MCITP 70-640: Security Configuration Wizard

preview_player
Показать описание
The Security Configuration Wizard is a simple wizard that allows the administrator to tighten up security in Windows. This video looks how to run the wizard and configure the settings on multi computers.

Download Handout

Attack Surface
The attack surface on a computer system or device is the amount of software, protocols and ports that are open for use. If an exploit was found in any of these, an attacker could potentially use these to compromise the system. To reduce the attack surface, any software, protocols or ports that are not in use should be removed or disabled. Even if an exploit is not known today, tomorrow an exploit could be found that could be used to compromise your system. A firewall should also be used to increase the security of the system. Products like Security Configuration Wizard analyze Windows and gives the administrator configuration options that they can use to improve the security of their system. The process of increasing the security of a system is also known as hardening.

Demonstration
Security Configuration Wizard is available from the start menu under Administrative Tools. If you have additional software on the system that opens ports, you should run this software before you start the wizard so the wizard can detect these open ports.

The wizard will then go through different areas of the system list below.
Role-Based Service Configuration: Analyzes security settings depending on what roles are installed on the server. If you plan to add the role later, tick the option so the wizard can suggest settings for you.
Network Security: Settings regarding network security like firewall settings.
Registry Settings: Basic registry settings relating to authentication and security options for file sharing.
Audit Policy: Configures auditing settings to best audit changes to the system. There is also an option to apply an additional security template. This will greatly increase the security of your system. If you want to remove the settings applied from a security template later on you will need to use the roll back feature found at the start of the wizard.

Once you finish the wizard, these settings can be saved and applied to any computer.

The complete security template can be converted to a Group Policy Object using the following command.
scwcmd transform /p:(XMLFile) /g:(GPOName)
Рекомендации по теме
Комментарии
Автор

No problem at all. Thanks for watching.

itfreetraining
Автор

Another great video, thank you. I love the fact you provide in-depth videos for topics that other subscription-based training providers either skim over or miss out entirely. Much appreciated!

richardwaldron
Автор

Thanks for watching. This would help against Malware in two ways. By increasing security makes you system less like to get Malware. Secondary if the system does have Malware on it, the increase security helps prevent it from doing anything or reduces it ability to do so.

itfreetraining
Автор

This was a great video, thank you very much for the information as always keep them coming and we will be here to be informed and educated.

gadgetproblemnoproblem
Автор

congrats, these are fine tutorials, informative and direct, I'm a new subscriber.

dawoodderful
Автор

This was a great video, thank you very much for the information!!!

divide
Автор

Great video as always - thank you.
This tightens the security by reducing attack surface, is protecting that minimum attack surface your general malware protection methods?

pflickgoal
Автор

Thanx! Your channel is extremely helpfull.

YanivMatarasso
Автор

thnx 4 ewr love ewr al videos..thnx man ewr dng awesome work :)

MrCooleddy
Автор

HI, I did all you say, but I couldn't get result when I insert scwcmd transform /p:webserverbaselineV1.0.xml /g:webserverbaselineV1.0" command.

anza
Автор

No problem at all. Thanks for watching.

itfreetraining