Computer Science Homework Help

ITT 430 EMCC Benchmark Deploy Security Measures Using Group Policy Paper

 

During this assignment, students will use the CIS Microsoft Windows Server 2019 (or current server version) Benchmark to ensure settings/policies/security options are configured on all three Windows Servers within the virtual environment.

Part 1

  1. Access the “ITT-430 CIS Microsoft Windows Server 2016 Benchmark.”
  2. Scan the CIS document and choose at least 10 appropriate settings/policies/security options for each Windows Server.
  3. In an MS Word document, provide a bulleted list and description of the options chosen for each server.

Part 2

  1. Domain Controller: Using the selected CIS settings/policies/security options from Part 1, follow the procedures in the “ITT-430 Domain Controller Group Policy Management Instructions,” to import and apply the new Group Policy settings throughout the domain.
  2. Deploy changes throughout domain.
  3. In the same MS Word document for Part 1, present a 250- to 500-word summary to include (a) security controls that were applied to minimize systems risks, threats, and vulnerabilities (b) baseline countermeasures that should be in place and (c) preventive controls needed to decrease the threat of unintentional errors or unauthorized access. In addition, provide screenshots as directed.
  4. Then, in 250–500 words, describe the differences between a scan conducted using CIS (Center Internet Security) Benchmarks to one using Security Technical Implementation Guides (STIGs) Benchmarks as well as defensive measures that can protect information within the network.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

B.S. Information Technology and B.S. Information Technology – Cyber Security

1.2: Minimize systems risks, threats, and vulnerabilities using best practices in user and resource administration.

3.2: Implement security measures to protect information systems.

B.S. Cyber Security

3.4 Utilize defensive measures and information collected from a variety of sources to identify, analyze, and report events that might occur within the network to protect information, information systems, and networks.

4.3 Establish baseline countermeasures that should be in place to counter cyber attacks from physical threats.

7.4 Employ preventive controls to decrease the threat of unintentional errors or unauthorized users accessing the system and modifying information.