SlideShare a Scribd company logo
1 of 2
Download to read offline
Note: This project is broken up into Windows and Mac versions (listed below).
Security and privacy should never be an afterthought when developing secure software. A formal
process must be in place to ensure they're considered at all points of the product's lifecycle.
Microsoft's Security Development Lifecycle (SDL) embeds comprehensive security requirements,
technology specific tooling, and mandatory processes into the development and operation of all
software products. All development teams at Microsoft must adhere to the SDL processes and
requirements, resulting in more secure software with fewer and less severe vulnerabilities at a
reduced development cost.
Office 365 isolation controls
Microsoft continuously works to ensure that the multi-tenant architecture of Microsoft 365 supports
enterprise-level security, confidentiality, privacy, integrity, local, international, and availability
standards. The scale and the scope of services provided by Microsoft make it difficult and non-
economical to manage Microsoft 365 with significant human interaction. Microsoft 365 services are
provided through globally distributed data centers, each highly automated with few operations
requiring a human touch or any access to customer content.
Microsoft 365 is composed of multiple services that provide important business functionality and
contribute to the entire Microsoft 365 experience. Each of these services is self-contained and
designed to integrate with one another. Microsoft 365 is designed with the following principles:
- Service-oriented architecture: designing and developing software in the form of interoperable
services providing well-defined business functionality.
- Operational security assurance: a framework that incorporates the knowledge gained through
various capabilities that are unique to Microsoft, including the Microsoft Security Development
Lifecycle, the Microsoft Security Response Center, and deep awareness of the cybersecurity
threat landscape.
How do Microsoft online services employ audit logging?
Microsoft online services employ audit logging to detect unauthorized activities and provide
accountability for Microsoft personnel. Audit logs capture details about system configuration
changes and access events, with details to identify who was responsible for the activity, when and
where the activity took place, and what the outcome of the activity was. Automated log analysis
supports near real-time detection of suspicious behavior. Potential incidents are escalated to the
appropriate Microsoft security response team for further investigation.
Microsoft online services internal audit logging captures log data from various sources, such as:
Event logs
AppLocker logs
Performance data
System Center data
Call detail records
Quality of experience data
IIS Web Server logs
SQL Server logs
Syslog data
Security audit logs
Windows Users - the Windows version requires Windows (7/10/11) operating environment.
1. Your task is to examine your Windows operating environment (7/10/11). Using ALL the
available applications/apps provided by underlying operating system, identify these logs and
document your findings as follows:
Name of the log (using the list above).
Sample of the log (1-2 records/objects/data items).
Your own interpretation of the log (brief).
If you cannot find any of the logs mentioned above, document that log(s) as follows:
Name of the log.
Current Operating System cannot provide this log OR "I am unable to identify this log data".
2. Investigate and list Applications and Windows failure logs including any Warnings using the
Reliability Monitor.
Combine your responses from the above into a Word document and submit by day 7 of this
module. See the rubric for additional grading guidelines.
MacOS Users, do the following:
Go to VMWare and create a free account.
Login and go to Hands-On Labs.
Search for Windows 10 lab.
Setup the virtual lab.
Then, run the virtual lab for Windows 10.
Now Mac users have access to Windows 10.
1. Your task is to examine your Windows operating environment (7/10/11). Using ALL the
available applications/apps provided by underlying operating system, identify these logs and
document your findings as follows:
Name of the log (using the list above).
Sample of the log (1-2 records/objects/data items).
Your own interpretation of the log (brief).
If you cannot find any of the logs mentioned above, document that log(s) as follows:
Name of the log.
Current Operating System cannot provide this log OR "I am unable to identify this log data".
2. Investigate and list Applications and Windows failure logs including any Warnings using the
Reliability Monitor.

More Related Content

Similar to Note This project is broken up into Windows and Mac version.pdf

Securing your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesSecuring your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesFrank Lesniak
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websitesMike Taylor
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibilitymicham
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureIRJET Journal
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docxjeffsrosalyn
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Jennifer Lopez
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideAryan G
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentationtsteh
 
Microsoft operations management_suite_resources
Microsoft operations management_suite_resourcesMicrosoft operations management_suite_resources
Microsoft operations management_suite_resourcesEhtesham Opel
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Achim D. Brucker
 

Similar to Note This project is broken up into Windows and Mac version.pdf (20)

Securing your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security BaselinesSecuring your Windows Network with the Microsoft Security Baselines
Securing your Windows Network with the Microsoft Security Baselines
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websites
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
Windows 7 Application Compatibility
Windows 7 Application CompatibilityWindows 7 Application Compatibility
Windows 7 Application Compatibility
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docxRunning Head WINDOWS AND LINUX     1WINDOWS AND LINUX12.docx
Running Head WINDOWS AND LINUX 1WINDOWS AND LINUX12.docx
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?
 
Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...Operating System Structure Of A Single Large Executable...
Operating System Structure Of A Single Large Executable...
 
OWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference GuideOWASP Secure Coding Quick Reference Guide
OWASP Secure Coding Quick Reference Guide
 
Observe It Presentation
Observe It PresentationObserve It Presentation
Observe It Presentation
 
Sharanabasappa_Resume
Sharanabasappa_Resume Sharanabasappa_Resume
Sharanabasappa_Resume
 
Lab 14
Lab 14Lab 14
Lab 14
 
4 sdlc and stlc
4 sdlc and stlc4 sdlc and stlc
4 sdlc and stlc
 
Sudheendra
SudheendraSudheendra
Sudheendra
 
Microsoft operations management_suite_resources
Microsoft operations management_suite_resourcesMicrosoft operations management_suite_resources
Microsoft operations management_suite_resources
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...
 

More from sagaraccura

Which of the following is a disadvantage of teams Teams typ.pdf
Which of the following is a disadvantage of teams Teams typ.pdfWhich of the following is a disadvantage of teams Teams typ.pdf
Which of the following is a disadvantage of teams Teams typ.pdfsagaraccura
 
Tipik HO ortamn gz nnde bulundurun 2 lke Kolombiya ve .pdf
Tipik HO ortamn gz nnde bulundurun 2 lke Kolombiya ve .pdfTipik HO ortamn gz nnde bulundurun 2 lke Kolombiya ve .pdf
Tipik HO ortamn gz nnde bulundurun 2 lke Kolombiya ve .pdfsagaraccura
 
The percent frequency distributions of job satisfaction scor.pdf
The percent frequency distributions of job satisfaction scor.pdfThe percent frequency distributions of job satisfaction scor.pdf
The percent frequency distributions of job satisfaction scor.pdfsagaraccura
 
Please refer to the Network Diagram below Let Xij represent.pdf
Please refer to the Network Diagram below Let Xij represent.pdfPlease refer to the Network Diagram below Let Xij represent.pdf
Please refer to the Network Diagram below Let Xij represent.pdfsagaraccura
 
Soru 2 Campbells orba irketi Rus tketicileri rnne b.pdf
Soru 2  Campbells orba irketi Rus tketicileri rnne b.pdfSoru 2  Campbells orba irketi Rus tketicileri rnne b.pdf
Soru 2 Campbells orba irketi Rus tketicileri rnne b.pdfsagaraccura
 
Sanayi Devrimi patlak verdi sz ne anlama gelmektedir Bu .pdf
Sanayi Devrimi patlak verdi sz ne anlama gelmektedir Bu .pdfSanayi Devrimi patlak verdi sz ne anlama gelmektedir Bu .pdf
Sanayi Devrimi patlak verdi sz ne anlama gelmektedir Bu .pdfsagaraccura
 
Since the late 19 th century US monufacturers were able t.pdf
Since the late 19 th century US monufacturers were able t.pdfSince the late 19 th century US monufacturers were able t.pdf
Since the late 19 th century US monufacturers were able t.pdfsagaraccura
 
Responda la siguiente pregunta basada en el estudio de caso .pdf
Responda la siguiente pregunta basada en el estudio de caso .pdfResponda la siguiente pregunta basada en el estudio de caso .pdf
Responda la siguiente pregunta basada en el estudio de caso .pdfsagaraccura
 
Required information The following intortabion appoies to t.pdf
Required information The following intortabion appoies to t.pdfRequired information The following intortabion appoies to t.pdf
Required information The following intortabion appoies to t.pdfsagaraccura
 
recommendation on remedaying addressed issues .pdf
recommendation on remedaying addressed issues            .pdfrecommendation on remedaying addressed issues            .pdf
recommendation on remedaying addressed issues .pdfsagaraccura
 
QUESTIONS System implementation is the process of preparing.pdf
QUESTIONS System implementation is the process of preparing.pdfQUESTIONS System implementation is the process of preparing.pdf
QUESTIONS System implementation is the process of preparing.pdfsagaraccura
 
Question 1 What is virtualization Question 2 How have clo.pdf
Question 1 What is virtualization Question 2 How have clo.pdfQuestion 1 What is virtualization Question 2 How have clo.pdf
Question 1 What is virtualization Question 2 How have clo.pdfsagaraccura
 
public ArrayList tT getReverseArraylist Returns an ArrayL.pdf
public ArrayList tT getReverseArraylist Returns an ArrayL.pdfpublic ArrayList tT getReverseArraylist Returns an ArrayL.pdf
public ArrayList tT getReverseArraylist Returns an ArrayL.pdfsagaraccura
 
please I need it in less than 30min thank you Required info.pdf
please I need it in less than 30min thank you Required info.pdfplease I need it in less than 30min thank you Required info.pdf
please I need it in less than 30min thank you Required info.pdfsagaraccura
 
Durine extreme meteornlogical drought Wood et al found it .pdf
Durine extreme meteornlogical drought Wood et al found it .pdfDurine extreme meteornlogical drought Wood et al found it .pdf
Durine extreme meteornlogical drought Wood et al found it .pdfsagaraccura
 
Let X be a random variable with probability density function.pdf
Let X be a random variable with probability density function.pdfLet X be a random variable with probability density function.pdf
Let X be a random variable with probability density function.pdfsagaraccura
 
Kullanlan kaynaklar almanzn sonunda Kaynaka bal altnda b.pdf
Kullanlan kaynaklar almanzn sonunda Kaynaka bal altnda b.pdfKullanlan kaynaklar almanzn sonunda Kaynaka bal altnda b.pdf
Kullanlan kaynaklar almanzn sonunda Kaynaka bal altnda b.pdfsagaraccura
 
42 Let x1x2xn be IID pvs with Commen df fx2x.pdf
42 Let x1x2xn be IID pvs with Commen df fx2x.pdf42 Let x1x2xn be IID pvs with Commen df fx2x.pdf
42 Let x1x2xn be IID pvs with Commen df fx2x.pdfsagaraccura
 
In the last few decades the alternative research paradigms .pdf
In the last few decades the alternative research paradigms .pdfIn the last few decades the alternative research paradigms .pdf
In the last few decades the alternative research paradigms .pdfsagaraccura
 
In using the Case of A amp B a consumer credit reporting .pdf
In using the Case of A amp B  a consumer credit reporting .pdfIn using the Case of A amp B  a consumer credit reporting .pdf
In using the Case of A amp B a consumer credit reporting .pdfsagaraccura
 

More from sagaraccura (20)

Which of the following is a disadvantage of teams Teams typ.pdf
Which of the following is a disadvantage of teams Teams typ.pdfWhich of the following is a disadvantage of teams Teams typ.pdf
Which of the following is a disadvantage of teams Teams typ.pdf
 
Tipik HO ortamn gz nnde bulundurun 2 lke Kolombiya ve .pdf
Tipik HO ortamn gz nnde bulundurun 2 lke Kolombiya ve .pdfTipik HO ortamn gz nnde bulundurun 2 lke Kolombiya ve .pdf
Tipik HO ortamn gz nnde bulundurun 2 lke Kolombiya ve .pdf
 
The percent frequency distributions of job satisfaction scor.pdf
The percent frequency distributions of job satisfaction scor.pdfThe percent frequency distributions of job satisfaction scor.pdf
The percent frequency distributions of job satisfaction scor.pdf
 
Please refer to the Network Diagram below Let Xij represent.pdf
Please refer to the Network Diagram below Let Xij represent.pdfPlease refer to the Network Diagram below Let Xij represent.pdf
Please refer to the Network Diagram below Let Xij represent.pdf
 
Soru 2 Campbells orba irketi Rus tketicileri rnne b.pdf
Soru 2  Campbells orba irketi Rus tketicileri rnne b.pdfSoru 2  Campbells orba irketi Rus tketicileri rnne b.pdf
Soru 2 Campbells orba irketi Rus tketicileri rnne b.pdf
 
Sanayi Devrimi patlak verdi sz ne anlama gelmektedir Bu .pdf
Sanayi Devrimi patlak verdi sz ne anlama gelmektedir Bu .pdfSanayi Devrimi patlak verdi sz ne anlama gelmektedir Bu .pdf
Sanayi Devrimi patlak verdi sz ne anlama gelmektedir Bu .pdf
 
Since the late 19 th century US monufacturers were able t.pdf
Since the late 19 th century US monufacturers were able t.pdfSince the late 19 th century US monufacturers were able t.pdf
Since the late 19 th century US monufacturers were able t.pdf
 
Responda la siguiente pregunta basada en el estudio de caso .pdf
Responda la siguiente pregunta basada en el estudio de caso .pdfResponda la siguiente pregunta basada en el estudio de caso .pdf
Responda la siguiente pregunta basada en el estudio de caso .pdf
 
Required information The following intortabion appoies to t.pdf
Required information The following intortabion appoies to t.pdfRequired information The following intortabion appoies to t.pdf
Required information The following intortabion appoies to t.pdf
 
recommendation on remedaying addressed issues .pdf
recommendation on remedaying addressed issues            .pdfrecommendation on remedaying addressed issues            .pdf
recommendation on remedaying addressed issues .pdf
 
QUESTIONS System implementation is the process of preparing.pdf
QUESTIONS System implementation is the process of preparing.pdfQUESTIONS System implementation is the process of preparing.pdf
QUESTIONS System implementation is the process of preparing.pdf
 
Question 1 What is virtualization Question 2 How have clo.pdf
Question 1 What is virtualization Question 2 How have clo.pdfQuestion 1 What is virtualization Question 2 How have clo.pdf
Question 1 What is virtualization Question 2 How have clo.pdf
 
public ArrayList tT getReverseArraylist Returns an ArrayL.pdf
public ArrayList tT getReverseArraylist Returns an ArrayL.pdfpublic ArrayList tT getReverseArraylist Returns an ArrayL.pdf
public ArrayList tT getReverseArraylist Returns an ArrayL.pdf
 
please I need it in less than 30min thank you Required info.pdf
please I need it in less than 30min thank you Required info.pdfplease I need it in less than 30min thank you Required info.pdf
please I need it in less than 30min thank you Required info.pdf
 
Durine extreme meteornlogical drought Wood et al found it .pdf
Durine extreme meteornlogical drought Wood et al found it .pdfDurine extreme meteornlogical drought Wood et al found it .pdf
Durine extreme meteornlogical drought Wood et al found it .pdf
 
Let X be a random variable with probability density function.pdf
Let X be a random variable with probability density function.pdfLet X be a random variable with probability density function.pdf
Let X be a random variable with probability density function.pdf
 
Kullanlan kaynaklar almanzn sonunda Kaynaka bal altnda b.pdf
Kullanlan kaynaklar almanzn sonunda Kaynaka bal altnda b.pdfKullanlan kaynaklar almanzn sonunda Kaynaka bal altnda b.pdf
Kullanlan kaynaklar almanzn sonunda Kaynaka bal altnda b.pdf
 
42 Let x1x2xn be IID pvs with Commen df fx2x.pdf
42 Let x1x2xn be IID pvs with Commen df fx2x.pdf42 Let x1x2xn be IID pvs with Commen df fx2x.pdf
42 Let x1x2xn be IID pvs with Commen df fx2x.pdf
 
In the last few decades the alternative research paradigms .pdf
In the last few decades the alternative research paradigms .pdfIn the last few decades the alternative research paradigms .pdf
In the last few decades the alternative research paradigms .pdf
 
In using the Case of A amp B a consumer credit reporting .pdf
In using the Case of A amp B  a consumer credit reporting .pdfIn using the Case of A amp B  a consumer credit reporting .pdf
In using the Case of A amp B a consumer credit reporting .pdf
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 

Note This project is broken up into Windows and Mac version.pdf

  • 1. Note: This project is broken up into Windows and Mac versions (listed below). Security and privacy should never be an afterthought when developing secure software. A formal process must be in place to ensure they're considered at all points of the product's lifecycle. Microsoft's Security Development Lifecycle (SDL) embeds comprehensive security requirements, technology specific tooling, and mandatory processes into the development and operation of all software products. All development teams at Microsoft must adhere to the SDL processes and requirements, resulting in more secure software with fewer and less severe vulnerabilities at a reduced development cost. Office 365 isolation controls Microsoft continuously works to ensure that the multi-tenant architecture of Microsoft 365 supports enterprise-level security, confidentiality, privacy, integrity, local, international, and availability standards. The scale and the scope of services provided by Microsoft make it difficult and non- economical to manage Microsoft 365 with significant human interaction. Microsoft 365 services are provided through globally distributed data centers, each highly automated with few operations requiring a human touch or any access to customer content. Microsoft 365 is composed of multiple services that provide important business functionality and contribute to the entire Microsoft 365 experience. Each of these services is self-contained and designed to integrate with one another. Microsoft 365 is designed with the following principles: - Service-oriented architecture: designing and developing software in the form of interoperable services providing well-defined business functionality. - Operational security assurance: a framework that incorporates the knowledge gained through various capabilities that are unique to Microsoft, including the Microsoft Security Development Lifecycle, the Microsoft Security Response Center, and deep awareness of the cybersecurity threat landscape. How do Microsoft online services employ audit logging? Microsoft online services employ audit logging to detect unauthorized activities and provide accountability for Microsoft personnel. Audit logs capture details about system configuration changes and access events, with details to identify who was responsible for the activity, when and where the activity took place, and what the outcome of the activity was. Automated log analysis supports near real-time detection of suspicious behavior. Potential incidents are escalated to the appropriate Microsoft security response team for further investigation. Microsoft online services internal audit logging captures log data from various sources, such as: Event logs AppLocker logs Performance data System Center data Call detail records Quality of experience data IIS Web Server logs SQL Server logs Syslog data Security audit logs
  • 2. Windows Users - the Windows version requires Windows (7/10/11) operating environment. 1. Your task is to examine your Windows operating environment (7/10/11). Using ALL the available applications/apps provided by underlying operating system, identify these logs and document your findings as follows: Name of the log (using the list above). Sample of the log (1-2 records/objects/data items). Your own interpretation of the log (brief). If you cannot find any of the logs mentioned above, document that log(s) as follows: Name of the log. Current Operating System cannot provide this log OR "I am unable to identify this log data". 2. Investigate and list Applications and Windows failure logs including any Warnings using the Reliability Monitor. Combine your responses from the above into a Word document and submit by day 7 of this module. See the rubric for additional grading guidelines. MacOS Users, do the following: Go to VMWare and create a free account. Login and go to Hands-On Labs. Search for Windows 10 lab. Setup the virtual lab. Then, run the virtual lab for Windows 10. Now Mac users have access to Windows 10. 1. Your task is to examine your Windows operating environment (7/10/11). Using ALL the available applications/apps provided by underlying operating system, identify these logs and document your findings as follows: Name of the log (using the list above). Sample of the log (1-2 records/objects/data items). Your own interpretation of the log (brief). If you cannot find any of the logs mentioned above, document that log(s) as follows: Name of the log. Current Operating System cannot provide this log OR "I am unable to identify this log data". 2. Investigate and list Applications and Windows failure logs including any Warnings using the Reliability Monitor.