Free Essay

Unit 9 Workstation Domain Antivirus Policy

In:

Submitted By TonyU
Words 335
Pages 2
Workstation Domain Anti-virus and Anti-malware Policy Improvements

Employ automated tools to continuously monitor workstations, servers, and mobile devices for active, up-to-date anti-malware protection with anti-virus, anti-spyware, personal firewalls, and host-based IPS functionality. All malware detection events should be sent to enterprise anti-malware administration tools and event log servers. The endpoint security solution should include zero-day protection such as network behavioral heuristics.
Employ anti-malware software and signature auto-update features or have administrators manually push updates to all machines on a daily basis. After applying an update, automated systems should verify that each system has received its signature update.
Configure laptops, workstations, and servers so that they will not auto-run content from USB tokens (i.e., "thumb drives"), USB hard drives, CDs/DVDs, Firewire devices, external serial advanced technology attachment devices, mounted network shares, or other removable media. If the devices are not required for business use, they should be disabled.
Configure systems so that they conduct an automated anti-malware scan of removable media when it is inserted.
All e-mail attachments entering the organization's e-mail gateway should be scanned and blocked if they contain malicious code or file types unneeded for the organization's business. This scanning should be done before the e-mail is placed in the user's inbox. This includes e-mail content filtering and web content filtering.
Apply anti-virus scanning at the Web Proxy gateway. Content filtering for file-types should be applied at the perimeter.
Deploy features and toolkits such as Data Execution Prevention (DEP) and Enhanced Mitigation Experience Toolkit (EMET), products that provide sandboxing (e.g., run browsers in a VM), and other techniques that prevent malware exploitation.
Limit use of external devices to those that have business need. Monitor for use and attempted use of external devices.
Block access to external e-mail systems, instant messaging services and other social media tools.
Apply proxy technology to all communication between internal network and the Internet.

Similar Documents

Premium Essay

It Infastructure

...total domains. Each domain’s overview consists of risks, threats, and the vulnerabilities that will be found in today’s society. Here I will explain three of the IT infrastructure domains affected by the “Internal Use Only” data classification standard. The first domain is the User Domain. The user domains consist of the Acceptable use policy. This is the guidelines that each user must follow within an organization. If any of these rules are violated, the employee can be terminated. The AUP consist of all the asset of the Richman Investment Company. It is the responsibility for the company to have all employees’ sign a legal document that ensure all assets will be kept confidential. The user domain structure is the weakest link of any infrastructure and has several risks associated with it. There is lack of awareness, and it can be controlled by conducting security awareness training. Another risk is user apathy toward policies, and it can be controlled by implementing acceptable use policies and updating staff manuals and handbooks. The second domain is the workstation domain. A workstation consists of desktops, PDAs or smartphones, or laptops. All employees must have the proper rights and access to be efficient at their job. This tasks falls into the job description of the IT professionals to assign rights and grant access where needed. A few of the following risks are things that may occur within a workstation domain. The first is unauthorized access to workstation, and...

Words: 479 - Pages: 2

Premium Essay

Meow Investments Meow Documents

...Unit Plans Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure  Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains Reading  Kim and Solomon, Chapter 1: Information Systems Security. Keywords Use the following keywords to search for additional materials to support your work:  Data Classification Standard  Information System  Information Systems Security  Layered Security Solution  Policy Framework ------------------------------------------------- Week 1 Assignment (See Below) * Match Risks/Threats to Solutions * Impact of a Data Classification Standard Lab * Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) * Page 7-14 in lab book. Project (See Below) * Project Part 1. Multi-Layered Security Plan ------------------------------------------------- Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes  You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions...

Words: 1409 - Pages: 6

Premium Essay

C White Data Communication, Chapter 8 Quiz

...multitasking operating system runs only one program at a time. ANS: T 4. The resources that a network operating system must manage typically include one or more network servers. ANS: T 5. A network operating system does not perform network support functions. ANS: F 6. Microsoft Windows 7 is an example of a desktop operating system. ANS: T 7. NetWare 6 was the last version of Novell’s network operating system. ANS: T 8. A bindery contains the data that pertains only to the server it resides in. ANS: T 9. The design of a tree should ideally be similar to a pyramid. ANS: T 10. NetWare 5 dropped the NDS distributed database of network resources. ANS: F 11. Windows 2008 Server is a network operating system designed to run over a network of microcomputer workstations and provide file sharing and peripheral sharing. ANS: T 12. It is not possible to create a network with multiple domains. ANS: F 13. Unlike NetWare’s NDS, Active Directory creates a hierarchical structure of resources. ANS: F 14. Unix is most often found with a text-based interface, although graphical user interfaces are available. ANS: T 15. Shortly after its introduction, the Unix software was rewritten in the popular C++ programming language. ANS: F 16. Unix runs on the widest variety of hardware of any network operating system. ANS: T 17. Linux shares many of the same advantages and disadvantages of Unix. ANS: T...

Words: 3578 - Pages: 15

Premium Essay

The Wave System

...F-Secure Client Security Administrator's Guide F-Secure Client Security | TOC | 3 Contents Chapter 1: Introduction.......................................................................9 System requirements..............................................................................................................10 Policy Manager Server.................................................................................................10 Policy Manager Console..............................................................................................10 Main components...................................................................................................................12 Features..................................................................................................................................13 Product registration.................................................................................................................14 Application management........................................................................................................15 Basic terminology...................................................................................................................16 Chapter 2: Installing the product......................................................17 Installation steps.....................................................................................................................18 Download and run the installation...

Words: 31829 - Pages: 128

Premium Essay

Wk 3 Lab

...entry fields * Mitigate known web application and web server vulnerabilities with security countermeasures to eliminate risk from compromise and exploitation Overview This Lab will demonstrate a Cross-site Scripting (XSS) exploit and an SQL Injection attack on the test bed web application and web server using the Damn Vulnerable Web App (DVWA) loaded on an Apache Web Server on “TargetUbuntu01” Linux VM server. They will first identify the IP target host, identify known vulnerabilities and exploits, and then attack the web application and web server using XSS and an SQL Injection to exploit the web application using a web browser and some simple command strings. Assignment Requirements Watch the Demo Lab in Learning Space Unit 5 and then answer questions 1-10 below. Lab Assessment Questions & Answers 1. Why is it critical to perform a penetration test on a web application prior to production implementation? 2. What is a cross-site scripting attack? Explain in your own words. 3. What is a reflective cross-site scripting attack? 4. What common method of obfuscation is used in most real world SQL attacks? 5. Which web application attack is more prone to extract privacy data...

Words: 1054 - Pages: 5

Premium Essay

Secured Infrastructure Development for Educational University Using Servers, Firewalls and Biometric Devices

...------------------------------------------------- Department of Electrical, Computer & Communications Engineering ------------------------------------------------- MSc Project Final Project Report ------------------------------------------------- Title: Secured infrastructure development for educational university using servers, firewalls and biometric devices ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Author: Azhar ur Rehman ------------------------------------------------- ------------------------------------------------- Academic Session: 2008-2009 ------------------------------------------------- Supervisor: Mr.Manoj Pongubhati Course Title: Msc computer systems and networking Mode of Study: Full Time ACKNOWLEDGEMENT First and foremost I would like to dedicate my thesis to my parents and want to thank Prof. Mr. Manoj pongubhati, my research dissertation supervisor, for giving me an opportunity to work on the dissertation of my interest and encouraging me throughout my work. His support and patience helped me overcome many difficult times during my dissertation research. I am also deeply grateful to Mr Ali Ahmed, a good friend and guardian who is working as an Assistant Manager with Dynamic Associates Info Pvt Ltd was actively involved with my research. The day I started working under the professional guidance of Dynamic...

Words: 7221 - Pages: 29

Premium Essay

Test

...Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Premium Essay

Network Administrator

...Re-use: "This task contains portions of material that were originally submitted during [1/6/2013 -2/12/2013] in [IT401-1301A] with [Kay N. Crook]." Re-use: "This task contains portions of material that were originally submitted during [8/19/2012 -9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 ...

Words: 4303 - Pages: 18

Premium Essay

It Infrastructure Manager

...CURRICULUM VITAE ANYIDOHO RAPHAEL FOSTER, B.Sc. (Physics). MBA (IT Management), ITILv3, ECSS, PRINCE2 (Foundation) & MEMBER ISACA | | |permanent addrss : P.O.Box MD 287 madina, accra ghana | |Phone +233-020-2019870/027-7451537/024-2770807/026-2770807 | |E-MAIL RANYIDOHO@AGRICBANK.COM, RFANYIDOHO@YAHOO.COM | Date of Birth: 24TH June 1971 Nationality: Ghanaian Gender: Male Marital Status: Married Summary of Work Experience • Experience in LAN/WAN Design, Installation and Implementation. • Conversant With Windows NT/Unix Systems Administration • Experience In Windows 2000/2003 Systems Administration • Good Working Knowledge In TCP/IP • Experience In Configuring And Installing Electronic Mailing System • Experience In Microsoft Exchange Server 2000/Microsoft Outlook 2000 and Outlook 2003 • Experience In Configuring And Installing Intel/Alpha Based Servers • Experience in providing Technical support to the following software’s;...

Words: 1719 - Pages: 7

Premium Essay

Is3340 Final Exam

...IS416 Securing Windows Platforms and Applications FINAL EXAMINATION 1. Scope This exam covers all Units and is based on the content from the textbook. 2. Answer Key |Question Number |Correct Answer |Course Objective(s)|Reference | | | |Tested | | |1. |c |1.1 |Security Strategies in Windows Platforms and Applications, Pages 22–23 | |2. |b |1.2 |Security Strategies in Windows Platforms and Applications, Page 27 | |3. |d |1.3 |Security Strategies in Windows Platforms and Applications, Page 31 | |4. |c |1.4 |Security Strategies in Windows Platforms and Applications, Page 32 | |5. |a |1.5 |Security Strategies in Windows Platforms and Applications, Page 32 | |6. |c |2.1 |Security Strategies in Windows Platforms and Applications, Page 42 | |7. |a |2.2 |Security Strategies in Windows Platforms and Applications, Page 44 | |8. ...

Words: 2305 - Pages: 10

Premium Essay

Assestment

...Questionnaire The Information Security Office offers many types of assessments to meet our customer’s needs. This document explains the process for requesting an assessment, describes the set of security assessment services that the Information Security Office (ISO) offers to members of the campus community and provides a questionnaire that is used to assist in understanding the target environment. The ISO is not able to assess every possible platform or application. Nor is it possible for the ISO to meet every timeline requirement. In those cases, the ISO may contract with external partners to deliver the requested assessment service. There may be associated costs that will need to be passed along to the requesting organizational unit. Process: The Information Security Office has created a simple process around vulnerability assessments to provide clarity and consistency. The process is outlined and diagrammed below. 1. Contact the ISO (request assessment) 2. The ISO accepts the project 3. A questionnaire (later in this document) is completed by the customer 4. A scoping/kick-off meeting is held • The goal of the meeting is to try to determine which type of assessment is appropriate, the scope of the assessment, a timeline and contact information. The product of the meeting is a Statement of Work that will be agreed upon and signed by both parties. 5. The assessment is scheduled (projected end date is noted as well) 6. Assessment...

Words: 1566 - Pages: 7

Premium Essay

Test

...TB 11-5800-229-10 TECHNICAL BULLETIN SYSTEM OVERVIEW GUIDE WARFIGHTER INFORMATION NETWORK - TACTICAL (WIN-T) INCREMENT 2 FInal Draft DISTRIBUTION STATEMENT C: Distribution authorized to U.S. Government Agencies and their contractors. This publication is required for administrative and operational purposes. This determination was made on 15 March 2011. Other requests for this document must be referred to Commander, U.S. Army CECOM Life Cycle Management Command (LCMC), ATTN: AMSEL-LCL-ECM, Aberdeen Proving Ground, MD 21005-1846. WARNING: This document contains technical data whose export is restricted by the Arms Export Control Act (Title 22, U.S.C., Sec 2751, et. seq.) or the Export Administration Act of 1979, as amended, Title 50A, U.S.C., App. Violations of these export laws are subject to severe criminal penalties. Disseminate in accordance with provisions of DoD Directive 5230.25.. DESTRUCTION NOTICE - Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY 15 JUNE 2012 TB 11-5800-229-10 LIST OF EFFECTIVE PAGES/WORK PACKAGES NOTE: The portion of text affected by the change is indicated by a vertical bar in the outer margins of the page. Changes to illustrations are indicated by a vertical bar adjacent to the title. Zero (0) in the “Change No.” column indicates an original page or work package. Date of issue for the original manual is: Original: 15 June 2012 TOTAL...

Words: 42929 - Pages: 172

Free Essay

It Auditing Ch 3 Powerpoint

...Chapter 3—Security Part I: Auditing Operating Systems and Networks TRUE/FALSE 1. In a computerized environment, the audit trail log must be printed onto paper documents. ANS: F PTS: 1 2. Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling. ANS: F PTS: 1 3. A formal log-on procedure is the operating system’s last line of defense against unauthorized access. ANS: F PTS: 1 4. Computer viruses usually spread throughout the system before being detected. ANS: T PTS: 1 5. A worm is software program that replicates itself in areas of idle memory until the system fails. ANS: T PTS: 1 6. Viruses rarely attach themselves to executable files. ANS: F PTS: 1 10. Operating system controls are of interest to system professionals but should not concern accountants and auditors. ANS: F PTS: 1 11. The most frequent victims of program viruses are microcomputers. ANS: T PTS: 1 13. Operating system integrity is not of concern to accountants because only hardware risks are involved. ANS: F PTS: 1 14. Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs. ANS: T PTS: 1 15. In a telecommunications environment, line errors can be detected by using an echo check. ANS: T PTS: 1 16. Firewalls are special materials used to insulate computer facilities ANS: F PTS: 1 17. The message authentication code...

Words: 7824 - Pages: 32

Premium Essay

Accounting

...COPY The following sections contain student copies of the assignments that must be distributed to students at least two weeks prior to the due dates for those assignments. Online students will have access to those documents in PDF format available for downloading at any time during the course. ------------------------------------------------- Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1. Lab 1. Preparing a Virtual Workstation Image Windows 7 Virtual Machine “Keyless” Installation and Re-arm Process Purpose: This section describes the reason for and the procedure to use the “keyless” installation for Windows 7 Professional applicable to our lab environment for IT109/NT1230, and to use the “Re-arm” procedure to extend the trial period to meet our curriculum needs. Background: In installing Windows 7 Professional into a virtual machine in the VMware Player for the labs in our lab environment, if the Product Key for Windows 7 Professional is applied and activated during or at the end of the installation, the installed virtual machine will be authorized to launch...

Words: 5558 - Pages: 23

Premium Essay

Ms 70-640

...network has a domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. Only one Active-Directory integrated zone has been configured in the ABC.com domain. ABC.com has requested that you configure DNS zone to automatically remove DNS records that are outdated. What action should you consider? A. You should consider running the netsh /Reset DNS command from the Command prompt. B. You should consider enabling Scavenging in the DNS zone properties page. C. You should consider reducing the TTL of the SOA record in the DNS zone properties page. D. You should consider disabling updates in the DNS zone properties page. Answer: B Explanation: In the scenario you should enable scavenging through the zone properties because scavenging removes the outdated DNS records from the DNS zone automatically. You should additionally note that patience would be required when enabling scavenging as there are some safety valves built into scavenging which takes long to pop. Reference: http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088a6bbce0a4304&ID=211 QUESTION NO: 2 You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network has a server named ABC-SR15. You install the Active Directory Lightweight Directory Services (AD LDS) on ABC-SR15. Which of the following options can be used for the creation of new Organizational Units (OU’s) in...

Words: 34198 - Pages: 137