When doing a ping scan it came back with: 262 sec. scanned 256 host(s) scanned 21 host(s) online 235 host(s) offline on Corporation Techs Network Infrastructure. The Active host are in green and offline hosts are in Red.
The Protocols used in the network are TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more computers to communicate.
The Services being used by Corp Tech Management
Domain on the internet is a group of computers networked through some form of networking. When on the internet, this is defined by an ip. address.
Kerberos –sec is intended to provide secure authentication over insecure networks such as the Internet. Further, Kerberos provides for mutual authentication, each party can be assured of the identity of the other
Msrpc (Microsoft Remote ...view middle of the document...
We Can Harden the System to be exposed to less Vulnerabilities to the IT infrastructure is by closing ports that are not being used. Always have the most updated software on systems
* Non-essential services - It is important that an operating system only be configured to run the services required to perform the tasks for which it is assigned.
* Patches and Fixes - As an ongoing task, it is essential that all operating systems be updated with the latest vendor supplied patches and bug fixes (usually collectively referred to as security updates).
* Password Management - Most operating systems today provide options for the enforcement of strong passwords. Utilization of these options will ensure that users are prevented from configuring weak, easily guessed passwords. As an additional levels of security include enforcing the regular changing of passwords and the disabling of user accounts after repeated failed login attempts.
* Unnecessary accounts - All guest, unused and unnecessary user accounts must be disabled or removed from operating systems. It is also vital to keep track of employee turnover so that accounts can be disabled when employees leave an organization.
* File and Directory Protection - Access to files and directories must be strictly controlled through the use of Access Control Lists (ACLs) and file permissions.
* File and File System Encryption - Some file systems provide support for encrypting files and folders. For additional protection of sensitive data it is important to ensure that all disk partitions are formatted with a file system type with encryption features (NTFS in the case of Windows).
* Enable Logging - It is important to ensure that the operating system is configured to log all activity, errors and warnings.
* File Sharing - Disable any unnecessary file sharing
By doing this, our system will not be 100% protected, by we will less exposed .