Configure Windows Security Settings Flashcards
Lesson 14C (58 cards)
Configuring members of the Administrators built-in group.
UAC requiring confirmation of the use of administrator privileges.
Configuring UAC notifications.
Configuring Windows Hello sign-in options.
Security groups in Active Directory
Group Policy Management.
Configuring iOS device enrollment in Microsoft’s Intune Enterprise Mobility Management (EMM)
suite.
Logical security controls
are digital safeguards that protect systems and data through authentication, authorization, and accounting mechanisms, ensuring only authorized users can access resources while monitoring and enforcing security policies.
Security Control Classes
- Physical controls: Examples fences, doors, and locks.
- Procedural controls Examples incident response processes/ management oversight/training programs.
- Logical controls: Examples user authentication, antivirus software, and firewalls.
access control system
- Authentication
- Authorization
- Accounting
access control systems
Authentication
ensures that users and systems are verified through unique accounts and credentials, allowing only authorized access to protect security.
access control systems
Authorization
ensures that users can access resources based on predefined permissions, with access control lists defining actions they can perform, such as reading or editing files.
access control systems
Accounting
means logging when and by whom a resource was accessed.
access control list (ACL)
defines permissions for resources, specifying allowed actions for users, computers, or services based on identifiers like MAC address, IP address, port number, or security ID (SID).
Implicit deny
is a security principle where access is denied by default unless explicitly permitted, commonly used in ACLs and firewall policies to ensure unauthorized requests are blocked.
least privilege
security principle, balancing security with usability to minimize risks(challenging) and support overhead.
user account
is the principal means of controlling access to computer and network resources
user account
local account
defined on a specific computer, stored in the Security Account Manager (SAM) within the KEY_LOCAL_MACHINE registry, and cannot be used to access other devices or network resources.
user account
Microsoft account
an online identity linked to an email address, allowing access to multiple devices and services while enabling synchronization of profile settings across them.
Security Groups
are collections of user accounts used for efficient permission management, with built-in groups like Administrators having high-level access, while custom groups enforce least privilege principles for security.
security group
standard account
has limited system permissions, allowing them to manage their profile settings, run applications, install store apps, use printers, and shut down the computer, while administrative accounts should be restricted for security.
security groups
Guest group
is only present for legacy reasons. It has the same default permissions and rights as the User group.
security groups
Power Users
was originally designed to provide intermediate permissions between administrators and standard users but was deprecated in Windows 10/11 due to security risks, now functioning with the same permissions as the Users group.