10 Immutable Laws of Security Administration





10 Immutable Laws of Security Administration



Law #1: Nobody believes anything bad can happen to them until it does

Law #2: Security only works if the secure way also happens to be the easy way

Law #3: If you don’t keep up with security fixes, your network won’t be yours for long

Law #4: It doesn’t do much good to install security fixes on a computer that was never secured to begin with

Law #5: Eternal vigilance is the price of security

Law #6: There really is someone out there trying to guess your passwords

Law #7: The most secure network is a well-administered one

Law #8: The difficulty of defending a network is directly proportional to its complexity

Law #9: Security isn’t about risk avoidance; it’s about risk management

Law #10: Technology is not a panacea

Microsoft has established several best practices for improving potentially faulty configurations, the following is a concise list.

Secure all privileged accounts and groups by using proper configuration settings and techniques.

Avoid disabling security features on users’ computers.

Avoid granting excessive rights and permissions to accounts (particularly service accounts).

Avoid using identical local credentials across systems.

Do not permit the installation of unauthorized applications and utilities that create vulnerabilities.

Eliminate permanent membership in highly privileged groups.

Eliminate unnecessary applications and utilities on domain controllers.

Do not allow downloads of Internet content and freeware utilities on the domain controllers.

Limit membership in key security groups like Domain Admin

Recent Articles

How to configure restriction for Users from creation of Office 365 groups, Plans & Microsoft teams.

Connect-AzureAD Create new Security Group "AllowedtoCreateGroups" Get-AzureADGroup -SearchString "AllowedtoCreateGroups" $GroupName = "<SecurityGroupName>" $AllowGroupCreation = "False" Connect-AzureAD $settingsObjectID = (Get-AzureADDirectorySetting | Where-object -Property Displayname -Value "Group.Unified" -EQ).id if(!$settingsObjectID) { $template = Get-AzureADDirectorySettingTemplate | Where-object...

Attack Simulator for Office 365

Microsoft has released Attack Simulator (currently in Preview) to allow Office 365 Global Administrators to simulate phishing campaigns and other attack simulations. Prerequisites ·       Your organization’s email...

What is Advanced Threat Analytics?

Advanced Threat Analytics (ATA) is an on-premises platform that helps protect your enterprise from multiple types of advanced targeted cyber-attacks and insider threats. How ATA...

How to remove Office 365 Groups permanently ?

  Hi Guys, Here is process how to remove office 365 groups or soft deleted groups from your office 365 tenant. Step-1 you need to connect with Azure...

How to solve the issue of guest users access in Office 365 when you applied restriction on office 365 groups creation tenant wide?

Connect-AzureAD via powerShell Run the following command: $template = Get-AzureADDirectorySettingTemplate | ? {$_.displayname -eq "group.unified"} See if you already have an AzureADDirectorySetting object,...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Stay on op - Ge the daily news in your inbox