Identifying_and_Removing_Malware_from_Windows_Systems_4e_-_Vikas_Nehra

pdf

School

University of North Alabama *

*We aren’t endorsed by this school

Course

111

Subject

Information Systems

Date

Apr 28, 2024

Type

pdf

Pages

10

Uploaded by ChiefPencilDuck42

Report
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 Student: Email: Vikas Nehra vnehra@una.edu Time on Task: Progress: 1 hour, 15 minutes 100% Report Generated: Thursday, March 7, 2024 at 2:39 AM Section 1: Hands-On Demonstration Part 1: Scan a Windows Server with Malwarebytes 6. Make a screen capture showing the scan summary . 8. From your local computer, use your favorite internet browser to research the identified threat and possible remediation steps , then document your findings . Trojan.Rozena and Malware.Ai refer to specific types of malicious software (malware) with different characteristics and behaviors. Trojan.Rozena: This is a type of Trojan malware. Trojans are malicious programs that disguise themselves as legitimate software. Rozena might be used to gain unauthorized access to a user's system, steal information, or cause other harmful actions.Remediation Steps for Trojan.Rozena: Use Antivirus Software: Run a full system scan using a reputable Page 1 of 10
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 antivirus or anti-malware software to detect and remove the Trojan.Update Software: Ensure that your operating system and all software are up to date with the latest security patches.Change Passwords: After removal, change passwords to your accounts, as Trojans can steal login information.Back-up Data: Regularly back up your data to mitigate loss in case of malware attacks.Be Cautious with Downloads: Avoid downloading software from untrusted sources to prevent future infections. Malware.AI.(id-nr) are detection names produced by the Artificial Intelligence module in Malwarebytes 4 and Malwarebytes business products. These generic malware detections are due to our new automated signature system called BytesTotal and DDS engine that are based on Machine Learning technology with 100% autonomous learning which don’t require any human interaction to correctly identify malware.. These techniques are part of Malwarebytes’ Katana engine and were developed for automated mass detection of wide ranges of malware and adware.The id-nr is usually around 9 digits. Remediation Steps for Malware Detected by AI: Malwarebytes detects unknown threats as Malware.AI by using Artificial Intelligence and Machine Learning techniques without any specific detection rules to protect users from malware that has not yet been researched and classified. This helps protect our customers against 0-day malware. Page 2 of 10
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 15. Make a screen capture showing the empty Quarantine area. Part 2: Scan a Windows Server with Microsoft Defender Antivirus 26. Make a screen capture showing the threat details in Microsoft Defender Antivirus . Page 3 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 29. Make a screen capture showing the results of the cleaning process . 37. Make a screen capture showing the blocked Quarantined threats list . Page 4 of 10
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 Section 2: Applied Learning Part 1: Scan a Windows Server with Microsoft Defender Antivirus 5. Make a screen capture showing the threat detected by the Full Scan . Page 5 of 10
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 8. Make a screen capture showing the confirmation that the threat was successfully blocked . Part 2: Run a Custom Scan on a Windows Server with Malwarebytes Page 6 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 7. Make a screen capture showing the results of the Malwarebytes scan . 8. Document the number of threats identified by Malwarebytes. 9 Page 7 of 10
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 Section 3: Challenge and Analysis Part 1: Compare Malwarebytes and Microsoft Defender Scan Results Make a screen capture showing the results of the Windows Defender scan . Page 8 of 10
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 Make a screen capture showing the results of the Malwarebytes scan . Compare the results of the two scans and note the differences in the threats detected. In Windows Security there are several detections Trojan:W97M/Melissa Virus:VBS/Lipossa.A@mm (listed twice) Trojan:Win32/Meterpreter.O All of these are marked asSevere, which indicates a high threat level, and they are listed as Active, suggesting that they are currently present and potentially running on the system and on Malwarebytes scan it indicates that there were zero threats detected on the system. Where as in MalwareBytes there were no Virus detected. Page 9 of 10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Identifying and Removing Malware from Windows Systems (4e) Security Strategies in Windows Platforms and Applications 4e - Lab 4 Make a screen capture showing the cleared Quarantined items list in Malwarebytes . Powered by TCPDF (www.tcpdf.org) Page 10 of 10