Section 20.194 Group Policies Flashcards

Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Group Policy

A

A set of rules and policies that can be applied to users or computer accounts within an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accessing Group Policy Editor

A

■ Access the Group Policy Editor by entering “gpedit” in the run prompt

■ The local Group Policy Editor is used to create and manage policies within a Windows environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Group Policies Overview

A

■ Each policy acts as a security template applying rules such as

● Password complexity requirements,
● Account lockout policies
● Software restrictions
● Application restrictions

In a Windows environment with an Active Directory domain controller, you have access to an advanced Group Policy Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Templates

A

■ A group of policies that can be loaded through one procedure

■ In corporate environments, create security templates with predefined rules based on administrative policies

■ Security Template: A group of policies that can be loaded through the Group Policy Editor

■ Group Policy Objective (GPO): Used to harden the operating system and establish secure baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baselining

A

■ A process of measuring changes in the network, hardware, or software
environment

■ Helps establish what “normal” is for the organisation

■ Identifies abnormal or deviations for investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Group Policy Editor in Windows

A

■ Access the Group Policy Editor by entering “gpedit” in the run prompt

■ Create allow or block list rules for application control policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Creating a Rule in Group Policy Editor

A

■ Launch the Group Policy Editor

■ Navigate to “Computer Configuration” > “Windows Settings” > “Security Settings”
> “Application Control Policies” > “App Locker”

■ Create an executable rule
■ Choose to allow or deny
■ Select who the rule applies to (e.g., everyone)
■ Define the rule based on conditions like publisher, path, or file hash.
■ Specify the path to be blocked (e.g., the temp directory)
■ Name the rule and provide a description
■ Decide whether to create default rules (allow or deny) and save the policy
■ Deploy the policy across the environment for system hardening

Windows Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rules in Group Policy Editor

A

Allow Rules (Default):
● Allow files in the “Program Files” directory to launch
● Allow files in the “Windows” folder to launch
● Allow administrators to launch any file

Deny Rule (Custom):
● Block all files from running in the “temp directory”

By following these steps, you can establish a secure baseline for your Windows systems, improving overall security and policy management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly