Search This Blog

Showing posts with label winsecurity. Show all posts
Showing posts with label winsecurity. Show all posts

Saturday, 21 January 2012

Hitting Windows 8 reset button: Security bonus saves time and money


Takeaway: The Windows 8 reset button from a security perspective.
The much ballyhooed Windows 8, Microsoft’s latest release of its flagship product, will allow users to restore their Windows 8 PC to its pristine factory state through the push of a single button. There are two distinct restore types: reset and refresh. A reset will restore a Windows 8 PC to its original factory state, consequently removing any personal data, apps, and settings. A refresh will reinstall Windows 8, but preserves any documents, wireless network connections, BitLocker settings, drive letter assignments, personalization settings, and installed Metro apps. Any file-type associations, display settings, and Windows firewall settings will not be retained after a refresh.
The reset/refresh options are different than the current system restore process found in Windows 7/Vista/XP in that Windows is completely re-installed (the current system restore reverts back to a “last known good state” therefore, not all current system settings or files are retained). Additionally, the system restore files are not immune from becoming infected with malware. I assume cybercriminals are already looking for any weaknesses in the new reset/refresh process. The time required to perform a refresh is approximately eight minutes, and six minutes for a quick reset. A thorough reset takes 23 minutes. The thorough option overwrites any existing data visible to the operating system.

Good news for support pros

From a security perspective, the reset/refresh options provide a great method for quickly restoring malware infested computers to a “safe” state. Before security companies rush to play the antitrust card, they should realize that this capability complements itself nicely to any endpoint security software. The purpose of endpoint security software is to prevent any malicious software from being run or installed in the first place. However, as any IT professional can attest, having such software does not equate to complete immunity. Scareware, rootkits, keyloggers, trojans and other nefarious items can still make their way onto a computer. The reset/refresh option allows for a quick recovery when the security software “fails”. The security industry has yet to prove that their products are able to fully cover the entire prevent/detect/recover/remediate cycle.
Depending on the industry, anywhere between 40%-70% of IT support (or help desk) employee time is spent removing viruses and malware from company computers. Generally speaking, the time required for someone to run an antimalware removal tool and conduct further troubleshooting (if needed for particularly troublesome malware) can easily exceed an hour. This leads to productivity loss and subsequent frustration. Countless hours are spent attempting to either remove all traces of the malware from the computer or completely wiping out the machine, re-imaging it from scratch, and installing the latest patches. On top of that, time is needed to re-install any applications, copy over any files, and restore usability settings. Pretty soon an entire afternoon (or morning) is lost. This is crucial time taken away from IT support (and the employee whose laptop was infected) when they could have been working on more strategic projects that actually provide value to the company. When scaled by organization size, the productivity loss grows exponentially. The time that is spent cleaning up viruses and malware costs the company money and negatively affects the bottom line.
In a time where companies are cash strapped and desperate to find cost savings, reducing the time devoted to recovering from malware infections to mere minutes, will lead not only to reduced costs, but will translate into a competitive advantage. Making use of the reset/refresh one-click option in Windows 8 is a no-brainer. The security industry would be foolish to view it any other way.

Monday, 30 May 2011

Few best practices for Windows security....


Few best practices for Windows security....that you can do to secure your Windows and data from unwanted attacks by viruses,spywares,etc.
Windows Security Shield
1) Reduce the attack surface whenever possible:-
One of the first steps you should take when hardening a machine is to reduce its attack surface. The more code that's running on a machine, the greater the chance that the code will be exploitable. You should therefore uninstall any unnecessary operating system components and applications.

2) Use only reputable applications:-
Given the current economic climate, it might be tempting to use freeware, deeply discounted, or open source
applications. While I will be the first to admit that I use a handful of such applications in my own organization, it is critically important to do a little bit of research before adopting such an application. Some free or low cost
applications are designed to serve ads to users; others are designed to steal personal information from users or track their Internet browsing habits.

3) Use a normal user account when you can:-
As a best practice, administrators should use normal user accounts when they can. If a malware infection occurs, the malware generally has the same rights as the person who is logged in. So of course that malware could be far more damaging if the person who is logged in has administrative permissions.

4) Create multiple Administrator accounts:-
In the previous section, I discussed the importance of using a regular user account whenever possible and using an Administrative account only when you need to perform an action that requires administrative permissions. However, this does not mean that you should be using the domain Administrator account.
If you have multiple administrators in your organization, you should create a personalized administrator account for each of them. That way, when an administrative action is performed, it is possible to tell who did it. For example, if you have an Administrator named John Doe, you should create two accounts for that user. One will be the normal account for day-to-day use, and the other will be an administrative account to be used only when necessary. The accounts might be named JohnDoe and Admin-JohnDoe.

5) Don't go overboard with audit logging:-
Although it may be tempting to create audit policies that track every possible event, there is such a thing as too much of a good thing. When you perform excessive auditing, the audit logs grow to massive sizes. It can be nearly impossible to find the log entries you're looking for. Rather than audit every possible event, it is better to focus on auditing only the events that matter the most.

6) Make use of local security policies:-
Using Active Directory based group policy settings does not nullify the need for local security policy settings.
Remember that group policy settings are enforced only if someone logs in using a domain account. They do
nothing if someone logs into a machine using a local account. Local security policies can help to protect your
machines against local account usage.

7) Review your firewall configuration:-
You should use a firewall at the network perimeter and on each machine on your network, but that alone isn't
enough. You should also review your firewall's port exceptions list to ensure that only the essential ports are
open.A lot of emphasis is typically placed on the ports that are used by the Windows operating system, but you should also be on the lookout for any firewall rules that open ports 1433 and 1434. These ports are used for monitoring and remotely connecting to SQL server and have become a favorite target for hackers.

8) Practice isolation of services:-
Whenever possible, you should configure your servers so that they perform one specific task. That way, if a
server is compromised, the hacker will gain access to only a specific set of services. I realize that financial
constraints often force organizations to run multiple roles on their servers. In these types of situations, you may
be able to improve security without increasing costs by using virtualization. In certain virtualized environments,
Microsoft allows you to deploy multiple virtual machines running Windows Server 2008 R2 for the cost of a
single server license.

9) Apply security patches in a timely manner:-
You should always test patches before applying them to your production servers. However, some organizations really go overboard with the testing process. While I certainly do not deny the importance of ensuring server stability, you have to balance the need for adequate testing with the need for adequate security.When Microsoft releases a security patch, the patch is designed to address a well-documented vulnerability. This means that hackers already know about the vulnerability and will be specifically looking for deployments in which the patch that corrects that vulnerability has not yet been applied.

10) Make use of the Security Configuration Wizard:-
The Security Configuration Wizard allows you to create XML-based security policies, which can then be applied to your servers. These policies can be used to enable services, configure settings, and set firewall rules. Keep in mind that the policies created by the Security Configuration Wizard are different from security templates (which use .INF files) Furthermore, you can't use group policies to deploy Security Configuration Wizard policies.

*************************
Related Posts Plugin for WordPress, Blogger...