Need to do the application security labs assignments
Lab 3: Configuring BitLocker and Windows Encryption
4
5 | Lab #3 Configuring BitLocker and Windows Encryption
SECTION 1: Hands-On Demonstration
Part 1. Configure Microsoft Encrypted File System (EFS)
17. Make a screen capture showing the encrypted Documents folder and paste it into your Lab Report file.
The Documents folder now includes a lock icon indicating that the folder and its contents are now encrypted.
Part 2. Test the EFS Security
6. Make a screen capture showing Notepad and the alert message and paste it into your Lab Report file.
Part 3. Configure BitLocker
11. Make a screen capture showing the settings on the Confirmation page and paste it into your Lab Report file.
26. Make a screen capture showing Notepad and the BitLocker recovery key and paste it into your Lab Report file.
40. Make a screen capture showing the This PC view with the unlocked drive and paste it into the Lab Report file.
SECTION 2: Applied Learning
Part 1. Configure Microsoft Encrypted File System (EFS)
6. Make a screen capture showing the encrypted SFUser02 Documents folder and paste it into your Lab Report file.
Part 2. Test the EFS Security
4. Make a screen capture showing Notepad and the error message and paste it into your Lab Report file.
Part 3. Configure BitLocker
28. Make a screen capture showing the unlocked E: drive in the File Explorer and paste it into your Lab Report file.
31. Make a screen capture showing the User Access details for the Encrypt folder and paste it into your Lab Report file.
SECTION 3: Challenge Questions
Analysis and Discussion
1. In the lab, you learned that Microsoft’s BitLocker encryption utility can be defeated by another Microsoft program: COFEE (Computer Online Forensic Evidence Extractor). What is your opinion about this strategy?
Tools and Commands
Using Windows PowerShell, unmount the E: drive and document your progress with screen captures.
Challenge Exercise
In Part 3 of this lab, you encrypted a drive on the remote Windows machine using BitLocker. Now, change the BitLocker password to a password of your own that meets the password complexity requirements, then turn off BitLocker, rename the drive to yourname, replacing yourname with your own name, change the drive letter to Z:, and encrypt the drive with the new BitLocker password. Document your progress with screen captures.
Copyright © 2017 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Report
Lab 2: Using Access Control Lists to Modify File System Permissions on Windows Systems
8
7 | Lab #2: Using Access Control Lists to Modify File System Permissions on Windows Systems
SECTION 1: Hands-On Demonstration
Part 1. View Existing ACLs on a Windows System
5.
Make a screen capture showing the current permissions for the SFfiles folder and paste it into the Lab Report file.
11. Make a screen capture showing the current permissions for the HRfiles folder and paste it into the Lab Report file.
12. Make a screen capture showing the current permissions for the MGRfiles folder and paste it into the Lab Report file.
Part 2. Modify ACLs using Icacls.exe
8. In your Lab Report file, compare the results of the icacls.exe command with the ACLS you documented in Part 1 of this lab. Do they match?
11. In the Lab Report file, compare the new results of this command with the results from step 7.:
12. Make a screen capture of the icacls.exe results showing the changes you made to the SFfiles folder permissions and paste it into the Lab Report file.
.14. Make a screen capture of the icacls.exe results showing the changes you made to the HRfiles folder permissions and paste it into the Lab Report file.
16. Make a screen capture of the icacls.exe results showing the changes you made to the MGRfiles folder permissions and paste it into the Lab Report file.
Part 3. Validate ACL Settings
14. Make a screen capture showing the modified text file in the SFfiles folder and paste it into the Lab Report file.
16. Make a screen capture showing the modified text file in the HRfiles folder and paste it into the Lab Report file.
17. Repeat steps 2-14 using the SFManager account.
· Make a screen capture showing the modified text file in the SFfiles folder and paste it into the Lab Report file.
· Make a screen capture showing the modified text file in the MGRfiles folder and paste it into the Lab Report file.
SECTION 2: Applied Learning
Part 1. Modify a Script to Add a New User
3. Make a screen capture showing the new user account in this script and paste it into your Lab Report file.
Part 2. Modify a Script to Add a New Group
5. Make a screen capture showing the modifications you made to the script and paste it into the Lab Report file.
Part 3. Modify Permissions Using a Script
2. Make a screen capture showing the current contents of the TargetWindows01 C: drive and paste it into the Lab Report file.
Part 4. Create Directories Using a Script
3. Make a screen capture showing the modifications to the final part of the script and paste it into the Lab Report file.
10. Make a screen capture showing the contents of the new LabDocuments2 directory and paste it into your Lab Report file.
12. Make a screen capture showing the permissions for the ISSA01 security group and paste it into your Lab Report file.
15. Make a screen capture showing the members of the ISSA01 security group and paste it into your Lab Report file.
SECTION 3: Challenge Questions
Analysis and Discussion
1. Explain how the principle of least privilege can be used in a corporate setting to protect corporate resources.
Tools and Commands
13. Research ACLs on the Internet and determine what permissions are required to rename existing files.
Challenge Exercise
14. Throughout this lab, you applied the Modify right to all of the groups/users equally. In a real-world organization, each group or user is granted the rights that are necessary to complete their job. Those rights may not be exactly the same as every other person in their department or sharing their same title.
Use the icacls.exe utility to add the Delete right (D) to only the managers in this organization. Review the Access Controls Criteria table from Part 2 of this lab to determine which folders should be changed and which users or groups should be modified. Describe the choices you’ve made and use screen captures to document your changes, and the success/failure of that change.
Copyright © 2017 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Report