Figure 1 : Security classified according to 'depth security'
The idea behind 'in-depth security' is to design solutions that include many independent security layers, all of which have a duty to protect your resources. In order for an unauthorized user to increase the access level to the resource you are trying to protect, he must destroy the existing defense classes on the floors including the human class, the unspecified class. In Figure 1. This principle will help your system to be safe in case it has been attacked by several layers. With these principles, let's take a look at some examples of how security measures can be taken for device control in Windows Vista.
Device Installation Control (Control device settings)
Windows Vista has been loaded with various security features, compared to the 'predecessors' we introduced in part 1 of the article. One of those features is Device Installation Control, which provides you with an essential way to control whether a device's user is allowed to install on the computer and install it. set like. Microsoft has written step by step on how to get users to get started with this feature, but in this article, we will introduce you to some more examples on how to apply. they are before the principles involved in the use of minimum and white lists. Before introducing you need to know some of the following:
Example 1 : Device control has minimal privileges
In this example, we will show you how to prevent users from installing hardware devices on a Vista computer.
We use the Group Policy Management Console, so from Vista you must log in with a domain account to modify Group Policies.
At the Start command window Search you type GPMC.MSC and press Enter
1, Go to Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
2, Configure the following settings (as shown in Figure 2)
Figure 2 : Prevent anyone from installing new hardware.
3, After applying the GPO, we will check how these settings work, Figure 3, 4 and 5 show you this clearly.
Figure 3 : A USB device you want to install on your computer
Figure 4 : Mechanism to restrict the device that is working with the message you inserted
Figure 5 : In Device Manager you can see the USB has not been installed
Example 2 : Control the device with a white list
In this example we will show you how to prevent users from installing hardware devices except those listed on the white list. Before doing so, you should know some things about device classes and IDs (hardware IDs). Figures 6 and 7 show you the device classes and IDs from the Device Manager window.
Figure 6 : Viewing device classes
Figure 7 : View their ID
With this example, we will show you how to use the device-based device restriction feature.
You can collect both device classes and IDs that you want to restrict or allow using the GUI in Device Manager, the method that people feel most friendly or can be more comfortable with and using the command line . In this article, we will show you how to use a pretty convenient command line tool from Microsoft called DevCon, you can find it here.
Copy the command line utility to the Vista reference machine and open the command line as an administrator. We won't cover all of the command-line options here, but simply introduce how to use DevCon in the example.
1, At the command line you type the command as shown in Figure 8:
devcon classes
This command will display all device classes available on the computer you use to read this ID and class.
Figure 8 : Complete list of device classes on the computer used to retrieve the ID
2, In the example, we do for a 4GB USB (ie only this USB has the right to install into your protected system), so we need the device ID from this device. reference reference, typing as shown in Figure 9:
devcon hwids usb *
Notice some things for this command line example. The second parameter ' usb ' appears because we used the previous DevCon command. Adding 'asterix' will display all USB devices installed on the reference computer. Position the hardware ID as shown in Figure 9 and copy this ID before continuing to the next step.
Figure 9 : How to specify a specific hardware ID from the command window
Note : You need to know which hardware ID will copy. When working with whitelists, you always copy the top hardware ID for a specific device. If you implement a blacklist, you must consider using the hardware IDs below. In short, these device IDs are different from the ID you wish it could work with your system.
Again, we will use the Group Policy Management Console, so from Vista you must log in to the domain account that allows you to change Group Policies.
At the Start command window Search you type GPMC.MSC then press Enter
3, Go to Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
4, Configure the settings below
Figure 10 : Add a hardware ID for the device to whitelist
5, Check your settings for devices named or not on the white list.
Conclude
Although it is not a perfect method, this limited part of Vista's installation is indeed an ideal feature and it is actually more useful than what we have seen in Part 1 especially for wireless communication devices. Identifying wireless communication devices used by an unauthorized user is an important issue. By using Vista's Device Installation Restriction feature, you can easily do that. Taking full advantage of this feature, you can safely protect your clients.