Assume you have discovered all of the recent malware spreads through mapped network drives. This organization has a shared common drive (X:). Prevent users from being able to run executable files from the X: drive OR prevent executable files from being able to be saved to the X: drive. Document and screenshot the settings you enable.
8. Review the firewall ACLs. Modify them to take a least privilege approach. Screenshot your ACLs in your report. Here are the items to consider:
a. End users need to be able to authentication to Active Directory.
b. No servers in the DMZ are domain-members but currently point to DC1 for DNS.
c. The SMTP service needs to be accessible on SMTP1 for the company’s email.
d. Workstations need to be able to access file shares, FTP and WSUS on App1.
e. Workstations need to be able to browse internet websites.