Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
123 views
7 pages
CND Labs Module 04 Network Security Policy Design and Implementation
SANS
Uploaded by
jcjordana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CND Labs Module 04 Network Security Policy Design ... For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
123 views
7 pages
CND Labs Module 04 Network Security Policy Design and Implementation
SANS
Uploaded by
jcjordana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CND Labs Module 04 Network Security Policy Design ... For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save CND Labs Module 04 Network Security Policy Design ... For Later
You are on page 1
/ 7
Search
Fullscreen
CND Lab Manual Network Security Policy Design and Implementation Module 04TON KEY Vato Infoamiton AF Ten Yous —_Beowledge Web Brerise 2A Workbook Review "Module 04 - Network Security Policy Design and Implementation Implementing Policies using the Group Policy Management Console (GPMC) ‘The Group Policy Management Console (GPMC) is a scriptable Microsoft Management Console (MMC) snap-in, providing a single administrative too! for ‘managing Group Policy across the enterprise. GPMC 1s the standard tool for managing Group Policy. Lab Scenario Administrators use GPMC to pesfosm all Group Policy management tasks with, the exception of configusing individual policy settings in Group Policy Objects shemselves. This is done with Group Policy Object Editor. The scenasios below describe how an administrator uses GPMC to manage Group Policy. Lab Objectives This lab demonstrates how to use Group Policy Management. Lab Environment To casey out this lab, you need: A virtual machine maning Windows Server 2008 A vierwal machine maning Windows 10 Lab Duration ‘Time: 20 Mines Overview of the Lab Gronp Policy Preferences, introduced in Windows Server 2008, provide more than ‘sweaty Group Policy exteasions that expand the sage of configurable preference settings in a Group Policy object (GPO). Gsoup Policy lets you manage dsive (END Lab Maal Page 99 ‘Getifed Nerwork Defender Copy © by EC Counel ‘AU Rights Revd Repeehccon Stat PeteModul 04 - Network Security Policy Design and implementation mappings, registry settings, local users and groups, services, files, and folders without ‘the need to leam a scripting language. Lab Tasks Before starting this lab make sure that the Windows 10 machine is turned on, 1. Launch the Windows Server 2008 machine and log in as a domain Task 4 Launch Group ne Policy administrator Management 2, Once you have logged in, close the Secver Manager window, if it appears. 3. To launch Group Policy Management, navigate to Start > Administrative Tools and click Group Policy Management as shown in the screenshot 4, Altematively you can also launch by typing gpme.mse in the Start Search field and press Enter to launch, “The GPMC uses Se hat ave ad, adi and dnl extensions to dapay ‘he fendy mans of peli rss when ‘eoecrtag HTML cepocs BieGPO» Grow Pokey Moding sod Group Policy Rem. These epson et yon conte tbe Teestion fom which he GPMC wads only adn oe FIGURE 1 Linch Geo Pee Manages ‘END Tab Mannal Figs 100 ‘Cabed Nework Defender Coprieit © by Ee Council (ALRigbts Reserved Repredcaon Stat Pred‘Module 04 - Network Socurity Policy Design an! Implomontation 5. ‘The Group Policy Management main window appears as showa in the serceashot. Expand the Forest: CND.com domain tee wlio IES ‘wa rane “ro ciOsrt oi ny Woe [— FIGURE 1.5: Dent Donia Pokey 7. Click to expand the Policies, Windows Settings and Security Settings, right-click on Account Policies/Password Policy and click Edit from the contest memu as shown in the screenshot. ‘END Lab Mannal Fags 107 ‘Gaited Nerwok Defender Copii © by EE Counel (ALRigbts Reserved Repredcaon Stat Pred‘Module 04 - Network Socurity Policy Design an! Implomontation 8. With this you can configure the password policies for domain users. mater Crip (Embed) FIGURE 14 ing count Pie /Pucoocd Poy 9. In this lab we are going to set the password policies for the domain users. The Group Policy Management Editor Window appears; expand Computer Coafiguration > Policies > Windows Settings > Secusity Settings > Account Policies and click Password Policy in the left pane. 10, As soon as you click on Password Policy in the left pane you will see the CSS Policy and its Policy Settings in the sieht pane as shown in the ‘Bese Dawson eiloay Mt oc ovis on tember seen Ifthe feosdeetrecamfetyietewts aie Socpmusirorgrenmsecnpen ned ‘END Tab Maal Page 103 ‘Gaited Nerwok Defender Copii © by EE Counel (ALRigbts Reserved Repredcaon Stat PredFIGURE 1 6 Pasowoe Poses 12, The selected policy properties window appears; you can define the policy settings under the Secusity Policy Setting tab Sy ‘Thee poley seing ce ‘ed foc dona ot ea seer accomnts They ‘Geramstances to length ‘of ume that aa secon wi belockad omar he [FIGURE L7. apes of Poy 13, In the Explain tab yon will have a brief deseription of the selected policy, scad the explanation and edit the policy following your organization’s policy. ‘END Tab Maal Page 105 “Carined Nerwork Defender Copright © by EE Counell "AU Rights Reese. Repeedction Stacy Probate‘Module 04 - Network Socurity Policy Design an! Implomontation 114, Click the OK button to close the policy properties window. plex reasrements Prove ‘Kasbesos Poke: These oe sein ae med or omain wer secon ‘They dersmine Kerbeor eked stung och 0 ‘eket Wetanes and ‘ofererent Keine policy stings do not exist info compte poly FIGURE 18: Paty Esplanon 15, Similarly, you can configure the Password Policies accosding to your organization's policies. Lab Analysis “Analyze and document the results of the lab exercise. Give your opinion on your ‘target's security postuse and exposure through free public information. PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS ‘ABOUT THIS LAB. ers ee) OYes Z Classroom ‘END Tab Manval Page 07 ‘Cored Neewonk Detar opr © by Ee Counell "AU Rights Reese. Repeedction Stacy Probate
You might also like
CND Labs Module 14 Network Incident Response and Management
PDF
No ratings yet
CND Labs Module 14 Network Incident Response and Management
8 pages
CND Labs Module 04 Network Security Policy Design and Implementation
PDF
No ratings yet
CND Labs Module 04 Network Security Policy Design and Implementation
7 pages
INE Host and Network Penetration Testing Post Exploitation Course Files
PDF
No ratings yet
INE Host and Network Penetration Testing Post Exploitation Course Files
111 pages
CND Labs Module 02 Network Security Threats, Vulnerabilities, and Attacks
PDF
No ratings yet
CND Labs Module 02 Network Security Threats, Vulnerabilities, and Attacks
6 pages
DLP Help Forcepoint
PDF
No ratings yet
DLP Help Forcepoint
512 pages
Forcepoint NGFW SSL VPN Portal PDF
PDF
No ratings yet
Forcepoint NGFW SSL VPN Portal PDF
12 pages
IG 12 Win Desktop WinLogin Admin Iss2
PDF
No ratings yet
IG 12 Win Desktop WinLogin Admin Iss2
167 pages
Kaspersky Endpoint Security and Management: Technical Training
PDF
No ratings yet
Kaspersky Endpoint Security and Management: Technical Training
145 pages
ISE 2.1 Guest SAML Portal-Pingfed
PDF
No ratings yet
ISE 2.1 Guest SAML Portal-Pingfed
44 pages
Tripwire Executives Guidetothe CISCSC
PDF
No ratings yet
Tripwire Executives Guidetothe CISCSC
16 pages
Fireware Essentials - Student Guide - (En US) - v12 1 PDF
PDF
No ratings yet
Fireware Essentials - Student Guide - (En US) - v12 1 PDF
479 pages
Windows Server 2016
PDF
No ratings yet
Windows Server 2016
17 pages
EDU 220 81 B Mod07 AdministrativeAccounts 636736804075439000
PDF
No ratings yet
EDU 220 81 B Mod07 AdministrativeAccounts 636736804075439000
25 pages
FortiGate Security Study Guide For FortiOS5.6.2
PDF
No ratings yet
FortiGate Security Study Guide For FortiOS5.6.2
666 pages
KL 002.11.1 en Labs v2.1.5 PDF
PDF
No ratings yet
KL 002.11.1 en Labs v2.1.5 PDF
145 pages
Mcafee Network Security Platform 10.1.x Manager API Reference Guide 5-6-2022
PDF
No ratings yet
Mcafee Network Security Platform 10.1.x Manager API Reference Guide 5-6-2022
1,399 pages
B Cisco UCS Admin MGMT Guide 3 1
PDF
No ratings yet
B Cisco UCS Admin MGMT Guide 3 1
154 pages
Penetration Testing
PDF
No ratings yet
Penetration Testing
12 pages
Sicap 300-101 Defense Pro Level 1
PDF
No ratings yet
Sicap 300-101 Defense Pro Level 1
3 pages
Honeypot in Network Security
PDF
No ratings yet
Honeypot in Network Security
27 pages
McAfee - McAfee Web Gateway 8.x Essentials Exam
PDF
No ratings yet
McAfee - McAfee Web Gateway 8.x Essentials Exam
19 pages
NNT PCI DSS Microsoft Member Server 2016 v1217
PDF
No ratings yet
NNT PCI DSS Microsoft Member Server 2016 v1217
21 pages
Mcafee Agent 5.7.x Product Guide
PDF
No ratings yet
Mcafee Agent 5.7.x Product Guide
75 pages
Group Policy Explained: Paul Semple
PDF
No ratings yet
Group Policy Explained: Paul Semple
21 pages
Symantec Lab Exercise
PDF
100% (1)
Symantec Lab Exercise
136 pages
The ENow Active Directory Security Playbook 2023
PDF
No ratings yet
The ENow Active Directory Security Playbook 2023
34 pages
Cours - Formation F5 APM
PDF
No ratings yet
Cours - Formation F5 APM
416 pages
Deep Discovery Email Inspector 5.1 Best Practice Guide
PDF
No ratings yet
Deep Discovery Email Inspector 5.1 Best Practice Guide
102 pages
Active Directory LDAP
PDF
No ratings yet
Active Directory LDAP
76 pages
Mcafee NSP Guide 9.1
PDF
No ratings yet
Mcafee NSP Guide 9.1
457 pages
Mcafee Web Gateway 8.0.x Interface Reference Guide 1-2-2020
PDF
No ratings yet
Mcafee Web Gateway 8.0.x Interface Reference Guide 1-2-2020
335 pages
F5 ASM Course Content
PDF
No ratings yet
F5 ASM Course Content
20 pages
001 KSC13 - Preparative - Procedures - 2.01
PDF
No ratings yet
001 KSC13 - Preparative - Procedures - 2.01
32 pages
File Transfer Protocols
PDF
No ratings yet
File Transfer Protocols
24 pages
GPO
PDF
No ratings yet
GPO
3 pages
Securebasebook PDF
PDF
No ratings yet
Securebasebook PDF
184 pages
CP R81.10 QoS AdminGuide
PDF
No ratings yet
CP R81.10 QoS AdminGuide
111 pages
Redirecting HTTP To Https FortiWeb
PDF
0% (1)
Redirecting HTTP To Https FortiWeb
12 pages
Cortex XDR-Windows Event Collection
PDF
No ratings yet
Cortex XDR-Windows Event Collection
3 pages
Ccsa - 156-215.80 V18.75
PDF
No ratings yet
Ccsa - 156-215.80 V18.75
142 pages
8 Steps To A DDoS Mitigation Plan - GD 1
PDF
No ratings yet
8 Steps To A DDoS Mitigation Plan - GD 1
2 pages
Portnox NAC Brief
PDF
No ratings yet
Portnox NAC Brief
1 page
Cisco Nexus 7000 Series Virtual Device Context Configuration Guide
PDF
No ratings yet
Cisco Nexus 7000 Series Virtual Device Context Configuration Guide
94 pages
SandBlast Network PTK Training Labs-V7.12 CloudShare
PDF
No ratings yet
SandBlast Network PTK Training Labs-V7.12 CloudShare
60 pages
Ransomware Response Playbook
PDF
No ratings yet
Ransomware Response Playbook
6 pages
Tulpa PWK Prep Guide1
PDF
No ratings yet
Tulpa PWK Prep Guide1
9 pages
McAfee Solidcore Reviewers Guide
PDF
No ratings yet
McAfee Solidcore Reviewers Guide
70 pages
Microsoft Official Course: Implementing A Group Policy Infrastructure
PDF
No ratings yet
Microsoft Official Course: Implementing A Group Policy Infrastructure
42 pages
Troubleshooting Guide For SEP
PDF
No ratings yet
Troubleshooting Guide For SEP
16 pages
Configuring Cisco ACS 5.2 For Use With Palo Alto VSA
PDF
No ratings yet
Configuring Cisco ACS 5.2 For Use With Palo Alto VSA
10 pages
Reference Solution For Checkpoint - Certkiller.156-215.80.v2020-06-04.by - Venla.131q.vce
PDF
No ratings yet
Reference Solution For Checkpoint - Certkiller.156-215.80.v2020-06-04.by - Venla.131q.vce
4 pages
Fortiproxy: SSL Inspection
PDF
No ratings yet
Fortiproxy: SSL Inspection
6 pages
ITSY 2401 - Firewalls and Network Security - Network Security Plan Project
PDF
No ratings yet
ITSY 2401 - Firewalls and Network Security - Network Security Plan Project
7 pages
TechNet Group Policy Tips and Tricks
PDF
No ratings yet
TechNet Group Policy Tips and Tricks
30 pages
EC-Council Univ-MSS Program Dtails
PDF
No ratings yet
EC-Council Univ-MSS Program Dtails
2 pages
An Overview of Trend Micro Deep Security Solution Components
PDF
No ratings yet
An Overview of Trend Micro Deep Security Solution Components
7 pages
CPENTbrochure
PDF
No ratings yet
CPENTbrochure
9 pages
FTP
PDF
No ratings yet
FTP
31 pages
Web Application Firewalls: When Are They Useful?: The Owasp Foundation
PDF
No ratings yet
Web Application Firewalls: When Are They Useful?: The Owasp Foundation
44 pages
Digital Certificate FAQ
PDF
No ratings yet
Digital Certificate FAQ
10 pages