Each topic can be 1-2 paragraphs which will sum up to 2 pages. I've attached the template needed for the assignment along with the grading rubric
Complete the following in a Word document titled "Assessment 3":
The Microsoft Management Console (MMC) contains several snap-in consoles to assist systems administrators to enforce IT policies on a network. Systems administrators can configure settings such as enforcing secure password policy. Often the configurations are carried-out via Group Policy at the domain level, and the policy flows down to users and nodes on the network. There are times when local group policy and local security policy can be used on workstations.
As a systems administrator, you are already aware that you must protect your network resources from intruders. The Windows Firewall is a security tool in most Windows systems that defends our computers and servers from unauthorized users.
Describe two group policies that a system administrator should deploy to client computers on the network to address malware issues.
Recommend a hardware or software solution to combat malware attacks. Explain its effectiveness.
Assessment 3: Configuring Security Policies and Windows Firewall
Name
Systems Administration
Capella University
Professor Kuhlman
Date
Table of Contents
Group policy and how not to display the most recent logon credentials …..………….. 3
Filtering incoming and outgoing traffic ……….……………………………………… 4
Malware Policies ……….. ………………………………………………………………5
Hardware or software solution to combat malware attacks …………………………… 5
References…………..…………….. …………………………………………………… 6
Group policy and how not to display the most recent logon credentials
Explain how to enable a local group policy not to display the most recent logon credentials on a stand-alone workstation
Filtering incoming and outgoing traffic
Describe the process Windows firewall uses to filter incoming and outgoing traffic
Malware Policies
Describe group policies that a sysadmin should deploy to client computers on the network to address malware issues
Hardware or software solution to combat malware attacks
Describe a hardware or software solution to combat malware attacks
References
Andrews, J., Dark, J., & West, J. (2018) CompTIA A+ Guide to IT Technical Support Ninth Edition. Massachusetts: Cengage Learning.
,
8/4/22, 10:45 PM Configuring Security Policies and Windows Firewall Scoring Guide
https://courserooma.capella.edu/bbcswebdav/institution/IT-FP/IT-FP3318/220400/Scoring_Guides/a03_scoring_guide.html 1/1
Configuring Security Policies and Windows Firewall Scoring Guide
CRITERIA NON-PERFORMANCE BASIC PROFICIENT DISTINGUISHED
Submit fully completed lab reports that document specified configuration of security policies and a Windows Firewall.
Does not submit required lab reports.
Submits lab reports that document specified configuration of security policies and a Windows Firewall, but with errors or omissions.
Submits fully completed lab reports that document specified configuration of security policies and a Windows Firewall.
Submits fully completed lab reports that document specified configuration of security policies and a Windows Firewall with a brief summary of what was learned in each lab.
Explain how to enable a local group policy not to display the most recent logon credentials on a stand-alone workstation.
Does not explain how to enable a local group policy not to display the most recent logon credentials on a stand-alone workstation.
Explains how to enable a local group policy not to display the most recent logon credentials on a stand- alone workstation, but with some errors or omissions.
Explains how to enable a local group policy not to display the most recent logon credentials on a stand-alone workstation.
Explains how to efficiently enable a local group policy not to display the most recent logon credentials on a stand-alone workstation in exacting detail.
Describe the process Windows Firewall uses to filter incoming and outgoing traffic.
Does not describe the process Windows Firewall uses to filter incoming and outgoing traffic.
Describes the process Windows Firewall uses to filter incoming and outgoing traffic, but with errors or omissions.
Describes the process Windows Firewall uses to filter incoming and outgoing traffic.
Describes the process Windows Firewall uses to filter incoming and outgoing traffic in exacting detail, providing a specific example.
Describe group policies that a system administrator should deploy to client computers on the network to address malware issues.
Does not describe group policies that a system administrator should deploy to client computers on the network to address malware issues.
Describes group policies that a system administrator should deploy to client computers on the network to address malware issues, with errors or omissions.
Describes group policies that a system administrator should deploy to client computers on the network to address malware issues.
Describes group policies that a system administrator should deploy to client computers on the network to address malware issues in exacting detail, including specific examples to illustrate.
Describe a hardware or software solution to combat malware attacks.
Does not describe a hardware or software solution to combat malware attacks.
Describes an ineffective hardware or software solution to combat malware attacks.
Describes a hardware or software solution to combat malware attacks.
Explains in detail how a hardware or software solution effectively combats malware attacks.
Writes explanations that are clear, organized, and generally free of grammatical errors.
Writes explanations that are very unclear and have numerous written and grammatical errors.
Writes explanations that are somewhat unfocused or unclear or that contain significant grammatical errors.
Writes explanations that are clear, organized, and generally free of grammatical errors.
Writes explanations that are free of grammatical errors and exhibit clarity, meaning, and ideas that are consistently logical and succinct.
We are a professional custom writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework.
Yes. We have posted over our previous orders to display our experience. Since we have done this question before, we can also do it for you. To make sure we do it perfectly, please fill our Order Form. Filling the order form correctly will assist our team in referencing, specifications and future communication.
1. Click on the “Place order tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
2. Fill in your paper’s requirements in the "PAPER INFORMATION" section and click “PRICE CALCULATION” at the bottom to calculate your order price.
3. Fill in your paper’s academic level, deadline and the required number of pages from the drop-down menus.
4. Click “FINAL STEP” to enter your registration details and get an account with us for record keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
5. From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.
Need this assignment or any other paper?
Click here and claim 25% off
Discount code SAVE25