05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

27 Configuring, Managing, and<br />

Troubleshooting Security<br />

Computers are constantly under attack. Although Microsoft Windows XP (especially<br />

with Service Pack 2 installed) is designed to protect against most attacks, the default<br />

configuration might not meet your organization’s security needs. Depending on how<br />

users make use of their computers and the confidentiality of the data on your computers,<br />

you might need to adjust the default security settings.<br />

You will start by configuring Users and Groups for the people who will need to access<br />

resources on each Windows XP computer. Then, you can use tools such as the Computer<br />

Management console and the Local Security Policy console to grant rights to<br />

those users. Users who do not have accounts will have a very difficult time gaining<br />

access to resources on your computer, which will protect you against most attacks.<br />

Some attacks might come from users with legitimate user accounts, however. In fact,<br />

the most damaging attacks come from people within your own organization. You can<br />

reduce the risk of this type of attack by tightly configuring user rights. Ideally, you will<br />

follow the principle of least privilege and assign users only the bare minimum rights<br />

they need to do their jobs.<br />

You might still be vulnerable to attacks from threats without valid user accounts, however.<br />

To protect against people who might physically steal a computer (especially a<br />

laptop), use Encrypting File System (EFS). EFS encrypts files, requiring the attacker to<br />

log on with a user account that has a private key that can decrypt the files. To protect<br />

against malicious Web sites, you can configure Internet Explorer to prevent risky types<br />

of communications, such as transmitting unencrypted data across the Internet or<br />

accepting third-party cookies without privacy policies.<br />

To complete this objective, you must understand how to install, configure, and troubleshoot<br />

all these security technologies.<br />

Tested Skills and Suggested Practices<br />

The skills you need to successfully master the Configuring, Managing, and Troubleshooting<br />

Security objective domain on the <strong>Installing</strong>, Configuring, and Administering<br />

Microsoft Windows XP Professional exam include the following:<br />

■ Configure, manage, and troubleshoot Encrypting File System (EFS).<br />

❑ Practice 1: Encrypt and decrypt files and folders on a storage volume formatted<br />

with NTFS by using Microsoft Windows Explorer.<br />

27-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!