How to strengthen the security function of Win7 operating system

  

Windows 7 is Microsoft's newest desktop client operating system. It is a new system based on the advantages and disadvantages of Windows XP and Vista. All services have been enhanced, and new security features have made it more reliable. . In addition to basic system improvements and new services, Windows 7 provides additional security features, enhanced auditing and monitoring capabilities, and the ability to encrypt remote communications and data. Windows 7 also developed an internal protection mechanism to enhance internal security. Performance such as kernel remediation protection, service hardening, data execution defense, address space layout randomization, and mandatory integrity levels. All improvements to Windows 7 are security-centric. First, the system is used to develop Microsoft's Security Development Lifecycle (SDL) framework and to support common standards requirements, allowing it to meet an Assessment Confirmation Level (EAL) 4 certificate that complies with the Federal Information Processing Standard (FIPS) #140-2 . In addition, by leveraging other security tools such as Group Policy, you can control every aspect of desktop security. If Windows 7 is primarily used for home office or personal use, it can also prevent hacking and intrusion. You can also think that Windows 7 is safe internally, but that doesn't mean you can rely on the default configuration, you need to adjust to your own security needs. In this article, we'll look at how to ensure Windows 7 security, security configuration, and some little-known Windows 7 security features, and we'll look at protecting data, backing up data, and how to deal with an attack or system failure. Run the data quickly. This article also introduces the concept of security, how to strengthen Windows 7, how to provide security for running programs, how to manage the security of Windows 7, how to deal with the problems caused by malware, as well as the protection of data, backup and recovery of operating system functions, How to recover to the state before the operating system and how to recover data and systems when the system fails. The purpose of this article is to familiarize you with the security features, enhancements, and in-depth understanding of how to properly deploy these security features. Note: If you work in a corporate environment or other professional environment, please do not set up your company computer. If you are not familiar with security issues or Microsoft products, please read the relevant documents carefully when making changes to the system. Basic Security Considerations Management security mechanisms require analytics to adapt existing security architectures and identify potential attacks. Most of the time, security mechanisms will be attacked by malicious or malicious programs. If potential attacks are discovered in time, they can be active. Resist the attack. Through logging and auditing, you can find out if someone is trying to log in to the router or trying to log in as an administrator account. Logs and alert information are very helpful so that when something goes wrong, you can react quickly. Responding to a thorough attack is called “attack response” and the key to responding correctly is to have a positive plan. A disaster recovery plan (sometimes combined with a business continuity plan) can help recover from an attack. Therefore, for home users and independent system users, you should follow the same strategy. You need to protect your data and react to disasters, and a well-planned plan can make you invincible. If your system is infected with malware (such as Trojans) and all other recovery technologies fail, you may need to reinstall your system. In this case, you should pre-designate team members before the disaster to clarify their work to minimize the impact of the disaster on the system. Note: You should review your plan on a regular basis, especially if you have the biggest problem or failure, and add the necessary items. Tip: Security measures should be considered and deployed for any system or service to reduce the risk of an attack. If security measures are deployed in such a way that you can defend against attacks or disasters, you will save a lot. At the same time, we should also consider the use of defense-in-depth technology to deploy security measures both conceptually and technically, and security measures must be considered and deployed for all systems, services, applications, and network devices. In order to prevent the security architecture from leaking, we can consider using a security model that takes advantage of the concept of vertical breeding. Figure 1 shows a very basic defense-in-depth application. Of course, you can add more layers of protection, depending on how the network is built. As you can see from here, defense-in-depth technology can be customized to your needs. In the example above, the purpose of the security policy is to provide a secure direction and communication to the user's system and network. In addition, enhancements to systems, handsets, desktops, services, applications, servers, routers, switches, and PBX should also be considered to ensure that all interfaces are secure. If you are using a wireless network, you should also use filters, scanners, and other tools to check and record any information. Windows 7 is very flexible, it contains many options to configure a fully functional system (minimum security), or just configure the operating program you need to use (highest security), using Windows 2008 and Windows 7 correctly will make it safe Performance increased by 10 times. Note: It is important to remember that denying the problem (potential problem) is not acceptable. If you ignore the problem or fix it later, it will complicate the problem, which will only waste time. Full deployment security measures can be lower than most penetration attacks and provide multiple levels of protection, and of course, cannot completely prevent attacks. You need to understand the basics of security mechanisms and how to prevent attacks aggressively or passively. On how to configure Windows 7 security settings, you can find a lot of templates and detailed instructions on Microsoft's official website, which can help you deploy and use Windows system security measures step by step. When deploying security measures, we also need a certain level of flexibility to maintain a high level of security while meeting business goals and requirements. For example, we can use the User Account Control Tool (UAC) to provide a high level of security when properly debugged. UAC is used to prevent processes or applications from modifying the computer to manipulate the system. It is implemented by restricting access rights within the operating system kernel. It will also provide users with programs that attempt to install or further configure the operating system. details. This is very helpful and allows us to confirm the activities of the program and take appropriate action. UAC first appeared in the Vista system, but because it could not be closed, the prompt message that popped up made the user feel bored. Windows developers have also encountered coding problems because of UAC limitations. However, Windows 7 now completely shuts down UAC, providing more flexibility and choice. Warning: In order to ensure the security of the system, we recommend that you do not completely turn off UAC or when you turn off UAC for some operations, please remember to open UAC afterwards. Windows 7 Installation and Hardening When deploying Windows 7, it is always recommended to install the operating system on the new compatible hardware and then harden it. System hardening is a necessary process to increase the level of security, primarily by configuring the necessary security settings, removing unwanted software and adjusting advanced policy settings. Note: When choosing hardware for Windows 7, you need to make a plan, because if you want to use virtualization, Windows Trusted Platform Module (TPM) management and other features (such as BitLocker), you need to buy the right hardware. Implement these features. So, what steps do you take to harden it after installing the operating system? Is there a specific order? The steps for system hardening are the same as the basic installation steps, removing all things that are not needed, updating the system, and applying basic security techniques. Then perform a backup to quickly restore the system if necessary, as follows: Step 1—— Install the operating system, select all options that enhance security during the installation process, and do not select unnecessary services, options, and programs. Step 2——Install the Administrator Toolkit, Security Tools, and Required Programs Step 3——Delete unwanted services, programs, and software, disable or delete unnecessary user accounts or groups. Step 4—— Update all security procedures in a timely manner Step 5—— Run security audit (scanner, template, MBSA, etc.) to evaluate current security level Step 6—— Run system restore and create restore point, run for disaster recovery Backup and recovery application step 7—— backup operating system, able to quickly recover the system after a disaster is just a simple example, you can add more steps. After completing the Windows 7 installation, the next step is to remove any unwanted software, services, protocols, and programs that can be operated from the control panel. Then disable or delete unnecessary user accounts or groups. Tip: In Server2008, you can install the "Core" function, which is an intensive process for the actual installation. After installation, the server will only run the necessary functions, thus reducing the risk of security breaches. Windows 7 doesn't have this feature, we need to enforce the policy by using policies, templates, or manually configuring security settings.

Copyright © Windows knowledge All Rights Reserved