Create a system restore point for a windows 10 system

Assignment Help Management Information Sys
Reference no: EM131813288

Lab Activity : Investigate Restore & Recover Tools for System Integrity

Purpose: Assess and Document Tools to Restore and Recover System Integrity for Windows 10 Workstations.

1. Assess and document selected uses of the Windows 10Control Paneltoolduring the incident response process.

2. Assess and document selected uses of the Windows 10Windows Settings tool during the incident response process.

Your Task:

Prepare draft incident response guidance to be included in the Sifers-Grayson Incident Responder's Handbook. Your draft guidance will explain the use of Windows 10 operating system features (utilities)and describe how each could be used as part of an incident response process.

The guidance documents to be completed under this task are:

(a) Creating, Using, and Removing System Restore Points and System Image Backups

(b) Managing Installation, Removal, and Updating of Programs, Applications, and Operating System Features for Windows 10

Instructions

Part (a): Creating, Using, Removing System Restore Points for Windows 10

1. Identify appropriate sources of information andinstructions for using the Windows 10 Control Panel andSystem Restoretool. Using those sources, research the procedures required to perform the following tasks:

a. Create a system restore point for a Windows 10 system

b. Use a specific system restore point to roll-back changes made to a Windows 10 system

c. Deletesystem restore points from a Windows 10 system

2. Identify how the System Restore tool could be used during the incident response and recovery process (it may be useful in more than one phase). Typical uses include:

a. Prepare a known-good backup for operating system files and data structures (e.g. the system registry and the information stored within it)

b. Removeunauthorized configuration changes

c. Restore the system to full operating status after an attack or suspected attack

d. Remove failed software installations and/or unwanted changes to the operating system, applications software, and/or files.

3. Write a guidance document that identifies the tool, explains the capabilities it provides, and thenlists and briefly describes the recommended uses identified under item #2.

Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions).

Close your guidance document with a Notes / Warnings / Restrictions section that answers the question "Is there anything else the incident responder needs to be aware of when using this tool?"

Part (b): Using Windows Features toManageInstallation, Removal, and Updating of Programs, Applications, and Operating System Features for Windows 10

1. Identify appropriate sources of information and instructions for usingPrograms and Features(accessed via Control Panel) and Update and Security (accessed via Windows Settings). Using those sources, research the procedures required to perform the following tasks:

a. Turn Windows 10 Features On or Off

b. Modify, Repair, or Uninstall a program or application from a Windows 10 system

c. Control Installation of Updates for Windows 10

d. Control Installation of Updates for Windows 10 Applications

2. Identify and research how the Programs and Features and Update and Security tools could be used during the incident response and recovery process. Typical uses include:

a. Turn off undesired Windows features, e.g. location services or remote access

b. Turn off features to implement a containment strategy

c. Remove unauthorized programs

d. Remove unwanted changes to operating system utilities or features, applications software, and/or patches / updates

e. Manually apply updates ("patches") for installed programs

3. Write a guidance document that identifies the tool, explains the capabilities it provides, and thenlists and briefly describes the recommended uses identified under item #2.

Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions).

Close your guidance document with a Notes / Warnings / Restrictions section that answers the question "Is there anything else the incident responder needs to be aware of when using this tool?"

Reference no: EM131813288

Questions Cloud

Define the scientific method in psychology : Define the scientific method in psychology. Briefly review the steps in the research process and Evaluate Ambridge's conclusion starting
Is moral suasion the same as forward policy guidance : Is moral suasion the same as forward policy guidance?
Determine mean amount of credit card debt in a sample : Suppose that in one region of the country the mean amount of credit card debt per household in households having credit card debt is $15,250.
Speed of vehicles on a particular stretch of roadway : Suppose speeds of vehicles on a particular stretch of roadway are normally distributed with mean 36.6 mph and standard deviation 1.7 mph.
Create a system restore point for a windows 10 system : Identify appropriate sources of information and instructions for using the Windows 10 Control Panel andSystem Restoretool.
Prepaid forward contract at prepaid forward price : Suppose an investor is willing to buy a prepaid forward contract at a prepaid forward price of $105 on a one year prepaid forward contract.
Entered into a cash-and-carry like arrangement : Suppose that you entered into a cash-and-carry like arrangement where you agreed to sell 10 shares of Apple through a forward contract,
Find the probability that the shark will remain in state : If a biologist induces a state of tonic immobility in such a shark in order to study it, find the probability that the shark will remain in this state
What is the amount of the firm net fixed assets : The Ashwood Company has a long-term debt ratio of 0.30 and a current ratio of 1.40. What is the amount of the firm's net fixed assets?

Reviews

inf1813288

12/12/2018 12:24:35 AM

Hey guys! Use the services of Experts Mind, when you stuck for assignment you will get assured help from Experts Mind. Exact help you will be getting from them.

Write a Review

Management Information Sys Questions & Answers

  Discuss about the characterizing data types

Assess the value to an interface designer, of being familiar with the seven basic tasks and create an argument for which five of the seven basic tasks are the most important to incorporate in a design.

  What is the name of the hidden administrative share

A Windows Server2003/2008 system configured as part of a network workgroup would be properly referred to by which of the following?

  Fasb codification system provides the accountant with a

fasb codification system provides the accountant with a vast array of information related to accounting issues. assume

  Provide a brief overview of the business process

Provide a brief overview of the business process. Identify positive aspects of the process. Identify issues associated with the process.

  Describe the purpose of the database

Describe the purpose of the database.describe the entities of the database and the attributes of each entity.

  Development of statements of policy for assurance plan

For the Module Three assignment, students will be provided multiple scenarios that contain hypothetical situations pertaining to authentication and security protocols, which will assist in the development of statements of policy for the information..

  Defining the legal and ethical boundaries

Defining the legal and ethical boundaries at the cyber frontier, create your own thread discussing at least three concepts presented .

  Supply chain management powerpointafter the initial report

supply chain management powerpointafter the initial report the owners of stone horse supply company john and michael

  Secure operating system selection and implementation

Secure Operating System Selection and Implementation

  Describe at least five needed internal control improvements

Describe at least five needed internal control improvements. What makes point-of-sale systems different from revenue cycles of manufacturing firms? Give three examples of Access Control in a Point-of-Sale (POS) system.

  The effect of challenges on the use of internethow might

the effect of challenges on the use of internethow might cultural political or geoeconomic challenges affect a global

  Create an overall lan-wan configuration and troubleshooting

For Week One, compile a 6- to 8-slide presentation, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide. The presentation should depict the three locations and include the following:An accurate ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd