Answered step by step
Verified Expert Solution
Question
1 Approved Answer
How would i go about finding or answering these. I have a windows desktop that i use but i havnt really gone in and changed
How would i go about finding or answering these. I have a windows desktop that i use but i havnt really gone in and changed a bunch of things to harden it because its mostly used for school. so all the setting configurations are the factory ones it come with most likely.
Hardening operating systems is an important part of a layered defense strategy. For this Project, you will take a comprehensive look at the Windows Desktop OS and follow best practices to harden the system to prepare it for deployment.
USER CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system.
NETWORK CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
FEATURES AND ROLES PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
PATCH MANAGEMENT CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
FIREWALL CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
REMOTE ACCESS CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
SERVICE CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
LOGGING AND MONITORING PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
ADDITIONAL HARDENING STEPS PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started