Week 7 Homework: A Day in the Life of a Windows Sysadmin
Overview
This homework assignment builds on the Group Policy Objectives activities from the previous class. We will create domain-hardening GPOs and revisit some PowerShell fundamentals.
⚠ The Day 3 activities must be fully completed in order to complete this activity. If they are not, you will need to refer to your student guides and set up your domain OUs, users, and groups .
Lab Environment
For this week’s homework, please use the Windows Server machine and Windows 10 machine inside your Azure Windows RDP Host machine.
Windows RDP Host Machine:
Open the Hyper-V Manager in the Windows RDP Host machine to access the nested virtual machines:
Windows 10 Machine
Windows Server Machine:
Note: The instructions for each task will tell you which machine to work in.
The following document contains a list of Windows issues that commonly occur during this unit. Familiarize yourself with these issues so you can fix them as needed:
Refer to your Unit 7 Student Guides if you have trouble with this homework.
Task 1: Create a GPO: Disable Local Link Multicast Name Resolution (LLMNR)
For this first task, you will investigate and mitigate one of the attack vectors that exists within a Windows domain.
Local Link Multicast Name Resolution (LLMNR) is a vulnerability, so we will be disabling it on our Windows 10 machine (via the GC Computers OU).
A few notes about LLMNR:
Turning off LLMNR for the GC Computers OU will prevent our Windows machine from trusting location responses from potential attackers.
Instructions
Since this task deals with Active Directory Group Policy Objects, you’ll be working in your nested Windows Server machine.
Create a Group Policy Object that prevents your domain-joined Windows machine from using LLMNR:
Task 2: Create a GPO: Account Lockout
For security and compliance reasons, the CIO needs us to implement an account lockout policy on our Windows workstation. An account lockout disables access to an account for a set period of time after a specific number of failed login attempts. This policy defends against brute-force attacks, in which attackers can enter a million passwords in just a few minutes.
Account lockouts have some important considerations. Read about these in the following documentation:
To summarize, an overly restrictive account lockout policy (such as locking an account for 10 hours after 2 failed attempts), can potentially keep an account locked forever if an attacker repeatedly attempts to access it in an automated way.
Instructions
You’ll be working within in your nested Windows Server machine again to create another Group Policy Object.
Create what you believe to be a reasonable account lockout Group Policy for the Windows 10 machine.
Hint: If you’re confused about where to find the right policies, check the instructions in italics.
Task 3: Create a GPO: Enabling Verbose PowerShell Logging and Transcription
As mentioned in a previous lesson, PowerShell is often used as a living off the land hacker tool. This means:
So why not just completely disable PowerShell?
Instructions
For this task, you’ll be working in your Windows Server machine.
Create a Group Policy Object to enable PowerShell logging and transcription. This GPO will combine multiple policies into one, although they are all under the same policy collection.
}
Note that the next time you log into your Windows 10 machine, run gpupdate. Then launch a new PowerShell window and run a script. You see verbose PowerShell logs created in the Windows 10 machine directory for the user that ran the script: C:\Users\<user>\Documents.
Speaking of scripts, your next task is to create a script.
Task 4: Create a Script: Enumerate Access Control Lists
Before we create a script, let’s review Access Control Lists.
Familiarize yourself with the basics of Get-Acls:
Instructions
For this task, you’ll be working in your nested Windows 10 machine with the following credentials: sysadmin | cybersecurity.
Create a PowerShell script that will enumerate the Access Control List of each file or subdirectory within the current working directory.
}
Bonus Task 5: Verify Your PowerShell Logging GPO
For this task we’ll want to test and verify that our PowerShell logging GPO is working properly.
Instructions
Submission Guidelines
Provide the following:
As a renowned provider of the best writing services, we have selected unique features which we offer to our customers as their guarantees that will make your user experience stress-free.
Unlike other companies, our money-back guarantee ensures the safety of our customers' money. For whatever reason, the customer may request a refund; our support team assesses the ground on which the refund is requested and processes it instantly. However, our customers are lucky as they have the least chances to experience this as we are always prepared to serve you with the best.
Plagiarism is the worst academic offense that is highly punishable by all educational institutions. It's for this reason that Peachy Tutors does not condone any plagiarism. We use advanced plagiarism detection software that ensures there are no chances of similarity on your papers.
Sometimes your professor may be a little bit stubborn and needs some changes made on your paper, or you might need some customization done. All at your service, we will work on your revision till you are satisfied with the quality of work. All for Free!
We take our client's confidentiality as our highest priority; thus, we never share our client's information with third parties. Our company uses the standard encryption technology to store data and only uses trusted payment gateways.
Anytime you order your paper with us, be assured of the paper quality. Our tutors are highly skilled in researching and writing quality content that is relevant to the paper instructions and presented professionally. This makes us the best in the industry as our tutors can handle any type of paper despite its complexity.
Recent Comments