Networking Fundamentals for Hardening Windows Flashcards
(11 cards)
What is best practice for network device management?
- Ensure you keep the software of your network devices current.
- Enable auditing on devices.
- Integrate authentication using LDAP.
- Use a Privileged Access Management (PAM) solution.
- Disable or prevent local account access and change default usernames
and passwords. - Ensure the management of devices is encrypted (SSH).
- Isolate the management network.
- Don’t allow the management of network devices from the internet.
What group policies focus on network security?
- Microsoft network client settings focus on how clients communicate with servers
and how those communications are handled. - Microsoft network server settings focus on how servers accept communications
from clients and handle those sessions. - Network access settings control how clients and users connect and interact
remotely with each other and to file shares. - Network security settings focus on hardening the protocols and authentication
methods used to authorize communication between clients and servers.
What are best practices for securing wireless networks?
- Do not use Wired Equivalent Privacy (WEP).
- Enable enterprise-grade authentication
- Ensure any guest networks, Operational Technology (OT) networks, and Internet
of Things (IoT) networks are isolated from more sensitive production networks
and ensure all guest access is protected. If using a guest SSID with a password,
implement a process to rotate the password regularly. - Ensure the WLAN infrastructure is kept current and up to date.
What is best practice for securing WLAN on the local device?
- Block connections to suggested open hotspots and networks shared by contacts or paid services. These features are known as Wi-Fi Sense.
- Block internet sharing.
- Block Wi-Fi Direct.
- Minimize the number of simultaneous connections to the internet or a Windows
domain. Set preventing Wi-Fi when on Ethernet. - Block connections to a non-domain network when connected to an authenticated
domain network. - Block access to the Windows Connect Now (WCN) wizards.
- Block the configuration of wireless settings using WCN.
- Remove any unused Wi-Fi networks if possible.
What is best practice for securing Bluetooth on the local device?
- Ensure the strongest Bluetooth security mode is enforced for all users where
Bluetooth is enabled. Bluetooth operates in two security modes with four levels of differing variance that can be mixed if supported by the device. - For the strictest security, use security mode 2 with level 4 and require communications that are paired, encrypted, and signed. For the least restrictive, you would use level 1, which will not require any security at all.
- Ensure Bluetooth is listed and referenced in the company security policies and that
the device settings have been modified to reflect these policies. - Ensure any users enabled to use Bluetooth are fully aware of security issues with
Bluetooth and their responsibilities while using it. - Delete unused Bluetooth pairings or configure allowed Bluetooth services and
policies using MDM.
Define Microsoft “Always on VPN”
A configurable Windows VPN profile that can automatically connect when off your corporate network.
What are the requirements for Always on VPN?
- AD Domain Services
- DNS server
- Network policy and access services (NPS-RADIUS)
- AD Certificate Authority (CA)
- Remote access (direct access and VPN-RAS)
What is best practice for Windows Server networking?
- Windows server implementations should only be connected using Ethernet for security purposes and for any needed internet access.
- Servers should be on a separate network segment from your client devices if possible.
What is best practice for securing VMs in Hyper-V?
- Use a secure network for both host management and Virtual Machines (VMs).
- Use separate networks and dedicated physical adapters for the physical hosts.
- Use a separate secure network to access virtual hard disk files and VM
configurations. - Use a separate secure network for any VM migrations and ensure encryption is
enabled. - For VMs, ensure the virtual network interface cards (NIC) are connected to the
correct virtual switch and are configured with the correct security settings.
https://docs.microsoft.com/en-us/windows-server/virtualization/
hyper-v/plan/plan-hyper-v-security-in-windows-server
Describe Microsoft “Network protection”
A security feature that can be enabled through the Exploit Guard features of Microsoft Defender; Helps security feature that can be enabled through the Exploit Guard features of Microsoft Defender; Reduce attacks from low-reputation IP and URL sources known for malicious activity; Includes extensions for Chrome and Firefox.
What can network protection be enabled?
Group policy and Intune