Preview

LAB 4 Using Group Policy Objects And Microsoft Baseline Security Analyzer

Satisfactory Essays
Open Document
Open Document
386 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
LAB 4 Using Group Policy Objects And Microsoft Baseline Security Analyzer
Assessment Worksheet
Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control
Johnathan McMullen

Student Name: ________________________________________________________________
Stephen Osborne

Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
There are many tools and suites designed to aid the security practitioner and the organization in implementing and managing change management. In this lab, you explored two such tools for the Windows platform: Group Policy Objects (built into the Windows operating systems) and the
Microsoft Security Baseline Analyzer (provided free of charge). You used Group Policy Objects to strengthen the organization’s password policy by adding complexity and minimum password length requirements. You scanned the Windows server with the Microsoft Baseline Security
Analyzer (MBSA) to assess its security state, and you examined the results of the Microsoft
Baseline Security Analyzer in detail.
Lab Assessment Questions & Answers
1. Define why change control management is relevant to security operations in an organization.
Proper management control need to be in place in an organization to govern the level of authority needed. Change control is a systematic way to approaching change. Within an organization, it can prevent the possibility of services becoming interrupted

2. Name six (6) policies you could enable in a Windows Domain.
Acceptable User Policy (AUP), Security Awareness Policy, Asset Classification Policy, Asset
Protection Policy, Asset Management Policy, Vulnerability Asset Management Policy

3. What is the minimum password length enforced by the Password must meet complexity requirements policy?
The complexity requirements policy states that a password must consist of at least or at a minimum of eight characters mixed with letters and numbers.

4. What sources could you use as a source

You May Also Find These Documents Helpful

  • Satisfactory Essays

    4. Where would patch management and software updates fall under in security operations and management?…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    There are many tools and suites designed to aid the security practitioner and the organization in…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    In this lab, you used group policy objects to create a minimum password length password policy and link it…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Intrusion detection a full time monitoring tool place in hot spots of corporate network to detect intruders. This monitoring software…

    • 369 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Building controls into the system by teaching employees to take ownership and setting up accountability control procedures.…

    • 583 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Roundy’s Password and Account Management Portal allows you to manage the passwords you use for Roundy’s…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Password Strength

    • 5555 Words
    • 23 Pages

    Most organizations specify a password policy that sets requirements for the composition and usage of passwords, typically dictating minimum length, required categories (e.g. upper and lower case, numbers, and special characters), prohibited elements (e.g. own name, D.O.B., address, telephone number). Some governments have national authentication frameworks[1] that define requirements for user authentication to government services, including requirements for passwords.…

    • 5555 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Accounting System Controls

    • 2200 Words
    • 9 Pages

    are in the best interest of the organization. These controls come in the form of…

    • 2200 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Access Control

    • 2183 Words
    • 9 Pages

    Giannoulis, P., & Northcutt, S. (2007, January 25). Security Laboratory: IT Managers - Safety Series. Retrieved from Sans Technology Institute: http://www.sans.edu/research/security-laboratory/article/281…

    • 2183 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Honeypots

    • 1901 Words
    • 8 Pages

    Although there exist a number of security tools that are available today, none of these tools can easily address all of the security goals of an organization. As computer attacks evolve, new responses are essential. Thus organisations look for more advanced tools which are effective in detecting security attacks and recovering from them.…

    • 1901 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Scientific Management

    • 2184 Words
    • 9 Pages

    * Control by establishing discipline through hierarchical authority and introducing a system whereby all management’s policy decisions could be implemented.…

    • 2184 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Rdd for Postal System

    • 957 Words
    • 4 Pages

    The software has no doubt been able to solve the above mentioned problems to a great extent, package has still not stabilized even after five years due to incomplete incorporation of Departmental rules and inadequate data integrity. Many facilities in different modules of the package have not yet been implemented. IT security related control measures in place are not adequate. As a result, reliance on manual work continues, which is a setback to the objectives set by DoP for introduction of the package such as reducing…

    • 957 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Security

    • 466 Words
    • 2 Pages

    Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training. The password policy may either be advisory or mandated by technical means. Some governments have national authentication frameworks[1] that define requirements for user authentication to government services, including requirements for passwords.…

    • 466 Words
    • 2 Pages
    Good Essays