Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
8 Cards in this Set
- Front
- Back
Security Baseline |
The first step in a security baseline is creating the security policy that admins can use to secure past and future systems.
There are typically multiple security baselines within an organization.
Microsoft SCW creates an XML database that can be imported into a group policy.
|
|
GPO (group policy object) |
Microsoft uses GPOs to standardized the configuration of systems. They can be applied to a group of computers or just a single system. GPOs are checked at the start of a system and when a user logs into a sys. |
|
Security Templates include: |
1. Account Policies 2. Local Policies 3. System Services 4. Software Restrictions 5. Restricted Groups |
|
Configuration Baseline |
Documents sys config and should be updated when the system is updated. This includes after installing new software, deploying service packs, or modifying any sys config settings |
|
Reporting Baseline |
Documents normal sys performance. Admins compare current performance against a baseline report to determine abnormal activity. |
|
Imaging a system provides: |
1. Secure starting point 2. Reduced costs |
|
Imaging Tools |
Symantec Ghost LanDesk Microsoft tools |
|
Standardized Images Include: |
Mandatory security configurations. This ensures the sys starts in a secure state and reduces overall costs. There is no difference in the security requirements for images deployed to physical versus virtual systems. |