Monitoring with built-in Windows tools can prevent the worst from happening after an attempted attack.
For some initial, crucial findings in Windows during incident and event management, you do not need to look further than the existing Event Viewer logs. After the introduction of Windows Server 2008 and Vista, Microsoft established a more granular approach. The events are sorted into categories along with subcategories for improved monitoring and recording. Typing
at the command line lists a quick overview of the possibilities and shows the current configuration (Figure 1).
Figure 1: The output for auditpol /get /category:* shows an overview of monitored events.
You will usually control the Advanced Audit Policy Configuration
settings with a group policy; you can also set it up at the command line. If you want the configuration to be used, it needs to be enabled. On newly installed systems, the correct value is set by default and does not need to be defined explicitly. However, best practices dictate activating this value with group policy for safety's sake. The reason lies in the legacy Active Directory (AD) installed on Windows Server 2000/2003, whose Default Domain Controllers Policy has never been edited or still uses the obsolete monitoring policy. You can reset the
...
Use Express-Checkout link below to read the full article (PDF).
We discuss how to manage and secure clients with group policy object templates and look at some recommendations from various governmental and non-governmental security advocates.
Windows Defender Application Control protects systems against threats that traditional virus scanners and signature-based mechanisms cannot detect by restricting applications in the user context and reducing the code allowed in the system kernel.
Microsoft operating systems are not necessarily regarded as the epitome of computer security, but the free Security Compliance Manager helps enforce some basic hardening measures.