20410D 12
20410D 12
20410D 12
Module 12
10 minutes
Applying Defense-In-Depth to Increase Security
Defense-in-depth uses a layered approach to security
• Reduces an attacker’s chance of success
• Increases an attacker’s risk of detection
• UAC is a security
feature that prompts
the user for an
administrative user’s
credentials if the task
requires administrative
permissions
• UAC enables users to
perform common
daily tasks as non-
administrators
Configuring Security Auditing
When using security auditing to log security-related events,
you can:
• Configure security auditing according to your company’s security
regulations
• Filter the Security Event Log in Event Viewer to find specific
security related events
Configuring Restricted Groups
Logon Information
Virtual machines 20410D-LON-DC1
20410D-LON-SVR1
20410D-LON-SVR2
20410D-LON-CL1
User name Adatum\Administrator
Password Pa$$w0rd
Benefits of AppLocker:
• Controls how users can access and run all types of apps
• Allows the definition of rules based on a wide variety of variables
• Provides for importing and exporting entire AppLocker policies
AppLocker Rules
Rule actions
• Allow or Deny conditions
• Enforce or Audit Only policies
Demonstration: Creating AppLocker Rules
10 minutes
Firewall Profiles
Logon Information
Virtual machines 20410D-LON-DC1
20410D-LON-SVR1
20410D-LON-CL1
User name Adatum\Administrator
Password Pa$$w0rd
• Review Questions
• Best Practices
• Common Issues and Troubleshooting Tips
• Tools