Webcam User Manual
St.BernardSoftware,Inc. ProtectingYourNetworkInvestment
June19th,2006 UpdateEXPERTPremiumv7.01EvaluationGuide 25
SecurityEXPERTOverview
Settings Management (Services, Registry, Fil e, andSecurity Policy settings) is provided by
downloadingoneormoresecuritytemplatesfrom theUpdateEXPERTSecurityTemplatesTab,
andusingthesettingsmanagementinformationto:
· CreatePolicies,i.e.,researchandselectsecuritypointsofinterest
· TestCompliance,i.e.,assessthestatusofmachines
· EnforcePolicy,i.e.,implementsettingschangestoenhancesecurity
Important: The actual enforcement of settings policy can change registry items, filesystem
permissions,andservicessettings.Settingschangescannegativelyimpactapplicationsand
users. It is strongly recommended that you completely research and understand your
chosen security points wh en creating policy, and that you first test enforcement on
appropriatetestplatforms.Youmusttesttheeffectsofenforcementonapplications&users.In
general, understand what you are doing and why, and be conservative. Deployed settings
changescannotbeeasilyreversedorundone.
Related to the point above, is that filesystem permission enforcements currently replace
permissions that currently exist on the target file(s). SecurityEXPERT will apply the specified
permissionsfortheaccountslistedandwillremoveanyotheraccountorpermission.Again,test
howthepermissionreplacementmayimpactapplications/users.
Note: SecurityEXPERT settings that affect remote access are displayed with a warning icon.
Losingremoteaccesswillpreventpatchmanagementandsettingsmanagement.
AssumingyouincludedSecurityEXPERTduringinstallation,usingSecurityEXPERTrequiresthe
following:
· DownloadingSecurityEXPERTTemplates
· ResearchingSecurit yPointsandCreatingPolicy
· AssigningMachinestoaPolicy
· AssessingMachinesbyPolicy
· PolicyEnforcement
The example that follows creates a policy starting with an “expert” recommendation for a
“desktop”XPmachine.Forthesakeofsimplicity,youwill clearallthesecuritypoi nts,andcreate
a simpl e policy for two services. T his allows rapid familiarization wi th the SecurityEXPERT
workflow. Usingexpertrecommendations woul d be appropriateforsettingasecuri ty“baseline”
fornewlyinstalledorimagedmachines.Forexistingmachines,carefulconstructionofyourown
policy,addingspecificitemsov ertime,mayworkbest.Thei ntentionofthisEvaluationi st oget
you started on using basic SecurityEXPERT features and workflow. See the UpdateEXPERT
UserGuideformoreinformationonSecurityEXPERT.










