ISOL534 University of the Cumberlands Security Configuration and Analysis
A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls. The process of comparing real computer configurations to known baselines, also called profiling, is important to ensure your configurations are correct and secure.
For each of the following scenarios, select the best tool to profile a Windows computer to determine if it satisfies your security requirements, and write at least 2 pages about each scenario and the tools you selected.
You must select from the following options:
- Security Configuration and Analysis (SCA)
- Microsoft Security Baseline Analyzer (MBSA)–Graphical User Interface (GUI)
- MBSA command-line interface
- Shavlik NetChk Protect
- Secunia Security Analyzers
Suspected malware scenarios:
|
|
|
|
|
|
|