Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

SECURITY CONSIDERATIONS

FOR WINDOWS
OBJECTIVE

• Discuss concepts where it may not be so obvious to secure our infrastructure


• Explain why it’s a good idea to build a layered security approach
• Discuss points in which my experience has told me goes further than
completely relying on technology
CONSIDERATION 1 – ASSESSING YOUR
ENVIRONMENT

• Windows cannot protect you from everything


• Even with enhancements over the years, security is still a problem
• Completed security checklist for systems and audit regularly
• Example: Patches - finding missing updates
CONSIDERATION 2 - MONITOR

• Event logs can be boring to read through, however essential to a well running
environment
• Security and system logs are important to understand
• Use another system to monitor critical infrastructure
• Example: How do you know something is working or not working?
CONSIDERATION 3 – USE A LAYERED
APPROACH TO SECURITY
• A firewall can’t protect everything just like antivirus can’t protect you from
everything either
• Careful consideration and due diligence are important steps in planning for a secure
environment
• Firewalls, antimalware, DEP, least privilege are all steps in protecting systems,
however, without understanding how users are using the system, layered security
might be too restrictive
• Example: Password security policies may have opposite effect you want
CONSIDERATION 4 – YOUR END USERS NEED
YOUR HELP

• Not everything is intuitive like Microsoft thinks it is


• Users need training as to why or why not technology put in place is there to
protect them
• You have to support your users in the end
• Example: Moving to the cloud
CONCLUSION

• While some decisions seem obvious to you, they always aren’t to everyone
else
• Explanations on security decisions go a long way to ensure stability and
continuity and less data breaches

You might also like