Linking Users to Assets using Native Tools in Windows 7 Networks

PDF

Authors
  1. Magar, A.
Corporate Authors
Defence Research and Development Canada, Ottawa Research Centre, Ottawa ON (CAN);Bell/Sphyma Team, Kanada Ont (CAN) Security Architect
Abstract
When defending a computer network, it quickly becomes obvious that some assets, desktop computers or servers, are more important than others and, therefore, require more attention. While it is necessary to patch the computer in the corner that hasn’t been used for months, that computer should certainly not be the focus of effort during a crisis. It is easy to see that the computer is not critical to the business or missions being carried out on the network, but that is not always the case. How does one judge the criticality of similar assets?
Keywords
Windows 7;Windows operating system;Windows 2008 Server;automated user detection;user detection tools
Report Number
DRDC-RDDC-2016-C223 — Contract Report
Date of publication
01 Mar 2015
Number of Pages
181
DSTKIM No
CA042921
CANDIS No
804193
Format(s):
Electronic Document(PDF)

Permanent link

Document 1 of 1

Date modified: