Benchmark - Deploy Security Measures Using Group Policy - Copy
.docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
430
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
5
Uploaded by michaeljr1119
Benchmark - Deploy Security Measures Using Group Policy
Michael Harris
ITT-430-0500
November 30, 2023
Dr. Chuck Brust
Benchmark - Deploy Security Measures Using Group Policy
1
Benchmark - Deploy Security Measures Using Group Policy
Part 1: 10 Security Policies 1.
Minimum password length must be set to 14 or more characters. -
This policy setting determines the least number of characters that make up a password
for a user account.
2.
All passwords must meet the basic requirements for a strong password. -
The user should not include their name or exceed 2 consecutive characters.
-
English uppercase characters (A through Z)
-
English lowercase characters (a through z)
-
Base 10 digits (0 through 9)
-
Non-alphabetic characters (for example, !, $, #, %)
3.
Ensure 'Domain controller: Allow vulnerable Netlogon secure channel connections' is set to 'Not Configured'.
-
This security setting determines whether the domain controller bypasses secure RPC for Netlogon secure channel connections for specified machine account.
4.
Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'.
-
This policy setting determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted.
5.
Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'. -
The secure channel protects domain credentials as they are sent to the Domain Controller.
6.
Ensure 'Always prompt for password upon connection' is set to 'Enabled'
2
Benchmark - Deploy Security Measures Using Group Policy
-
If this is enabled the computer will always prompt the user to enter the password and username rather than just automatically login them in. 7.
Ensure 'Set time limit for active but idle Remote Desktop Services sessions' is set to 'Enabled: 15 minutes or less, but not Never (0)
-
This ensures that the maximum amount of time a user can be on a device or computer
is no more than 15 minutes and it will automatically kick you out of the session. This setting helps to prevent active Remote Desktop sessions from tying up the computer
for long periods of time while not in use, preventing computing resources from being consumed by large numbers of inactive sessions.
8.
Ensure that software and security is regularly updated.
-
To ensure that the information is secure and there are no vulnerabilities updating the software and security is a easy step to making sure the servers are more secure. 9.
Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts'
-
This policy setting prevents users from adding new Microsoft accounts on this computer.
10. Ensure 'Interactive logon: Don't display last signed-in' is set to 'Enabled'.
-
This policy setting determines whether the account name of the last user to log on to the client computers in your organization will be displayed in each computer's respective Windows logon screen.
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help