Reference no: EM132321270 , Length: word count : 1350
User Accounts and Behavior
Discuss the following in detail
• Windows local and Domain accounts that are targets for credential theft and their purpose
• Unix accounts that are targets for credential theft and their purpose
• UserandAdminactivitiesthatincreasethechanceofcompromisefortheseaccounts
Least-Privilege Administrative Models
Discuss the following in detail
• Why a company should consider a least privilege administrative model?
• What is the active directory administrative tier model or red forest design?
• What is account delegation in Windows?
• Based on what you wrote above, and what you have learned in class, write a brief description of the level of accounts that your organization would have and the privileges you would delegate to each.
Account Delegation (Must Complete Least-Privilege Administrative Model Section)
Delegation
• Based on your account plan and the privileges you would delegate to those accounts, implement that plan in your active directory lab environment. Create the user accounts and groups necessary for that plan and then delegate the permissions.
Audit Delegation
Secure Administrative Hosts
• Discuss the following in detail
• What do I mean by the term secure administrative hosts?
o Why would an organization want to identify hosts that re used for administration and provide them with extra security?
o Write a detailed plan for turning your Windows 10 host in the lab environment into a secure administrative host.
o Implementation
• Take your plan for turning your windows 10 host into a secure administrative host and implement that plan on your Windows 10 host in the lab environment. Be cognizant of how your plan may affect the remote access you need.
Secure Domain Controllers
• Discuss the following in detail
o Are domain controllers, virtual and physical, inherently secure?
o Why would an attacker target a domain controller first when there may be other targets such as
o databases, web servers, file servers, etc.?
o What can one do to further enhance the security for domain controllers? Implementation
o Based on your suggestions for enhancing the security of domain controllers above, write a brief plan for securing the domain controller in your lab environment, bullet points are fine.
o Now implement the plan on both domain controllers in the lab. Be cognizant of how these controls may affect the remote access you need.
Security monitoring and your domain
• Discuss the following in detail
o Discuss why log monitoring in your Windows domain is such an important part of any security program?
o Discuss the top 10 audit/event logs that you should be monitoring for on your domain controllers
o Discuss the top 10 audit/event logs that you should be monitoring for on your workstations
o What type of system should you be sending your logs to?
Linux Secure Services - Do these on your Kali VM!
o SFTP Server
o Tell me what SFTP is, why you would use it, and why you would limit shell access.
o Configure a secure SFTP server on your Kali host
o LAMP Server
o Explain to me what the LAMP stack is and what each member of the stack is used for.
o Configure LAMP on Kali and Secure