100% (1)
page:
2 pages/≈550 words
Sources:
2
Style:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.96
Topic:

Deploy Security Measures Using Group Policy

Coursework Instructions:

Writer!

This is a technical assignment.

Please inform Support about your bid for this project.
Assessment Description

During this assignment, students will use the CIS Microsoft Windows Server 2016 (or current server version) Benchmark to ensure settings/policies/security options are configured on all three Windows Servers within the virtual environment.

Part 1

1. Access the "ITT-430 CIS Microsoft Windows Server 2016 Benchmark."

2. Scan the CIS document and choose at least 10 appropriate settings/policies/security options for each Windows Server.

3. In an MS Word document, provide a bulleted list and description of the options chosen for each server.

Part 2

1. Domain Controller: Using the selected CIS settings/policies/security options from Part 1, follow the procedures in the "ITT-430 Domain Controller Group Policy Management Instructions," to import and apply the new Group Policy settings throughout the domain.

2. Deploy changes throughout domain.

3. In the same MS Word document for Part 1, present a 250-word summary to include (a) security controls that were applied to minimize systems risks, threats, and vulnerabilities (b) baseline countermeasures that should be in place and (c) preventive controls needed to decrease the threat of unintentional errors or unauthorized access. In addition, provide screenshots as directed.

4. Then, in 250-words, describe the differences between a scan conducted using CIS (Center Internet Security) Benchmarks to one using Security Technical Implementation Guides (STIGs) Benchmarks as well as defensive measures that can protect information within the network.

APA style is not required, but solid academic writing is expected.

Do I not understand I put course work which would include both

Coursework Sample Content Preview:

Deploy Security Measures Using Group Policy
Student Name
College/University
Course
Professor’s Name
Due Date
Part 1
After scanning the CIS Microsoft Windows Server 2016 Benchmark, the following 10 settings/policies/security options have been chosen for each Windows Server:
Windows Server 1
Disable the Guest account
Change the default administrator account name
Enable strong password complexity
Enable the firewall
Disable LM and NTLMv1 authentication protocols
Enable audit logging
Restrict Remote Desktop Protocol (RDP) access
Disable SMBv1
Enable AppLocker
Set password expiration policy
Windows Server 2
Disable the Guest account
Change the default administrator account name
Enable strong password complexity
Enable the firewall
Disable LM and NTLMv1 authentication protocols
Enable audit logging
Restrict Remote Desktop Protocol (RDP) access
Disable SMBv1
Disable unnecessary services
Enable BitLocker
Windows Server 3
Disable the Guest account
Change the default administrator account name
Enable strong password complexity
Enable the firewall
Disable LM and NTLMv1 authentication protocols
Enable audit logging
Restrict Remote Desktop Protocol (RDP) access
Disable SMBv1
Enable Windows Defender
Enable User Account Control
Part 2
Using the selected CIS settings/policies/security options from Part 1, the following procedures have been followed to import and apply the new Group Policy settings throughout the domain:
Domain Controller: The CIS settings/policies/security options were imported into the Group Policy Management Editor.
The Group Policy settings were then applied throughout the domain.
(a)The security controls that were applied to minimize systems risks, threats, and vulnerabilities included enabling strong password complexity, disabling unnecessary services, enabling audit logging, and enabling the firewall. (b)The baseline countermeasures that should be in place include implementing regular software updates, ensuring data backups are performed regularly, and constantly monitoring system logs for any signs of suspicious activity. (c) The preventive controls needed to decrease the threat of unintentional errors or unauthorized access include enforcing access controls, training employees on safe computing practices, and implementing network segmentation.
One of the most basic security controls is enforcing strong password complexity. This helps to prevent unauthorized access by making it difficult for attackers to guess passwords. Disabling unnecessary se...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!