Question

DQ1: Discuss the importance of security baseline in configuration setting, and how does it relates to...

DQ1: Discuss the importance of security baseline in configuration setting, and how does it relates to profiling.

DQ2: Name one Auditing tool that can be used for Microsoft window Security, and describe the process of auditing.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

DQ1: Discuss the importance of security baseline in configuration setting, and how does it relates to profiling.

Solution : - Basline Security is also known as Minimum Security controls which are need to provide security to the organization by following the principal of Confidentiality, Integrity and Availability

It reduces or eliminates various security gaps which results  from Cyber Asssets that are not properly configured.

Profiling is a process of examining data from an existing source and summarizing information about data. whereas process of baselining involves both cconfiguration of IT environment to confirm to consistent standard levvels  

DQ2: Name one Auditing tool that can be used for Microsoft window Security, and describe the process of auditing.

Solution :-  

Netwrix is an Auditing tool which can be used for Microsoft Window Security . It delivers change audit reports on all criticalWindows Security log events, including changes to local users and groups, services , advanced audit policy settings, and critical servers like domain controllers.

Auditing is a process to keep track of files and folders, it allows the Admin to keep track of various activities like opening, closing, modifying, deleting or accessing any file or folder.In order to audit you must enavle Microsoft windows security auditing features. The process of auditing includes three steps:

1, Enablle Audit Policies

2. Applying Policies on Files/ Folders

3. Checking Event View Security Log

Audit Security Group Management is used in Windows OS to generate audit events when specific security group management tasks are performed.

It provides to audit following things:

1. Whether a Security group created or changed , or deleted.

2. Whether a memeber is added or removed from security group

3. Whether a group type is changed.

Security logs are configured using default Domain Controller group policy. To access it

Step 1: - Go to Computer Configuration

Step 2: - Then,Go to Windows Settings

Step 3: - Next go to security settings

Step 4: - Then Select Local Policies and then

Step 5: - Select Audit Policies

Here you will get number of policies which you can configure according to your needs there are two options for it which is Success or Failure. Success means apply that policy whereas Failure means does not apply that policy

Add a comment
Know the answer?
Add Answer to:
DQ1: Discuss the importance of security baseline in configuration setting, and how does it relates to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Explain the importance of microbiology and how it relates to the nursing profession (USLO 1) List...

    Explain the importance of microbiology and how it relates to the nursing profession (USLO 1) List the major groups of microorganisms and provide an example of each (USLO 2) Choose one historical advancement in microbiology (USLO 3) Describe methods used in microbiology such as microscopy and staining techniques (USLO 1.4)

  • Information Security Systems What is RSA Archer used for? Define Wireshark and NetWitness. How does Wireshark...

    Information Security Systems What is RSA Archer used for? Define Wireshark and NetWitness. How does Wireshark differ from NetWitness Investigator? What are security audits? Why they are important? Describe how Zenmap can help you identify risks, threats, and vulnerabilities in an IP network infrastructure. Describe input and output of the process.

  • Research and discuss SNMP. Describe the different versions available and what each one does differently (or...

    Research and discuss SNMP. Describe the different versions available and what each one does differently (or better). Is this tool necessary? Discuss the similarities and differences between a network monitor and a protocol analyzer. Is there overlap in functionality? Are there distinguishing characteristics? The book discusses many tools for checking lines used in networking. Is this a necessary skill for modern system administrators? Should someone else be handling this responsibility? How valid are looking glass sites to the overall job...

  • 5-1. Discuss the stages in the negotiation process and how culturally based value systems influence these...

    5-1. Discuss the stages in the negotiation process and how culturally based value systems influence these stages. Specifically, address the following. Explain the role and relative importance of relationship-building in different countries. Discuss the various styles and tactics that can be involved in exchanging task-related information. Describe differences in culturally based styles of persuasion. Discuss the kinds of concession strategies a negotiator might anticipate in various countries. 5-2. Discuss the relative use of nonverbal behaviors, such as silent periods, interruptions,...

  • Discuss how the Metro-E can contribute with respects to both the POS and Phone systems From...

    Discuss how the Metro-E can contribute with respects to both the POS and Phone systems From the perspective of Human Resource manager in HR department : Suggest ONE advantage for the POS and ONE advantage for the phones. Request information from TWO other departments that could assist in your investigation. Please specify both the TYPE, and specific CONTENTS of the report you are requesting (Unit 3 types of output) Discuss how the metro-E and the internet can contribute with respects...

  • 28. How does "Quality Control" apply to radiology departments with respect to patient protection and how...

    28. How does "Quality Control" apply to radiology departments with respect to patient protection and how does this relate to the overall medical facility Quality Management program to ensure standard of care? 29. Name and describe five ways that patient dose can be minimized in mammography, 30. Name at least one individual in history whose life was most likely lost or shortened due to exposure to radiation and briefly describe the type of exposure that was most likely the cause...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. ...

    Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. A signed applet can be hijacked. The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project. The generation of a real random number is a trivial task. Buffer overflow is one of the most common web attack methodologies. Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM),...

  • 1. Descri be the process of a bacterial transformation. Explain how scientists can make bacteria take...

    1. Descri be the process of a bacterial transformation. Explain how scientists can make bacteria take up DNA in a laboratory setting. (15 pts.) 2. Genetic transformations are not limited to bacteria. There are real-world applications where scientists have taken genes from one organism and inserted them into another organism. Give an example of how a genetically modified organism (can be any organ- ism, you are not limited to bacteria) have been used to solve real-world issues. Describe the organisms...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT