Identifying_and_Removing_Malware_from_Windows_Systems_4e_-_Vikas_Nehra
pdf
keyboard_arrow_up
School
University of North Alabama *
*We aren’t endorsed by this school
Course
111
Subject
Information Systems
Date
Apr 28, 2024
Type
Pages
10
Uploaded by ChiefPencilDuck42
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
Student:
Email:
Vikas Nehra
vnehra@una.edu
Time on Task:
Progress:
1 hour, 15 minutes
100%
Report Generated:
Thursday, March 7, 2024 at 2:39 AM
Section 1: Hands-On Demonstration
Part 1: Scan a Windows Server with Malwarebytes
6.
Make a screen capture showing the scan summary
.
8.
From your local computer, use your favorite internet browser to research the identified threat
and possible remediation steps
, then document your findings
.
Trojan.Rozena and Malware.Ai refer to specific types of malicious software (malware) with different
characteristics and behaviors. Trojan.Rozena: This is a type of Trojan malware. Trojans are malicious
programs that disguise themselves as legitimate software. Rozena might be used to gain unauthorized
access to a user's system, steal information, or cause other harmful actions.Remediation Steps for
Trojan.Rozena:
Use Antivirus Software: Run a full system scan using a reputable
Page 1 of 10
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
antivirus or anti-malware software to detect and remove the
Trojan.Update Software: Ensure that your operating system and
all software are up to date with the latest security
patches.Change Passwords: After removal, change passwords
to your accounts, as Trojans can steal login information.Back-up
Data: Regularly back up your data to mitigate loss in case of
malware attacks.Be Cautious with Downloads: Avoid
downloading software from untrusted sources to prevent future
infections. Malware.AI.(id-nr) are detection names produced by
the Artificial Intelligence module in Malwarebytes 4 and
Malwarebytes business products. These generic malware
detections are due to our new automated signature system
called BytesTotal and DDS engine that are based on Machine
Learning technology with 100% autonomous learning which
don’t require any human interaction to correctly identify
malware.. These techniques are part of Malwarebytes’ Katana
engine and were developed for automated mass detection of
wide ranges of malware and adware.The id-nr is usually around
9 digits. Remediation Steps for Malware Detected by AI:
Malwarebytes detects unknown threats as Malware.AI by
using Artificial Intelligence and Machine Learning
techniques without any specific detection rules to protect
users from malware that has not yet been researched and
classified. This helps protect our customers against 0-day
malware.
Page 2 of 10
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
15.
Make a screen capture showing the empty Quarantine area.
Part 2: Scan a Windows Server with Microsoft Defender Antivirus
26.
Make a screen capture
showing the threat details in Microsoft Defender Antivirus
.
Page 3 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
29.
Make a screen capture
showing the results of the cleaning process
.
37.
Make a screen capture
showing the blocked Quarantined threats list
.
Page 4 of 10
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
Section 2: Applied Learning
Part 1: Scan a Windows Server with Microsoft Defender Antivirus
5.
Make a screen capture
showing the threat detected by the Full Scan
.
Page 5 of 10
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
8.
Make a screen capture
showing the confirmation that the threat was successfully
blocked
.
Part 2: Run a Custom Scan on a Windows Server with Malwarebytes
Page 6 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
7.
Make a screen capture
showing the results of the Malwarebytes scan
.
8.
Document the number of threats identified by Malwarebytes.
9
Page 7 of 10
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
Section 3: Challenge and Analysis
Part 1: Compare Malwarebytes and Microsoft Defender Scan Results
Make a screen capture
showing the results of the Windows Defender scan
.
Page 8 of 10
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
Make a screen capture
showing the results of the Malwarebytes scan
.
Compare the results
of the two scans and note the differences
in the threats detected.
In Windows Security there are several detections
Trojan:W97M/Melissa
Virus:VBS/Lipossa.A@mm (listed twice)
Trojan:Win32/Meterpreter.O
All of these are marked asSevere, which indicates a high threat level, and
they are listed as Active, suggesting that they are currently present and
potentially running on the system and on Malwarebytes scan it indicates
that there were zero threats detected on the system. Where as in
MalwareBytes there were no Virus detected.
Page 9 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Identifying and Removing Malware from Windows Systems (4e)
Security Strategies in Windows Platforms and Applications 4e - Lab 4
Make a screen capture
showing the cleared Quarantined items list in Malwarebytes
.
Powered by TCPDF (www.tcpdf.org)
Page 10 of 10