•Windows local and Domain accounts that are targets for credential theft and their purpose
•Unix accounts that are targets for credential theft and their purpose
•User and Admin activities that increase the chance of compromise for these accounts
•What is account delegation in Windows?
•Based on what you wrote above, and what you have learned in class, write a brief description of the level of accounts that your organization would have and the privileges you would delegate to each.
•Why would an organization want to identify hosts that re used for administration and provide them with extra security?
•Write a detailed plan for turning your Windows 10 host in the lab environment into a secure administrative host.
•Are domain controllers, virtual and physical, inherently secure?
•Why would an attacker target a domain controller first when there may be other targets such as databases, web servers, file servers, etc.?
•What can one do to further enhance the security for domain controllers? Implementation - 20 Points
Physical Domain Controller
Virtual Domain Controller
•Based on your suggestions for enhancing the security of domain controllers above, write a brief plan for securing the domain controller in your lab environment, bullet points are fine.
•Now implement the plan on both domain controllers in the lab. Be cognizant of how these controls may affect the remote access you need.
•Discuss the top 10 audit/event logs that you should be monitoring for on your domain controllers
•Discuss the top 10 audit/event logs that you should be monitoring for on your workstations
•What type of system should you be sending your logs to?
Recently Asked Questions
- What are the reasons why the 1998 Human Rights Act was really needed?
- how do I use the fzero function to solve this problem in matlab 2xy-40e^x=0 x^2-y=50 the solution for x lies near 0.
- the mean is 10 10 in and the is standard deviation is 2in (a) What percent of the fish are longer than 11 inches (b) if 500 fish are randomly selected,