Group Policy Protections [NG] Author: Malcolm Reed Jr. Framework Category: Operate and Maintain Specialty Area: Systems Analysis Work Role: Systems Security Analyst Task Description: Verify minimum security requirements are in place for all applications. (T0508) Scenario After attending a conference I was made aware that our Internet Explorer and Windows servers have been left open and vulnerable. I need you to find a way to improve the security of the application through the use of Group Policy. Additional Information More details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge. You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge. Once you have completed the requested tasks, you will need to document the methodology you used with as much detail and professionalism as necessary. This should be done on the documentation tab within the workspace once the challenge is deployed. Below the main documentation section be sure to include a tagged list of applications you used to complete the challenge. Your username/password to access all virtual machines and services within the workspace will be the following... Username: playerone Password: password123 The username/password used to access the Firewall's web interface within the workspace will be the following... Username: admin Password: password123

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Group Policy Protections [NG]

Author: Malcolm Reed Jr.
Framework Category: Operate and Maintain
Specialty Area: Systems Analysis
Work Role: Systems Security Analyst
Task Description: Verify minimum security requirements are in place for all applications. (T0508)
Scenario

After attending a conference I was made aware that our Internet Explorer and Windows servers have been left open and vulnerable. I need you to find a way to improve the security of the application through the use of Group Policy.

Additional Information

More details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge.

You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge.

Once you have completed the requested tasks, you will need to document the methodology you used with as much detail and professionalism as necessary. This should be done on the documentation tab within the workspace once the challenge is deployed. Below the main documentation section be sure to include a tagged list of applications you used to complete the challenge.

Your username/password to access all virtual machines and services within the workspace will be the following...
Username: playerone
Password: password123

The username/password used to access the Firewall's web interface within the workspace will be the following...
Username: admin
Password: password123

Richard LeGrand
@playerone, I just attended United States Government Configuration Baseline (USGCB) for Microsoft content seminar and found out some interesting things. I talked to some security professionals and they told me their top four Windows
security concerns.
lone Leventis
How was that seminar boss?
Richard LeGrand
Not now lone l'm in the middle of something..Where was 1?
Oh yea. so @playerone I was talking to some senior guys at the conference and they suggested a few things to me.
First, do not send any private information to Microsoft . whatever that means stop it.
Second stop cross site scripting..Uhh get that done.
Richard LeGrand
There was also mention of only allowing programs with correct signatures to be downloaded via Internet Explorer.
Lastly do not allow users to change any security settings within Windows Explorer. Go ahead and disable the Windows Explorer security tab altogether.
Gary Thatcher
@playerone, you should enforce these changes via a group policy object that spans the entire domain. Please make a new GPO called DasGroup on the Domain-Controller and set up the policies there.
Transcribed Image Text:Richard LeGrand @playerone, I just attended United States Government Configuration Baseline (USGCB) for Microsoft content seminar and found out some interesting things. I talked to some security professionals and they told me their top four Windows security concerns. lone Leventis How was that seminar boss? Richard LeGrand Not now lone l'm in the middle of something..Where was 1? Oh yea. so @playerone I was talking to some senior guys at the conference and they suggested a few things to me. First, do not send any private information to Microsoft . whatever that means stop it. Second stop cross site scripting..Uhh get that done. Richard LeGrand There was also mention of only allowing programs with correct signatures to be downloaded via Internet Explorer. Lastly do not allow users to change any security settings within Windows Explorer. Go ahead and disable the Windows Explorer security tab altogether. Gary Thatcher @playerone, you should enforce these changes via a group policy object that spans the entire domain. Please make a new GPO called DasGroup on the Domain-Controller and set up the policies there.
Group Policy Protections | Thomas Brown
O 34h 06m Left
Submit Challenge Attempt
Virtual Machines
Checks
Status
Check Description
Check Type
Check State
Last Changed
O Having issues with mouse/keyboard input or connecting to VM consoles?
Disable Microsoft Customer Experience Improvement [Approx. 3m Refresh]
Challenge Check ?
Undesireable State
09:20 AM PST
Machine Name
Status
Actions
Open Console ?
Disable the Security Tab [Approx. 3m Refresh]
Challenge Check ?
Undesireable State
09:20 AM PST
Backup
Powered On
Action -
5 HTML5
VMRC
Disable Cross-Site Scripting [Approx. 3m Refresh]
Challenge Check ?
Undesireable State
09:20 AM PST
Database
Powered On
Action
5 HTML5
I VMRC
Disable downloads without correct signatures for files [Approx. 3m Refresh]
Challenge Check 2.
Undesireable State
09:20 AM PST
Dev-Web
Powered On
Action -
5 HTML5
VMRC
Domain-Controller
Powered On
Action -
S HTML5
VMRC
Fileshare
Powered On
Action -
S HTML5
VMRC
Firewall
Powered On
Action -
5 HTML5
VMRC
Mail
Powered On
Action -
S HTML5
VMRC
Prod-Web
Action -
5 HTML5
Powered On
VMRC
Security-Desk
Powered On
Action -
5 HTML5
VMRC
Worketation Deck
Daworad A.
AUTME
OVMDC
Documentation
E Challenge Info
- Meeting Notes
* Network Map
Richard LeGrand
@playerone, I just attended United States Government Configuration Baseline (USGCB) for Microsoft content seminar and found out some interesting things. I talked to some security professionals and they told me their top four Windows
security concerns
D D D D D D D D
Transcribed Image Text:Group Policy Protections | Thomas Brown O 34h 06m Left Submit Challenge Attempt Virtual Machines Checks Status Check Description Check Type Check State Last Changed O Having issues with mouse/keyboard input or connecting to VM consoles? Disable Microsoft Customer Experience Improvement [Approx. 3m Refresh] Challenge Check ? Undesireable State 09:20 AM PST Machine Name Status Actions Open Console ? Disable the Security Tab [Approx. 3m Refresh] Challenge Check ? Undesireable State 09:20 AM PST Backup Powered On Action - 5 HTML5 VMRC Disable Cross-Site Scripting [Approx. 3m Refresh] Challenge Check ? Undesireable State 09:20 AM PST Database Powered On Action 5 HTML5 I VMRC Disable downloads without correct signatures for files [Approx. 3m Refresh] Challenge Check 2. Undesireable State 09:20 AM PST Dev-Web Powered On Action - 5 HTML5 VMRC Domain-Controller Powered On Action - S HTML5 VMRC Fileshare Powered On Action - S HTML5 VMRC Firewall Powered On Action - 5 HTML5 VMRC Mail Powered On Action - S HTML5 VMRC Prod-Web Action - 5 HTML5 Powered On VMRC Security-Desk Powered On Action - 5 HTML5 VMRC Worketation Deck Daworad A. AUTME OVMDC Documentation E Challenge Info - Meeting Notes * Network Map Richard LeGrand @playerone, I just attended United States Government Configuration Baseline (USGCB) for Microsoft content seminar and found out some interesting things. I talked to some security professionals and they told me their top four Windows security concerns D D D D D D D D
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY