ABSTRACT

Some organizations focus only on network perimeter security and overlook host security. Host security addresses weaknesses in default operating system installation and application configuration. The first step to strong host security is understanding each system’s role in organization. The operating system hardening is the process of locking down system to ensure that it is not providing too much access or running too many unnecessary services. The security Manager takes Microsoft’s Security Configuration Manager and extends its use by providing centralized management and a knowledge base of best practices. System–integrity checkers are the most popular tools for host security monitoring. These programs take a snapshot of people system, usually in the form of a cryptographic hash for each file, object, or Registry key. “Firewalls and Perimeter Security,” but firewalls are also useful for host security protection on internal network. The restore process is much less painful and timeconsuming if have a proper backup plan in place.