The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Managing Host Based Security Purpose: To develop and verify system administration and vulnerability management procedures which implement host based security capabilities for Windows 8.1
Â
Cybersecurity Processes & TechnologiesLab #2:Managing Host Based SecurityPurpose:To develop and verify system administration and vulnerability management procedureswhich implement host based security capabilities for Windows 8.1Objectives1.Develop systems administraTon procedures to confgure and manage host-based securitycapabiliTes (frewall and anT-virus/anT-malware).2.Develop systems management procedures to scan For and remediate so±ware andconfguraTon vulnerabiliTes in Windows 8.1 systems.OverviewIn this lab, our Focus is upon implemenTng and managing host-based security For Windows 8.1systems using the Following tools:Windows DeFenderWindows ²irewallMicroso± Baseline Security Analyzer (MBSA)²or each tool, you will research and then write a step-by-step procedure to confgure the toolaccording to security best pracTces For Windows 8.1 hosts. Each oF these tools can be used as part oF anoverallinformaton securiTy vulnerabiliTy managemenTbusiness process.Note:Windows DefenderandWindows Firewallare Found under Control Panel. MBSA can beFound using Windows Search (Windows Key + R).Your deliverables for this lab will become part of theFnal project for this course (System Administra±on Manual).Deliverables(a) Step-by-Step System AdministraTon Procedure to Manage Windows DeFender(b) Step-by-Step System AdministraTon Procedure to confgure Windows ²irewall For Windows8.1 to (a) allow a new applicaTon and (b) block an applicaTon(c) Step-by-Step System Management Procedure to Manage VulnerabiliTes using Microso±Baseline Security AnalyzerSubmit your deliverables in a SINGLE ²ILE in MS Word Format (.docx or .doc fle types).
Attachments:
-----------