Restart the system to apply the changes

Assignment Help Management Information Sys
Reference no: EM133437991

1. Log into the Windows 7 virtual machine student account using the credentials listed in the Machines tab.

2. First, check and see what service pack is installed on your system.

3. Next, view a list of installed programs to gain an understanding of what is currently running on your system.

4. Notice that OpenOffice is installed on your system. Staying aware of your company security documentation, you recall that OpenOffice is not approved for use on organizational systems and will need to be removed. So take care of that now.

5. During the uninstall, a User Account Control window may appear asking you if you want to run a randomly named msi file. Click Yes.

1. Make the following changes to the machine: Configure Windows Update to install updates automatically Turn on the network firewall

2. Next, create a backup of the folders, C:labfiles and C:logfile, and back them up to a network share on the 192.168.0.10 box.

3. Verify User Account Control settings are at the default setting. If they are not, change and save the settings. 

4. View all of the Security components being monitored in the Action Center by clicking on the button with a down arrow inside it. The button is located to the right of the Security heading and will open items below the Virus protection area. 

5. Some changes will not be applied until the system is restarted. Restart the system to apply the changes.

1. Log back into the Windows 7 machine and see which programs are allowed access through the firewall. Programs that are allowed through will be marked as exceptions.  

2. Rules can be set to allow or block inbound or outbound connections. Create a new rule that blocks all ICMP traffic trying to enter the system (inbound).  

3. Next, create a rule to block all traffic from the IP address, 192.168.0.101. 

4. Lastly, verify again the Firewall is on and is set to log any dropped packets

1. Let's now test the firewall rule. First, ping host 192.168.0.10 to verify a connection to it. 

2. Then switch to the Windows Server 2012 and login using the credentials in the machine tab.

3. On the Windows Server 2012 box, ping the 192.168.0.30 host and make sure your ICMP rule is working properly. If it is not, make the appropriate changes. 

4. Switch to the Windows 7 machine and find the firewall log entries that show the packets that were just dropped.

.Lastly, switch to the Kali machine and then login to it using the credentials in the machines tab. Then, run an nmap scan against the 192.168.0.30 box and make sure your second firewall rule is also working properly.

Reference no: EM133437991

Questions Cloud

Create a database to record the various airlines : create a database to record the various airlines and the pilots that work for them Discussions with the industry representatives focused on two initial entities
Time forensics, registry forensics and email forensics : Topic Time forensics, Registry forensics and Email forensics", can someone give me a ppt on this topic
Describe how your values or ethics align with theirs find : discuss how the company markets themselves and see if it aligns with their values look and see if there finances align with their values through donations
What is relative risk of skin cancer : What is the relative risk of skin cancer from high exposure after the 2-year follow-up?
Restart the system to apply the changes : Then, run an nmap scan against the 192.168.0.30 box and make sure your second firewall rule is also working properly.
Explain how you would use each and which one you feel would : You are the CEO for a developing firm less than five years old. Explain the differences, advantages, and disadvantages of a SWOT analysis versus porfolio
Resignation to your current employer : Draft two or three points that you will include in the letter of resignation to your current employer.
What was the context and decision you made : What was the context and decision you made? What was your decision-making style? What went wrong?
Enhancing cyber security in healthcare : Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning - A brief discussion of how you plan to design your study to answer the research

Reviews

Write a Review

Management Information Sys Questions & Answers

  If the ehr went down what should the facility do

Create a contingency plan checklist. If the EHR went down, what should the facility do? Have a least 25 items on your checklist.

  Research and collect data and information regarding an rfid

Research and collect data and information regarding an RFID system that can be integrated into a specific business process to solve a problem .

  Explain how organizations use information technology

Assess how these two organizations use information technology for competitive advantage

  Explain advantages in the organization in question incurs

Many organizations are using cloud services to provide application and database services to their users and their customers.From the e-Activities, select one (1) organization that provides application or database support through cloud services. Exp..

  Explain why businesses develop information systems

Point out some of the wrong reasons businesses sometimes cite for developing information systems and support your answer with examples.

  Use of information technology

Use of information technology - Describe how the use of information technology can make things worse if it is applied to a poorly thought out process.

  Create a mib module for your company

Create a MIB module for your company. The objective is to find the inventory of any specific product while sitting in your office as president of the company.

  Determine the appropriateness of a particular development

ICT393 : an employee of a consulting firm called Innovative Solutions that specialises in systems analysis, design, and development services.

  Define basic requirements for the system

Define basic requirements for the system and identify three leading off-the-shelf office productivity suits that should be considered.

  Develop and populate the prototypee-commerce website

Develop and populate the prototypee-commerce website for which you prepared a strategic analysis and preliminary prototype e-commerce website.

  Show the challenge of logistics in supply chain management

Show the Challenge of logistics in Supply Chain Management - Independently research this key logistics issue and report on it. Define the problem and its scope, and provide some possible solutions.

  Why the steering committee is very important for the success

Discuss how you would go about implementing a health information technology (HIT) strategic plan for data security, privacy, and quality management.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd