MS-09-P1 Microsoft Endpoint Security Flashcards
Scrambles computer information
Encryption
Used to encrypt (scramble) and decrypt (unscramble) data
Keys
Utilizes many available algorithms and methods
Symmetric (shared key) and asymmetric (public/private key)
Pre installed in windows 10 and provides disk encryption method for OS, uses key lengths of 128 and 256, provides pre-boot protection, network unlock, GUI and Powershell managment
BitLocker
used for bitlocker key protection
TPM - Trusted Platform Module
A microcontroller embedded in the system and generates cryptographic keys
TPM - Trust Platform Module
An application that allows restricting multiple apps with a single rule. helps administrators control which apps and files users can run, including executable files, scripts, dynamic-link libraries (DLLs),and others.
AppLocker
Is a policy used to identify applications
Application Identify
T or F: Policy should be set to automatic for any AppLocker usage
True
.exe
Executable
.msi, .msp, .mst
Windows Installer
.ps1, .bat, .cmd, .vbs, .js
Script
Make sure files function properly
AppLocker Default Rules
Uses the app’s digital signature for identification
Publisher
Uses the app’s location in the file system for identification
Path
Identifies a file by a generated hash
File Hash
Ptovides network traffic protection and enables program integration
Windows Firewall
Enabls exception configuration
Windows Firewall
Rules that manage incoming traffic`
Inbound rules
manage traffic generated in the system and sent out of the system
Outbound Rules
This section focuses on file sharing in the Windows environment
Server Message Block (SMB)
a shared resource over the network requires authentication and permission-based authorization.
Access Process
permissions(or authorization)determine the type of access users have to the shared folder across the network.
Sharing-level
Security permissions are used to manage access to files and folders stored in the local NTFS file system.
security permissions(or simply permissions) and share permissions
s another advanced feature of NTFS. NTFS maintains a detailed log of disk changes, failures, and errors.
Fault tolerance
File or folder access can be denied by explicitly adjusting settings to deny certain users. Deny permission overrides granted permissions.
Deny Permission
is the process of scrambling data in order to convert it into a non-human-readable format.
Host Encryption
employ the use of one key for both the encryption and decryption of data.
Symmetric ciphers