Security

From Help
Jump to: navigation, search

Security in IT can encompass many aspects, including user education, various security software / hardware (anti-virus, personal firewalls), policies and procedures, and much more.

The National Institute of Standards and Technology (NIST) is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Its mission is to promote innovation and industrial competitiveness.

Return to Main Page

NIST

Return to Top

CVE Database

800-171

One of the first steps is loading the various Policy templates, GPOs, and WMI into your AD environment.

WMI

You can come up with your own procedure, but this is one I use:

  • Inside the unzipped dir, make a directory called WMI
  • Search your unzipped for *.mof
  • Copy all these into the WMI directory
  • Bring up Group Policy Management on the DC
  • Go down to WMI Filters
  • Right-click and select Import
  • Browse into the above WMI directory, select a file
    • Copy the "Name" into the "Description" if you want
  • It will now show up in WMI Filter
  • As a side-bonus, this WMI query can be useful for SCCM as well

Policy Definitions

  • On your DC, browse to the URL below, replacing DOMAIN.COM with the name of your domain:
    • \\DOMAIN.COM\SYSVOL\DOMAIN.COM\Policies
    • Make a new directory called PolicyDefinitions
  • In a different File Explorer window, go into the various unzip directory that have the .admx files
  • Copy these (and the en-US directory) into the \Policies\PolicyDefinitions\ above

When you launch GPME, you will now see "Administrative Templates: Policy definitions (ADMX files) retrieved from the central store"



Security Technical Implementation Guide

A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities.

The Master list is located at:

https://iase.disa.mil/stigs/Pages/a-z.aspx

Windows Operating systems

Return to Top

Networking

Return to Top

Other

Return to Top

References

  • External URL name 1
    • External URL link 1

Return to Top