Technical Documentation
Introduction to Windows Security
To understand the Windows approach to security, you have to understand a bit about the history of Microsoft, and the computing environment which the company has found itself in. When Microsoft began producing operating systems in the early 1980s, there was no World Wide Web, few virus writers, and little concern for security. Indeed, the earliest Microsoft operating systems, designed to run on non-networked PCs, included no specific security measures whatsoever.
Moreover, at that time, Microsoft faced a far more competitive business environment than it does today. While Microsoft operating systems enjoyed a great deal of success from the start, the company still found itself in a real battle with Apple. In contrast with the situation today, Apple enjoyed market shares as high as 16-20% in the 1980s and early 1990s. Moreover, the Mac had a sophisticated Graphic User Interface, which Windows programs could not match until the 1990s. A similar situation existed with application software. While Microsoft Office programs like Word and Excel dominate the marketplace today, vendors like Lotus and WordPerfect had the most popular programs during this earlier period of time.
In this environment, Microsoft prioritized product development and new features, while arguably paying insufficient attention to security, even as threats grew.
Matters came to a head in early 2002. In response to mounting complaints about poor Windows security, Microsoft acknowledged problems and declared that security would now be the company’s top priority. This spawned an initiative called “Trustworthy Computing,” which has henceforth represented the company’s general approach to the security issue.
The Trustworthy Computing program can usefully be seen as implementing three basic types of features:
- Better Code Security: Microsoft’s “Security Development Lifecycle” approach is designed to produce more secure operating systems and applications. Programs are designed from the start with security in mind, and security is tested at major steps in the development process.
- Better Security Features: Microsoft operating systems (since the release of XP Service Pack 2 in 2004, and including Vista and Windows 7) now include a set of “built in” security features. These include:
- Firewalls: Like a literal “fire-wall” prevents fires from moving from one part of a building to another, computer firewalls protect hackers from getting into your computer.
- Windows Defender: This feature (included only with the Vista and Windows 7 operating systems) offers protection against “malware” (programs that seek to access your computer) like spyware.
- User Account Control: This feature sets up different kinds of accounts. An administrator account, which can perform many actions on a computer, and a standard user account, which can only do basic things. Logging in with a standard user account prevents malware programs from performing many harmful computer operations.
- Easier, automatic updates: Since Microsoft relies on “patches” to addresses newly discovered security problems for programs that are out in the field and being used by consumers, the company sought to make this update process more efficient and effective. The company has strengthened its efforts to identify security holes quickly, and to make the update process easier by providing automatic, regularly scheduled updates.
Note: While Microsoft has not previously provided anti-virus protection, the September 2009 release of the free “Security Essentials” program provides such protection, and supersedes the Defender anti-malware program, for the Vista and Windows 7 operating systems.
Securing Windows 7 OS
Basic Security
It’s very important to enable the basic security packages Windows 7 comes preprogrammed with. Given that the Microsoft Windows platform dominates the PC market, new threats and attacks are a constant occurrence. Keeping the system and all the applications up-to-date and patched are important steps in maintaining a strong and robust networked environment. Don’t make your system any vulnerable than it already is. Run and keep activated the following packages:
- Firewall: software that monitors and restricts network traffic, acts like a filter.
- Malware & Anti-Virus Programs: software such as ClamWin*, Norton, MaKafee that scans and isolates harmful programs.
- Defender: anti-spyware program carried over from Vista.
- Microsoft Security Essentials: similar to Defender.
- User Account Control: allows multiple levels of user accounts, keep all users at high-restriction levels except the Administrator account.
*We decided to use ClamWin anti-virus to help secure Windows 7 on the new computers at Salem.
ClamWin is a Free Antivirus program that is compatible with Microsoft Windows 7. It comes with an easy installer and open source code. It can be downloaded free of charge. It features:
* High detection rates for viruses and spyware;
* Scanning Scheduler;
* Automatic downloads of regularly updated Virus Database.
* Standalone virus scanner and right-click menu integration to Microsoft Windows Explorer;
* Addin to Microsoft Outlook to remove virus-infected attachments automatically.
Please note that ClamWin Free Antivirus does not include an on-access real-time scanner. You need to manually scan a file in order to detect a virus or spyware.
Updates
Set the Microsoft Update, the utility for downloading and installing system updates and service packs, to update automatically when system is networked.
Additional Tips
In addition to keeping Web browers patched and upgraded, consider installing the add-on NoScript to disable Web site script attacks if running Firefox or similar clients.
