{"id":20991,"date":"2021-08-13T00:12:00","date_gmt":"2021-08-12T22:12:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=20991"},"modified":"2024-10-05T21:44:38","modified_gmt":"2024-10-05T19:44:38","slug":"microsoft-und-tenable-geben-tipps-zum-hrten-der-it-umgebung","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/08\/13\/microsoft-und-tenable-geben-tipps-zum-hrten-der-it-umgebung\/","title":{"rendered":"Microsoft and Tenable share tips for hardening the IT environment"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=256636\" target=\"_blank\" rel=\"noopener\">German<\/a>]Both Microsoft and the vendor Tenable have addressed the question of how to better protect corporate environments against cyberattacks and ransomware infections in blog posts. I have summarized the relevant information in the following post.&nbsp; <\/p>\n<p><!--more--><\/p>\n<h2>Microsoft's advice on hardening the environment<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/2e5179988f914fa7a8bf9fcc9120a311\" width=\"1\" height=\"1\">In the blog post <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/08\/11\/7-ways-to-harden-your-environment-against-compromise\/\" target=\"_blank\" rel=\"noopener\">7 ways to harden your environment against compromise<\/a>, Microsoft not only links its <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/06\/09\/crsp-the-emergency-team-fighting-cyber-attacks-beside-customers\/\" target=\"_blank\" rel=\"noopener\">Microsoft Compromise Recovery Security Practice<\/a> (CRSP), but also provides seven tips for improving security.&nbsp; <\/p>\n<ol>\n<li>Patch faster <\/li>\n<li>Actively protect devices <\/li>\n<li>Reduce attack surface from the Internet <\/li>\n<li>Reduce privileges for users <\/li>\n<li>Leverage the power of the cloud <\/li>\n<li>Reduce \"technical debt\" <\/li>\n<li>Look at your logs and respond to alerts<\/li>\n<\/ol>\n<p>While these are generalities and the details can be read in the linked article. On the \"patch faster\" point (within 48 hours if possible), I had somethingwritten about that in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/08\/09\/microsoft-wirbt-fr-erstklassige-monatliche-windows-update-effizienz\/\">Microsoft touts top-notch monthly Windows update efficiency<\/a>. And regarding the smart advice from point 7 to look at the logs, I refer Exchange administrators to the following <a href=\"https:\/\/twitter.com\/cyb3rops\/status\/1425464179507466247\" target=\"_blank\" rel=\"noopener\">tweet<\/a>. <\/p>\n<p><a href=\"https:\/\/twitter.com\/cyb3rops\/status\/1425464179507466247\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/gzyr2VW.png\"><\/a><\/p>\n<p>Looks like Microsoft needs to start with itself and clean some things up. <\/p>\n<h2>Tenable hints as ransomware protection<\/h2>\n<p>I came across the following <a href=\"https:\/\/twitter.com\/TenableSecurity\/status\/1425858163325030405\" target=\"_blank\" rel=\"noopener\">tweet<\/a> from security provider Tenable, which suggests 6 steps that can protect against ransomware attacks.&nbsp; <\/p>\n<p><a href=\"https:\/\/twitter.com\/TenableSecurity\/status\/1425858163325030405\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Tenable about Ransomware protection\" alt=\"Tenable about Ransomware protection\" src=\"https:\/\/i.imgur.com\/sZXN3RE.png\"><\/a><\/p>\n<p>This document provides the following six tips on what to do to protect against ransomware attacks.<\/p>\n<ol>\n<li>Scan frequently and all IT systems for signs of ransomware<\/li>\n<li>Harden and specially protect Active Directory (AD) against attacks<\/li>\n<li>Reduce privileges of users in the IT environment<\/li>\n<li>Prioritize, because you can't patch everything<\/li>\n<li>Eliminate vulnerabilities in IT &#8211; but completely <\/li>\n<li>Measure the measures via appropriate metrics<\/li>\n<\/ol>\n<p>Details on the individual punctures can be found in the linked document. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Both Microsoft and the vendor Tenable have addressed the question of how to better protect corporate environments against cyberattacks and ransomware infections in blog posts. I have summarized the relevant information in the following post.&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-20991","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=20991"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20991\/revisions"}],"predecessor-version":[{"id":35875,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20991\/revisions\/35875"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=20991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=20991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=20991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}