Answer & Explanation:I want someone to summarize what in this paper into 5 slides powerpoint presentation, It is about this tool compared to other hardening tools. microsoft_windows_security_tool.doc
microsoft_windows_security_tool.doc
Unformatted Attachment Preview
MS Security Compliance Manager
The SCM is the central security manager that has been made by Microsoft. It is a
compliance product that gives both security and policy conformity abilities to the users of MS
windows. Unlike other tools that have been made to harden the windows operating system the
SCM is meant to operate on standalone foundation (TechNet, 2015). Such a baseline has been
developed to ensure appropriate application of products. This is done as a policy and also as a
response to continued response to customer feedback. Given that these policies keep on being
changed, it has been important for the company to come up new improvements. The SCM is
completely integrated into the MS system center. MS security compliance manager is well
understood when discussed together with the entire pool of hardening tools for MS windows.
The security compliance manager uses SQL as the database. If there is no SQL installed it
is not possible to use the express edition. This may not be the case with other tools of hardening
set together with Windows. Apparently the other tools are known for the conjunction of servers
and programs as a chief mechanism of fortification (Sivarajan, 2015).
Settings of the security compliance manager are not part of the baseline. Each baseline
has been set to comply with a specific line of make. Security experts worked on the entire design
with the aim of making a concrete tool. It was a new way of exercising the wisdom needed in the
production of precaution systems. In the end, the ultimate security manager was supposed to
have negligible limitations. It was intentionally made by taking away ambiguous inputs that can
be easily hacked by prospective invaders of its technology.
Most hardening methods are configurations that have been set inflexibly (Whitman,
Mattord & Green, 2013). They do not support every administrative setting of newer versions of
MICROSOFT WINDOWS SECURITY TOOL
2
Windows. SCM supports administrative applications generally. These include audit policies,
firewalls, security options, user rights, passwords, and lock out specifications. Any group that
cannot be supported by the SCM is restricted in security policies. Fundamental means of
hardening can however be given the abilities of the manager. This is done by leaving their
application on director-based GPO or making of GPO backups.
It is possible to import data into the security compliance manager. This can be baselines
or GPO backups. SCAP and other types of data cannot be imported. This is because it was an
extra component that needed to be incorporated. There was no enough time to create it. Such
importation can be exercised through other methods of security like firewalls (Sivarajan, 2015).
In the future more time can be reportedly deported into the making of versions that are decidedly
bendable.
SCM is open to upgrades of the Windows OS. This is done by the creation of more
baselines; exchange 2010, SQL 2008R and SQL 2008. The new baselines have come as
excitement to the company. These are broad in action and do not act on a simple shield of
applications. They have power-based encryptions that integrate special scripts leaving room for
modification.
The following are the major tolls for hardening that work in conjunction with the SCM;
The Bitlocker is an encryption feature. This protects data when Windows is at rest. It also bars
malicious booting of the windows. Just like the overall strategy of SCM, it is an anti return
program. GC is used as the major encryption style. Secondly, applockers are enhancements that
help the system to white list all the definitions that are in action. Given that the SCM creates a
baseline for security, its settings makes it possible to restrict software deployment that is not
regular. This is used together with the DCM. This is a desired configuration manager (Sivarajan,
MICROSOFT WINDOWS SECURITY TOOL
3
2015). It works by protecting the host. A baseline that is not desirable cannot fit in the
compliance manger.
MS also has MS isolated conversion environment MSICE. It protects all binary files
either from PowerPoint, word or excel. These can be attachments on mails of documents that
have been made locally using the operating system. It is crucial to note that SCM works in
protection B environment. It is selective in all mitigation actions (Whitman, Mattord & Green,
2013). This does not mean that it does not offer permanent protection. Like other tools of
hardening the manager uses all the departments that make up its initial base line. It is a tailored
security mechanism that reduces risks in regard to the architecture of the windows.
In reality it is hard to configure an operating system and help to run safely in an
environment full of attacks. This has been considered in the structure of the security compliance
manager. It incorporates creative tools to maximize the level of security. This calls for important
tasks. For server protection it employs ECs. These configure the programmed bases into distinct
functions that are only noticed by special commands (TechNet, 2015).
Windows hardening have both merits and demerits compared to the SCM. Just like in any
other mechanism of protection, the hardening process seems predictable. It is simple activity of
making configurations that accept one way. The methods of hardening are forced to use an
Exchange server or DNS. Unlike the programming in the SCM these use a galaxy of functions
that make it hard to diversify (Sivarajan, 2015). This is why they have to be retained in narrow
specifications that protect a certain range of applications in the OS. Generally protection can
only be made enough through the consideration of the whole Windows. With every new version
of Windows there comes new boxes and thus hardening is a transient need. It has to be done by
considering all other innovations that are being created in the world of information technology.
MICROSOFT WINDOWS SECURITY TOOL
4
On the other note, the need of hardening can however not be overlooked. It makes it
possible to use fewer slots in programming. The SCM creates and makes use of compliance in
making security. It calls for the importance of urgency versus importance. This is in three elves
of classifying the risks eminent in IT; important, optional and critical needs of protection. These
are leveled at the level of no threats.
The SCM creates a safe environment. It saves the cost of repairing damages that have
occurred due to lack security. It helps to save time in organizations. It also helps to ensure that
operations in organizations are done with the efficiency. When the Windows OS is used together
with the SCM, it becomes possible to enjoy a pool of server security in industries. By adopting
this MS infrastructure that has been tried and proven it has been possible to use the perilous
internet without hitches even in sensitive systems like banking. It is saver than using native tools
that may be built in contemporary technologies.
MICROSOFT WINDOWS SECURITY TOOL
5
References
Sivarajan, S. (2015). Getting started with Windows Server Security: Develop and implement a
secure Microsoft infrastructure platform using native and built-in tools.
TechNet. (2015). Microsoft Security Compliance Manager (SCM) – Frequently Asked Questions
(FAQ). Retrieved from
http://social.technet.microsoft.com/wiki/contents/articles/1836.microsoft-securitycompliance-manager-scm-frequently-asked-questions-faq.aspx
Whitman, M. E., Mattord, H. J., & Green, A. (2013). Hands-on information security lab manual.
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more