E-books in Russian and English



<<< >>>

Welcome
(Columbus, Ohio, United States)

 


Enter · Register · Search

 
 
   
 
 
 
« Август 2010 »
Пн Вт Ср Чт Пт Сб Вс
 1
2345678
9101112131415
16171819202122
23242526272829
3031 
 
One Week Top10:
 2  3   4

Least Privilege Security for Windows 7, Vista, and XP

date: 22 августа 2010 / author: izograv / категория: Windows / views: 1562 / comments: 0

Least Privilege Security for Windows 7, Vista, and XP by Russell Smith



Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges.

This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security.

The book begins by showing you how to apply Least Privilege Security to different categories of users. You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker.

A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems

What you will learn from this book

* Explore the principle of Least Privilege Security and implement it across different versions of Microsoft Windows
* Overcome the most common technical challenges of implementing Least Privilege Security on the desktop
* Apply Least Privilege Security to different categories of users and get buy-in from management
* Identify any potential compatibility problems with Least Privilege Security and software installed on networked PCs using Microsoft's Application Compatibility Toolkit (ACT)
* Prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings
* Configure User Account Control on multiple computers using Group Policy
* Modify incompatible applications and achieve the best balance between compatibility and security by using Application Compatibility shims
* Deploy applications using Group Policy Software Installation (GPSI) and Windows Installer and create MSI wrappers for legacy setup programs
* Install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS)
* Deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker
* Here is a brief summary of what each chapter covers:

Chapter 1: An Overview of Least Privilege Security in Microsoft Windows Explore the principle of Least Privilege Security and implement it in different versions of Microsoft Windows. Control and change system privileges. Benefit from implementing Least Privilege Security on the desktop and overcome the most common technical and political problems and challenges when implementing Least Privilege Security.

Chapter 2: Political and Cultural Challenges for Least Privilege Security Understand the reasons why users may not accept Least Privilege Security on the desktop. Clearly explain and justify the benefits of Least Privilege Security for your organization. Apply Least Privilege Security to different categories of users and get buy-in from management.

Chaper 3: Preparing Vista and Windows 7 for Least Privilege Security Collect and analyze data to identify any potential compatibility problems with Least Privilege Security and software installed on networked PCs using Microsoft's Application Compatibility Toolkit (ACT). Analyze logon scripts for Least Privilege compatibility. Prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings.

Chapter 4: Least Privilege in Windows XP Redeploy Windows XP with Least Privilege Security using the Microsoft Deployment Toolkit. Identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. Mitigate the problems and limitations users may face when running with a Least Privilege Security account. Handle ActiveX controls in Windows XP.

Chapter 5: User Account Control Achieve a seamless user experience by using the different components and compatibility features of User Account Control. Configure User Account Control on multiple computers using Group Policy and understand the inner workings of User Account Control's core components. OA Chapter 6: Supporting Users Running with Least-Privilege Support Least-Privilege user accounts using reliable remote access. Connect to remote systems with administrative privileges using different techniques. Enable remote access using Group Policy and Windows Firewall.

Chapter 7:Microsoft Windows Application Compatibility Infrastructure Modify incompatible applications on the fly and achieve the best balance between compatibility and security by using Application Compatibility shims. Create shims using Application Compatibility Toolkit 5.5 and distribute compatibility databases to devices across the enterprise.

Chapter 8: Software Distribution using Group Policy Prepare to deploy applications using Group Policy Software Installation (GPSI) and Windows Installer. Repackage legacy setup programs in Windows Installer .msi format. Make GPSI more scalable and flexible using the Distributed File System (DFS). Target client computers using Windows Management Instrumentation (WMI) filters and Group Policy Scope of Management.

Chapter 9: Internet Explorer Add-on Management Support per-user and per-machine ActiveX Controls and manage Internet Explorer add-ons via Group Policy. Install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). Implement best practices for working with ActiveX Controls in a managed environment.

Chapter 10: Software Restriction Policies and AppLocker Deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run. Force an application to launch with standard user privileges even if the user is an administrator. Blacklist an application using SRP or AppLocker.

Approach

This practical handbook has detailed step-by-step instructions for implementing Least Privilege Security and related management technologies. It has solutions to the most common technical challenges and Microsoft best practice advice. It also covers techniques for managing Least Privilege on the desktop.

Who this book is written for

This book is for System Administrators or desktop support staff who want to implement Least Privilege Security on Windows systems.




 

Comments: 0

 
 
Year Top:
2011
2010
2009
2008
2007
2006
 
  

 


 

Design/Web/Support/Anti-Leech by izograv @ yandex.ru
Optimized for Firefox | Anti-Leech tested on IE, Firefox, Reget