Question

In: Computer Science

Secure a Workstation Securing a workstation is one of the most important tasks you will perform...

Secure a Workstation

Securing a workstation is one of the most important tasks you will perform when setting up security for an organization or individual. A few simple tweaks to a computer’s security policy will greatly improve its resistance to attack.

Note: Some of the settings below may already be enabled by default.

On a computer running Windows 10 Pro, follow these steps to require that a user press Ctrl+Alt+Del to log on:

  1. Press Win+R, and in the Search box, type netplwiz and press Enter. Write down the usernames displayed in the User Accounts dialog box.
  2. Click the Advanced tab and under Secure sign-in, check Require users to press Ctrl+Alt+Delete. Why does this setting help increase the workstation’s security?
  3. Apply the changes and restart the computer to confirm the change.

Follow these steps to secure the computer using a screen saver and sleep mode:

  1. Open Settings, click Accounts, and click Sign-in options. Under Require sign-in, select When PC wakes up from sleep.
  2. Return to the Settings Home window, click System, and click Power & sleep. Set the screen timeouts and sleep timeouts as desired.
  3. Return to the Settings Home window, click Personalization, and click Lock screen. Scroll down and click Screen saver settings. Select a screen saver to activate the screen saver function.
  4. Set a wait time. For optimal security, this should be a low number. Check On resume, display logon screen. Click OK and close all windows.

Follow these steps to require that all users have a password:

  1. Press Win+R, and in the Search box, type gpedit.msc and then press Enter. The Local Group Policy Editor window opens.
  2. Navigate to Computer Configuration, Windows Settings, Security Settings, Account Policies, Password Policy.
  3. Change the Minimum password length policy to a value higher than zero. How many characters did you require?
  4. Search for and list three additional policies that would provide security to a workstation. Choose the policies from the nested folders from either of the parent locations below:
    1. Computer Configuration, Windows Settings, Security Settings
    2. Computer Configuration, Administrative Templates
  5. List why each of these three policies provide additional security

Please answer the questions.

Solutions

Expert Solution

Below are the questions present in the question, the answers to them should satisfy the requirement.

Q1.) Click the Advanced tab and under Secure sign-in, check Require users to press Ctrl+Alt+Delete. Why does this setting help increase the workstation’s security? This is the first question from the context.

Ans.: There are many programs which pose as a threat to the Windows security by posing as a mimic of fake sign-in. These program will make a user think that the mimic is the original sign-in screen. The user will enter the credentials in it, making it available to the hackers. This will compromise the security. In order to guarantee that the authentic Windows sign-in screen appears, the Ctrl + Alt + Delete combination is required as a measure of secure sign-in.

Q2.) Navigate to Computer Configuration, Windows Settings, Security Settings, Account Policies, Password Policy.
Change the Minimum password length policy to a value higher than zero. How many characters did you require?

Ans.: We require minimum 1 character to set up the password. It also depends on the value of the Relax minimum password length limits settings. If this is disabled, 0 to 14 is the limit. If enabled, 0 to 128 is the limit.

Q3.) Search for and list three additional policies that would provide security to a workstation. Choose the policies from the nested folders from either of the parent locations below:

    Computer Configuration, Windows Settings, Security Settings
    Computer Configuration, Administrative Templates

List why each of these three policies provide additional security.

Ans.:

  1. Administrator account status policy: This policy if enabled, determines that whether the local administrator account is enable or disabled. This policy provides the additional security as the administrator handles the system and will check for the possible intrusion attempts.
  2. User Account Control policy: Detect application installation and prompt for elevation.: This policy is enabled by default in the computers. This policy restricts the installation of any application by a prompt. When an application is being installed, this policy will spring in action and will give a prompt whether to install or not. This enhances the security as there are no applications which will be installed on the system without user's approval. This prevents many malicious applications being installed on system.
  3. Account lockout threshold policy: This policy determines the number of failed logon attempts that will cause the user account to be locked out. In case of intruder attempting to login the system with gusses, this policy will alert the administrators when the attempt threshold is reached. This will also stop the intruder to guess and try anymore.

Related Solutions

Selecting the right people is one of the most important tasks of a business leader. Read...
Selecting the right people is one of the most important tasks of a business leader. Read the Forbes article “4 Secrets To Hiring The Right People.” Forbes Article 1. Describe a selection process in which you have participated, either as a candidate for a job or as a part of a selection committee. 2. Do you think the process was effective in hiring the right people? What changes would you recommend to improve the process?
to pass a test you have to perform successfully two consecutive tasks, one easy and one...
to pass a test you have to perform successfully two consecutive tasks, one easy and one hard. the easy task you think you can perform with probability z.and the hard task you think you can perform with probability h, where h<z. you are allowed three attempts. either in the order(easy, hard, easy)or in the order (hard, easy, hard). whichever order, you must be successful twice in a row to pas. assuming that your attempts are independent, in what order should...
Sales planning primarily entails planning sales volumes, and one of the most important tasks performed by...
Sales planning primarily entails planning sales volumes, and one of the most important tasks performed by sales employees is to draw up a sales plan on the basis of their current sales, Bill McDermott became CEO of SAP America in 2002. He had spent 17 years in sales and sales management at Xerox and served as executive vice president of worldwide sales and operations at Siebel Systems. His leadership at SAP has produced overall growth of about 14 percent in...
One of the most important, if not the most important aspect of portfolio analysis is that...
One of the most important, if not the most important aspect of portfolio analysis is that of “Performance Evaluation”, therefore it is very important that investments practitioners utilize the different methods of performance evaluation to understand the results which were generated. Do you agree or disagree, provide detailed information to support.
Managers at all levels of an organisation need adequate information to perform their respective tasks. One...
Managers at all levels of an organisation need adequate information to perform their respective tasks. One study investigated the effect the source has on the dissemination of information. In this particular study the sources of information were a superior, a peer and a subordinate. In each case, a measure of dissemination was obtained, with higher values indicating greater dissemination of information. To verify whether the source of information significantly affects dissemination, you perform the ANOVA test. The following table partially...
Managers at all levels of an organisation need adequate information to perform their respective tasks. One...
Managers at all levels of an organisation need adequate information to perform their respective tasks. One study investigated the effect the source has on the dissemination of information. In this particular study the sources of information were a superior, a peer and a subordinate. In each case, a measure of dissemination was obtained, with higher values indicating greater dissemination of information. To verify whether the source of information significantly affects dissemination, you perform the ANOVA test. The following table partially...
Pointer Tasks This part of the assignment will give you a chance to perform some simple...
Pointer Tasks This part of the assignment will give you a chance to perform some simple tasks with pointers. The instructions below are a sequence of tasks that are only loosely related to each other. Start the assignment by creating a file named pointerTasks.cpp with an empty main function, then add statements in main() to accomplish each of the tasks listed below. Some of the tasks will only require a single C++ statement, others will require more than one. For...
Discuss the activity that you feel is one of the most important that needs to be...
Discuss the activity that you feel is one of the most important that needs to be done as part of closing a project? What are the risks of skipping this activity? What is one crucial question that you could ask during a post-project evaluation and how could you use what you learn to improve the next project.
Discuss the activity that you feel is one of the most important that needs to be...
Discuss the activity that you feel is one of the most important that needs to be done as part of closing a project. What are the risks of skipping this activity? What is one crucial question that you could ask during a post-project evaluation and how could you use what you learn to improve the next project.
In LINUX Provide the command(s) and any additional steps to perform the following tasks. You will...
In LINUX Provide the command(s) and any additional steps to perform the following tasks. You will need to be running with root privileges. Create a symlink to the /etc/openldap/ directory named "ldapconf" in /tmp/. Find all .conf files in the /etc/ directory and its subfolders. Find all directories starting with "gnome" or "GNOME" anywhere under the /usr/share/ directory. Sam and Susan are members of the "sales" group. Sam has been working on a project that has grown too big for...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT