, which is locked
with one master key or a
key‐disk
http://portableapps.com
56 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security Tools: Registry
Mechanic
1. Registry Mechanic offers tools to speed up and improve the stability of Windows7, Windows Vista, or
Windows XP PC
2. Registry Mechanic safely cleans, repairs, and optimizes the registry and automatically backs up changes
for future recovery
3. Permanently erases Internet activity, personal files, and free space to keep information away from
prying eyes
http://www.pctools.com
57 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Windows Security Tools:Windows
Defender
Windows Defender helps protect a
computer against pop‐ups, slow
performance, and security threats
caused by spyware and other
unwanted software by detecting and
removing known spyware from a
computer
http://www.microsoft.com
58 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Guidelines for Securing
System Security
Mac OS X
59 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 1: Enabling and Locking Down the
Login Window
Click Apple menu System
Preferences Accounts
Login options Display Login
Windows as Name and
Password
Uncheck Automatically login as:
Check Hide the Sleep, Restart,
and Shut Down buttons
Uncheck Enable fast users
switching if not used
60 Copyright © byEC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 2: Configuring Accounts
Preferences
From the Apple menu choose System
Preferences from the View menu
choose Accounts select the username
whose password you want to change
Click Reset Password (Mac OS X v10.3 and
v10.4) or Change Password (Mac OS X
v10.5 or later)
Enter a new password in both the
Password and Verify fields click the
Reset Password (Mac OS X v10.3 and
v10.4) or the Change Password (Mac OS X
v10.5 or later)
If a dialog box appears with the message
Your Keychain password will be changed
to your new account password, click
OK
61 Copyright © by EC-
Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 3: Guidelines for Creating
Accounts
Never create accounts Each user should have his or
that are shared by her own standard or
several users managed account
62 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 4: Securing the Guest Account
The guest account must be used for
temporary access to the system
63 Copyright © by EC-
Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 5: Controlling Local Accounts
with Parental Controls
Network
Traffic Analysis
Open System Preferences click
Accounts
If the lock icon is locked click the
lock icon and provide an
Administrator name and Password
Select the user account to be
managed with parental controls
select the Enable Parental Controls
checkbox
Click Open Parental Controls click
System, Content, Mail & iChat, Time
Limits, and Logs
64 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 6: Use Keychain Settings
Keychain stores passwords on the disk in an encrypted form and it is difficult for a non‐root user to
sniff a password between applications
Go to Applications Utilities Keychain Access Edit Change settings for Keychain "login"
Check Lock after change minutes of inactivity to the desired number of minutes check Lock
when sleeping click Save
65 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 7: Use Apple Software Update
Mac OS X includes an automatic software update tool to patch the majority of Apple applications
Software Update often includes important security updates that should be applied to a user’s machine
To update software :
Open Software Update preferences click the Scheduled Check pane
Deselect Download updates automatically click Check Now
66 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 8: Securing Date & Time Preferences
1. Open Date & Time preferences in the Date & Time pane, enter a secure and trusted
NTP server in the Set date & time automatically field
67 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 9: Securing Network Preferences
It is recommended to disable unused
hardware devices listed in Network
preferences
Open Network preferences from the
list of hardware devices, select the
hardware device that connects one’s
network
From the Configure pop‐up menu,
choose Manually
Enter the user’s static IP address, Subnet
Mask, Router, DNS Server, and Search
Domain configuration settings
Click Advanced in the Configure IPv6
pop‐up menu, choose Off click OK
68 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 10: Enable Screen Saver Password
To prevent unauthorized access to a system, enable a screen saver password
69 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 11: Set Up FileVault to Keep
Home Folder Secure
Click System Preferences click
Security click FileVault
click Set Master Password
Create the master password for
the computer but ensure this
password is different from user
account password
Verify the password click OK
70 Copyright © by EC-
Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Step 12: Firewall Security
Mac OS X firewall blocks unwanted network
communication with the computer:
1. Click System Preferences click Security click
Firewall
2. Click the Lock Icon to make changes
3. If prompted, type the admin userid and password
4. By default, the firewall allows all incoming
connections, change the option by clicking the
second option (Allow only essential services) or
third option (Set access for specific services and
applications)
5. Choose which application(s) you want the firewall
to allow and which to block
6. Click the lock icon to prevent further changes and
close the Security window
71 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Summary
73 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.