You are a security administrator responsible for providing secure configuration requirements for new laptop deployments.
Malware infections have noticeably increased in your company, and all the impacted machines did not have updated anti-virus signatures.
Your task is to setup secure configuration settings and Anti-Virus to assure the systems are secure and document this in a Word document as instructions for others to use.
After reading Modules 2 and 3 of Certified Secure Computer User v2 exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step.
Then, apply Anti-Virus to the system using the instructions below.
Windows:
Lock system when not in use
Create and change user account password
Disable Guest Account
Enable Automatic Software Updates
Enable Firewall
Create a New Firewall Rule
Turn on Windows Defender
Enable bitlocker
Decrypt file using EFS
Disable Unnecessary Services
Mac:
Lock system when not in use
Disable Automatic Login
Enable Automatic Software updates
Disable Guest Account
Enable FileVault
Enable Firewall
Change Password at set intervals
Enable and set parental controls
Choose one of the following two options for Anti-Virus administration:
Option 1 (choose this option if you do not have Kaspersky or Avast anti-virus software on your machine):
Follow the directions given in Module 3 to install and configure Kaspersky or Avast anti-virus software on your machine.
Verify that virus definitions are current. Take a screenshot.
Run a scan of your machine. Take a screenshot of the results.
Option 2 (choose this option if you already have anti-virus software installed on your machine):
Verify that virus definitions are current. Take a screenshot.
Run a scan of your machine. Take a screenshot of the results.
Paste ALL screenshots into a single Microsoft® Word document to demonstrate you applied appropriate configurations and anti-virus definitions are current.
Write a short explanation for each screenshot explaining what it is, how it was setup, and why it helps secure the system.