You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2 exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step: Windows: Lock system when not in use Create and change user account password Disable Guest Account Enable Automatic Software Updates Enable Firewall Create a New Firewall Rule Turn on Windows Defender Enable bitlocker Decrypt file using EFS Disable Unnecessary Services Paste screenshots into a Microsoft® Word document to demonstrate you applied the configurations. Write a 1-page explanation on how and why these settings create a secure operating system.
Looking for a solution written from scratch with No plagiarism and No AI?
WHY CHOOSE US?
We deliver quality original papers |
Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected |
Free revisions |
We offer our clients multiple free revisions just to ensure you get what you want. |
Discounted prices |
All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount |
100% originality |
We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI |
On-time delivery |
We will deliver your paper on time even on short notice or short deadline, overnight essay or even an urgent essay |