Question: How would i go about finding or answering these. I have a windows desktop that i use but i havnt really gone in and changed

How would i go about finding or answering these. I have a windows desktop that i use but i havnt really gone in and changed a bunch of things to harden it because its mostly used for school. so all the setting configurations are the factory ones it come with most likely.
Hardening operating systems is an important part of a layered defense strategy. For this Project, you will take a comprehensive look at the Windows Desktop OS and follow best practices to harden the system to prepare it for deployment.
USER CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system.
NETWORK CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
FEATURES AND ROLES (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
PATCH MANAGEMENT CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
FIREWALL CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
REMOTE ACCESS CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
SERVICE CONFIGURATION (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
LOGGING AND MONITORING (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
ADDITIONAL HARDENING STEPS (10PTS)
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!