NIIT Lab@Home 10
ICTWC
1. Holly
Dickson is concerned about her users' security settings when they are browsing
the Internet, especially when they are doing so when connected to their
customer's networks. She has asked that you investigate improving the security
settings on her users' computers in Internet Explorer. Objectives Configure
security settings in Internet Explorer. Test the security settings.
Configure security settings in Internet Explorer.
Test the security settings.
In this exercise, you will implement some of the security and compatibility features in Internet Explorer 10.
The main tasks for this exercise are as follows:
1. Configure compatibility settings.
2. Configure security settings.
Task 1: Configure compatibility settings
1. Log on as Adatum\Administrator with the password Pa$$w0rd, and open Internet Explorer.
2. Configure Compatibility View for all websites.
Task 2: Configure security settings
1. Delete History, but retain Preserve Favorites website data. Remove selections for all other options.
2. Close Internet Explorer.
3. Navigate to http://LON-DC1, and verify that this site’s address is stored in your history.
4. Delete the browsing history again, select only Temporary Internet files and website files and
Cookies and website data and History.
5. Verify that there are no site addresses showing in your history.
6. Launch InPrivate Browsing.
7. Navigate to http://lon-dc1.
8. Confirm that this address has not been retained in your site history.
9. Close Internet Explorer.
10. Configure the Local intranet security settings to High.
11. Open the Current Projects link on the Intranet home page. This fails to load a required add-on.
Close the newly opened tab.
12. Add the local intranet to the trusted sites.
13. Open the Current Projects link on the Intranet home page. This is successful.
14. Close all open windows.
15. Log off of LON-CL1.
Test the security settings.
In this exercise, you will implement some of the security and compatibility features in Internet Explorer 10.
The main tasks for this exercise are as follows:
1. Configure compatibility settings.
2. Configure security settings.
Task 1: Configure compatibility settings
1. Log on as Adatum\Administrator with the password Pa$$w0rd, and open Internet Explorer.
2. Configure Compatibility View for all websites.
Task 2: Configure security settings
1. Delete History, but retain Preserve Favorites website data. Remove selections for all other options.
2. Close Internet Explorer.
3. Navigate to http://LON-DC1, and verify that this site’s address is stored in your history.
4. Delete the browsing history again, select only Temporary Internet files and website files and
Cookies and website data and History.
5. Verify that there are no site addresses showing in your history.
6. Launch InPrivate Browsing.
7. Navigate to http://lon-dc1.
8. Confirm that this address has not been retained in your site history.
9. Close Internet Explorer.
10. Configure the Local intranet security settings to High.
11. Open the Current Projects link on the Intranet home page. This fails to load a required add-on.
Close the newly opened tab.
12. Add the local intranet to the trusted sites.
13. Open the Current Projects link on the Intranet home page. This is successful.
14. Close all open windows.
15. Log off of LON-CL1.
2. Holly is concerned that people in her department are spending time
listening to music files. She wants a way to disable the Windows Media® Player
from running. You decide to implement AppLocker to prevent members of the IT
group from running this program. Objectives Create AppLocker rules. Apply rules
and test rules.
Create AppLocker rules.
Apply rules and test rules.
In this exercise, you will create the executable and default AppLocker rules.
The main tasks for this exercise are as follows:
1. Create a new executable rule.
2. Enforce AppLocker rules.
Task 1: Create a new executable rule
1. Log on as Adatum\Administrator with the password Pa$$w0rd. Open the Local Group Policy
Editor.
2. Navigate to Computer Configuration > Windows Settings > Security Settings > Application
Control Policies > AppLocker. Create a new Executable rule with the following properties:
o Permissions: Deny
o Group: IT
o Program: C:\Program Files\Windows Media Player\wmplayer.exe
o Create the default rules.
Task 2: Enforce AppLocker rules
1. In Local Group Policy Editor, open the AppLocker Properties, and then configure the Executable
rules for Enforce rules.
2. Close the Local Group Policy Editor, and open a command prompt. Run the gpupdate /force
command.
At the end of the exercise, you will have successfully created the required AppLocker rule.
2: Testing the AppLocker Rules
In this exercise, you will confirm the executable rule, and then test it by logging on as a member of the IT
group.
The main tasks for this exercise are as follows:
1. Confirm the Executable Rule Enforcement.
2. Test the enforcement.
Task 1: Confirm the Executable Rule Enforcement
1. View the Windows\System log in Event Viewer. Check for event ID 1502.
2. Start the Application Identity service.
3. Log off LON-CL1
Task 2: Test the enforcement
1. Log back in as Adatum\Holly with a password Pa$$w0rd.
2. Attempt to open Windows Media Player.
3. Log off.
4. Log on as Adatum\Administrator with the password Pa$$w0rd.
5. Open Event Viewer.
6. Locate the Application and Services\Microsoft\Windows\AppLocker\EXE and DLL log.
7. Close all open windows, and log off.
Apply rules and test rules.
In this exercise, you will create the executable and default AppLocker rules.
The main tasks for this exercise are as follows:
1. Create a new executable rule.
2. Enforce AppLocker rules.
Task 1: Create a new executable rule
1. Log on as Adatum\Administrator with the password Pa$$w0rd. Open the Local Group Policy
Editor.
2. Navigate to Computer Configuration > Windows Settings > Security Settings > Application
Control Policies > AppLocker. Create a new Executable rule with the following properties:
o Permissions: Deny
o Group: IT
o Program: C:\Program Files\Windows Media Player\wmplayer.exe
o Create the default rules.
Task 2: Enforce AppLocker rules
1. In Local Group Policy Editor, open the AppLocker Properties, and then configure the Executable
rules for Enforce rules.
2. Close the Local Group Policy Editor, and open a command prompt. Run the gpupdate /force
command.
At the end of the exercise, you will have successfully created the required AppLocker rule.
2: Testing the AppLocker Rules
In this exercise, you will confirm the executable rule, and then test it by logging on as a member of the IT
group.
The main tasks for this exercise are as follows:
1. Confirm the Executable Rule Enforcement.
2. Test the enforcement.
Task 1: Confirm the Executable Rule Enforcement
1. View the Windows\System log in Event Viewer. Check for event ID 1502.
2. Start the Application Identity service.
3. Log off LON-CL1
Task 2: Test the enforcement
1. Log back in as Adatum\Holly with a password Pa$$w0rd.
2. Attempt to open Windows Media Player.
3. Log off.
4. Log on as Adatum\Administrator with the password Pa$$w0rd.
5. Open Event Viewer.
6. Locate the Application and Services\Microsoft\Windows\AppLocker\EXE and DLL log.
7. Close all open windows, and log off.
3. TimeTech Solution has a small sales team of five sales executives.
These sales executives share a Windows-based desktop within the office premises
for saving their clients' information. Eric, one of the Senior Sales Executive,
wants to secure his confidential data, which he wants to store in the folder
named Confidential. Help him to resolve the same. Experiment To protect the
client's information, you need to perform the following tasks: Encrypt the
client's information. Test the encryption as another user.
1. Encrypt the client's information.
2. Text the encryption as another user.
Task 1. Encrypt the client's information.
To Encrypt the client's information., you need to perform the following steps:
1. Ensure that the Start screen is displayed.
2. Type C:\, and then press the Enter key. the Local Disk (C:) windows is displayed.
3. Right click anywhere in the enpty area of the right pane of the Local Disk (C:) window, and then select new folder.
A new folder is created in the right pane.
4. Type Confidential, and then press the Enter key to rename the new folder.
5. Double click the Confidential folder. the Confidential window is displayed.
6. Right click anywhrer in the empty area of the right pane of the Confidential window, and then select new text document.
A new text document is created in the right pane.
7. Type Client Notes, and then press the Enter key to rename the new file.
8. Double click the Client notes text document file. the client notes window is displayed.
9. Type this is a test document in the client notes window.
10. Select file save from the menu bar.
11. Close the client notes text file.
12. Click the Back arrow button. the local disk (C:) window is displayed.
13. Right click Confidential folder, and then select the properties option from the pop-up menu. the Confidential propertied
dialog box is displayed.
14. Click the Advanced button. the Advanced Attributes dialog box under is displayed.
15. Select the Encrypt contents to secure data check box under the compress or Encrypt attributes section.
16. Click the Ok button twice. the Confirm Attribute changes dialog box is displayed.
17. Ensure that the Apply changes to this folder, subfolder and files option is selected.
18. Click the ok button. the Applying attributes message box is displayed for a few moments, and then disppears.
19. Close the Local disk (C:) window.
Task 2. Text the encryption as another user.
To text the encryption as another user, you need to perform the following steps:
1. Press the Windows key. the Start screen is displayed.
2. Click Eric Swift on the top right hand side of the Start screen.
3. Select the Switch acciunt option from the drop down list. the Other user screen is displayed.
4. Type Harry and Pa$$w0rd in the User name and password text boxes, respectively.
5. Press the Enter key. After a few moments the Start screen is displayed.
6. Open the C:\ drive.
7. Double click the confidential folder.
8. Double click the Client notes text file.
9. Click the ok button to close the message box.
10. Close all the open windows.
2. Text the encryption as another user.
Task 1. Encrypt the client's information.
To Encrypt the client's information., you need to perform the following steps:
1. Ensure that the Start screen is displayed.
2. Type C:\, and then press the Enter key. the Local Disk (C:) windows is displayed.
3. Right click anywhere in the enpty area of the right pane of the Local Disk (C:) window, and then select new folder.
A new folder is created in the right pane.
4. Type Confidential, and then press the Enter key to rename the new folder.
5. Double click the Confidential folder. the Confidential window is displayed.
6. Right click anywhrer in the empty area of the right pane of the Confidential window, and then select new text document.
A new text document is created in the right pane.
7. Type Client Notes, and then press the Enter key to rename the new file.
8. Double click the Client notes text document file. the client notes window is displayed.
9. Type this is a test document in the client notes window.
10. Select file save from the menu bar.
11. Close the client notes text file.
12. Click the Back arrow button. the local disk (C:) window is displayed.
13. Right click Confidential folder, and then select the properties option from the pop-up menu. the Confidential propertied
dialog box is displayed.
14. Click the Advanced button. the Advanced Attributes dialog box under is displayed.
15. Select the Encrypt contents to secure data check box under the compress or Encrypt attributes section.
16. Click the Ok button twice. the Confirm Attribute changes dialog box is displayed.
17. Ensure that the Apply changes to this folder, subfolder and files option is selected.
18. Click the ok button. the Applying attributes message box is displayed for a few moments, and then disppears.
19. Close the Local disk (C:) window.
Task 2. Text the encryption as another user.
To text the encryption as another user, you need to perform the following steps:
1. Press the Windows key. the Start screen is displayed.
2. Click Eric Swift on the top right hand side of the Start screen.
3. Select the Switch acciunt option from the drop down list. the Other user screen is displayed.
4. Type Harry and Pa$$w0rd in the User name and password text boxes, respectively.
5. Press the Enter key. After a few moments the Start screen is displayed.
6. Open the C:\ drive.
7. Double click the confidential folder.
8. Double click the Client notes text file.
9. Click the ok button to close the message box.
10. Close all the open windows.
4. Users in A. Datum are about to receive their new Windows 8 computers.
You must use Performance Monitor to establish a performance monitoring baseline
and measure a typical computer's responsiveness under a representative load.
This will help to ensure that resources, such as RAM and CPU, are specified
correctly for these computers. Objectives Create a performance monitoring
baseline. Introduce a load. Measure system performance and analyze results.
Create a performance monitoring baseline.
Introduce a load.
Measure system performance and analyze results.
In this exercise, you create a performance monitoring baseline against which to measure future
performance.
The main tasks for this exercise are as follows:
1. Establish a performance baseline.
2. View the baseline report.
Task 1: Establish a performance baseline
1. On LON-CL1, log on as Adatum\Administrator with the password of Pa$$w0rd, and then open
Performance Monitor.
2. Create a user-defined Data Collector Set with the following properties:
o Name: Adatum Baseline
o Create manually (Advanced)
o Performance counter
o Sample interval: 1 second
o Counters to include:
= Memory > Pages/sec
= Network Interface > Packets/sec
= Physical Disk > % Disk Time
= Physical Disk > Avg. Disk Queue Length
= Processor > % Processor Time
= System > Processor Queue Length
3. Start the data collector set, and then start the following programs:
o Microsoft Office Word 2010
o Microsoft Office Excel 2010
o Microsoft Office PowerPoint 2010
4. Close all Microsoft Office applications, and in Performance Monitor, stop the Adatum Baseline data
collector set.
Task 2: View the baseline report
1. In Performance Monitor, locate Reports > User Defined > Adatum Baseline. Click the report that
has a name that begins with LON-CL1.
2. Record the following values:
o Memory Pages per second
o Network Interface Packets per second
o Physical Disk % Disk Time
o Physical Disk Avg. Disk Queue Length
o Processor % Processor Time
o System Processor Queue Length
After this exercise, you should have created a performance monitoring baseline.
2: Introducing Additional Workload
In this exercise, you introduce additional computer workload by running a script that performs various
tasks on the computer.
The main task for this exercise is as follows:
• Create a load on the computer.
Task 1: Create a load on the computer
1. Switch to the LON-CL1 computer and then start the Adatum Baseline.
2. Run the E:\Labfiles\Mod10\Load.vbs script.
After this exercise, you should have generated additional load on the computer.
3: Measuring System Responsiveness Under Load
In this exercise, you compare the results that you collected during performance monitoring with those
collected earlier when you created the baseline.
The main task for this exercise is as follows:
• Identify performance bottlenecks in the computer.
Task 1: Identify performance bottlenecks in the computer
1. Open Resource Monitor.
2. Which components are under strain?
3. After a few minutes, close the two instances of C:\Windows\System32\cmd.exe launched by the
script.
4. Switch to Performance Monitor, and then stop the Adatum Baseline data collector set.
5. In Performance Monitor, locate Reports > User Defined > Adatum Baseline. Click on the second
report that has a name that begins with LON-CL1.
6. View the data as a report.
7. Record the component details:
a. Memory Pages per second
b. Network Interface Packets per second
c. Physical Disk % Disk Time
d. Physical Disk Avg. Disk Queue Length
e. Processor % Processor Time
f. System Processor Queue Length
8. In your opinion, which components are the most seriously affected?
9. Close all open windows and programs, and then revert to the Start screen.
Introduce a load.
Measure system performance and analyze results.
In this exercise, you create a performance monitoring baseline against which to measure future
performance.
The main tasks for this exercise are as follows:
1. Establish a performance baseline.
2. View the baseline report.
Task 1: Establish a performance baseline
1. On LON-CL1, log on as Adatum\Administrator with the password of Pa$$w0rd, and then open
Performance Monitor.
2. Create a user-defined Data Collector Set with the following properties:
o Name: Adatum Baseline
o Create manually (Advanced)
o Performance counter
o Sample interval: 1 second
o Counters to include:
= Memory > Pages/sec
= Network Interface > Packets/sec
= Physical Disk > % Disk Time
= Physical Disk > Avg. Disk Queue Length
= Processor > % Processor Time
= System > Processor Queue Length
3. Start the data collector set, and then start the following programs:
o Microsoft Office Word 2010
o Microsoft Office Excel 2010
o Microsoft Office PowerPoint 2010
4. Close all Microsoft Office applications, and in Performance Monitor, stop the Adatum Baseline data
collector set.
Task 2: View the baseline report
1. In Performance Monitor, locate Reports > User Defined > Adatum Baseline. Click the report that
has a name that begins with LON-CL1.
2. Record the following values:
o Memory Pages per second
o Network Interface Packets per second
o Physical Disk % Disk Time
o Physical Disk Avg. Disk Queue Length
o Processor % Processor Time
o System Processor Queue Length
After this exercise, you should have created a performance monitoring baseline.
2: Introducing Additional Workload
In this exercise, you introduce additional computer workload by running a script that performs various
tasks on the computer.
The main task for this exercise is as follows:
• Create a load on the computer.
Task 1: Create a load on the computer
1. Switch to the LON-CL1 computer and then start the Adatum Baseline.
2. Run the E:\Labfiles\Mod10\Load.vbs script.
After this exercise, you should have generated additional load on the computer.
3: Measuring System Responsiveness Under Load
In this exercise, you compare the results that you collected during performance monitoring with those
collected earlier when you created the baseline.
The main task for this exercise is as follows:
• Identify performance bottlenecks in the computer.
Task 1: Identify performance bottlenecks in the computer
1. Open Resource Monitor.
2. Which components are under strain?
3. After a few minutes, close the two instances of C:\Windows\System32\cmd.exe launched by the
script.
4. Switch to Performance Monitor, and then stop the Adatum Baseline data collector set.
5. In Performance Monitor, locate Reports > User Defined > Adatum Baseline. Click on the second
report that has a name that begins with LON-CL1.
6. View the data as a report.
7. Record the component details:
a. Memory Pages per second
b. Network Interface Packets per second
c. Physical Disk % Disk Time
d. Physical Disk Avg. Disk Queue Length
e. Processor % Processor Time
f. System Processor Queue Length
8. In your opinion, which components are the most seriously affected?
9. Close all open windows and programs, and then revert to the Start screen.
5. When A. Datum received the first shipment of Windows 8 computers,
Holly disabled automatic updates because she was concerned that they would
cause problems with a custom application on these systems. After extensive
testing, you have determined that it is extremely unlikely that automatic updates
will cause a problem with this application. Objectives Configure the local
Windows Update settings.
Configure the local
Windows Update settings.
You have to confirm that automatic updates are disabled for your Windows 8 computers, and then enable
automatic updates by implementing a Group Policy.
The main tasks for this exercise are as follows:
1. Verify that automatic updates are disabled.
2. Enable automatic updates in Group Policy.
3. Verify that the automatic updates setting from the GPO is being applied.
Task 1: Verify that automatic updates are disabled
• On LON-CL1, open Windows Update, and verify that automatic updates are disabled.
Task 2: Enable automatic updates in Group Policy
1. Log on to the LON-DC1 virtual machine as Adatum\Administrator with the password Pa$$w0rd,
and open the Group Policy Management administrative tool.
2. Edit the Default Domain Policy:
o Modify the settings for Computer Configuration\Policies\Administrative Templates
\Windows Components\Windows Update\Configure Automatic Updates:
= Enabled
= 4 – Auto download and schedule the install
Task 3: Verify that the automatic updates setting from the GPO is being applied
1. On LON-CL1, run gpupdate /force to update the Group Policy settings.
2. Open Windows Update, and verify that the new settings have been applied.
You have to confirm that automatic updates are disabled for your Windows 8 computers, and then enable
automatic updates by implementing a Group Policy.
The main tasks for this exercise are as follows:
1. Verify that automatic updates are disabled.
2. Enable automatic updates in Group Policy.
3. Verify that the automatic updates setting from the GPO is being applied.
Task 1: Verify that automatic updates are disabled
• On LON-CL1, open Windows Update, and verify that automatic updates are disabled.
Task 2: Enable automatic updates in Group Policy
1. Log on to the LON-DC1 virtual machine as Adatum\Administrator with the password Pa$$w0rd,
and open the Group Policy Management administrative tool.
2. Edit the Default Domain Policy:
o Modify the settings for Computer Configuration\Policies\Administrative Templates
\Windows Components\Windows Update\Configure Automatic Updates:
= Enabled
= 4 – Auto download and schedule the install
Task 3: Verify that the automatic updates setting from the GPO is being applied
1. On LON-CL1, run gpupdate /force to update the Group Policy settings.
2. Open Windows Update, and verify that the new settings have been applied.
No comments:
Post a Comment