SlideShare a Scribd company logo
1 of 2
Download to read offline
This project is broken up into Windows and Mac versions (listed below). Security and privacy
should never be an afterthought when developing secure software. A formal process must be in
place to ensure they're considered at all points of the product's lifecycle. Microsoft's Security
Development Lifecycle (SDL) embeds comprehensive security requirements, technology-specific
tooling, and mandatory processes into the development and operation of all software products. All
development teams at Microsoft must adhere to the SDL processes and requirements, resulting in
more secure software with fewer and less severe vulnerabilities at a reduced development cost.
Office 365 isolation controls Microsoft continuously works to ensure that the multi-tenant
architecture of Microsoft 365 supports enterprise-level security, confidentiality, privacy, integrity,
and local, international, and availability standards. The scale and the scope of services provided
by Microsoft make it difficult and non-economical to manage Microsoft 365 with significant human
interaction. Microsoft 365 services are provided through globally distributed data centers, each
highly automated with few operations requiring a human touch or any access to customer content.
Microsoft 365 is composed of multiple services that provide important business functionality and
contribute to the entire Microsoft 365 experience. Each of these services is self-contained and
designed to integrate with one another. Microsoft 365 is designed with the following principles: -
Service-oriented architecture: designing and developing software in the form of interoperable
services providing well-defined business functionality. - Operational security assurance: a
framework that incorporates the knowledge gained through various capabilities that are unique to
Microsoft, including the Microsoft Security Development Lifecycle, the Microsoft Security
Response Center, and deep awareness of the cybersecurity threat landscape. How do Microsoft
online services employ audit logging? Microsoft online services employ audit logging to detect
unauthorized activities and provide accountability for Microsoft personnel. Audit logs capture
details about system configuration changes and access events, with details to identify who was
responsible for the activity, when and where the activity took place, and what the outcome of the
activity was. Automated log analysis supports near real-time detection of suspicious behavior.
Potential incidents are escalated to the appropriate Microsoft security response team for further
investigation. Microsoft online services internal audit logging captures log data from various
sources, such as: Event logs AppLocker logs Performance data System Center data Call detail
records Quality of experience data IIS Web Server logs SQL Server logs Syslog data Security
audit logs Windows Users - the Windows version requires Windows (7/10/11) operating
environment. 1. Your task is to examine your Windows operating environment (7/10/11). Using
ALL the available applications/apps provided by underlying operating system, identify these logs
and document your findings as follows: Name of the log (using the list above). Sample of the log
(1-2 records/objects/data items). Your own interpretation of the log (brief). If you cannot find any of
the logs mentioned above, document that log(s) as follows: Name of the log. Current Operating
System cannot provide this log OR "I am unable to identify this log data". 2. Investigate and list
Applications and Windows failure logs including any Warnings using the Reliability Monitor.
Combine your responses from the above into a Word document and submit by day 7 of this
module. See the rubric for additional grading guidelines. MacOS Users, do the following: Go to
VMWare and create a free account. Login and go to Hands-On Labs. Search for Windows 10 lab.
Setup the virtual lab. Then, run the virtual lab for Windows 10. Now Mac users have access to
Windows 10. 1. Your task is to examine your Windows operating environment (7/10/11). Using
ALL the available applications/apps provided by underlying operating system, identify these logs
and document your findings as follows: Name of the log (using the list above). Sample of the log
(1-2 records/objects/data items). Your own interpretation of the log (brief). If you cannot find any of
the logs mentioned above, document that log(s) as follows: Name of the log. Current Operating
System cannot provide this log OR "I am unable to identify this log data". 2. Investigate and list
Applications and Windows failure logs including any Warnings using the Reliability Monitor.

More Related Content

Similar to This project is broken up into Windows and Mac versions lis.pdf

COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxmccormicknadine86
Β 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
Β 
Securing your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesSecuring your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesFrank Lesniak
Β 
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docxjeffsrosalyn
Β 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Jennifer Lopez
Β 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websitesMike Taylor
Β 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
Β 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
Β 
Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Achim D. Brucker
Β 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureIRJET Journal
Β 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideAryan G
Β 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
Β 
Week 10
Week 10Week 10
Week 10adrenal
Β 
Week 10
Week 10Week 10
Week 10adrenal
Β 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentationtsteh
Β 
03_Azure Security Center_GAB2019
03_Azure Security Center_GAB201903_Azure Security Center_GAB2019
03_Azure Security Center_GAB2019Kumton Suttiraksiri
Β 

Similar to This project is broken up into Windows and Mac versions lis.pdf (20)

COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
Β 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
Β 
Securing your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesSecuring your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security Baselines
Β 
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Β 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
Β 
4 sdlc and stlc
4 sdlc and stlc4 sdlc and stlc
4 sdlc and stlc
Β 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websites
Β 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
Β 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
Β 
Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...
Β 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
Β 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
Β 
Lab 14
Lab 14Lab 14
Lab 14
Β 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
Β 
Week 10
Week 10Week 10
Week 10
Β 
Week 10
Week 10Week 10
Week 10
Β 
What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?
Β 
Sudheendra
SudheendraSudheendra
Sudheendra
Β 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
Β 
03_Azure Security Center_GAB2019
03_Azure Security Center_GAB201903_Azure Security Center_GAB2019
03_Azure Security Center_GAB2019
Β 

More from ableelectronics

Background InfoDichotomous keys can be used to help identify.pdf
Background InfoDichotomous keys can be used to help identify.pdfBackground InfoDichotomous keys can be used to help identify.pdf
Background InfoDichotomous keys can be used to help identify.pdfableelectronics
Β 
At the beginning of the video Lead like the great conductors.pdf
At the beginning of the video Lead like the great conductors.pdfAt the beginning of the video Lead like the great conductors.pdf
At the beginning of the video Lead like the great conductors.pdfableelectronics
Β 
7 TF The longer the password the tougher it is to crack.pdf
7  TF The longer the password the tougher it is to crack.pdf7  TF The longer the password the tougher it is to crack.pdf
7 TF The longer the password the tougher it is to crack.pdfableelectronics
Β 
A researcher for the EPA measured the amount of arsenic in t.pdf
A researcher for the EPA measured the amount of arsenic in t.pdfA researcher for the EPA measured the amount of arsenic in t.pdf
A researcher for the EPA measured the amount of arsenic in t.pdfableelectronics
Β 
Earthquake Epicenter Locations and Depths The letters on th.pdf
Earthquake Epicenter Locations and Depths The letters on th.pdfEarthquake Epicenter Locations and Depths The letters on th.pdf
Earthquake Epicenter Locations and Depths The letters on th.pdfableelectronics
Β 
6 Consider a random sample X1Xn of size n from a Gamma.pdf
6 Consider a random sample X1Xn of size n from a Gamma.pdf6 Consider a random sample X1Xn of size n from a Gamma.pdf
6 Consider a random sample X1Xn of size n from a Gamma.pdfableelectronics
Β 
11 Jacobs Co sat grevlileri ve yneticileri tarafndan i .pdf
11 Jacobs Co sat grevlileri ve yneticileri tarafndan i .pdf11 Jacobs Co sat grevlileri ve yneticileri tarafndan i .pdf
11 Jacobs Co sat grevlileri ve yneticileri tarafndan i .pdfableelectronics
Β 
Computer Programming and MCUs Assembly Language STM32Cu.pdf
Computer Programming and MCUs  Assembly Language  STM32Cu.pdfComputer Programming and MCUs  Assembly Language  STM32Cu.pdf
Computer Programming and MCUs Assembly Language STM32Cu.pdfableelectronics
Β 
Chief Complaint 23yearold man with immunce deficiency His.pdf
Chief Complaint 23yearold man with immunce deficiency His.pdfChief Complaint 23yearold man with immunce deficiency His.pdf
Chief Complaint 23yearold man with immunce deficiency His.pdfableelectronics
Β 
Why did we choose to process BMP image files rather than ot.pdf
Why did we choose to process BMP image files rather than ot.pdfWhy did we choose to process BMP image files rather than ot.pdf
Why did we choose to process BMP image files rather than ot.pdfableelectronics
Β 
Using the data in the table what is Walmarts NYSE WMT b.pdf
Using the data in the table what is Walmarts NYSE WMT b.pdfUsing the data in the table what is Walmarts NYSE WMT b.pdf
Using the data in the table what is Walmarts NYSE WMT b.pdfableelectronics
Β 
void f int x The above code is a c++ function In ter.pdf
void f  int x  The above code is a c++ function In ter.pdfvoid f  int x  The above code is a c++ function In ter.pdf
void f int x The above code is a c++ function In ter.pdfableelectronics
Β 
The as of Ct+11 allows what benefit It can be shared by .pdf
The as of Ct+11  allows what benefit It can be shared by .pdfThe as of Ct+11  allows what benefit It can be shared by .pdf
The as of Ct+11 allows what benefit It can be shared by .pdfableelectronics
Β 
Tartma stemi Yantlamak iin aadaki sorulardan birini sein.pdf
Tartma stemi  Yantlamak iin aadaki sorulardan birini sein.pdfTartma stemi  Yantlamak iin aadaki sorulardan birini sein.pdf
Tartma stemi Yantlamak iin aadaki sorulardan birini sein.pdfableelectronics
Β 
Supportive leadership is the same as which of the following .pdf
Supportive leadership is the same as which of the following .pdfSupportive leadership is the same as which of the following .pdf
Supportive leadership is the same as which of the following .pdfableelectronics
Β 
System Analysis Assignment 4 Due date See LEARN Max Marks.pdf
System Analysis Assignment 4 Due date See LEARN Max Marks.pdfSystem Analysis Assignment 4 Due date See LEARN Max Marks.pdf
System Analysis Assignment 4 Due date See LEARN Max Marks.pdfableelectronics
Β 
Sarah tiene 30 aos y es madre de dos nios pequeos de 3 y.pdf
Sarah tiene 30 aos y es madre de dos nios pequeos de 3 y.pdfSarah tiene 30 aos y es madre de dos nios pequeos de 3 y.pdf
Sarah tiene 30 aos y es madre de dos nios pequeos de 3 y.pdfableelectronics
Β 
Real GDP per capita in the country of Arcadia grew from abou.pdf
Real GDP per capita in the country of Arcadia grew from abou.pdfReal GDP per capita in the country of Arcadia grew from abou.pdf
Real GDP per capita in the country of Arcadia grew from abou.pdfableelectronics
Β 
Rex y Felix son los nicos accionistas de Dogs and Cats Corp.pdf
Rex y Felix son los nicos accionistas de Dogs and Cats Corp.pdfRex y Felix son los nicos accionistas de Dogs and Cats Corp.pdf
Rex y Felix son los nicos accionistas de Dogs and Cats Corp.pdfableelectronics
Β 
please use only these Part 1 Organize the code 85 Fo.pdf
please use only these   Part 1 Organize the code 85  Fo.pdfplease use only these   Part 1 Organize the code 85  Fo.pdf
please use only these Part 1 Organize the code 85 Fo.pdfableelectronics
Β 

More from ableelectronics (20)

Background InfoDichotomous keys can be used to help identify.pdf
Background InfoDichotomous keys can be used to help identify.pdfBackground InfoDichotomous keys can be used to help identify.pdf
Background InfoDichotomous keys can be used to help identify.pdf
Β 
At the beginning of the video Lead like the great conductors.pdf
At the beginning of the video Lead like the great conductors.pdfAt the beginning of the video Lead like the great conductors.pdf
At the beginning of the video Lead like the great conductors.pdf
Β 
7 TF The longer the password the tougher it is to crack.pdf
7  TF The longer the password the tougher it is to crack.pdf7  TF The longer the password the tougher it is to crack.pdf
7 TF The longer the password the tougher it is to crack.pdf
Β 
A researcher for the EPA measured the amount of arsenic in t.pdf
A researcher for the EPA measured the amount of arsenic in t.pdfA researcher for the EPA measured the amount of arsenic in t.pdf
A researcher for the EPA measured the amount of arsenic in t.pdf
Β 
Earthquake Epicenter Locations and Depths The letters on th.pdf
Earthquake Epicenter Locations and Depths The letters on th.pdfEarthquake Epicenter Locations and Depths The letters on th.pdf
Earthquake Epicenter Locations and Depths The letters on th.pdf
Β 
6 Consider a random sample X1Xn of size n from a Gamma.pdf
6 Consider a random sample X1Xn of size n from a Gamma.pdf6 Consider a random sample X1Xn of size n from a Gamma.pdf
6 Consider a random sample X1Xn of size n from a Gamma.pdf
Β 
11 Jacobs Co sat grevlileri ve yneticileri tarafndan i .pdf
11 Jacobs Co sat grevlileri ve yneticileri tarafndan i .pdf11 Jacobs Co sat grevlileri ve yneticileri tarafndan i .pdf
11 Jacobs Co sat grevlileri ve yneticileri tarafndan i .pdf
Β 
Computer Programming and MCUs Assembly Language STM32Cu.pdf
Computer Programming and MCUs  Assembly Language  STM32Cu.pdfComputer Programming and MCUs  Assembly Language  STM32Cu.pdf
Computer Programming and MCUs Assembly Language STM32Cu.pdf
Β 
Chief Complaint 23yearold man with immunce deficiency His.pdf
Chief Complaint 23yearold man with immunce deficiency His.pdfChief Complaint 23yearold man with immunce deficiency His.pdf
Chief Complaint 23yearold man with immunce deficiency His.pdf
Β 
Why did we choose to process BMP image files rather than ot.pdf
Why did we choose to process BMP image files rather than ot.pdfWhy did we choose to process BMP image files rather than ot.pdf
Why did we choose to process BMP image files rather than ot.pdf
Β 
Using the data in the table what is Walmarts NYSE WMT b.pdf
Using the data in the table what is Walmarts NYSE WMT b.pdfUsing the data in the table what is Walmarts NYSE WMT b.pdf
Using the data in the table what is Walmarts NYSE WMT b.pdf
Β 
void f int x The above code is a c++ function In ter.pdf
void f  int x  The above code is a c++ function In ter.pdfvoid f  int x  The above code is a c++ function In ter.pdf
void f int x The above code is a c++ function In ter.pdf
Β 
The as of Ct+11 allows what benefit It can be shared by .pdf
The as of Ct+11  allows what benefit It can be shared by .pdfThe as of Ct+11  allows what benefit It can be shared by .pdf
The as of Ct+11 allows what benefit It can be shared by .pdf
Β 
Tartma stemi Yantlamak iin aadaki sorulardan birini sein.pdf
Tartma stemi  Yantlamak iin aadaki sorulardan birini sein.pdfTartma stemi  Yantlamak iin aadaki sorulardan birini sein.pdf
Tartma stemi Yantlamak iin aadaki sorulardan birini sein.pdf
Β 
Supportive leadership is the same as which of the following .pdf
Supportive leadership is the same as which of the following .pdfSupportive leadership is the same as which of the following .pdf
Supportive leadership is the same as which of the following .pdf
Β 
System Analysis Assignment 4 Due date See LEARN Max Marks.pdf
System Analysis Assignment 4 Due date See LEARN Max Marks.pdfSystem Analysis Assignment 4 Due date See LEARN Max Marks.pdf
System Analysis Assignment 4 Due date See LEARN Max Marks.pdf
Β 
Sarah tiene 30 aos y es madre de dos nios pequeos de 3 y.pdf
Sarah tiene 30 aos y es madre de dos nios pequeos de 3 y.pdfSarah tiene 30 aos y es madre de dos nios pequeos de 3 y.pdf
Sarah tiene 30 aos y es madre de dos nios pequeos de 3 y.pdf
Β 
Real GDP per capita in the country of Arcadia grew from abou.pdf
Real GDP per capita in the country of Arcadia grew from abou.pdfReal GDP per capita in the country of Arcadia grew from abou.pdf
Real GDP per capita in the country of Arcadia grew from abou.pdf
Β 
Rex y Felix son los nicos accionistas de Dogs and Cats Corp.pdf
Rex y Felix son los nicos accionistas de Dogs and Cats Corp.pdfRex y Felix son los nicos accionistas de Dogs and Cats Corp.pdf
Rex y Felix son los nicos accionistas de Dogs and Cats Corp.pdf
Β 
please use only these Part 1 Organize the code 85 Fo.pdf
please use only these   Part 1 Organize the code 85  Fo.pdfplease use only these   Part 1 Organize the code 85  Fo.pdf
please use only these Part 1 Organize the code 85 Fo.pdf
Β 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
Β 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
Β 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)β€”β€”β€”β€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)β€”β€”β€”β€”IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)β€”β€”β€”β€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)β€”β€”β€”β€”IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
Β 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
Β 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
Β 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ9953056974 Low Rate Call Girls In Saket, Delhi NCR
Β 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Β 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
Β 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
Β 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
Β 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Β 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Β 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
Β 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
Β 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
Β 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
Β 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
Β 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
Β 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Β 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)β€”β€”β€”β€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)β€”β€”β€”β€”IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)β€”β€”β€”β€”IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)β€”β€”β€”β€”IMP.OF KSHARA ...
Β 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Β 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Β 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Β 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
Β 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Β 
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Β 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
Β 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
Β 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
Β 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Β 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Β 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
Β 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Β 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Β 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
Β 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Β 

This project is broken up into Windows and Mac versions lis.pdf

  • 1. This project is broken up into Windows and Mac versions (listed below). Security and privacy should never be an afterthought when developing secure software. A formal process must be in place to ensure they're considered at all points of the product's lifecycle. Microsoft's Security Development Lifecycle (SDL) embeds comprehensive security requirements, technology-specific tooling, and mandatory processes into the development and operation of all software products. All development teams at Microsoft must adhere to the SDL processes and requirements, resulting in more secure software with fewer and less severe vulnerabilities at a reduced development cost. Office 365 isolation controls Microsoft continuously works to ensure that the multi-tenant architecture of Microsoft 365 supports enterprise-level security, confidentiality, privacy, integrity, and local, international, and availability standards. The scale and the scope of services provided by Microsoft make it difficult and non-economical to manage Microsoft 365 with significant human interaction. Microsoft 365 services are provided through globally distributed data centers, each highly automated with few operations requiring a human touch or any access to customer content. Microsoft 365 is composed of multiple services that provide important business functionality and contribute to the entire Microsoft 365 experience. Each of these services is self-contained and designed to integrate with one another. Microsoft 365 is designed with the following principles: - Service-oriented architecture: designing and developing software in the form of interoperable services providing well-defined business functionality. - Operational security assurance: a framework that incorporates the knowledge gained through various capabilities that are unique to Microsoft, including the Microsoft Security Development Lifecycle, the Microsoft Security Response Center, and deep awareness of the cybersecurity threat landscape. How do Microsoft online services employ audit logging? Microsoft online services employ audit logging to detect unauthorized activities and provide accountability for Microsoft personnel. Audit logs capture details about system configuration changes and access events, with details to identify who was responsible for the activity, when and where the activity took place, and what the outcome of the activity was. Automated log analysis supports near real-time detection of suspicious behavior. Potential incidents are escalated to the appropriate Microsoft security response team for further investigation. Microsoft online services internal audit logging captures log data from various sources, such as: Event logs AppLocker logs Performance data System Center data Call detail records Quality of experience data IIS Web Server logs SQL Server logs Syslog data Security audit logs Windows Users - the Windows version requires Windows (7/10/11) operating environment. 1. Your task is to examine your Windows operating environment (7/10/11). Using ALL the available applications/apps provided by underlying operating system, identify these logs and document your findings as follows: Name of the log (using the list above). Sample of the log (1-2 records/objects/data items). Your own interpretation of the log (brief). If you cannot find any of the logs mentioned above, document that log(s) as follows: Name of the log. Current Operating System cannot provide this log OR "I am unable to identify this log data". 2. Investigate and list Applications and Windows failure logs including any Warnings using the Reliability Monitor. Combine your responses from the above into a Word document and submit by day 7 of this module. See the rubric for additional grading guidelines. MacOS Users, do the following: Go to VMWare and create a free account. Login and go to Hands-On Labs. Search for Windows 10 lab. Setup the virtual lab. Then, run the virtual lab for Windows 10. Now Mac users have access to
  • 2. Windows 10. 1. Your task is to examine your Windows operating environment (7/10/11). Using ALL the available applications/apps provided by underlying operating system, identify these logs and document your findings as follows: Name of the log (using the list above). Sample of the log (1-2 records/objects/data items). Your own interpretation of the log (brief). If you cannot find any of the logs mentioned above, document that log(s) as follows: Name of the log. Current Operating System cannot provide this log OR "I am unable to identify this log data". 2. Investigate and list Applications and Windows failure logs including any Warnings using the Reliability Monitor.