Firewalls and IDSs

 

1. Windows Defender Firewall is a host-based firewall and like other host-based firewalls it is easy to configure compared to a hardware-based firewall. It allows to add and remove programs and ports on different network domains. An administrator is able block all inbound connections for maximum security in case a system is under attack. Windows Defender Firewall also supports IPSec, which can enforce device authentication prior to any communication. To configure a Windows Defender Firewall on Windows 11, go to Settings, then to Update & Security and to Windows Security. To configure a Windows Defender Firewall, go to Control Panel, then change to Large Icon View, go to Windows Defender Firewall and finally, Advanced settings. To add a program in the firewall, click Inbound Rules and then New Rule. Following that select Program from the Rule Type. Then browse to select the program executable file Tick Allow and choose what network domain the firewall will be applied to – either Domain, Private, or Public. Type a Name and Description if required. To add a port in the Windows Defender Firewall, go to New Rule, then click Port for the Rule Type. After that select TCP for Does this rule apply to TCP or UDP. Following that choose Specific local ports and switch allow for the TCP port. Ensure Allow the connection is selected. Select either Domain, Private, or Public and choose a Name and Description if necessary. 

2. Both network-based IDS (HIDS) and NIDS (host-based IDS) analyse data without interrupting the traffic flow and sending alerts when a threat is detected. While NIDS has holistic view of the network, HIDS has an ability to monitor internal workings of the host. One of the disadvantages of a NIDS is that it can generate many false positives. On the other hand, the problem with using HIDS is that it can only monitor a single host. The other major distinction between HIDS and NIDS is that HIDS can monitor encrypted traffic that NIDS cannot. 

3. It is advisable not to assign permissions to individual users but to groups of users because it is easier to keep track of groups of users. This way no user will get too many permissions that they do not require at a time. Instead, the user will be moved between groups as their permission requirements change. It is not recommended to assign a user administrator permissions unless it is necessary as this is a very powerful privilege that could cause a lot of harm if abused. If several documents are required to be accessed by many different employees, it is recommended they be grouped in one folder and that folder be shared.

Comments

Popular posts from this blog

Data breaches and their consequences

Data breach mitigation

Biometric authentication methods