نمایش نتایج: از شماره 1 تا 1 از مجموع 1
سپاس ها 3سپاس

موضوع: چک لیست های امنیتی

  
  1. #1
    نام حقيقي: Mohsen.A

    عضو عادی شناسه تصویری silas
    تاریخ عضویت
    Apr 2010
    محل سکونت
    Tehran
    نوشته
    240
    سپاسگزاری شده
    277
    سپاسگزاری کرده
    67

    چک لیست های امنیتی

    IT Checklist
    This is by no means a complete list but rather a guideline for basic IT functions that should be
    performed regularly.

    Daily:
    · Check event logs of every server.
    · Check backup logs of every server. Look for skipped files.
    · Change tapes in each server daily.
    · Update off site tape storage.
    · Troubleshoot user problems as needed.
    · Document everything you have fixed or performed maintenance on.

    Weekly:
    · Clean Servers, check for .tmp files, and other file pollution.
    · Research, Research, Research.
    · Reboot Servers if needed.
    · Keep up-to-date on IT news regarding my networks.
    · Evaluate software for System Admin and user purposes.
    · Verify that virus definitions are updating on all servers and PCs.

    Monthly:
    · Test restore procedure on each server.
    · Plan for future upgrades.
    · Set System and Application priorities: If more than one thing is broken, what needs to be
    fixed first.
    · Manage off-site storage of backup tapes, whether you take them home or a service picks
    them up.
    · IT System vulnerability analysis: (If something crashes, what will be the impact on other
    things and what will be the process for recovering?)
    · Keep network documentation up to date.
    · Periodically review workload. Are some things no longer done?
    · Periodically review company technical environment. How can it be improved?
    · Performance monitoring.
    · Meet with management to discuss status of network and plan for future changes.

    Initial or Occasionally:
    · Fully document the network. (Diagram, software list, user list, password list, vendor list,
    license list, etc.)
    · Prepare written procedures for routine tasks and troubleshooting and provide to users.
    (re-booting, printer settings, etc.)


    Windows Server 2003, Enterprise Edition Security Checklist
    This checklist will help to secure newly installed Windows Server 2003 member server.
    □ Verify that all disk partitions are formatted with NTFS
    □ Verify that the Administrator account has a strong password
    □ Disable unnecessary services
    □ Disable or delete unnecessary accounts
    □ Protect files and directories
    □ Make sure the Guest account is disabled
    □ Protect the registration from anonymous access
    □ Apply appropriate registry ACLs
    □ Restrict access to public Local Security Authority (LSA) information
    □ Set stronger password policies
    □ Set account lockout policy
    □ Configure the Administrator account
    □ Revoke the Debug programs user right
    □ Remove all unnecessary file shares
    □ Set appropriate ACLs on all necessary file shares
    □ Enable security event auditing
    □ Set log on warning message
    □ Install anti-virus software and updates
    □ Install service packs and critical patches
    □ Automate patch deployment
    □ Scan system with the Baseline Security Analyzer
    □ Additional security settings
    □ Install the latest Service Pack
    □ Install the appropriate post-Service Pack security hotfixes

    For better security, the Windows Server 2003 Security Configuration Wizard can also be used to harden the security of the server.
    First, a security policy must be created.
    □ Click Start, click Administrative Tools, and then click Security Configuration Wizard.
    □ Read the Welcome page and click Next.
    □ Select “Create a new security policy” and then click Next.
    □ Type the name of the prototype server and then click Next.
    □ Wait for the Security Configuration Database to be processed, and then click Next.



    □ On the Role-Based Service Configuration page, click Next.
    □ On the Select Server Roles page, click Next.
    □ On the Select Client Features page, click Next.
    □ On the Select Administration and Other Options page, click Next.
    □ On the Select Additional Services page, click Next.
    □ On the Handling Unspecified Services page, click Next.
    □ On the Confirm Service Changes page, click Next.
    □ On the Network Security page, click Next.
    □ On the Open Ports and Approve Applications page, click Next.
    □ On the Confirm Port Configuration page, click Next.
    □ On the Registry Settings page, click Next.
    □ On the Require SMB Security Signatures page, click Next.
    □ On the Require LDAP Signing page, click Next.
    □ On the Outbound Authentication Methods page, click Next.
    □ On the Outbound Authentication Using Domain Accounts page, click Next.
    □ On the Registry Settings Summary page, click Next.
    □ On the Audit Policy page, click Next.
    □ On the System Audit Policy page, click Next.
    □ On the Audit Policy Summary page, click Next.
    □ On the Internet Information Services page, click Next.
    □ On the Select Web Service Extensions for Dynamic Content page, click Next.
    □ On the Select Virtual Directories to Retain page, click Next.
    □ On the Prevent Anonymous Users from Accessing Content Files page, click Next.
    □ On the IIS Settings Summary page, click Next.
    □ On the Save Security Policy page, click Next.
    □ On the Security Policy File Name page, type a name for the prototype policy, and then click Next.

    Do not name the security policy by using the name of the prototype computer because scwcmd.exe uses computername.xml to save analysis results, and you do not want the security policy to have the same name as the analysis results. That would risk confusion or overwriting.
    □ On the Completing the Security Configuration Wizard page, click Finish.

    Once the security policy is created, it can then be applied to the server.
    □ Click Start, click Administrative Tools, and then click Security Configuration Wizard.
    □ Read the Welcome page and click Next.
    □ On the Configuration Action page, select Apply an existing security policy, type in the full path and file name of the policy, and then click Next.
    □ On the Select Server page, type in the name of the server to which the policy will be applied and then click Next. On the Apply Security Policy page, click Next.



    □ On the Applying Security Policy page, wait for processing to finish, and then click Next.
    □ On the Completing the Security Configuration Wizard page, click Finish.






    موضوعات مشابه:
    ویرایش توسط silas : 2010-10-09 در ساعت 04:53 PM
    jooya، mohsen3k و ehsan653 سپاسگزاری کرده‌اند.

کلمات کلیدی در جستجوها:

چک لیست it

چک لیست امنیتی

چک لیست امنیت سرور

چک لیست امنیت نرم افزار

چک لیست

چک لیست امنیتی شبکه

چک لیست امنیت شبکه

چک لیست امنیت اطلاعات

چک لیست ممیزی IT

چک لیست های امنیتی

چک لیست شبکهچک لیست سرورچک لیست امنیتی نرم افزارچک لیست امنیت در سرویسهاچک لیست امنیتی ویندوز سرور 2003چک لیست سوئیچچک لیست ممیزی شبکهچك ليست امنيت شبكهچک لیست نگهداری سرورچک لیست امنیت رایانهچک لیست امنیتsecurity configuration wizardچک لیست امنیتی کامپیوترچک لیست امنیتی سیسکوچک لیست های فاوا

برچسب برای این موضوع

مجوز های ارسال و ویرایش

  • شما نمی توانید موضوع جدید ارسال کنید
  • شما نمی توانید به پست ها پاسخ دهید
  • شما نمی توانید فایل پیوست ضمیمه کنید
  • شما نمی توانید پست های خود را ویرایش کنید
  •