Information Technology > STUDY GUIDE > Assignment 5 - Windows Server Hardening Illinois State University IT 357 (All)
IT 357 – Spring 2019 Assignment 5 Windows Server Hardening Objective: To apply basic strategies for hardening a Windows server system and utilize two specific tools for doing so. OpenStack: T... o use OpenStack, the system which hosts our Virtual Machines, go to https://login.it.ilstu.edu, and login in with your ULID and password. You will NOT need a VPN to use this site from offcampus. You’ll see a screen that looks something like this. Click on the + symbol next to “OpenStack Groups”, and you’ll see your ULID, click the + sign next to it to see your VMs, then click on the VM’s name to open a screen to the VM. Pro tip: Middle-click (with the mouse wheel), to open each machine in a new tab. Copy/paste from a VM to your host machine is not possible. To work around this, if needed, I’d recommend using either Google Keep, or Pastebin. Simply log in to the service on both your own machine and each VM where you want to use copy/paste, and paste into a new Keep/Pastebin note, and it will appear on the other side. If you accidentally power down a VM, you’ll need to access https://os.it.ilstu.edu, and you’ll need to use the VPN if off-campus. Full instructions for restarting VMs are under Resources on Reggienet. Note: If you prefer the older OpenStack environment, you can still access it at os.it.ilstu.edu, you’ll need a VPN if off-campus. Credentials for VMs for HW5 Windows 2K8 server: o USERNAME: Administrator, PASS: goober-stingy-pang 172.16.0.5 Ubuntu 16.04 LAMP o USERNAME: root, PASS: password1 o PHPMyAdmin: USERNAME: root, PASS: password Introductory question: (3 pts) List four steps that should be taken to harden a Windows system. 1. _Patch/apply security updates and configure automatic updates. ____________________ 2. _Manage or add/remove users as applicable ____________________________________ 3. _Set a good Password Policy ________________________________________________ 4. _Stop/close/remove unneeded programs, services and ports________________________ Procedure: Part 1 Background: The Windows server for this exercise has been intentionally compromised, has some misconfigurations, and has roles turned on that aren’t needed, as well as out-of date software. Part 1 Steps: 1. You will use the “Win2008 Server” and “Ubuntu LAMP” machines for this part of the exercise, so open each of those, and login as the “Administrator” user on Windows. For Linux, login as “root”. (Hint: the LAMP server is console only, hit a key if the screen is black. There is no mouse support in this VM). 2. Scan the Windows machine from Linux with nmap using a TCP connect scan and scan all ports. (3 pts) Insert a screenshot of the nmap results showing all open ports here. Part 2 Background: This server needs to be able to still perform the following roles once it is hardened. All other roles and server software should be removed. [Show More]
Last updated: 2 years ago
Preview 1 out of 21 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Dec 06, 2022
Number of pages
21
Written in
This document has been written for:
Uploaded
Dec 06, 2022
Downloads
0
Views
53
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·