Work Smart: Securing Your Computer Get Started About Securing Your Computer Adhere to Security Standards, Always Every domain connected computer is a gateway to the corporate network. Therefore, you must guard it against intruders trying to gain unauthorized access to resources and intellectual property. “Securing Your Computer” provides several best practices that will help you protect your computer from potential threats. Follow the policy standards set by <<insert organization’s information security group name>>, regardless of whether you are a full-time employee, an intern, or a remote worker who connects to the <<organization’s name>> network. Topics in this guide include: Use passwords for security Use Microsoft® Forefront™ Endpoint Protection Set a password for your screen saver Lock your computer Encrypt files on your computer with Windows BitLocker™ Drive Encryption or Encrypting File System (EFS) Store data securely Install from trusted sources Digitally sign and encrypt e-mail Customization note: This document contains guidance and/or step-by-step installation instructions that can be reused, customized, or deleted entirely if they do not apply to your organization’s environment or installation scenarios. The text marked in red indicates either customization guidance or organization-specific variables. All of the red text in this document should either be deleted or replaced prior to distribution. The <<insert organization’s “general use” policy name>> details the policies that apply to anyone who has access to the corporate network, and specifies the standards you must follow for your network accounts and passwords, building and network access, and usage of computing devices and applications, and other areas. The general use standards specify how to appropriately use and secure computing devices such as desktops, portable computers, mobile devices, printers, faxes, and any other device by which you can connect to the corporate network and access data. You always should adhere to these standards. The <<insert organization’s information security group name>> regularly monitors the corporate network and connected users to ensure they are complying with policy. If you violate information security standards, you may face disciplinary action, up to and including immediate termination of employment or assignment, and you may be subject to civil and/or criminal liability For detailed information on <<organization’s name>>information security standards and general use standards, see: • <<Insert links to related your organization’s Information Security standards and policies>> More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 1 of 7 Work Smart: Securing Your Computer Get Started Install Updates Regularly Use Passwords for Security Keep your software up-to-date at home and at the office. Use automatic updates to ensure you always have the latest software, updates, and virus protection. To turn on automatic updates manually: Select strong, hard-to-hack passwords, which act as your computer’s first line of defense for protecting your data and intellectual property, and the organization’s network. 1 Click Start, click All Programs, and then click Windows Update. 2 Click Change Settings on the Windows Update page. When you create and use passwords, follow these best practices: • Choose “strong” passwords that are at least eight characters long, and which includes a mix of the following: uppercase and lowercase letters, numbers (0 through 9), and symbols (~!@#$). • Do not use words or names in passwords. Do not create passwords from words in any language, slang, dialect, or jargon; personal, family, or pet names; or titles of items, such as the name of a book, song, or movie. • 3 Do not use passwords from other accounts. Each of your accounts should have a unique password. Make sure that Install Updates automatically is selected. • Do not sequence your passwords. Do not add a number or letter to a previous password to create a new one. For example, do not change LP4Rf7W! to LP4Rf7W!2. • Do not select the Save this password in your password list check box when you are prompted. • Disable the Save password option in Dial-Up Networking, if you are working on a laptop or remote computer. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 2 of 7 Work Smart: Securing Your Computer Get Started • • Create passwords that you can remember easily. One way to do this is create a password based on a song title, affirmation, or other phrase, by using the first letter of each word in that phase. After Forefront is installed and running on your system, FEP definitions update automatically from Windows Server Update Services (WSUS), Windows Update, and Microsoft Update. For example, the phrase might be This May Be One Way To Remember. Your password could be TmB1w2R! or Tmb1W>r~. Is Forefront Running Correctly? Never provide your account password to anyone, including the Helpdesk or your administrative assistant. Customization note: The above bullets represent some password creation best practices; this list should be updated based on the best practices defined by your organization. To determine whether FEP is running correctly: 1 In Control Panel, open Security Center . • The Microsoft Forefront Client Security window appears. • Antimalware protection should be On, and there should be a Passwords always must comply with the <<organization’s name>>password standards. For more information, see << insert password standards URL>>. Warning • Do not use the passwords that were examples in this section as your passwords. • <<organization’s name>> holds users accountable for actions that result from unauthorized network connections with their credentials. Use Microsoft Forefront If your devices attach to the corporate network, then you must have Microsoft Forefront Endpoint Protection (FEP) installed and enabled. FEP is an enterprise application that detects not only viruses, but also all malicious code and software: spyware, adware, worms, Trojan horses, robots (bots), Remote Access Trojans (RATs), vandalware, and rootkits. green icon ( ) in the notification area. This indicates that FEP is working correctly. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 3 of 7 Work Smart: Securing Your Computer Get Started 2 MSIT recommends that you use your Windows password in combination with your screen saver to prevent unauthorized access to your computer and the corporate network when you are not working on it. Double-click , and the Microsoft Forefront Endpoint Protection window appears. By default, your screen saver starts to run after your computer is idle for 15 minutes. To change the time in which your computer or mouse is idle before the screen saver opens: 1 Click Start, click Control Panel, and then click Appearance and Personalization. 2 Click Change screen saver, and then set the time delay that you prefer. For more information about how to establish a password, see “Use Passwords for Security” previously in this document. • • If FEP is running correctly, then the system tray icon, and the check marks under Malware protection and Windows Firewall, should be green. If FEP encounters an issue, the system tray icon will be red ( and there will be information under Malware protection that indicates the issue. Set a Password for Your Screen Saver Use a password to help secure your screen saver, which is the utility that causes your computer screen to go blank or show a preconfigured image when the computer is idle for a specific time. ), Lock Your Computer Lock your computer when you are not using it. This enables you to leave programs open and running, but protects the corporate network and resources from unauthorized access. When you are stepping away from your computer: • Press the Windows logo key ( )+L --OR-• Press CTRL+ALT+DELETE, and then click Lock Computer on the Windows Security dialog box. This locks your computer. When you want to unlock your computer, move the mouse or press the space bar on your computer, and the Unlock Computer dialog box appears. Enter your username and password, and then click OK. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 4 of 7 Work Smart: Securing Your Computer Get Started Encrypt Files on Your Computer Encrypt files on your computer to prevent unauthorized access. There are two ways to encrypt data on your computer. You can use BitLocker Drive Encryption or Encrypting File System (EFS). Using BitLocker To encrypt a folder: 1 Navigate to, and right-click, the folder that you want to encrypt, and then click Properties. 2 On the General tab, click Advanced. 3 In the Advanced Attributes dialog box, select Encrypt contents to secure data. 4 At the prompt window, select the option to encrypt all files and subfolders within the folder. BitLocker protects data on your computer by preventing unauthorized access to the hard disk drive. It allows access to your protected hard-disk data only after you log on to computers running Windows Vista® or newer. Additionally, BitLocker To Go™, which is available in Microsoft Windows 7 only, prevents unauthorized data access on your portable storage devices, including a universal serial bus (USB) flash drive. For detailed information about how to use BitLocker, refer to the following: • “Protect Your Data with BitLocker”: This Work Smart Guide provides detailed instructions about how to enable and use BitLocker. Located at<<Insert link or file location for “Protect Your Data with BitLocker”: Work Smart guide >>. Using EFS If your computer is not BitLocker-compatible, then use EFS. It encrypts your files and folders by using a certificate that <<organization’s name>> issues when you join your computer to the corporate domain. EFS requires other people to enter the appropriate decryption key before they can access your encrypted content. It is recommended that you dedicate a folder on your operating system in which you want to encrypt content. When you encrypt the folder, EFS prompts you to encrypt its files and subfolders. Important • It is recommended that you do not encrypt your My Documents folder. • If you move, copy, or save a file to an encrypted folder, the file becomes encrypted. • If you move, copy, or save an encrypted file to a location that is not on your hard disk, the file becomes decrypted. More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 5 of 7 Work Smart: Securing Your Computer Get Started Store Data Securely Install from Trusted Sources Store your data on a Windows SharePoint® site or by using IntelliMirror® Redirection Services, which provides a secure backup that MSIT manages. Do not install programs from the Internet unless you are familiar with the source. This includes freeware and shareware, which carry a high risk of containing malicious code. If you install software from sources that you do not know, you are compromising your computer and other computers on the corporate network. Using SharePoint If you plan to store sensitive data on SharePoint, a business collaboration platform that enables you to work with other people across the globe, then you should become familiar with the <<organization’s Information Classification requirements>>, which provides guidelines for working with <<High Business Impact (HBI) or your organization’s equivalent>> information and Personally Identifiable Information (PII). It also mandates how to manage access to your SharePoint sites. The <<HBI classification or your organization’s equivalent>> applies to any information assets that, if disclosed without authorization, could cause severe or catastrophic material loss to <<organization>>, the information asset owner, or relying parties. You must control access to your <<HBI or your organization’s equivalent >>assets, and limit disclosure to a need to know basis only. This information also is subject to the <<organization’s corporate privacy policy>>, which you can find at <<URL>> Sensitive PII can include government identification, such as social security and driver’s license numbers, and credit and medical information. There may be legal requirements for this data’s storage, transmission, and protection. Contact your<< organization’s legal group>> representative for specific guidance. Do not assume that an application or software is safe just because an internal Web site contains a link to it. Digitally Sign and Encrypt E-Mail Secure/Multipurpose Internet Mail Extensions (S/MIME) enable you to encrypt and digitally sign your e-mail messages so only people that you specify can access them. Encrypting your messages converts data with a cipher text, and recipients cannot access them unless they have a private key that matches the public key that you use for encryption. When you sign a message digitally, S/MIME applies an authorized certificate to it that validates that the message is from you, and that it is unaltered. If you send or receive encrypted messages within <<organization name>>, you do not have to take additional steps to access a message’s encrypted content or to enable intended internal recipients to access your encrypted messages. However, if you are sending encrypted e-mail to, or receiving it from, people outside the organization, you have to exchange certificates and keys first. For more information, see << URL>> More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 6 of 7 Work Smart: Securing Your Computer Get Started For More Information Welcome to Microsoft Update http://www.update.microsoft.com/microsoftupdate/v6/default.aspx?ln=e n-us More Work Smart Content: http://microsoft.com/itshowcase This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2012 Microsoft Corporation. All rights reserved. Page 7 of 7