Microsoft Windows XP Home Edition - Zenk - Security - Repository
Microsoft Windows XP Home Edition - Zenk - Security - Repository
Microsoft Windows XP Home Edition - Zenk - Security - Repository
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Microsoft</strong> <strong>Windows</strong> <strong>XP</strong> <strong>Home</strong> <strong>Edition</strong><br />
<strong>Security</strong> Implementation<br />
Version 1.4b Option 1<br />
Table of Contents<br />
I. INTRODUCTION ...............................................................................................................4<br />
II. PHYSICAL SECURITY ......................................................................................................4<br />
III. USER ACCOUNTS AND PASSWORDS...............................................................................6<br />
ADDING A NEW USER ACCOUNT ....................................................................................................6<br />
DISABLE / DELETE ACCOUNTS.....................................................................................................7<br />
ASSIGN STRONG PASSWORDS.......................................................................................................7<br />
SECURE THE ADMINI STRATO R ACCOUNT .......................................................................................9<br />
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46<br />
SECURE GUEST ACCOUNT ...........................................................................................................9<br />
PREVENT THE GUEST ACCOUNT FRO M VIEWING EVENT LOGS......................................................... 10<br />
PASSWORD RESET DISK ............................................................................................................ 10<br />
MANAGING PASSWO RDS ........................................................................................................... 10<br />
WELCOME SCREEN................................................................................................................... 11<br />
WARNING MESSAGE................................................................................................................. 12<br />
IV. FILE SYSTEMS ................................................................................................................ 13<br />
FILE SYSTEM........................................................................................................................... 13<br />
PRIVATE FOLDERS ................................................................................................................... 14<br />
V. KEEPING YOUR SYSTEM SECURE................................................................................ 14<br />
PATCHES ................................................................................................................................ 14<br />
SECURITY ALERTS ................................................................................................................... 16<br />
TESTING SECURITY SETTINGS .................................................................................................... 17<br />
VI. FIREWALLS .................................................................................................................... 18<br />
INTERNET CONNECTION FIREWALL (ICF) .................................................................................... 19<br />
RESPONDING TO AN ATTACK ..................................................................................................... 22<br />
THIRD PARTY PERSONA L FIREWALLS.......................................................................................... 23<br />
VII. ANTIVIRUS / VIRUS PROTECTION ........................................................................... 25<br />
FORMS O F THREATS ................................................................................................................. 25<br />
IDENTIFYING MALI CIOUS SO FTWARE ........................................................................................... 26<br />
INFO RMATION SOURCES............................................................................................................ 27<br />
PROTECTING YOU R CO MPUTER ................................................................................................... 29<br />
REPAIRING AN INFECTED SY STEM ............................................................................................... 30<br />
VIII. BACKUP AND RECOVERY ......................................................................................... 30<br />
BACKUP METHOD .................................................................................................................... 31<br />
MEDIA TYPES.......................................................................................................................... 31<br />
INTERIUM BACKUPS WITH WINDOWS BACKUP.............................................................................. 33<br />
BACKUP RECOMMENDATIONS .................................................................................................... 34<br />
THIRD PARTY PRODUCTS .......................................................................................................... 35<br />
MISCELLA NEOUS SITES............................................................................................................. 35<br />
DISA STER RECOVERY ............................................................................................................... 36<br />
© SANS Institute 2003, Author retains full rights<br />
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46<br />
Page 2 of 53<br />
© SANS Institute 2003, As part of the Information <strong>Security</strong> Reading Room. Author retains full rights.