Benchmark - Deploy Security Measures Using Group Policy - Copy

.docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

430

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by michaeljr1119

Report
Benchmark - Deploy Security Measures Using Group Policy Michael Harris ITT-430-0500 November 30, 2023 Dr. Chuck Brust Benchmark - Deploy Security Measures Using Group Policy 1
Benchmark - Deploy Security Measures Using Group Policy Part 1: 10 Security Policies 1. Minimum password length must be set to 14 or more characters. - This policy setting determines the least number of characters that make up a password for a user account. 2. All passwords must meet the basic requirements for a strong password. - The user should not include their name or exceed 2 consecutive characters. - English uppercase characters (A through Z) - English lowercase characters (a through z) - Base 10 digits (0 through 9) - Non-alphabetic characters (for example, !, $, #, %) 3. Ensure 'Domain controller: Allow vulnerable Netlogon secure channel connections' is set to 'Not Configured'. - This security setting determines whether the domain controller bypasses secure RPC for Netlogon secure channel connections for specified machine account. 4. Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled'. - This policy setting determines whether all secure channel traffic that is initiated by the domain member must be signed or encrypted. 5. Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled'. - The secure channel protects domain credentials as they are sent to the Domain Controller. 6. Ensure 'Always prompt for password upon connection' is set to 'Enabled' 2
Benchmark - Deploy Security Measures Using Group Policy - If this is enabled the computer will always prompt the user to enter the password and username rather than just automatically login them in. 7. Ensure 'Set time limit for active but idle Remote Desktop Services sessions' is set to 'Enabled: 15 minutes or less, but not Never (0) - This ensures that the maximum amount of time a user can be on a device or computer is no more than 15 minutes and it will automatically kick you out of the session. This setting helps to prevent active Remote Desktop sessions from tying up the computer for long periods of time while not in use, preventing computing resources from being consumed by large numbers of inactive sessions. 8. Ensure that software and security is regularly updated. - To ensure that the information is secure and there are no vulnerabilities updating the software and security is a easy step to making sure the servers are more secure. 9. Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts' - This policy setting prevents users from adding new Microsoft accounts on this computer. 10. Ensure 'Interactive logon: Don't display last signed-in' is set to 'Enabled'. - This policy setting determines whether the account name of the last user to log on to the client computers in your organization will be displayed in each computer's respective Windows logon screen. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help