Configure Workstation Security Flashcards
Lesson 17A (43 cards)
Using the local Group Policy editor to view password policies.
Using the Properties dialog box to unlock a user account.
Configuring AutoPlay. D3300 is a digital camera that has been connected to the computer previously.
Windows Defender Antivirus configuration page within the Windows Security app.
The Real-time protection setting can be toggled off to disable Windows Defender Antivirus temporarily.V
Windows Defender Firewall with Advanced Security—Profile Settings.
Configuring inbound filtering rules in Windows Firewall with Advanced Security.
Applying encryption to a folder using EFS.
A file that has been encrypted cannot be opened by other users—even administrators.
Configuring BitLocker and BitLocker To Go via the Control Panel.
Removable drive protected with BitLocker To Go. (Screenshot courtesy of Microsoft.)
Length & Complexity: A strong password
- should be at least 12-16 characters long, incorporating uppercase and lowercase letters, numbers, and special symbols.
passwords
Avoid Common Words:
-Using dictionary words, personal information, or predictable sequences (like 123456 or password) makes passwords highly vulnerable to brute-force attacks.
password
- Unique Passwords Per Account:
Reusing passwords across multiple accounts increases the risk—if one password is compromised, all linked accounts become accessible.
passwords
- Password Managers:
These tools help generate and store complex passwords, eliminating the need for users to remember multiple credentials manually.
passwords
- Regular Updates:
Changing passwords periodically reduces the risk of long-term exposure in case of a breach.
passwords
- Multifactor Authentication (MFA):
Even if a company can’t universally implement MFA, using it where possible significantly strengthens security by requiring a secondary authentication factor.
passwords
- Monitoring for Breaches:
Keeping an eye on password breaches using services like Have I Been Pwned can alert users if their credentials have been exposed.
BIOS/UEFI passwords
restrict system access before booting, with UEFI potentially supporting pre-boot authentication for network credential verification.
End-user security best practices
involve locking workstations when unattended, securing devices against theft, and protecting personal and confidential information from exposure or unauthorized access.
Account management
follows the principle of least privilege, limiting user permissions and minimizing admin accounts to reduce security risks, with protections like UAC and sudo.
Default administrator accounts
should be disabled if possible; otherwise, they must be secured with unique passwords, monitored for usage, and restricted to prevent unauthorized access or privilege misuse.
Guest accounts
allow unauthenticated access, so they should be disabled unless required for specific functions like passwordless file sharing, and monitored across systems to ensure compliance with security policies.
Account policies
enforce security controls through OS settings like Local Security Policy and Group Policy Objects, implementing login time restrictions, failed attempt lockouts, concurrent session limits, and automatic screen locking to enhance protection against unauthorized access.