Windows XP SP2 Proactive Prevention Comprehensive Protection

  

Since the release of Windows XP in 2001, the information security situation has changed a lot. On September 9, 2002, Microsoft released Windows XP SP11, and 325 patches were made to Windows XP, 33 of which were related to security. In the following two years, there were as many as 64 security bulletins for Windows XP SP1, with more than 80% of the critical and important security bulletins. In the meantime, another feature of malicious attacks is the use of operating system security vulnerabilities to attack, and the user's system settings, network environment and security awareness also provide opportunities for these attacks.

In fact, one year after the release of Windows XP, Microsoft began implementing a plan for trusted computing4. In the Trustworthy Computing White Paper 5, Microsoft proposed the means to implement trustworthy computing:

* Design security: reduce software vulnerabilities

* Default security: reduce attack surface

* Deployment security: Security measures are easier to implement

* User communication: Helping users learn to protect themselves

In Windows XP SP2, the above methods and concepts are well practiced. First, although SP2 is not a new operating system, 140 of its 818 fixes are Base Operating System fixes6 to compensate for software vulnerabilities in the design phase. In addition, Windows Firewall, Internet Explorer, Outlook Express, Windows Update, etc. are in a safe setting by default. Third, the Windows Security Center not only facilitates the security settings of the system, but also intelligently prompts users for security issues. For example, when the virus protection software is not updated in time, a security warning pops up.

Windows XP SP2 Features Overview

In Windows XP SP2, Microsoft provides a variety of security technologies to help users protect against malware and other risks, thereby improving the overall security of Windows XP. These security technologies include:

* Network Protection This type of security technology includes Windows Firewall Enhancement and Remote Procedure Call (RPC Remote Procedure Call), which helps to base on similar shockwaves (MSBlaster). The attack behavior of the network provides better protection. These enhancements include: turning Windows Firewall on by default, shutting down ports unless the port is used, an improved configuration user interface, improved application compatibility when Windows Firewall is turned on, and enterprise management tools for Windows Firewall through Group Policy. The attack surface of the remote procedure call service is reduced, and the object runs at a lower privilege level. The DCOM architecture also adds access control restrictions to reduce the risk of being hit by cyber attacks.

* Memory Protection Some software allows too much data to be copied into the computer's memory, and malware attacks can take advantage of this security weakness. Usually this phenomenon is called buffer overflow. Although no single technology can completely eliminate this problem, Microsoft is using multiple security technologies from different perspectives to mitigate such attacks. First, recompile the core Windows components with the latest compilation techniques, adding protection against buffer overflows. In addition, Microsoft is working with microprocessor vendors to enable Windows to support the hardware-based Data Execution Prevention feature on microprocessors. Data Execution Protection marks all memory locations of an application as unexecutable by the CPU unless these locations explicitly contain executable code. This way, when a worm or virus is inserted into the program code and into the storage portion marked as data only, the application or Windows component will not run it.

To view and set data execution protection, click the “Start” button, in the pop-up menu, right-click “My Computer” and select “ Properties in the shortcut menu ”. In the "System Properties" dialog that opens, select the "Advanced" tab, click the "Settings" button in the performance options, and select "Open" in the "Performance Options" dialog box. Data Execution Protection & rdquo; tab.

* Email Processing Security technology helps stop viruses that spread through email and instant messaging (such as SoBig.F). These technologies include security-enhanced default settings and improved attachment control using the AES Attachment Execution Service application interface. This enhances the security and reliability of communications applications such as Microsoft Outlook, Outlook Express, and Windows Messenger. As a result, potentially unsafe attachments delivered via e-mail and instant messaging are isolated and affect as little as possible of the rest of the system.

* Browsing Security Security technologies in Microsoft Internet Explorer provide protection against malicious content on the Web. One of the improvements is to lock the native zone to avoid running malicious scripts and enhancing the organization's harmful web downloads. In addition, better user controls and user interfaces help prevent malicious ActiveX controls and spyware from running without the user's knowledge.

Copyright © Windows knowledge All Rights Reserved