Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

How would i go about finding or answering these. I have a windows desktop that i use but i havnt really gone in and changed

How would i go about finding or answering these. I have a windows desktop that i use but i havnt really gone in and changed a bunch of things to harden it because its mostly used for school. so all the setting configurations are the factory ones it come with most likely.
Hardening operating systems is an important part of a layered defense strategy. For this Project, you will take a comprehensive look at the Windows Desktop OS and follow best practices to harden the system to prepare it for deployment.
USER CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system.
NETWORK CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
FEATURES AND ROLES (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
PATCH MANAGEMENT CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
FIREWALL CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
REMOTE ACCESS CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
SERVICE CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
LOGGING AND MONITORING (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
ADDITIONAL HARDENING STEPS (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

User Defined Tensor Data Analysis

Authors: Bin Dong ,Kesheng Wu ,Suren Byna

1st Edition

3030707490, 978-3030707491

More Books

Students also viewed these Databases questions