Click link for more description
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
Cybersecurity Processes & TechnologiesLab #2: Managing Host Based SecurityPurpose: To develop and verify system administration and vulnerability management procedureswhich implement host based security capabilities for Windows 8.1Objectives1. Develop systems administration procedures to configure and manage host-based securitycapabilities (firewall and anti-virus/anti-malware).2. Develop systems management procedures to scan for and remediate software andconfiguration vulnerabilities in Windows 8.1 systems.OverviewIn this lab, our focus is upon implementing and managing host-based security for Windows 8.1systems using the following tools:Windows DefenderWindows FirewallMicrosoft Baseline Security Analyzer (MBSA)For each tool, you will research and then write a step-by-step procedure to configure the toolaccording to security best practices for Windows 8.1 hosts. Each of these tools can be used as part of anoverall information security vulnerability management business process.Note: Windows Defender and Windows Firewall are found under Control Panel. MBSA can befound using Windows Search (Windows Key + R). Your deliverables for this lab will become part of thefinal project for this course (System Administration Manual).Deliverables(a) Step-by-Step System Administration Procedure to Manage Windows Defender(b) Step-by-Step System Administration Procedure to configure Windows Firewall for Windows8.1 to (a) allow a new application and (b) block an application(c) Step-by-Step System Management Procedure to Manage Vulnerabilities using MicrosoftBaseline Security AnalyzerSubmit your deliverables in a SINGLE FILE in MS Word format (.docx or .doc file types).