10 likes | 18 Views
CYB 110 Week 2 Individual Assignment Securing an Operating System//tutorfortune.com<br><br>Click on below link to buy<br>https://tutorfortune.com/products/cyb-110-week-2-individual-assignment-securing-an-operating-system<br>CYB 110 Week 2 Individual Assignment Securing an Operating System<br> Instructions: You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2 exercises, apply the configuration settings below on your Windowsu00ae or Macu00ae computer and take screenshots of each step: Windows: <br>1.tLock system when not in use<br>2.tCreate and change user account password<br>3.tDisable Guest Account<br>4.tEnable Automatic Software Updates<br>5.tEnable Firewall<br>6.tCreate a New Firewall Rule<br>7.tTurn on Windows Defender<br>8.tEnable bit locker<br>9.tDecrypt file using EFS<br>10.tDisable Unnecessary Services Mac:<br>11.tLock system when not in use<br>12.tDisable Automatic Login<br>13.tEnable Automatic Software updates<br>14.tDisable Guest Account<br>15.tEnable FileVault<br>16.tEnable Firewall<br>17.tChange Password at set intervals<br>18.tEnable and set parental controls Paste screenshots into a Microsoftu00ae Word document to demonstrate you applied the configurations. Write a 1-page explanation on how and why these settings create a secure operating system.<br>Click on below link to buy<br>https://tutorfortune.com/products/cyb-110-week-2-individual-assignment-securing-an-operating-system<br><br><br><br>
E N D
CYB 110 Week 2 Individual Assignment Securing an Operating System//tutorfortune.com Click on below link to buy https://tutorfortune.com/products/cyb-110-week-2-individual-assignment-securing-an- operating-system C Y B 1 1 0 We e k 2 I n d i v i d u a l A s s i g n me n t S e c u r i n g a n O p e r a t i n g S y s t e m I n s t r u c t i o n s : Y o u a r e a s e c u r i t y a d mi n i s t r a t o r r e s p o n s i b l e f o r p r o v i d i n g s e c u r e c o n fi g u r a t i o n r e q u i r e me n t s f o r n e w l a p t o p d e p l o y me n t s . A f t e r r e a d i n g Mo d u l e 2 o f C e r t i fi e d S e c u r e C o mp u t e r U s e r v 2 e x e r c i s e s , a p p l y t h e c o n fi g u r a t i o n s e t t i n g s b e l o w o n y o u r Wi n d o w s ® o r Ma c ® c o mp u t e r a n d t a k e s c r e e n s h o t s o f e a c h s t e p : Wi n d o w s : 1 . 2 . 3 . 4 . 5 . 6 . 7 . 8 . 9 . 1 0 . 1 1 . 1 2 . 1 3 . 1 4 . 1 5 . 1 6 . 1 7 . 1 8 . L o c k s y s t e m w h e n n o t i n u s e C r e a t e a n d c h a n g e u s e r a c c o u n t p a s s w o r d D i s a b l e G u e s t A c c o u n t E n a b l e A u t o ma t i c S o f t w a r e U p d a t e s E n a b l e F i r e w a l l C r e a t e a N e w F i r e w a l l R u l e T u r n o n Wi n d o w s D e f e n d e r E n a b l e b i t l o c k e r D e c r y p t fi l e u s i n g E F S D i s a b l e U n n e c e s s a r y S e r v i c e s Ma c : L o c k s y s t e m w h e n n o t i n u s e D i s a b l e A u t o ma t i c L o g i n E n a b l e A u t o ma t i c S o f t w a r e u p d a t e s D i s a b l e G u e s t A c c o u n t E n a b l e F i l e V a u l t E n a b l e F i r e w a l l C h a n g e P a s s w o r d a t s e t i n t e r v a l s E n a b l e a n d s e t p a r e n t a l c o n t r o l s P a s t e s c r e e n s h o t s i n t o a Mi c r o s o f t ® Wo r d d o c u me n t t o d e mo n s t r a t e y o u a p p l i e d t h e c o n fi g u r a t i o n s . Wr i t e a 1 - p a g e e x p l a n a t i o n o n h o w a n d w h y t h e s e s e t t i n g s c r e a t e a s e c u r e o p e r a t i n g s y s t e m. Click on below link to buy https://tutorfortune.com/products/cyb-110-week-2-individual-assignment-securing-an- operating-system