Describe all the potentially problematic security events that occurred in the 24-hour period after checking the antivirus software and configuring audit logging.
Project Part 3: System Hardening and Auditing Scenario Fullsoft’s chief technology officer (CTO) established a plan to mitigate risks, threats, and vulnerabilities. As part of the mitigation plan, you and your team members will configure baseline security controls on all workstations (harden the systems), which run either Windows 10 or OS X (Apple). For this […]