software or tool for security

Discussion in 'Application Software' started by totalbeliever, Feb 27, 2017.

  1. totalbeliever

    totalbeliever MDL Junior Member

    Joined:
    Oct 22, 2015
    Messages:
    96
    Likes Received:
    17
    Trophy Points:
    0
    Is there a software/ tool to make it harder for attackers to penetrate a network and obtain privileged account access? How do I add protection to privileged groups that control access across a range of domain-joined computers and applications on those computers?
     
  2. GodHand

    GodHand MDL Addicted

    Joined:
    Jul 15, 2016
    Messages:
    534
    Likes Received:
    880
    Trophy Points:
    30
    You can do this very easily on Windows Server using GPO and an encrypted VPN.
     
  3. pisthai

    pisthai Imperfect Human

    Joined:
    Jul 29, 2009
    Messages:
    7,060
    Likes Received:
    2,158
    Trophy Points:
    240
  4. CHEF-KOCH

    CHEF-KOCH MDL Expert

    Joined:
    Jan 7, 2008
    Messages:
    1,198
    Likes Received:
    1,188
    Trophy Points:
    60
  5. Korvar

    Korvar MDL Novice

    Joined:
    Apr 12, 2016
    Messages:
    15
    Likes Received:
    16
    Trophy Points:
    0
    I have to agree that (properly configured) hardware firewalls are the first line of defense. Writing out a security plan is also a good idea in a commercial production environment - that is, what are the likely vectors of attack and how can those be mitigated?

    Nothing is bulletproof - a good strategy will involve concealing valuable resources on your net to greatest extent possible. Then add as many barriers and restrictions as possible, balanced against the resources (budget) available and the flexibility absolutely needed (not wanted) for users of the network. You should ideally start from "all users have no privileges" and then add only those actually needed by each group, if you want to maximize security.

    The idea is to maximize the chance of 1) not being found and 2) making it difficult enough not to warrant the time investment someone would need to crack the security, relative to the value of the assets on the network.
     
  6. totalbeliever

    totalbeliever MDL Junior Member

    Joined:
    Oct 22, 2015
    Messages:
    96
    Likes Received:
    17
    Trophy Points:
    0