microsoft ® virtual academy module 3 understanding security policies christopher chapman | content...

13
Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM , Microsoft Thomas Willingham | Content Developer,

Upload: amanda-sparks

Post on 12-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Microsoft® Virtual Academy

Module 3Understanding Security Policies

Christopher Chapman | Content PM , MicrosoftThomas Willingham | Content Developer, Microsoft

Page 2: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Module Overview

•Common Password Attacks•Password Policies

Page 3: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Common Password Attacks

Page 4: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Dictionary and Brute Force Attacks

•A dictionary attack uses a dictionary containing an extensive list of potential passwords that the attacker then tries in conjunction with a user ID in an attempt to guess the appropriate password. •Another, more crude type of attack—called a brute force attack—doesn’t rely on lists of passwords, but rather tries all possible combinations of permitted character types.

Page 5: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Physical Attacks

•Anytime your computer can be physically accessed by an attacker, that computer is at risk. •Physical attacks on your computer can completely bypass almost all security mechanisms, such as by capturing the passwords and other critical data directly from the keyboard when a software or hardware keylogger is used. • In fact, if your encryption key passes through a keylogger, you might find that even your encrypted data is jeopardized.

Page 6: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Network Sniffers

•Sniffers are specially designed software (and in some cases hardware) applications that capture network packets as they traverse a network, displaying them for the attacker. •Sniffers are valid forms of test equipment, used to identify network and application issues, but the technology has been rapidly co-opted by attackers as an easy way to grab logon credentials.

Page 7: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Password Policies

Page 8: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Password Complexity

•Password complexity involves the characters used to make up a password. •A complex password uses characters from at least three of the following categories:• English uppercase characters (A through Z)• English lowercase characters (a through z)• Numeric characters (0 through 9)• Non-alphanumeric characters (!, @, #, $, %, ^, &, etc.)

Page 9: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Password Length, Age, and History

•Password length is the number of characters used in a password. •Time between password changes can be defined by two settings:•Minimum Password Age•Maximum Password Age

•Password history prevents users from recycling the same passwords through a system.

Page 10: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

View and Create a Password Policy

Demo

Page 11: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Account Lockout

•Account lockout settings allow you to specify when to lock an account if incorrect logon attempts happen. •Microsoft provides three separate settings with respect to account lockout:• Account lockout duration• Account lockout threshold• Reset account lockout counter after

Page 12: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

View and Create Account Lockout Policy

Demo

Page 13: Microsoft ® Virtual Academy Module 3 Understanding Security Policies Christopher Chapman | Content PM, Microsoft Thomas Willingham | Content Developer,

Additional Resources & Next Steps

Books• Exam 98-367 Security

Fundamentals• Exam 98-366: MTA

Networking Fundamentals

• Exam Ref 70-410: Installing and Configuring Windows Server 2012

Instructor-Led Courses• 40349A: Windows

Operating System Fundamentals: MTA Exam 98-349

• 40366A: Networking Fundamentals: MTA Exam 98-366

• 40365A: Windows Server Administration Fundamentals: MTA Exam 98-365

• 20410C: Installing and Configuring Windows Server 2012

Exams & Certifications• Exam 98-367:

Security Fundamentals

• Exam 98-349: Windows Operating System Fundamentals

• Exam 98-366: Networking Fundamentals

• Exam 98-365: Windows Server Administration Fundamentals

• Exam 70-410: Installing and Configuring Windows Server 2012