Configuring Security Policies and Windows Firewall
iReusecondoms
Assessment 3: Configuring Security Policies and Windows Firewall
Name
Systems Administration
Capella University
Professor Kuhlman
Date
Table of Contents
Group policy and how not to display the most recent logon credentials …..………….. 3
Filtering incoming and outgoing traffic ……….……………………………………… 4
Malware Policies ……….. ...……………………………………...……………………5
Hardware or software solution to combat malware attacks …………………………… 5
References…………..…………….. …………………………………...……………... 6
Group policy and how not to display the most recent logon credentials
Explain how to enable a local group policy not to display the most recent logon credentials on a stand-alone workstation
Filtering incoming and outgoing traffic
Describe the process Windows firewall uses to filter incoming and outgoing traffic
Malware Policies
Describe group policies that a sysadmin should deploy to client computers on the network to address malware issues
Hardware or software solution to combat malware attacks
Describe a hardware or software solution to combat malware attacks
References
Andrews, J., Dark, J., & West, J. (2018) CompTIA A+ Guide to IT Technical Support Ninth Edition. Massachusetts: Cengage Learning.