The enterprise cannot afford to have a single weakness in the newly installed operating system. It must consider many factors such as firewall configuration as an integral part of the layered security approach to secure the server and the client’s operating systems.
Windows operating system has inbuilt firewall features that need to be configured to block inbound and outbound traffic for the domain, private, and public profiles. To configure the basic firewall rules on the client and the server, a security administrator would need to follow the following steps.
From the system’s control panel, open the Basic Windows Firewall Settings to check the current status.
On the left pane, select the link “Turn Windows Firewall on or Off”. This option will allow the security administrator to customize settings for both Private and Public Networks; both settings must be turned “ON”.
Advanced settings can also be used to customize firewall settings for inbound and outbound traffic. These settings will help the enterprise control traffic to and from three profiles (the domain, private, and public). Suppose employees are allowed to use company-provided laptops in public, then inbound firewall rules can help prevent traffic from untrusted networks from entering the private part of the client and server systems. Outbound rules should be configured to control traffic, leaving the server and define which ports to pass through and to which destination.
Approach for the Implementation
Even after configuring firewall rules, the enterprise will still need a layered-security to secure its systems and the network. Based on the provided scenario, the enterprise might need to redesign the entire network infrastructure to cater for more security needs. Before doing that, it needs to have a policy guideline that sets security standards and the rules users, and system administrators need to follow, and security strategies to be deployed.
The network infrastructure can be redesigned to divide the network into security segments: the outside and inside of the network. These segments can then be secured through the implementation of the following:
Application-level and perimeter firewalls – the firewall would help filter and even block unrequested traffic destined to the inside of the network. Assuming that there are servers the enterprise wants to be protected, a security administrator must consider the best position to place a perimeter firewall. For example, it can be placed in front of the main router to filter and ensure that packets are forwarded to the right tunnel.
A firewall in a subnet – Assuming that the network infrastructure was redesigned to include some subnets, the enterprise might need to control traffic destined for those subnets using a firewall. The firewall would be configured to block traffic based on IP addresses and specific ports.
By implementing such security strategies, the enterprise would have a layered-security.
Summary of the Lab Experience
As demonstrated in the lab, small, medium, and large-sized enterprises need to configure firewall rules to restrict inbound and outbound traffic from their system. Blocking outbound traffic would help prevent leaks of confidential information, while blocking inbound traffic prevents applications from accessing the internet, installing updates and so forth. Before setting firewall rules, an enterprise must establish policy rules that would guide users and security administrators in implementing the best security practices. To do that, it might also need to use security tools such as Microsoft Security Compliance Manager to check, modify, create new baselines and even compare the difference between the new and existing ones for security compliance.
References
Get Professional Assignment Help Cheaply
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason may is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Our essay writers are graduates with diplomas, bachelor’s, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college diploma. When assigning your order, we match the paper subject with the area of specialization of the writer.
Why Choose Our Academic Writing Service?
Plagiarism free papers
Timely delivery
Any deadline
Skilled, Experienced Native English Writers
Subject-relevant academic writer
Adherence to paper instructions
Ability to tackle bulk assignments
Reasonable prices
24/7 Customer Support
Get superb grades consistently
How It Works
1. Place an order
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
2. Pay for the order
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
3. Track the progress
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
4. Download the paper
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH ESSAY SCORES TODAY AND GET AN AMAZING DISCOUNT
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more