![]() | ![]() |
| ||||||||||
![]() |
![]() |
![]() | |||||
| |||||
![]() |
This chapter covered the decisions you need to make in deploying your honeypot and the steps for installing it. The remainder of the chapter described suggestions for hardening honeypots.
You will need to harden any computer hosting VM honeypots. Even Windows honeypots need to be hardened against unauthorized compromise. You can harden a Windows host by installing needed patches, disabling or removing any applications or services not needed by the host, hardening the TCP/IP stack, filtering unneeded network traffic and connections, securing service accounts, protecting user accounts, disabling anonymous enumerations, and enforcing the use of the newer authentication protocols.
Chapter 5 will begin a three-chapter journey through installing, configuring, and using the low-interaction honeypot, Honeyd.
![]() | |||||
| |||||
![]() |