Cooper_Assignment #5
.docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
242
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
4
Uploaded by UltraLemur3395
Assignment 5:
Techniques to Harden a Microsoft Client
Zachary Cooper
Harding Operating Systems: ISSC242
Doctor Adam Rutherford
May 7, 2023
2
Assignment 5
Hardening a client, or server, is necessary for protection and security. This is by reducing
all possible points of system where an attacker can exploit the client. These points are also
known as the attack surface (Buenning, 2022). Server hardening is done through a series of steps
and techniques, both physically to a system and on administratively in the network and settings. An initial step is securing the server location. Limiting the physical access to the server to
only authorized personnel is essential for security. The location should also be within proximity
and be temperature controlled (Buenning, 2022). The next steps involve configurations for users
and the network. The user configuration will protect credentials of the users and be the process
of establishing password policies. User configuration will also establish an access control list and
delineate permissions to the users (Buenning, 2022). Configuring the network will involve
gaining connection whether it be local or through the internet. This network configuration should
be placed behind a firewall (UpGuard, 2023). The firewall will monitor traffic within the
network, preventing attackers from entering the network. Customizing features and roles will allow the client to have what is needed and remove
what is not needed. This is important for having the needed functionality for the client while
limiting the attack surface with the removal of unneeded applications. A crucial, yet simple, step
in security is maintaining updates. Updates will ensure that any known vulnerabilities are
patched through the update. UpGuard details attacks are often done on vulnerabilities that are
approximately a year old and lacks an update have made the client more vulnerable. Automatic
updates, if allowed, maintain the security updates. Establishing these steps and procedures in the building of a network and implementation
of a Windows client can greatly improve the security posture. It is necessary to maintain
continuous monitoring and logging of the network. This final and continuous step allows for
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help