• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/8

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

8 Cards in this Set

  • Front
  • Back

Security Baseline

The first step in a security baseline is creating the security policy that admins can use to secure past and future systems.



There are typically multiple security baselines within an organization.



Microsoft SCW creates an XML database that can be imported into a group policy.


GPO (group policy object)

Microsoft uses GPOs to standardized the configuration of systems. They can be applied to a group of computers or just a single system. GPOs are checked at the start of a system and when a user logs into a sys.

Security Templates include:

1. Account Policies


2. Local Policies


3. System Services


4. Software Restrictions


5. Restricted Groups

Configuration Baseline

Documents sys config and should be updated when the system is updated. This includes after installing new software, deploying service packs, or modifying any sys config settings

Reporting Baseline

Documents normal sys performance. Admins compare current performance against a baseline report to determine abnormal activity.

Imaging a system provides:

1. Secure starting point


2. Reduced costs

Imaging Tools

Symantec Ghost


LanDesk


Microsoft tools

Standardized Images Include:

Mandatory security configurations. This ensures the sys starts in a secure state and reduces overall costs. There is no difference in the security requirements for images deployed to physical versus virtual systems.