Question: How would i go about finding or answering these. I have a windows desktop that i use but i havnt really gone in and changed
How would i go about finding or answering these. I have a windows desktop that i use but i havnt really gone in and changed a bunch of things to harden it because its mostly used for school. so all the setting configurations are the factory ones it come with most likely.
Hardening operating systems is an important part of a layered defense strategy. For this Project, you will take a comprehensive look at the Windows Desktop OS and follow best practices to harden the system to prepare it for deployment.
USER CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system.
NETWORK CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
FEATURES AND ROLES PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
PATCH MANAGEMENT CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
FIREWALL CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
REMOTE ACCESS CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
SERVICE CONFIGURATION PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
LOGGING AND MONITORING PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
ADDITIONAL HARDENING STEPS PTS
Describe the current configuration along with the steps taken to harden the system based on best practices. Describe how the hardening techniques improve the security of the system
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
