Cooper_Assignment #5

.docx

School

American Military University *

*We aren’t endorsed by this school

Course

242

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by UltraLemur3395

Assignment 5: Techniques to Harden a Microsoft Client Zachary Cooper Harding Operating Systems: ISSC242 Doctor Adam Rutherford May 7, 2023
2 Assignment 5 Hardening a client, or server, is necessary for protection and security. This is by reducing all possible points of system where an attacker can exploit the client. These points are also known as the attack surface (Buenning, 2022). Server hardening is done through a series of steps and techniques, both physically to a system and on administratively in the network and settings. An initial step is securing the server location. Limiting the physical access to the server to only authorized personnel is essential for security. The location should also be within proximity and be temperature controlled (Buenning, 2022). The next steps involve configurations for users and the network. The user configuration will protect credentials of the users and be the process of establishing password policies. User configuration will also establish an access control list and delineate permissions to the users (Buenning, 2022). Configuring the network will involve gaining connection whether it be local or through the internet. This network configuration should be placed behind a firewall (UpGuard, 2023). The firewall will monitor traffic within the network, preventing attackers from entering the network. Customizing features and roles will allow the client to have what is needed and remove what is not needed. This is important for having the needed functionality for the client while limiting the attack surface with the removal of unneeded applications. A crucial, yet simple, step in security is maintaining updates. Updates will ensure that any known vulnerabilities are patched through the update. UpGuard details attacks are often done on vulnerabilities that are approximately a year old and lacks an update have made the client more vulnerable. Automatic updates, if allowed, maintain the security updates. Establishing these steps and procedures in the building of a network and implementation of a Windows client can greatly improve the security posture. It is necessary to maintain continuous monitoring and logging of the network. This final and continuous step allows for
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help