Ken 7 Windows Limited new exploit contrivance planning (ERP) software expands the extent and occasion of the Ken 7 Windows Limited computing environment. The new infrastructure media past computers and past users. You perceive that the process of administering a larger, past obscure environment requires a past ceremonious access. You feel determined to utensil the Plan-Do-Check-Act (PDCA) cycle to succor construct your efforts.
Consider the inventory of deposit government undertakings underneath. After each undertaking, point-out the feature of the PDCA cycle to which it belongs. Write at meanest two pages that explain why the undertaking belongs to the feature you chose and how each undertaking makes your environment past protect.
Security government undertakings:
Write password plan to exact obscure passwords.
Identify settings that feel alterable for a inequitable computer by analyzing the output of a baseline similarity, then inventory settings that should be alterable.
Use Microsoft Baseline Deposit Analyzer (MBSA) to review for floating software versions.
Lock the door to the facts character.
Use a packet sniffer to see if network exchange is encrypted.
Develop daily server backup procedures.
Apply software deposit patches.
Update antivirus verification factsbases.
Monitor log files.