What does mbsa do to check for weak local account

Assignment Help Other Subject
Reference no: EM131306724

Assignment: Microsoft Baseline Security Analyzer

Introduction

The Microsoft Baseline Security Analyzer (MBSA) is a powerful tool to identify missing security updates and common security misconfigurations in a networked environment. This lab will involve researching to understand the theoretical implications of improper configuration, as well as the practical aspect of using MBSA to identify configuration issues and perform remediation.

Background Information

1. About "MBSA"

The Microsoft Baseline Security Analyzer (MBSA) is a powerful tool used by system administrators, information security professionals, and internal auditors to identify missing security updates and common security misconfigurations in a networked environment. Based on its findings, it provides security recommendations and offers specific remediation guidance. In particular, MBSA performs routine checks to ensure system integrity - missing patches, user account access, firewall settings, and running services - just to name a few. MBSA can be used to scan an individual computer or to scan multiple computers on a network. In its advanced configuration, it can be used to scan certain types of computers such as servers subscribing to Windows Server Update Services (WSUS).

2. Utility of MBSA

In general, the corporate sector does not patch all of their systems as frequently as necessary. This makes them fall victim to vulnerabilities that could have been solved if patching had occurred. A recent example of this was the Conficker Worm which upon its release would not have infected computers that had been fully patched six months prior.

One of the main purposes behind MBSA is to identify similar vulnerabilities. MBSA checks to see if patches have been installed and it reports which ones have not been installed. Tools such as MBSA can be used as a preventative control or a detective control. These tools can help save companies enormous amounts of lost revenue from potential data leaks, intrusions, and other infiltrative consequences.

Goal

The purpose of this lab is to familiarize you with proper Windows configurations, as well as identify how certain improper configurations can allow a system to become compromised. This lab will involve researching to understand the theoretical implications of improper configuration, as well as the practical aspect of using MBSA to identify configuration issues and perform remediation. At the end of this lab, you should be familiar with how malware can be used to compromise a system, the consequences of not having strong account passwords, and overall system management.

Questions (Provide a minimum 100-word, fact-based response for each question. Be quantitative, show lab results, and show in-line citations, where appropriate. Include overall reference list at the end.)

1. Focus on the overall "security assessment" risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?
2. a. What does MBSA do to check for weak local account passwords?
b. Why is it important to have a strong password on local user accounts especially in a corporate environment?
c. Explain why it is important to have a password expiration policy set.

3. Malware can affect a computer in multiple ways. Having automatic updates turned off, not allowing Windows to update, and disabling the Windows firewall and setting exceptions in the Windows firewall are all tell-tale signs of this. Explain
a. how malware is able to accomplish this, and
b. also what type of malware could be used.
Please be as specific and fact-based as possible regarding types of malware using credible references to support your answers.

4. On local machines (home) computers, it is traditionally acceptable to have Windows automatically update the system with patches. In a corporate environment, typically system administrators will set domain computers to manually install updates. Through this process, the administrators will decide if a patch is necessary for their environment 's standard operation expectancy (SOE). Typically they would use Windows Server Update Services (WSUS) to push out the updates to the computers, which is a highly time consuming process.

Conficker is one of the most recent examples of an infection that leveraged a vulnerability that could have been avoided through a patch had already been released. Yet, it spread like wildfire, infecting millions of corporate environments.

o Explain what Conficker is, which systems were vulnerable, which vulnerability it exploited, which Microsoft patch fixed the vulnerability, and the reason(s) that it is necessary to test new patches as they are
released. Please be as specific and fact-based as possible regarding types of malware using credible references to support your answer.

o How would MBSA be used to detect the missing patch in a corporate environment?

5. If you were preparing the next version of MBSA, what new feature would you add? Why?

Reference no: EM131306724

Questions Cloud

Provide a history of its use as a weapon of mass destructio : Provide a history of its use as a weapon of mass destruction (WMD); describe how it is made and dispersed, signs and symptoms of its use; circumstance where it would be the weapon of choice; actions the public can take to prepare for such an attac..
Describe and analyze the current practice of csr assurance : Describe and analyze the current practice of CSR assurance worldwide. Some examples of aspects to be discussed could include, but SHOLD NOT limited to: CSR assurance regulations, CSR assurance providers, CSR assurance objective, CSR assurance framewo..
How do economists derive estimates of marginal damages : How do economists derive estimates of marginal damages from estimates of total damages? Why is a discount factor used in these calculations? What results do they find?
Determine the dressed size area moment of inertia : Determine the dressed size, area, moment of inertia, and section modulus for the following members. Give values for both axes. Tables may be used (cite reference).
What does mbsa do to check for weak local account : What does MBSA do to check for weak local account passwords and why is it important to have a strong password on local user accounts especially in a corporate environment?
How effective is the process to administer physical security : Who is in charge of physical security? Why? Is this person also in charge of logical security? Why or why not?What types of physical security measures are in place? Why?What specific tools or hardware are used for physical security? Why?How effective..
Explain the various aspects of cp : You are now in the phase of developing a business continuity plan (BCP) for an organization. Describe the basic activities that must be managed by the BCP. Develop plans for alternate site relocation, and develop an estimated monthly budget for th..
Advise jack and jill of their income tax consequences : Advise Jack and Jill of their income tax consequences arising out of the above information under both the diminishing value method and the prime cost method (if relevant) for the year ended 30 June 2015. Assume that the business does not qualify as a..
List the sku which was purchased the most : List the SKU which was purchased the most. List the two SKUs that were purchased most frequently together. List the three SKUs that were purchased most frequently together.

Reviews

Write a Review

Other Subject Questions & Answers

  Do you agree with the meta-analysis study

Based on your workplace experiences and observations, do you agree with the 1995 meta-analysis study conducted by Eagly, Karau, & Makhijani indicating that women and men are more effective in leadership roles that are congruent with their gender? ..

  Speech on campus crime

As you listen to a speech on campus crime, you relate the speakers ideas to your own knowledge, goals and experience. according to your textbook, you are filtering the speech through your own

  Analyze at least five problems experienced by employees

Single Sign-On Access Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more..

  Socially neutral

Certain technologies often view themselves as "socially neutral." Do you find this view acceptable? Or does technology always have some social affect on society as a whole?

  Main competing standards for the determination of death

Why does Veatch believe that “selecting a point when it is appropriate to treat people as dead” is properly a matter of public policy (437)? What does Veatch identify as the three main competing standards for the determination of death?

  Description of the song using the introduction to the elemen

Please watch the video of Ben E. King's Stand By Me using the provided link and write a 300-400 word musical description of the song using the Introduction to the Elements of Music in your textbook as a guide (pp. 1-15). Below are several questions t..

  Write an academic summary

Write an academic summary- Given the document is: "Is mindfulness Buddhist? (and why it matters)". -Read the text, highlighting important information and taking notes.

  Do agree with his thesis or disagree

How do you see his thesis playing out in our world today?  Do agree with his thesis or disagree?

  Write about genetic diseases and the relationship between

write about genetic diseases and the relationship between crime and the environment around. for example if we bring a

  Connection between project planning and control

Why can't the PM use the organization's current information system for project monitoring and reporting?

  Read the journal article on issues addressing acquisitions

This means article must cite references and have bibliography at end of the article. After reading article, you must create a one to two page paper discussing article and give a summary to the professor.

  Description of implementation logistics

Description of current problem, issue, or deficit requiring a change - Description of implementation logistics

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd