Question

In: Computer Science

A new administrator needs some help creating a security baseline. Create a checklist/template that covers the...

A new administrator needs some help creating a security baseline. Create a checklist/template that covers the basic steps in creating a security baseline to assist them, and explain why each step is important.

Solutions

Expert Solution

Below are the checklist for creating security baseline:

1. Ensure the site is configured for Desired Configuration Management

To configure a configuarion manager site for desired configuration management. follow below two taks

a. Enable client agent

b. Configure defalut compliance evaluation schedule

2. Download the Configuration Pack, and import it.

Configuration items are used when defining configuration baselines.

In addition to creating configuration items, you can import configuration items.

3. Create a configuration baseline and add the imported configuration items with the configuration baseline rules you require.

Create a new configuration baseline in desired configuration management.

4. Assign the new configuration baseline to a collection, and configure the compliance evaluation schedule.

Here it will exaplain how to assign configuration baselines and how to set configuration baseline assignment compliance evaluation schedule in desired

configuration management.

5. View compliance results:

Here it will show how to view compliance results.


Related Solutions

CompTIA Security+ SY0-501 Q1)A security administrator is implementing a SIEM and needs to ensure events can...
CompTIA Security+ SY0-501 Q1)A security administrator is implementing a SIEM and needs to ensure events can be compared against each other based on when the events occurred and were collected. Which of the following does the administrator need to implement to ensure this can be accomplished? A. TOTP B. TKIP C. NTP D. HOTP ____________________________________________ Q2) Fuzzing is used to reveal which of the following vulnerabilities in web applications? A. Weak cipher suites B. Improper input handling C. DLL injection...
Dany needs help with some personal finance concepts and has turned to you for help. Insert...
Dany needs help with some personal finance concepts and has turned to you for help. Insert the correct word from the choice of words at the end of this Mini-Case 1 to complete the sentence (note: not all words will be used): (8 marks -1 mark each) • Pooled investments is an investment fund that pools together money from many investors; it provides for diversification, _______________________________________, and marketability. • When applying for life insurance, the information you provide about your...
Explain how you would incorporate Heimdal’s Corporate Security Checklist in an organization's business strategy. (Create an...
Explain how you would incorporate Heimdal’s Corporate Security Checklist in an organization's business strategy. (Create an organization)
When creating a synthetic security, in order to successfully create the security, a number of assumptions or theories must be accepted or adhered to:
When creating a synthetic security, in order to successfully create the security, a number of assumptions or theories must be accepted or adhered to:a. One assumption is liquidity, that there is enough liquidity to insure stable pricing. Another is replication; the synthetic security is able to be replicated.b. There are many assumptions or theories. Two that must occur is the theory of pricing, or market-clearing, the second is denotation, the theory associated with a security’s notional value. c. One assumption is...
The board of executives decides on creating a new position as chief security officer, however, they...
The board of executives decides on creating a new position as chief security officer, however, they are not sure if the new position should be part of it department and report to the chief It officer or the new CSO should be the same level to CIO and directly report to the board. What would be your recommendation as a security consultant and why?
Some company issues $ 500MM of stock to help it fund a new manufacturing facility for...
Some company issues $ 500MM of stock to help it fund a new manufacturing facility for monoclonal antibodies . Is this a Capital Market transaction ? Not enough information is provided to answer this question No. Yes .
Your company is creating a new sales system. These are some of the concerns: Ease of...
Your company is creating a new sales system. These are some of the concerns: Ease of data entry Accuracy of data entered, stored, and managed Ability to create reports Cost to build and maintain the system Role of Chief Information Officer (CIO) is assigned to you: Chief Information Officer (CIO): All IT is overseen by the CIO. The CIO is over the hardware, software, IT processes, management, support and security and privacy of all systems within the organization To prepare...
Create a poster which identifies the current primary security threats facing civil aviation for new security...
Create a poster which identifies the current primary security threats facing civil aviation for new security staff joining an aviation security group. Outline “Protecting this [aviation security] system demands a high level of vigilance because a single lapse in aviation security can result in hundreds of deaths, destroy equipment worth hundreds of millions of dollars, and have immeasurable negative impacts on the economy and the public’s confidence in air travel.” Your task is to create a poster, using PowerPoint, identifying...
IST Insurance Brokers, Inc. needs your help to create a program to calculate the total cost of insurance policies issued by its brokers.
Note: For input/output, you must use the JOptionPane class.IST Insurance Brokers, Inc. needs your help to create a program to calculate the total cost of insurance policies issued by its brokers. Write a small Java program that prompts the user for a type of insurance policy and then determines the total policy cost.The company currently supports only three types of insurance policies: Apartment, Auto, and Condo. When a user enters a different type of insurance policy, they should be told...
Some authors make the assertion that there are no new security issues with cloud computing at...
Some authors make the assertion that there are no new security issues with cloud computing at a network-, host-, or application-level. They maintain that cloud computing may exacerbate existing issues, but that cloud computing does not present new security issues. Do you agree with that assertion? Explain security issues with cloud computing. Include how they differ from privacy issues. How are organizations and CSPs overcoming those issue? Use examples and references to support your answer. Provide at least one reference...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT