{"id":3044,"date":"2019-05-14T11:41:34","date_gmt":"2019-05-14T09:41:34","guid":{"rendered":"http:\/\/lestfrexgn.cluster020.hosting.ovh.net\/?p=3044"},"modified":"2019-05-14T11:41:46","modified_gmt":"2019-05-14T09:41:46","slug":"windows-10-cadre-de-securisation-seccon","status":"publish","type":"post","link":"https:\/\/les2t.fr\/fr_fr\/windows-10-cadre-de-securisation-seccon\/","title":{"rendered":"Windows 10 \u2013 Cadre de s\u00e9curisation SECCON"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"250\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\" alt=\"\" class=\"wp-image-2439\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png 800w, https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10-480x150.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw\" \/><\/figure>\n\n\n\n<p>La configuration de la s\u00e9curit\u00e9 est complexe. Avec des\nmilliers de strat\u00e9gies de groupe disponibles dans Windows, il est difficile de\nchoisir le \u00ab meilleur \u00bb param\u00e8tre. Il n&rsquo;est pas toujours \u00e9vident de savoir\nquelles permutations de strat\u00e9gies sont n\u00e9cessaires pour mettre en \u0153uvre un\nsc\u00e9nario complet et des verrouillages de s\u00e9curit\u00e9 ont souvent des cons\u00e9quences\ninattendues.<\/p>\n\n\n\n<p>L\u2019utilisation des Baselines de s\u00e9curit\u00e9 peu aller trop loin\npour certaines organisations et le cout de la s\u00e9curisation ne peut \u00eatre\npleinement justifi\u00e9 dans certain cas.<\/p>\n\n\n\n<p>Voil\u00e0 pourquoi, Microsoft introduit une nouvelle classification\npour les configurations de s\u00e9curit\u00e9 de Windows 10. Ce nouveau cadre de\nconfiguration de s\u00e9curit\u00e9, appel\u00e9 cadre SECCON, organise les p\u00e9riph\u00e9riques dans\ncinq configurations de s\u00e9curit\u00e9 distinctes.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"376\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2019\/05\/seccon-framework-1024x376.png\" alt=\"\" class=\"wp-image-3045\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2019\/05\/seccon-framework-1024x376.png 1024w, https:\/\/les2t.fr\/wp-content\/uploads\/2019\/05\/seccon-framework-300x110.png 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2019\/05\/seccon-framework-768x282.png 768w, https:\/\/les2t.fr\/wp-content\/uploads\/2019\/05\/seccon-framework.png 1102w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Attention, le Niveau 1 et 2 sont encore en cours de r\u00e9daction\npar Microsoft et devrait rapidement \u00eatre en ligne.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Niveau 5 &#8211; S\u00e9curit\u00e9 d&rsquo;entreprise<\/strong> : Microsoft recommande cette configuration comme configuration de s\u00e9curit\u00e9 minimale pour un p\u00e9riph\u00e9rique d&rsquo;entreprise. Les recommandations pour ce niveau de configuration de s\u00e9curit\u00e9 sont g\u00e9n\u00e9ralement simples et sont con\u00e7ues pour \u00eatre d\u00e9ploy\u00e9es dans les 30 jours<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-5-enterprise-security\">https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-5-enterprise-security<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Niveau 4 &#8211; Entreprise haute s\u00e9curit\u00e9<\/strong> : Microsoft recommande cette configuration pour les p\u00e9riph\u00e9riques o\u00f9 les utilisateurs acc\u00e8dent \u00e0 des informations sensibles ou confidentielles. Certains contr\u00f4les peuvent avoir un impact sur la compatibilit\u00e9 des applications et, par cons\u00e9quent, passeront souvent par une p\u00e9riode audit-configure-applique. Les recommandations pour ce niveau sont g\u00e9n\u00e9ralement accessibles \u00e0 la plupart des organisations et sont con\u00e7ues pour \u00eatre d\u00e9ploy\u00e9es dans les 90 jours.<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-4-enterprise-high-security\">https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-4-enterprise-high-security<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Niveau 3 &#8211; S\u00e9curit\u00e9 VIP d&rsquo;entreprise<\/strong> : Microsoft recommande cette configuration pour les p\u00e9riph\u00e9riques g\u00e9r\u00e9s par une entreprise dot\u00e9e d&rsquo;une \u00e9quipe de s\u00e9curit\u00e9 plus importante ou plus sophistiqu\u00e9e, ou pour des utilisateurs ou des groupes sp\u00e9cifiques qui sont expos\u00e9s \u00e0 un risque particuli\u00e8rement \u00e9lev\u00e9. Une entreprise susceptible d&rsquo;\u00eatre cibl\u00e9e par des adversaires bien financ\u00e9s et sophistiqu\u00e9s devrait aspirer \u00e0 cette configuration. Les recommandations pour ce niveau de configuration de s\u00e9curit\u00e9 peuvent \u00eatre complexes (par exemple, la suppression des droits d&rsquo;administrateur local pour certaines organisations peut \u00eatre un long projet en soi) et peuvent souvent aller au-del\u00e0 de 90 jours.<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-3-enterprise-vip-security\">https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-3-enterprise-vip-security<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Niveau 2 &#8211; Station de travail DevOps<\/strong> : Microsoft recommande cette configuration aux d\u00e9veloppeurs et aux testeurs, qui sont une cible attrayante tant pour les attaques de la cha\u00eene d&rsquo;approvisionnement que pour les attaques de vol de justificatifs qui tentent d&rsquo;acc\u00e9der \u00e0 des serveurs et syst\u00e8mes contenant des donn\u00e9es de grande valeur ou o\u00f9 les fonctions critiques de l&rsquo;entreprise pourraient \u00eatre perturb\u00e9es.<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-2-enterprise-devops-security\">https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-2-enterprise-devops-security<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Niveau 1 &#8211; Poste de travail de l\u2019administrateur<\/strong> : Les administrateurs (en particulier ceux des syst\u00e8mes d&rsquo;identit\u00e9 ou de s\u00e9curit\u00e9) courent le plus grand risque de vol de donn\u00e9es, d&rsquo;alt\u00e9ration de donn\u00e9es ou d&rsquo;interruption de service.<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-1-enterprise-administrator-security\">https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-configuration-framework\/level-1-enterprise-administrator-security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La configuration de la s\u00e9curit\u00e9 est complexe. Avec des milliers de strat\u00e9gies de groupe disponibles dans Windows, il est difficile de choisir le \u00ab meilleur \u00bb param\u00e8tre. Il n&rsquo;est pas toujours \u00e9vident de savoir quelles permutations de strat\u00e9gies sont n\u00e9cessaires pour mettre en \u0153uvre un sc\u00e9nario complet et des verrouillages de s\u00e9curit\u00e9 ont souvent des [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[63,47],"tags":[247,292,36,220,48,168],"class_list":["post-3044","post","type-post","status-publish","format-standard","hentry","category-securite","category-windows-10","tag-baselines","tag-hardening","tag-microsoft","tag-securite","tag-windows","tag-windows-10"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Windows 10 \u2013 Cadre de s\u00e9curisation SECCON - Les2T<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/les2t.fr\/fr_fr\/windows-10-cadre-de-securisation-seccon\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows 10 \u2013 Cadre de s\u00e9curisation SECCON - Les2T\" \/>\n<meta property=\"og:description\" content=\"La configuration de la s\u00e9curit\u00e9 est complexe. Avec des milliers de strat\u00e9gies de groupe disponibles dans Windows, il est difficile de choisir le \u00ab meilleur \u00bb param\u00e8tre. Il n&rsquo;est pas toujours \u00e9vident de savoir quelles permutations de strat\u00e9gies sont n\u00e9cessaires pour mettre en \u0153uvre un sc\u00e9nario complet et des verrouillages de s\u00e9curit\u00e9 ont souvent des [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/les2t.fr\/fr_fr\/windows-10-cadre-de-securisation-seccon\/\" \/>\n<meta property=\"og:site_name\" content=\"Les2T\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-14T09:41:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-14T09:41:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\" \/>\n<meta name=\"author\" content=\"TRARBACH Jean-Yves\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"TRARBACH Jean-Yves\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/\",\"url\":\"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/\",\"name\":\"Windows 10 \u2013 Cadre de s\u00e9curisation SECCON - Les2T\",\"isPartOf\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\",\"datePublished\":\"2019-05-14T09:41:34+00:00\",\"dateModified\":\"2019-05-14T09:41:46+00:00\",\"author\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\"},\"breadcrumb\":{\"@id\":\"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#primaryimage\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/les2t.fr\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows 10 \u2013 Cadre de s\u00e9curisation SECCON\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\",\"url\":\"https:\/\/les2t.fr\/fr_fr\/\",\"name\":\"Les2T\",\"description\":\"| BLOG  IT |\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\",\"name\":\"TRARBACH Jean-Yves\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"caption\":\"TRARBACH Jean-Yves\"},\"description\":\"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT\",\"sameAs\":[\"https:\/\/les2t.fr\/jean-yves-trarbach\/\"],\"url\":\"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows 10 \u2013 Cadre de s\u00e9curisation SECCON - Les2T","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/les2t.fr\/fr_fr\/windows-10-cadre-de-securisation-seccon\/","og_locale":"fr_FR","og_type":"article","og_title":"Windows 10 \u2013 Cadre de s\u00e9curisation SECCON - Les2T","og_description":"La configuration de la s\u00e9curit\u00e9 est complexe. Avec des milliers de strat\u00e9gies de groupe disponibles dans Windows, il est difficile de choisir le \u00ab meilleur \u00bb param\u00e8tre. Il n&rsquo;est pas toujours \u00e9vident de savoir quelles permutations de strat\u00e9gies sont n\u00e9cessaires pour mettre en \u0153uvre un sc\u00e9nario complet et des verrouillages de s\u00e9curit\u00e9 ont souvent des [&hellip;]","og_url":"https:\/\/les2t.fr\/fr_fr\/windows-10-cadre-de-securisation-seccon\/","og_site_name":"Les2T","article_published_time":"2019-05-14T09:41:34+00:00","article_modified_time":"2019-05-14T09:41:46+00:00","og_image":[{"url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png","type":"","width":"","height":""}],"author":"TRARBACH Jean-Yves","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"TRARBACH Jean-Yves","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/","url":"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/","name":"Windows 10 \u2013 Cadre de s\u00e9curisation SECCON - Les2T","isPartOf":{"@id":"https:\/\/les2t.fr\/fr_fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#primaryimage"},"image":{"@id":"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#primaryimage"},"thumbnailUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png","datePublished":"2019-05-14T09:41:34+00:00","dateModified":"2019-05-14T09:41:46+00:00","author":{"@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e"},"breadcrumb":{"@id":"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#primaryimage","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2017\/02\/BANW10.png"},{"@type":"BreadcrumbList","@id":"https:\/\/les2t.fr\/windows-10-cadre-de-securisation-seccon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/les2t.fr\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"Windows 10 \u2013 Cadre de s\u00e9curisation SECCON"}]},{"@type":"WebSite","@id":"https:\/\/les2t.fr\/fr_fr\/#website","url":"https:\/\/les2t.fr\/fr_fr\/","name":"Les2T","description":"| BLOG  IT |","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e","name":"TRARBACH Jean-Yves","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","caption":"TRARBACH Jean-Yves"},"description":"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT","sameAs":["https:\/\/les2t.fr\/jean-yves-trarbach\/"],"url":"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/3044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/comments?post=3044"}],"version-history":[{"count":0,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/3044\/revisions"}],"wp:attachment":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/media?parent=3044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/categories?post=3044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/tags?post=3044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}