ISBN 9789350232224,Least Privilege Security For Windows 7, Vista, And Xp

Least Privilege Security For Windows 7, Vista, And Xp

Rs959 Rs1199 20% OFF

Availability: Out of Stock

(Free Delivery)

We Accept
ISBN 9789350232224
Check delivery information
 
ISBN 9789350232224
Publisher

Shroff Publishers & Distributors Pvt Ltd

Publication Year 2010
ISBN-13

ISBN 9789350232224

ISBN-10 9350232227
Binding

Paperback

Number of Pages 468 Pages
Language (English)
Subject

Computer And Internet

Secure desktops for regulatory compliance and business agility Implement Least Privilege Security in Windows 7, Vista and XP to prevent unwanted system changes Achieve a seamless user experience with the different components and compatibility features of Windows and Active Directory Mitigate the problems and limitations many users may face when running legacy applications Distribute applications, updates and ActiveX Controls to least privilege users with Group Policy, application virtualization and the ActiveX Installer Service Ensure reliable remote access for IT administrators to support users by configuring support features and firecall access In Detail Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related management technologies. It will provide you with quick solutions for common technical challenges, Microsoft best practice advice, and techniques for managing Least Privilege on the desktop along with details on the impact of Least Privilege Security. The book begins by showing you how to apply Least Privilege Security to different categories of users. You will then prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. You will identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. This book will help you configure User Account Control on multiple computers using Group Policy and support Least Privilege user accounts using reliable remote access. Then, you will modify legacy applications for Least Privilege Security, achieving the best balance between compatibility and security by using Application Compatibility shims. You will install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). The book will help you implement best practices for working with ActiveX Controls in a managed environment. Finally, you will deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker. A practical handbook containing detailed step-by-step instructions for implementing Least Privilege Security on Windows systems What you will learn from this book Explore the principle of Least Privilege Security and implement it across different versions of Microsoft Windows Overcome the most common technical challenges of implementing Least Privilege Security on the desktop Apply Least Privilege Security to different categories of users and get buy-in from management Identify any potential compatibility problems with Least Privilege Security and software installed on networked PCs using Microsoft's Application Compatibility Toolkit (ACT) Prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings Configure User Account Control on multiple computers using Group Policy Modify incompatible applications and achieve the best balance between compatibility and security by using Application Compatibility shims Deploy applications using Group Policy Software Installation (GPSI) and Windows Installer and create MSI wrappers for legacy setup programs Install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS) Deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run and blacklist applications using SRP or AppLocker Here is a brief summary of what each chapter covers: Chapter 1: An Overview of Least Privilege Security in Microsoft Windows Explore the principle of Least Privilege Security and implement it in different versions of Microsoft Windows. Control and change system privileges. Benefit from implementing Least Privilege Security on the desktop and overcome the most common technical and political problems and challenges when implementing Least Privilege Security. Chapter 2: Political and Cultural Challenges for Least Privilege Security Understand the reasons why users may not accept Least Privilege Security on the desktop. Clearly explain and justify the benefits of Least Privilege Security for your organization. Apply Least Privilege Security to different categories of users and get buy-in from management. Chaper 3: Preparing Vista and Windows 7 for Least Privilege Security Collect and analyze data to identify any potential compatibility problems with Least Privilege Security and software installed on networked PCs using Microsoft's Application Compatibility Toolkit (ACT). Analyze logon scripts for Least Privilege compatibility. Prepare a desktop image with Least Privilege Security enabled from the start and deploy the new image while preserving users' files and settings. Chapter 4: Least Privilege in Windows XP Redeploy Windows XP with Least Privilege Security using the Microsoft Deployment Toolkit. Identify problems with applications caused by Least Privilege Security using the Application Compatibility Toolkit. Mitigate the problems and limitations users may face when running with a Least Privilege Security account. Handle ActiveX controls in Windows XP. Chapter 5: User Account Control Achieve a seamless user experience by using the different components and compatibility features of User Account Control. Configure User Account Control on multiple computers using Group Policy and understand the inner workings of User Account Control's core components. OA Chapter 6: Supporting Users Running with Least-Privilege Support Least-Privilege user accounts using reliable remote access. Connect to remote systems with administrative privileges using different techniques. Enable remote access using Group Policy and Windows Firewall. Chapter 7:Microsoft Windows Application Compatibility Infrastructure Modify incompatible applications on the fly and achieve the best balance between compatibility and security by using Application Compatibility shims. Create shims using Application Compatibility Toolkit 5.5 and distribute compatibility databases to devices across the enterprise. Chapter 8: Software Distribution using Group Policy Prepare to deploy applications using Group Policy Software Installation (GPSI) and Windows Installer. Repackage legacy setup programs in Windows Installer .msi format. Make GPSI more scalable and flexible using the Distributed File System (DFS). Target client computers using Windows Management Instrumentation (WMI) filters and Group Policy Scope of Management. Chapter 9: Internet Explorer Add-on Management Support per-user and per-machine ActiveX Controls and manage Internet Explorer add-ons via Group Policy. Install per-machine ActiveX Controls using the ActiveX Installer Service (AxIS). Implement best practices for working with ActiveX Controls in a managed environment. Chapter 10: Software Restriction Policies and AppLocker Deploy default Software Restriction Policy (SRP) or AppLocker rules to ensure only programs installed in protected locations can run. Force an application to launch with standard user privileges even if the user is an administrator. Blacklist an application using SRP or AppLocker. Approach This practical handbook has detailed step-by-step instructions for implementing Least Privilege Security and related management technologies. It has solutions to the most common technical challenges and Microsoft best practice advice. It also covers techniques for managing Least Privilege on the desktop. Who this book is written for This book is for System Administrators or desktop support staff who want to implement Least Privilege Security on Windows systems. About the Author Russell Smith is an independent IT consultant who specializes in management and security of Microsoft-based IT systems. An MCSE with more than ten years experience, his recent projects include Active Directory Security Consultant for the UK Health Service National Programme for Information Technology (NPfIT) and Exchange Architect for Wipro Technologies. Russell is a regular contributor to industry journals Windows IT Professional, Security Professional VIP, CDW's Biztech Magazine and a contributing author to Supporting and Troubleshooting Applications on a Microsoft Windows Vista Client for Enterprise Support Technicians from Microsoft's Official Academic Course (MOAC) series of books published by Wiley and Sons. Russell also has extensive experience as an IT trainer. Table of Contents Preface Chapter 1: An Overview of Least Privilege Security in Microsoft Windows Chapter 2: Political and Cultural Challenges for Least Privilege Security Chapter 3: Solving Least Privilege Problems with the Application Compatibility Toolkit Chapter 4: User Account Control Chapter 5: Tools and Techniques for Solving Least Privilege Security Problems Chapter 6: Software Distribution using Group Policy Chapter 7: Managing Internet Explorer Add-ons Chapter 8: Supporting Users Running with Least Privilege Chapter 9: Deploying Software Restriction Policies and AppLocker Chapter 10: Least Privilege in Windows XP Chapter 11: Preparing Vista and Windows 7 for Least Privilege Security Chapter 12: Provisioning Applications on Secure Desktops with Remote Desktop Services Chapter 13: Balancing Flexibility and Security with Application Virtualization Chapter 14: Deploying XP Mode VMs with MED-V Index

More from Author

Scroll