security requirements are in place for all applications. (T0508) Scenario After attending a conference I was made aware that our Internet Explorer and Windows servers have been left open and vulnerable. I need you to find a way to improve the security of the application through the use of Group Policy. Additional Information More details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge. You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge. Once you have completed the requested tasks, you will need to document the methodology you used with as much detail and professionalism as necessary. This should be done on the documentation tab within the workspace once the challenge is deployed. Below the main documentation section be sure to include a tagged list of applications you used to complete the challenge. Your username/password to access all virtual machines and services within the workspace will be the following... Username: playerone Password: password123 The username/password used to access the Firewall's web interface within the workspace will be the following... Username: admin Password: password123
I need help with Group Policy Protection. Here it is....Thanks.
Group Policy Protections [NG]
Author: Malcolm Reed Jr.Framework Category: Operate and Maintain
Specialty Area: Systems Analysis
Work Role: Systems Security Analyst
Task Description: Verify minimum security requirements are in place for all applications. (T0508)
Scenario
After attending a conference I was made aware that our Internet Explorer and Windows servers have been left open and vulnerable. I need you to find a way to improve the security of the application through the use of Group Policy.
Additional InformationMore details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge.
You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge.
Once you have completed the requested tasks, you will need to document the methodology you used with as much detail and professionalism as necessary. This should be done on the documentation tab within the workspace once the challenge is deployed. Below the main documentation section be sure to include a tagged list of applications you used to complete the challenge.
Your username/password to access all virtual machines and services within the workspace will be the following...
Username: playerone
Password: password123
The username/password used to access the Firewall's web interface within the workspace will be the following...
Username: admin
Password: password123
![Richard LeGrand
@playerone, I just attended United States Government Configuration Baseline (USGCB) for Microsoft content seminar and found out some interesting things. I talked to some security professionals and they told me their top four Windows
security concerns.
lone Leventis
How was that seminar boss?
Richard LeGrand
Not now lone l'm in the middle of something..Where was 1?
Oh yea. so @playerone I was talking to some senior guys at the conference and they suggested a few things to me.
First, do not send any private information to Microsoft . whatever that means stop it.
Second stop cross site scripting..Uhh get that done.
Richard LeGrand
There was also mention of only allowing programs with correct signatures to be downloaded via Internet Explorer.
Lastly do not allow users to change any security settings within Windows Explorer. Go ahead and disable the Windows Explorer security tab altogether.
Gary Thatcher
@playerone, you should enforce these changes via a group policy object that spans the entire domain. Please make a new GPO called DasGroup on the Domain-Controller and set up the policies there.](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2F3eaa5c6f-accd-4bc4-9b2e-eb3c7bd443e5%2Fbdaa9b9b-8361-425f-8fd0-3b789d74d711%2Fpdy4quf_processed.png&w=3840&q=75)
![Group Policy Protections | Thomas Brown
O 34h 06m Left
Submit Challenge Attempt
Virtual Machines
Checks
Status
Check Description
Check Type
Check State
Last Changed
O Having issues with mouse/keyboard input or connecting to VM consoles?
Disable Microsoft Customer Experience Improvement [Approx. 3m Refresh]
Challenge Check ?
Undesireable State
09:20 AM PST
Machine Name
Status
Actions
Open Console ?
Disable the Security Tab [Approx. 3m Refresh]
Challenge Check ?
Undesireable State
09:20 AM PST
Backup
Powered On
Action -
5 HTML5
VMRC
Disable Cross-Site Scripting [Approx. 3m Refresh]
Challenge Check ?
Undesireable State
09:20 AM PST
Database
Powered On
Action
5 HTML5
I VMRC
Disable downloads without correct signatures for files [Approx. 3m Refresh]
Challenge Check 2.
Undesireable State
09:20 AM PST
Dev-Web
Powered On
Action -
5 HTML5
VMRC
Domain-Controller
Powered On
Action -
S HTML5
VMRC
Fileshare
Powered On
Action -
S HTML5
VMRC
Firewall
Powered On
Action -
5 HTML5
VMRC
Mail
Powered On
Action -
S HTML5
VMRC
Prod-Web
Action -
5 HTML5
Powered On
VMRC
Security-Desk
Powered On
Action -
5 HTML5
VMRC
Worketation Deck
Daworad A.
AUTME
OVMDC
Documentation
E Challenge Info
- Meeting Notes
* Network Map
Richard LeGrand
@playerone, I just attended United States Government Configuration Baseline (USGCB) for Microsoft content seminar and found out some interesting things. I talked to some security professionals and they told me their top four Windows
security concerns
D D D D D D D D](/v2/_next/image?url=https%3A%2F%2Fcontent.bartleby.com%2Fqna-images%2Fquestion%2F3eaa5c6f-accd-4bc4-9b2e-eb3c7bd443e5%2Fbdaa9b9b-8361-425f-8fd0-3b789d74d711%2Fa5inty_processed.png&w=3840&q=75)
![](/static/compass_v2/shared-icons/check-mark.png)
almost all countries, crisis-response efforts
are in full motion. A large array of public-health
interventions has been deployed. Healthcare
systems are—explicitly—on a war footing to
increase their capacity of beds, supplies, and
trained workers. Efforts are under way to
alleviate shortages of much-needed medical
supplies. Business-continuity and employee-
safety plans have been escalated, with remote
work established as the default operating mode.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Computer Networking: A Top-Down Approach (7th Edi…](https://www.bartleby.com/isbn_cover_images/9780133594140/9780133594140_smallCoverImage.gif)
![Computer Organization and Design MIPS Edition, Fi…](https://www.bartleby.com/isbn_cover_images/9780124077263/9780124077263_smallCoverImage.gif)
![Network+ Guide to Networks (MindTap Course List)](https://www.bartleby.com/isbn_cover_images/9781337569330/9781337569330_smallCoverImage.gif)
![Concepts of Database Management](https://www.bartleby.com/isbn_cover_images/9781337093422/9781337093422_smallCoverImage.gif)
![Prelude to Programming](https://www.bartleby.com/isbn_cover_images/9780133750423/9780133750423_smallCoverImage.jpg)
![Sc Business Data Communications and Networking, T…](https://www.bartleby.com/isbn_cover_images/9781119368830/9781119368830_smallCoverImage.gif)