Preview

Security Strategies in Windows Platforms and Applications

Good Essays
Open Document
Open Document
344 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Strategies in Windows Platforms and Applications
Lab – Assessment Worksheet
Overview
The implementation of security scanners and profilers such as Microsoft’s Baseline Security Analyzer (MBSA) are an important component of maintaining an up-to-date and secure Windows infrastructure.

Lab Assessment Questions & Answers

1. Why is it important to run the MBSA?
It’s important to run the MBSA because it keeps your system safe and up-to-date.

2. What does an MBSA analysis look for?
It’s important to run the MBSA because it scans for missing security updates and less secure system configurations.

3. How can MBSA be executed?
MBSA can be executed through the Windows Start menu or through the command line.

4. Does the system that is being scanned need to have access to the internet for the scan to be successful?
The MBSA will still scan the system and notify you of vulnerabilities but if it’s connect to the internet then it won’t be able to download the latest software updates.

5. In what formats can the scan results be viewed?
Formats can be viewed in XML and .txt.

6. Could you scan one computer at a time or could you perform multiple scans at a time?
You can perform multiple scans at once.

7. What portion of the scan takes longer? Is it necessary to perform this scan every time?
The full system scan takes longer. It’s not necessary to perform the scan every time you scan but the full scan should be completed at least once a week.

8. Are the scans saved locally, and if so where?
Scan reports are stored on the computer where the tool is installed in the %userprofile%'SecurityScans folder.

9. Could you exclude patches to be scanned for?
Yes, you can configure MBSA to exclude specific security patches.

10. Which are some of the major recommendations that you would provide to secure any Windows system?
I would recommend that MBSA be ran on a regular basis to include full system scans. Anti-virus and anti-malware programs should be installed on systems as well. Implement

You May Also Find These Documents Helpful

  • Good Essays

    Geog/111 Final Exam

    • 1610 Words
    • 7 Pages

    Instructions: Fill out your name and PID number on the top left portion of the scantron sheet. (PID goes where it says identification number). Answer the questions on the test by darkening the circle containing the correct numbered response for each question. Double check to make sure that the question numbers on the test corresponds with those on the scantron sheet. Be sure to use a #2 pencil!…

    • 1610 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Assignment

    • 356 Words
    • 2 Pages

    If you choose to upgrade from a previous version, there is a possibility of loosing your console database. Here are instructions for backing up previous versions: http://service1.symantec.com/SUPPORT/on-technology.nsf/docid/2001050812540225?Open&seg=ent…

    • 356 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 327 Words
    • 2 Pages

    MBSA scans for missing updates and vulnerability where Microsoft updates only scans for missing updates…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    MGS 351 FINAL TIPS

    • 313 Words
    • 2 Pages

    9. intusion detection software: look ppl who should not be there. back up:copy the info. security auditing software: checks out the weakness of your computer.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ENVS 1000 Midterm Practice

    • 2927 Words
    • 24 Pages

    Do not make any markings in the ‘bar code’ regions of the Scantron – this…

    • 2927 Words
    • 24 Pages
    Satisfactory Essays
  • Good Essays

    For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    with varying amounts of data. In order for scanners to detect this type of virus,…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Multi-Layered Security

    • 350 Words
    • 2 Pages

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 350 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Invoice and Revenue Cycle

    • 1945 Words
    • 8 Pages

    | The revenue cycle is a recurring set of business activities and related information processing operations associated with providing goods and services to customers and collecting cash in payment for those sales. With whom is the primary external exchange of information?…

    • 1945 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    1. Ensure that the machine is in good condition before being used for security purposes…

    • 926 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Uv-Vis Procedure

    • 749 Words
    • 3 Pages

    The UVPorbe Software was opened and CONNECT button was clicked. A series of tests is automatically conducted which may take about 5 minutes. All checklist is made sure to be green.…

    • 749 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Panda Gold Protection comes with a very interactive interface which can also be used by fresh users. The user just has to click on the scan button which is very prominent and then wait while system does its…

    • 853 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    risk memo

    • 774 Words
    • 4 Pages

    NMAP is used to scan for open ports, identify services, and identify the operating system that the machine utilizes. This allows data that is extracted to be used to perform more direct vulnerability assessments. NMAP is not known to be a vulnerability scanner as other tool in the industry are. It is a stealthier tool than most. Meaning, it is a much quicker and more quiet than other tools. NMAP utilizes the Three Way : syn  syn/ack ack. The handshake helps with fire walking. Fire Walking is how a scanner determines the movement of a packet from an untrusted external host to a trusted host. This helps to determine which ports are open and what type of packets can travel to the internal host. This program helps with what and how many computers are on a network. It allows you to determine what services are running on a given machine. It allows you to find corresponding exploits for all systems. What is most attractive about NMAP is its price – FREE. The only associated cost with this automated tool is the training needed to run it effectively.…

    • 774 Words
    • 4 Pages
    Satisfactory Essays