Group Policy Protections [NG] Author: Malcolm Reed Jr. Framework Category: Operate and Maintain Specialty Area: Systems Analysis Work Role: Systems Security Analyst Task Description: Verify minimum security requirements are in place for all applications. (T0508) Scenario After attending a conference I was made aware that our Internet Explorer and Windows servers have been left open and vulnerable. I need you to find a way to improve the security of the application through the use of Group Policy. Additional Information More details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge. You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge. Once you have completed the requested tasks, you will need to document the methodology you used with as much detail and professionalism as necessary. This should be done on the documentation tab within the workspace once the challenge is deployed. Below the main documentation section be sure to include a tagged list of applications you used to complete the challenge. Your username/password to access all virtual machines and services within the workspace will be the following... Username: playerone Password: password123 The username/password used to access the Firewall's web interface within the workspace will be the following... Username: admin Password: password123
Group Policy Protections [NG]
Author: Malcolm Reed Jr.Framework Category: Operate and Maintain
Specialty Area: Systems Analysis
Work Role: Systems Security Analyst
Task Description: Verify minimum security requirements are in place for all applications. (T0508)
Scenario
After attending a conference I was made aware that our Internet Explorer and Windows servers have been left open and vulnerable. I need you to find a way to improve the security of the application through the use of Group Policy.
Additional InformationMore details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge.
You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge.
Once you have completed the requested tasks, you will need to document the methodology you used with as much detail and professionalism as necessary. This should be done on the documentation tab within the workspace once the challenge is deployed. Below the main documentation section be sure to include a tagged list of applications you used to complete the challenge.
Your username/password to access all virtual machines and services within the workspace will be the following...
Username: playerone
Password: password123
The username/password used to access the Firewall's web interface within the workspace will be the following...
Username: admin
Password: password123
Trending now
This is a popular solution!
Step by step
Solved in 2 steps