Lab Report: 7.1.6 Configure Windows Defender

Lab Report: 7.1.6 Configure Windows Defender

<p>Lab Report: 7.1.6 Configure Windows Defender </p><p><strong>Your Performance </strong></p><p>Your Score: 0 of 6 (0%) Elapsed Time: 12 seconds <br>Pass Status: Not Passed Required Score: 100% </p><p><strong>Task Summary </strong></p><p>Perform a full scan once per week&nbsp;Hide Details </p><p>Perform the scan on Saturday Perform the scan at midnight (12:00 am) Perform a full system scan </p><p>Check for updates before scanning Configure default actions to take&nbsp;Hide Details </p><p>Remove severe alert items Remove high alert items Remove medium alert items Allow low alert items Apply recommended actions to items detected during a scan </p><p>Configure advanced options&nbsp;Hide Details </p><p>Scan email Scan removable drives </p><p>Display items from all users of this computer Perform a quick scan </p><p><strong>Explanation </strong></p><p>In this lab, your task is to configure Windows Defender as follows: <br>Automatic scanning setting: </p><p>Frequency: <strong>Saturday </strong>Approximate time: <strong>12:00 am </strong></p><p>Type: <strong>Full scan </strong>(A quick scan checks the areas of the computer that spyware is likely to affect, and a full scan checks all files and programs on the computer) Check for updated definitions before scanning: <strong>Enabled </strong></p><p>Default actions settings: </p><p>Severe alert items: <strong>Remove </strong>High alert items: <strong>Remove </strong>Medium alert items: <strong>Remove </strong>Low alert items: <strong>Allow </strong></p><p>Apply recommended actions: <strong>Enabled </strong><br>Advanced settings: </p><p>Scan email: <strong>Enabled </strong>Scan removable drives: <strong>Enabled </strong></p><p>Administrator settings: <br>Display items from all users of this computer: <strong>Enabled </strong><br>Complete this lab as follows: </p><p>1. Right-click <strong>Start </strong>&gt; <strong>Control Panel</strong>. </p><p>2. In the top right corner under View by, select <strong>Small icons </strong>from the drop-down list. </p><p>3. Select <strong>Windows Defender</strong>. 4. Select <strong>Tools</strong>. </p><p>5. Under Settings, select <strong>Options</strong>. 6. Make sure <strong>Automatically scan my computer (recommended) </strong>is selected to allow Windows Defender to scan the computer automatically. <br>7. Configure automatic scanning settings as follows: </p><p>a. Select the <strong>frequency</strong>. b. Select the <strong>approximate time</strong>. </p><p>c. Select the <strong>type </strong>of scan. </p><p>d. Select <strong>Check for updated definitions before scanning </strong>to make sure definitions are up to date prior to a </p><p>scan. <br>8. Configure Default actions settings as follows: a. In the left-side menu, select <strong>Default actions</strong>. </p><p>b. Select the <strong>Severe alert items</strong>. c. Select the <strong>High alert items</strong>. d. Select the <strong>Medium alert items</strong>. e. Select the <strong>Low alert items</strong>. </p><p>f. Select <strong>Apply recommended actions </strong>to apply actions when items are detected. <br>9. Configure Advanced settings as follows: a. In the left menu, select <strong>Advanced</strong>. </p><p>b. Select <strong>Scan email</strong>. c. Select <strong>Scan removable drives</strong>. </p><p>10. Configure Administrator settings as follows: a. In the left menu, select <strong>Administrator</strong>. </p><p>b. Select <strong>Display items from all users of this computer</strong>. <br>11. Select <strong>Save</strong>. </p><p>12. Select <strong>Scan </strong>to run a quick scan. </p><p>Lab Report: 7.3.5 Configure Automatic Updates </p><p><strong>Your Performance </strong></p><p>Your Score: 0 of 4 (0%) Elapsed Time: 11 seconds <br>Pass Status: Not Passed Required Score: 100% </p><p><strong>Task Summary </strong></p><p>On Support, configure Windows Update&nbsp;Hide Details </p><p>Install updates on Wednesday Install updates at 2:00 am Allow other users to install updates Include recommended updates </p><p>On Support, configure driver updates to install if they are not found on the computer On ITAdmin, Enable automatic updates&nbsp;Hide Details </p><p>Install updates automatically Include recommended updates for other Microsoft products </p><p>On ITAdmin, configure driver updates to download apps and icons for new devices </p><p><strong>Explanation </strong></p><p>In this lab, you perform the following tasks: <br>Configure Windows Update on Support (which is running Windows 7) as follows: <br>Download and install updates automatically each <strong>Wednesday </strong>at <strong>2:00 am</strong>. Include recommended updates. Allow any user on the computer to install updates. Configure driver updates to install drivers if they are not found on the computer. </p><p>Configure Windows Update on ITAdmin as follows: <br>Configure Windows Update to install updates automatically. Configure Windows Update to install updates for other Microsoft products when Windows is updated. Configure driver updates to download apps and icons for new devices. </p><p>Complete this lab as follows: <br>1. On Support, modify Windows Update settings as follows: </p><p>a. Select <strong>Start</strong>. b. Select <strong>Control Panel</strong>. c. Select <strong>System and Security</strong>. d. Select <strong>Windows Update</strong>. e. On the left, select <strong>Change settings</strong>. </p><p>f. Configure the update <strong>day </strong>and <strong>time</strong>. </p><p>g. Select <strong>Give me recommended updates the same way I receive important updates </strong>to include </p><p>recommended updates. </p><p>h. Select <strong>Allow all users to install updates on this computer </strong>to allow any user to install updates. i. Click <strong>OK</strong>. </p><p>2. On Support, configure how Windows prompts for updated drivers: </p><p>a. Select <strong>Start</strong>. b. Right-click <strong>Computer </strong>and select <strong>Properties</strong>. c. On the left, select <strong>Advanced system settings</strong>. d. Select the <strong>Hardware </strong>tab. e. Select <strong>Device Installation Settings</strong>. </p><p>f. Select the required <strong>update option</strong>; then click <strong>Save Changes</strong>. </p><p>g. Click <strong>OK</strong>. </p><p>3. On ITAdmin, modify Windows Update settings as follows: a. From the top menu, select the <strong>Floor 1 </strong>location tab. </p><p>b. Select <strong>ITAdmin</strong>. c. Select <strong>Start</strong>. d. Select <strong>Settings</strong>. e. Select <strong>Update &amp; security</strong>. f. In Windows Update, select <strong>Advanced options</strong>. </p><p>g. From the Choose how updates are installed drop-down list, select <strong>Automatically</strong>. </p><p>h. Select <strong>Give me updates for other Microsoft products when I update Windows </strong>to include </p><p>recommended updates. <br>4. On ITAdmin, configure how Windows handles apps and icons for devices: </p><p>a. Right-click <strong>Start </strong>and select <strong>System</strong>. b. On the left, select <strong>Advanced system settings</strong>. c. Select the <strong>Hardware </strong>tab. d. Select <strong>Device Installation Settings</strong>. e. Select <strong>Yes</strong>; then select <strong>Save Changes</strong>. f. Select <strong>OK</strong>. </p><p>5. Select <strong>Yes</strong>; then click <strong>Save Changes</strong>. 6. Click <strong>OK</strong>. </p><p>Lab Report: 7.3.7 Configure Windows Firewall </p><p><strong>Your Performance </strong></p><p>Your Score: 0 of 3 (0%) Elapsed Time: 11 seconds <br>Pass Status: Not Passed Required Score: 100% </p><p><strong>Task Summary </strong></p><p>Turn Windows Firewall On&nbsp;Hide Details </p><p>Enable the firewall for the Domain network Profile Enable the firewall for the Public network Profile </p><p>Configure the program exceptions on the Domain network profile&nbsp;Hide Details </p><p>Allow Key Management Service through the firewall Allow the Arch98 program through the firewall Allow the Apconf program through the firewall Deny the Windows Media Player program through the firewall Deny the Windows Peer to Peer Collaboration Foundation program through the firewall </p><p>Configure the program exceptions on the Public network profile&nbsp;Hide Details </p><p>Allow Key Management Service through the firewall Allow the Arch98 program through the firewall Allow the Apconf program through the firewall </p><p><strong>Explanation </strong></p><p>In this lab, you configure Windows Firewall as follows: <br>Turn on Windows Firewall for the Domain and Public network profiles. Allow the following for the Domain and Public network profiles: </p><p><strong>Key Management Service </strong>An application named <strong>Arch98 </strong>An application named <strong>Apconf </strong></p><p>Remove the following exceptions on the Domain network profile: </p><p><strong>Windows Media Player Windows Peer to Peer Collaboration Foundation </strong></p><p>Complete this lab as follows: </p><p>1. Right-click <strong>Start </strong>and select <strong>Control Panel</strong>. 2. Select <strong>System and Security</strong>. 3. Select <strong>Windows Firewall</strong>. </p><p>4. Turn the Windows Firewall on as follows: </p><p>a. On the left, select <strong>Turn Windows Firewall on or off </strong>to enable the firewall. b. Under Domain network settings, select <strong>Turn on Windows Firewall</strong>. c. Under Public network settings, select <strong>Turn on Windows Firewall</strong>. d. Click <strong>OK</strong>. </p><p>5. Allow programs through the firewall as follows: </p><p>a. On the left, select <strong>Allow an app or feature through Windows Firewall </strong>to allow a program through the </p><p>firewall. </p><p>b. Select <strong>Change settings</strong>. </p><p>c. For Key Management Service, mark the <strong>exception </strong>box in the Domain and Public columns. d. Select <strong>Allow another app </strong>to configure an exception for an uncommon program. e. Select <strong>Arch98 </strong>from the list. </p><p>f. Select <strong>Add</strong>. </p><p>g. Make sure the <strong>Domain exception </strong>box is selected. h. In the Public column, select the <strong>exception </strong>box. i. Repeat steps 5d–5h for <strong>Apconf</strong>. </p><p>6. Restrict programs through the firewall as follows: a. Under Allowed apps and features, browse to the <strong>program</strong>. b. For the program, deselect the <strong>Domain exception </strong>box. </p><p>c. Click <strong>OK</strong>. </p><p>Lab Report: 7.4.5 Manage Services with Group Policy </p><p><strong>Your Performance </strong></p><p>Your Score: 0 of 5 (0%) Elapsed Time: 14 seconds <br>Pass Status: Not Passed Required Score: 100% </p><p><strong>Task Summary </strong></p><p>Set the <strong>Application Identity </strong>service to Automatic Set the <strong>Remote Registry </strong>service to Disabled Set the <strong>Routing and Remote Access </strong>service to Disabled Set the <strong>SSDP Discovery </strong>service to Disabled Set the <strong>UPnP Device Host </strong>service to Disabled </p><p><strong>Explanation </strong></p><p>In this lab, you configure the Workstation GPO with the following settings: </p><p></p><ul style="display: flex;"><li style="flex:1"><strong>Service </strong></li><li style="flex:1"><strong>Setting </strong></li></ul><p></p><p>Application Identity Remote Registry <br>Automatic Disabled <br>Routing and Remote Access&nbsp;Disabled </p><ul style="display: flex;"><li style="flex:1">SSDP Discovery </li><li style="flex:1">Disabled </li></ul><p></p><ul style="display: flex;"><li style="flex:1">Disabled </li><li style="flex:1">UPnP Device Host </li></ul><p>Complete this lab as follows: </p><p>1. From Server Manager, select <strong>Tools </strong>&gt; <strong>Group Policy Management</strong>. 2. Expand <strong>Forest: CorpNet.com </strong>&gt; <strong>Domains </strong>&gt; <strong>CorpNet.com </strong>&gt; <strong>Group Policy Objects</strong>. 3. Right-click <strong>WorkstationGPO </strong>and select <strong>Edit</strong>. 4. Under Computer Configuration, expand <strong>Policies </strong>&gt; <strong>Windows Settings </strong>&gt; <strong>Security Settings</strong>. 5. Select <strong>System Services</strong>. </p><p>6. In the right pane, double-click the <strong>policy </strong>you want to edit. </p><p>7. Select <strong>Define this policy setting</strong>. </p><p>8. Select the <strong>policy setting</strong>; then click <strong>OK</strong>. </p><p>9. Repeat steps 6–8 for each policy setting. </p><p>Lab Report: 7.5.5 Configure NTFS Permissions </p><p><strong>Your Performance </strong></p><p>Your Score: 0 of 4 (0%) Elapsed Time: 13 seconds <br>Pass Status: Not Passed Required Score: 100% </p><p><strong>Task Summary </strong></p><p>Give the Accounting Resources group Full Control to D:\Departments\Accounting Give the Research Resources group Full Control to D:\Departments\Research Give the Sales Resources group Full Control to D:\Departments\Sales Give the Support Resources group Full Control to D:\Departments\Support </p><p><strong>Explanation </strong></p><p>In this lab, you explicitly add permission assignments using the following: </p><p></p><ul style="display: flex;"><li style="flex:1"><strong>Folder </strong></li><li style="flex:1"><strong>Domain Local Group </strong></li><li style="flex:1"><strong>Permissions </strong></li></ul><p></p><p></p><ul style="display: flex;"><li style="flex:1">D:\Departments\Accounting </li><li style="flex:1">Accounting Resources </li><li style="flex:1">Full Control </li></ul><p>D:\Departments\Research D:\Departments\Sales D:\Departments\Support <br>Research Resources Sales Resources <br>Full Control Full Control </p><ul style="display: flex;"><li style="flex:1">Full Control </li><li style="flex:1">Support Resources </li></ul><p>Complete this lab as follows: <br>1. From the taskbar, open File Explorer. 2. Browse to and right-click the <strong>folder </strong>and select <strong>Properties</strong>. </p><p>3. Select the <strong>Security </strong>tab. 4. Select <strong>Edit</strong>. 5. Select <strong>Add</strong>. </p><p>6. In the Enter the object names to select field, type the <strong>name </strong>of the group that will receive permission to the shared folder; then click <strong>OK</strong>. </p><p>7. Select the <strong>group</strong>. </p><p>8. In the Allow column, select the appropriate <strong>permission</strong>. </p><p>9. Click <strong>OK </strong>twice. </p><p>10. Repeat steps 2-9 for each domain local group. </p><p>Lab Report: 7.5.6 Disable Inheritance </p><p><strong>Your Performance </strong></p><p>Your Score: 0 of 2 (0%) Elapsed Time: 16 seconds <br>Pass Status: Not Passed Required Score: 100% </p><p><strong>Task Summary </strong></p><p>Grant the Managers group Allow Full Control to D:\Personnel Prevent inherited permissions on the D:\Personnel folder&nbsp;Hide Details </p><p>Disable inheritance Remove all inherited permissions from the folder </p><p><strong>Explanation </strong></p><p>In this lab, you perform the following tasks: <br>Grant the Managers group the <strong>Full Control </strong>permission to the D:\Personnel folder. Remove all inherited permissions that are flowing to the D:\Personnel folder. </p><p>Complete this lab as follows: <br>1. Configure NTFS permissions as follows: </p><p>a. From the taskbar, open <strong>File Explorer</strong>. </p><p>b. Browse to the <strong>folder </strong>you need to modify permissions for. c. Right-click the <strong>folder </strong>and select <strong>Properties</strong>. </p><p>d. Select the <strong>Security </strong>tab. e. Select <strong>Edit</strong>. f. Select <strong>Add</strong>. </p><p>g. Enter the <strong>name </strong>of the group that will receive permission to the folder. </p><p>h. Click <strong>OK</strong>. </p><p>i. With the Managers group selected, select the appropriate <strong>NTFS permission</strong>. </p><p>j. Click <strong>OK</strong>. </p><p>2. Prevent inherited permissions from parent objects as follows: a. On the Security tab, select <strong>Advanced</strong>. </p><p>b. Select <strong>Disable inheritance</strong>. c. Select <strong>Remove all inherited permissions from this object</strong>. </p><p>d. Click <strong>OK </strong>to close the Advanced Security Settings for Personnel dialog. e. Click <strong>OK </strong>to close the Properties dialog. </p><p>Lab Report: 7.9.4 Configure Advanced Audit Policy </p><p><strong>Your Performance </strong></p><p>Your Score: 0 of 9 (0%) Elapsed Time: 16 seconds <br>Pass Status: Not Passed Required Score: 100% </p><p><strong>Task Summary </strong></p><p>Enable Audit Policies&nbsp;Hide Details </p><p>Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings:--Enabled </p><p>Audit: Shut down system immediately if unable to log security audits--Enabled </p><p>Enable Event Log Policy&nbsp;Hide Details </p><p>Retention method for security log: Enabled--do not overwrite events (clear log manually) </p><p>Enable Account Logon Audit Policy&nbsp;Hide Details </p><p>Audit Credential Validation: Success and Failure </p><p>Enable Account Management Audit Policies&nbsp;Hide Details </p><p>Audit User Account Management: Success and Failure Audit Security Group Management: Success and Failure Audit Other Account Management Events: Success and Failure Audit Computer Account Management: Success </p><p>Enable Detailed Tracking Audit Policy&nbsp;Hide Details </p><p>Audit Process Creation: Success </p><p>Enable Logon-Logoff Audit Policies&nbsp;Hide Details </p><p>Audit Logon: Success and Failure Audit Logoff: Success </p><p>Enable Policy Change Audit Policies&nbsp;Hide Details </p><p>Audit Authentication Policy Change: Success Audit Audit Policy Change: Success and Failure </p><p>Enable Privelege Use Audit Policy&nbsp;Hide Details </p><p>Audit Sensitive Privilege Use: Success and Failure </p><p>Enable System Audit Policies&nbsp;Hide Details </p><p>Audit System Integrity: Success and Failure Audit Security System Extension: Success and Failure Audit Security State Change: Success and Failure Audit IPsec Driver: Success and Failure </p><p><strong>Explanation </strong></p><p>In this lab, you configure the following audit policy settings in WorkstationGPO as follows: </p><p></p><ul style="display: flex;"><li style="flex:1"><strong>Local Policies </strong></li><li style="flex:1"><strong>Setting </strong></li></ul><p></p><p>Enabled Enabled <br>Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings </p><p>Audit: Shut down system immediately if unable to log security audits </p><p></p><ul style="display: flex;"><li style="flex:1"><strong>Event Log </strong></li><li style="flex:1"><strong>Setting </strong></li></ul><p></p><p>Retention method for security log&nbsp;Enabled: Do not overwrite events (clear log manually) </p><p><strong>Advanced Audit Policy Configuration </strong></p><p>Account Logon: Audit Credential Validation Account Management: Audit User Account Management Account Management: Audit Security Group Management Account Management: Audit Other Account Management Events Account Management: Audit Computer Account Management Detailed Tracking: Audit Process Creation Logon/Logoff: Audit Logon </p><p><strong>Setting </strong></p><p>Success and Failure Success and Failure Success and Failure Success and Failure Success Success Success and Failure </p><ul style="display: flex;"><li style="flex:1">Success </li><li style="flex:1">Logon/Logoff: Audit Logoff </li></ul><p>Policy Change: Audit Authentication Policy Change Policy Change: Audit Audit Policy Change Privilege Use: Audit Sensitive Privilege Use System: Audit System Integrity <br>Success Success and Failure Success and Failure Success and Failure Success and Failure Success and Failure Success and Failure <br>System: Audit Security System Extension System: Audit Security State Change System: Audit IPsec Driver </p><p>Edit audit policies as follows: </p><p>1. From Server Manager, select <strong>Tools </strong>&gt; <strong>Group Policy Management</strong>. 2. Expand Forest: <strong>CorpNet.com </strong>&gt; <strong>Domains </strong>&gt; <strong>CorpNet.com </strong>&gt; <strong>Group Policy Objects</strong>. 3. Right-click <strong>WorkstationGPO </strong>and select <strong>Edit</strong>. 4. Under Computer Configuration, expand <strong>Policies </strong>&gt; <strong>Windows Settings </strong>&gt; <strong>Security Settings</strong>. </p><p>5. Modify Local Policies as follows: </p><p>a. Expand <strong>Local Policies</strong>. b. Select <strong>Security Options</strong>. </p><p>c. In the right pane, double-click the <strong>policy </strong>you want to edit. </p><p>d. Select <strong>Define this policy setting</strong>. </p><p>e. Select the <strong>policy settings </strong>as required. </p><p>f. Click <strong>OK</strong>. g. Click <strong>Yes </strong>to confirm changes as necessary. </p><p>h. Repeat steps 5c–5g for additional policy settings. <br>6. Modify the event log as follows: a. In the left pane, select <strong>Event Log</strong>. b. In the right pane, double-click the <strong>policy </strong>you want to edit. </p><p>c. Select <strong>Define this policy setting</strong>. </p><p>d. Select the <strong>policy settings </strong>as required. </p><p>e. Click <strong>OK</strong>. </p><p>7. Modify Advanced Audit Policy Configuration as follows: </p><p>a. In the left pane, expand <strong>Advanced Audit Policy Configuration </strong>&gt; <strong>Audit Policies</strong>. b. Select the <strong>audit policy </strong>category. </p><p>c. In the right pane, double-click the <strong>policy </strong>you want to edit. </p><p>d. Select <strong>Configure the following audit events</strong>. </p><p>e. Select the <strong>policy settings </strong>as required. </p><p>f. Click <strong>OK</strong>. </p><p>g. Repeat steps 7b–7f for additional policy settings. </p><p>Lab Report: 7.9.6 Enable Device Logs </p><p><strong>Your Performance </strong></p><p>Your Score: 0 of 3 (0%) Elapsed Time: 20 seconds <br>Pass Status: Not Passed Required Score: 100% </p><p><strong>Task Summary </strong></p><p>Enable logging and the Syslog aggregator Set RAM memory logging to Critical Set Flash memory logging to Alerts </p><p><strong>Explanation </strong></p><p>In this lab, you perform the following: <br>Enable Logging and the Syslog aggregator Configure RAM memory logging as follows: <br>Emergency, Alert, and Critical: <strong>Enable </strong>Error, Warning, Notice, Informational, and Debug: <strong>Disable </strong></p><p>Configure Flash memory logging as follows: </p><p>Emergency and Alert: <strong>Enable </strong></p><p>Critical, Error, Warning, Notice, Informational, and Debug: <strong>Disable </strong><br>Complete this lab as follows: <br>1. From the left menu, expand the <strong>Administration</strong>. </p><p>2. Expand <strong>System Log</strong>. 3. Select <strong>Log Settings</strong>. </p><p>4. Under Logging, select <strong>Enable</strong>. 5. Under Syslog Aggregator, select <strong>Enable</strong>. 6. Under RAM Memory Logging, enable and disable the appropriate <strong>settings</strong>. 7. Under Flash Memory Logging, enable and disable the appropriate <strong>settings</strong>. </p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    23 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us