•Windows local and Domain accounts that are targets for credential theft and their purpose
•Unix accounts that are targets for credential theft and their purpose
•User and Admin activities that increase the chance of compromise for these accounts
•What is account delegation in Windows?
•Based on what you wrote above, and what you have learned in class, write a brief description of the level of accounts that your organization would have and the privileges you would delegate to each.
•Why would an organization want to identify hosts that re used for administration and provide them with extra security?
•Write a detailed plan for turning your Windows 10 host in the lab environment into a secure administrative host.
•Are domain controllers, virtual and physical, inherently secure?
•Why would an attacker target a domain controller first when there may be other targets such as databases, web servers, file servers, etc.?
•What can one do to further enhance the security for domain controllers? Implementation - 20 Points
Physical Domain Controller
Virtual Domain Controller
•Based on your suggestions for enhancing the security of domain controllers above, write a brief plan for securing the domain controller in your lab environment, bullet points are fine.
•Now implement the plan on both domain controllers in the lab. Be cognizant of how these controls may affect the remote access you need.
•Discuss the top 10 audit/event logs that you should be monitoring for on your domain controllers
•Discuss the top 10 audit/event logs that you should be monitoring for on your workstations
•What type of system should you be sending your logs to?
Recently Asked Questions
- How can i write a close analysis essay on lab girl by Hope Jahren?
- Give examples of how Domino’s has adapted its global marketing mix to meet the needs of local consumers. Are you their customer? If so, why?
- Explain how financial leverage at investment banks differed from financial leverage at more traditional commercial banks. What is the benefits of this